text
stringlengths 1
20.5k
| meta
dict | score
float64 0
0.99
| span_scores
list |
---|---|---|---|
FROM ubuntu:16.04
COPY common.sh /
RUN /common.sh
COPY cmake.sh /
RUN /cmake.sh
COPY xargo.sh /
RUN /xargo.sh
COPY qemu.sh /
RUN apt-get install --assume-yes --no-install-recommends \
gcc-arm-none-eabi \
libnewlib-arm-none-eabi && \
/qemu.sh arm
ENV QEMU_CPU=cortex-m4 \
CARGO_TARGET_THUMBV7EM_NONE_EABIHF_RUNNER=qemu-arm
| {
"pile_set_name": "Github"
} | 0.009302 | [
{
"begin": 0,
"end": 18,
"score": 0.0052062036
},
{
"begin": 18,
"end": 36,
"score": 0.0471521
},
{
"begin": 36,
"end": 51,
"score": 0.058929358
},
{
"begin": 51,
"end": 68,
"score": 0.014507953
},
{
"begin": 68,
"end": 82,
"score": 0.02517722
},
{
"begin": 82,
"end": 99,
"score": 0.014299706
},
{
"begin": 99,
"end": 113,
"score": 0.018881164
},
{
"begin": 113,
"end": 129,
"score": 0.031014297
},
{
"begin": 129,
"end": 188,
"score": 0.008503466
},
{
"begin": 188,
"end": 343,
"score": 0.025692256
}
] |
Robust protocol for feeder-free adaptation of cryopreserved human pluripotent stem cells.
Human pluripotent stem cells (hPSCs) are conventionally maintained on mouse embryonic fibroblast (MEF) feeder layers. However, downstream applications, such as directed differentiation protocols, are primarily optimized for feeder-free cultures. Therefore, hPSCs must often be adapted to feeder-free conditions. Here we propose a novel feeder-free adaptation protocol using StemFlex medium, which can be directly applied to thawed hPSC lines.The direct feeder-free adaptation protocol using StemFlex culture medium on Geltrex coating led to robust hPSC cultures in approximately 2 weeks. This approach was tested with three human embryonic stem cell (hESC) lines. All lines were confirmed to be pluripotent, expressing POU5F1, SOX2, and NANOG. No chromosomal imbalances were induced by the feeder-free adaptation.StemFlex medium enabled the efficient adaptation of hPSCs to feeder-free conditions directly after thawing. This protocol is easy to implement in laboratories that perform feeder-free cultures, allowing more convenient adaptation and more robust expansion of cryopreserved hPSCs, even in cases when sample quality is low or unknown. | {
"pile_set_name": "PubMed Abstracts"
} | 0.010274 | [
{
"begin": 0,
"end": 90,
"score": 0.05852979
},
{
"begin": 90,
"end": 208,
"score": 0.01228664
},
{
"begin": 208,
"end": 336,
"score": 0.02124131
},
{
"begin": 336,
"end": 402,
"score": 0.015202113
},
{
"begin": 402,
"end": 678,
"score": 0.022213135
},
{
"begin": 678,
"end": 754,
"score": 0.0121478075
},
{
"begin": 754,
"end": 834,
"score": 0.037023053
},
{
"begin": 834,
"end": 1011,
"score": 0.022945397
},
{
"begin": 1011,
"end": 1235,
"score": 0.006525108
}
] |
Q:
Post revision shows a different user edited the answer
I've just stumbled across this answer, which shows Jeff as the last editor,
But, when I view the revision history it displays deceze as the editor.
So, who's the real editor here? (Is this a bug?)
A:
It's unlikely to be a bug... it's probably Jeff hacking the DB in the early days of SO. I'd guess that he deleted a revision from the PostHistory table but didn't backfill the change to the denormalised version in the Posts table that's (probably) used to render the question page.
Data.SE (probably) confirms this hypothesis. The LastEditorUserId in the Posts table is Jeff; but the only edit in the PostHistory table is deceze's.
I'd only call this a bug in that there's nothing to confirm consistency between the data that states the official truth and the data that's been denormalised for display. Whether you want this is a balance between determining the likelihood of data being incorrect vs. the loss of service if it is vs. the amount of system resources necessary to ensure the denormalised data is correct. My checks run daily :-).
| {
"pile_set_name": "StackExchange"
} | 0.092263 | [
{
"begin": 0,
"end": 59,
"score": 0.0085381735
},
{
"begin": 59,
"end": 137,
"score": 0.029812546
},
{
"begin": 137,
"end": 210,
"score": 0.13745339
},
{
"begin": 210,
"end": 243,
"score": 0.064523295
},
{
"begin": 243,
"end": 260,
"score": 0.09172598
},
{
"begin": 260,
"end": 265,
"score": 0.019297661
},
{
"begin": 265,
"end": 353,
"score": 0.08447654
},
{
"begin": 353,
"end": 547,
"score": 0.040971663
},
{
"begin": 547,
"end": 592,
"score": 0.020408317
},
{
"begin": 592,
"end": 1110,
"score": 0.054534122
}
] |
Teens
Writing a Paper
Jeffrey's history teacher assigned a term paper at the beginning of the semester. Most of the class groaned, but they didn't seem too worried. Not Jeffrey, though: The thought of having to write a paper made him really anxious. Because he didn't know where to begin, he put off thinking about the assignment until closer to the due date.
Although a lot of students take Jeffrey's "I'll deal with it later" approach to writing papers, it's actually better for your stress levels — not to mention grades — to start working on a paper as soon as you find out about it. With some planning and time, anyone can turn a blank document on a computer screen into a good paper.
Writing a paper can seem intimidating at first. But putting together a strong paper really just involves a combination of things you already know how to do.
Understanding the Assignment
The first step in writing a paper is to make sure that you understand exactly what your teacher expects. Here are some questions to ask before you start researching and writing so you can be sure you are on the right track:
What type of paper is it? Is it a report (where you just gather facts and describe a topic), a paper in which you must offer your own ideas on an issue, or both?
Are there specific class readings you must use as sources?
What types of sources do you have to use? Can you use only Internet sources, or do you have to use books, journals, and newspapers too? Does your teacher like you to interview people, or does he or she prefer you stick only to printed sources?
Are there certain types of sources that are off-limits? Obviously, blogs and personal web pages aren't considered reliable sources. But what about other websites you might want to use? Find out what your teacher thinks about your sources before you start work.
What will your teacher look for while grading your paper? For example, is your teacher looking for a casual, descriptive writing style (like a magazine article) or a research paper with a more formal tone? Is there a certain way your teacher wants you to structure your paper?
How long should the paper be (how many pages or words)?
Does the paper have to be typed or presented in a certain form (such as double-spaced lines, specific margins, presented in a binder)? Are there additional graphics that you also have to provide, such as illustrations or photos?
Do you have to provide a bibliography, footnotes, or other list of sources?
Sometimes a teacher will assign a topic or thesis for a paper, and sometimes he or she will leave it up to students to pick their own topics (of course these have to be related to the class or subject!).
If the teacher lets you choose your own topic, it's best to write a paper about something that you find really interesting. This might be an issue that you feel strongly about and want to defend (or one you disagree with and want to argue against!). After you come up with your topic, run it by your teacher before you move on to the next step — research.
Researching a Topic
Behind every good paper is even better research. Good research means reading a lot — both as background to help you choose a topic and then to help you write your paper.
Depending on your chosen topic, your research could come from class textbooks, newspapers, professional journals, and websites. These are known as your sources.
Sources need to be reliable. To find good sources, begin at your school library, where the card catalogs and search engines can direct you to materials that have been published. When a source has been chosen for your school's library collection, you can be fairly confident that it's accurate enough to use in your paper.
Using Online Sources
When doing online research, avoid people's personal pages — it's impossible to tell if the person is an expert or just sounding off. It's best to focus your research on government sites (their domain names end in .gov), non-profit organizations (they usually end in .org), and educational sites (.edu).
Knowing which sources are considered good — and which ones aren't — is a skill that everyone gains with experience. Get your teacher or librarian's help in deciding if a source is credible.
If you don't understand what a particular source is talking about, ask your teacher what it means so you can better understand the material. Teachers can usually tell when students use information in their papers that they don't really understand.
Keeping Track of Sources
Once you've found a good source, make a note of it so that you can use it for your paper. Keep a notebook or computer document that has the source's title, the page number of the important information, and a few notes about why it's important. This will help you move ahead efficiently as you write. It will also help you to cite your sources correctly (more on this later).
Writing Your Paper
The great part about doing lots of research is that when you really know your topic, writing about it becomes easier. Still, sitting with a blank computer screen in front of you and a deadline looming can be pretty intimidating. Even if you've read countless books, websites, and journals, and have all your notes prepared, it's normal to struggle with exactly how to get started on the actual writing.
The best way to begin? Just start putting ideas down on paper! The first few words don't have to be perfect (and there's a good chance they won't be) but you'll find it gets easier after you've started. And you can always revise the actual writing later — the important thing is getting your ideas down on paper. (You may have learned this approach in elementary school as writing a "web.") After your ideas are on paper, you can start outlining them.
Some people like to think of their first writing attempt as a "first draft," taking the pressure off of themselves to write every sentence and line perfectly. Another good tip for getting started is to write down your ideas like you're telling your parent, brother, or sister about them.
Don't feel that you have to write a paper in order. If you know how you want to prove your thesis, for instance, but don't know how to introduce it, you could write some or all of the supporting paragraphs before doing the introduction.
Most people make revisions while they're working. For example, you may be halfway through writing paragraph four when you realize there's a better way to argue the point you made back in paragraph two. This is all part of the thinking process. (And it's a good reason to leave plenty of time to do your paper rather than putting it off until the last minute!)
It's also a good idea to leave enough time after finishing a paper to put it aside for a few days and then go back to make revisions. Revising a paper is a step that even the best writers think is essential. When you haven't worked on your paper for a few days, any flaws or problems will stand out more: Look for things like unnecessary words, sentences that don't make sense, and points that don't follow on from or support each other.
Citing Your Sources
Your teacher will probably want you to cite your sources (which means list the sources you used for ideas, statements, and other information in your paper). Sources can be cited in different ways — such as endnotes, footnotes, or a bibliography. Each teacher has different preferences so ask yours for guidance.
Citation not only shows that a paper is well researched, it also lets the reader know which ideas came from your mind and which ideas came from someone else's. The only time it's OK not to use a citation is if the content is common knowledge (like the date of a well-known battle) or if the idea is your own.
Citing sources is important because it can help you avoid something called plagiarism. Plagiarism is using someone else's ideas or words without giving that person proper credit for creating them. The most common ways students plagiarize are copying, quoting, or summarizing from a source without properly citing where the information came from.
Plagiarism is a form of cheating — just like looking over someone's shoulder to copy answers during a test. But many people who plagiarize don't realize they're doing it. That's why it's so important to keep track of sources. After weeks of research, the average student will have a hard time remembering what points he or she came up with and what points came from sources. Teachers usually are tough on plagiarism — even if the student didn't mean to plagiarize. So keep good notes on your sources!
Dealing with Paper Stress
Knowing they have a paper to write can be stressful for many students. To avoid becoming overwhelmed, take these two simple steps:
Start as soon as the paper is assigned. That way you'll have plenty of time for unexpected events — such as research that takes longer than you think or realizing you don't really like the topic you chose and need to come up with another.
Break the paper down into manageable "mini-projects." Your first is brainstorming an idea or topic, the next task is doing research, then comes writing the paper, and after that you'll revise it. Figure out how much time you'll need for each "mini-project" — this will not only help you feel more in control, it will also give you an idea of how much time the overall paper will take, from research to finished product.
Writing papers is a learning exercise — that's why teachers assign them! Most teachers don't expect you to do it perfectly all by yourself. Even college students head to their professors after class for help. If you need help — anywhere from the brainstorming to understanding difficult material to the writing — don't be afraid to talk to your teacher. | {
"pile_set_name": "Pile-CC"
} | 0.046809 | [
{
"begin": 0,
"end": 6,
"score": 0.027409043
},
{
"begin": 6,
"end": 23,
"score": 0.01999182
},
{
"begin": 23,
"end": 106,
"score": 0.013119632
},
{
"begin": 106,
"end": 167,
"score": 0.09279997
},
{
"begin": 167,
"end": 252,
"score": 0.0801064
},
{
"begin": 252,
"end": 362,
"score": 0.013883209
},
{
"begin": 362,
"end": 591,
"score": 0.028267438
},
{
"begin": 591,
"end": 693,
"score": 0.014438537
},
{
"begin": 693,
"end": 742,
"score": 0.0681194
},
{
"begin": 742,
"end": 9756,
"score": 0.01999182
}
] |
High Voter Turnout a Crisis That Calls for Quick Republican Action
The media klieg lights are always on, but they dim just a tad around the close of the business day Friday. Everybody's off to happy hour, or making the week's last commute home. Media consumers take a break to spend time with friends and family, and it may be late in the weekend before they bother to consider issues affecting all society. So if you're a politician with some nefarious plan or embarassing confession, save it for late Friday -- and who knows? Maybe by the time Monday rolls around a whole bunch of other stories will have entered the news cycle and your item will be lost, forgotten.
That clearly was the strategy of Florida House Republicans who had every reason to be ashamed of their effort to overhaul state voter registration laws, six months after voter drives were credited with helping Barack Obama win Florida in the presidential election. The bill would bar two forms of voter identification that were valid in 2008. It doesn't address the need for more early voting and longer hours of open polls. And it was all done lickety split after Republicans stopped what ought to have been a robust debate. South Florida Democrats are not pleased. From the article in the St. Pete Times:
The House Democratic leader, Rep. Franklin Sands, D-Weston, took
the floor on a point of personal privilege to condemn the council's
action. He said the bill's contents were not made public until late
Thursday night while lawmakers were debating the budget. Sands asked
that the bill be returned to the same committee for more study and
testimony.
"This morning's deliberations failed to meet the Legislature's promise of open and fair government," Sands said.
On Sunday the Times published this furious editorial. Let's hope this story stays in the news this week. | {
"pile_set_name": "Pile-CC"
} | 0.158599 | [
{
"begin": 0,
"end": 67,
"score": 0.064523295
},
{
"begin": 67,
"end": 175,
"score": 0.14418322
},
{
"begin": 175,
"end": 246,
"score": 0.012356056
},
{
"begin": 246,
"end": 409,
"score": 0.035306264
},
{
"begin": 409,
"end": 529,
"score": 0.21539254
},
{
"begin": 529,
"end": 670,
"score": 0.059728492
},
{
"begin": 670,
"end": 936,
"score": 0.20669603
},
{
"begin": 936,
"end": 1014,
"score": 0.0121478075
},
{
"begin": 1014,
"end": 1096,
"score": 0.011870144
},
{
"begin": 1096,
"end": 1846,
"score": 0.15976663
}
] |
KarachiSnob.com connects
your fine business with quality customers who
are specifically searching for what you offer.
Reach the right audience, at the right time,
in the right way... with KarachiSnob.com.Click here to get started. | {
"pile_set_name": "Pile-CC"
} | 0.020131 | [
{
"begin": 0,
"end": 25,
"score": 0.014507953
},
{
"begin": 25,
"end": 71,
"score": 0.022351967
},
{
"begin": 71,
"end": 118,
"score": 0.009509998
},
{
"begin": 118,
"end": 163,
"score": 0.01665985
},
{
"begin": 163,
"end": 230,
"score": 0.029125832
}
] |
Why palliative care?
And so there we have it in a nutshell--palliative care is about caring. Caring for those who are dying and for those who look after them and then grieve their loss. Palliative care has risen like a phoenix from the ashes of neglect and bad management which, until recently, had been the lot of the dying. Perhaps this new specialty may become a guiding beacon leading a profession, somewhat bewitched and side tracked by its own scientific cleverness, back to the road of caring. I sincerely hope that as the specialty gains recognition it does not lose its present identify and fine sense of purpose. | {
"pile_set_name": "PubMed Abstracts"
} | 0.122449 | [
{
"begin": 0,
"end": 21,
"score": 0.019714156
},
{
"begin": 21,
"end": 93,
"score": 0.074912034
},
{
"begin": 93,
"end": 186,
"score": 0.028267438
},
{
"begin": 186,
"end": 326,
"score": 0.14687516
},
{
"begin": 326,
"end": 501,
"score": 0.047495455
},
{
"begin": 501,
"end": 622,
"score": 0.02517722
}
] |
Clinical evaluation and treatment of immune-mediated inner ear disease.
Immune-mediated inner ear disease, first described by McCabe in 1979, typically presents with an idiopathic, rapidly progressive bilateral sensorineural hearing loss. The course of the hearing loss occurs over weeks to months. It may occur in both sexes and at a variety of ages, but is most common in middle-aged females. It may be accompanied by tinnitus, Meniere's-like vertigo, or more commonly, ataxia or unsteadiness. Approximately 30% of patients will have associated systemic immune-mediated disease. Although refinements in laboratory tests for specific inner ear antigens are being made, and non-specific laboratory indicators of inflammatory or systemic immune disease may be useful in confirming the diagnosis, the most important diagnostic finding is the improvement in hearing seen with a trial of immunosuppressants. This report includes a typical evaluation of the patient with suspected immune-mediated inner ear disease and an illustrative case. Sensorineural hearing loss due to immune-mediated inner ear disease, although unusual as a cause of hearing loss, is important to recognize because early diagnosis and treatment can have a marked effect on the clinical outcome. | {
"pile_set_name": "PubMed Abstracts"
} | 0.046122 | [
{
"begin": 0,
"end": 72,
"score": 0.008086969
},
{
"begin": 72,
"end": 239,
"score": 0.14552918
},
{
"begin": 239,
"end": 299,
"score": 0.015757442
},
{
"begin": 299,
"end": 395,
"score": 0.0753116
},
{
"begin": 395,
"end": 496,
"score": 0.040284947
},
{
"begin": 496,
"end": 581,
"score": 0.026894007
},
{
"begin": 581,
"end": 904,
"score": 0.014369122
},
{
"begin": 904,
"end": 1036,
"score": 0.050585672
},
{
"begin": 1036,
"end": 1263,
"score": 0.0067680646
}
] |
Union Max Championship
The is a professional wrestling championship and the top singles accomplishment in the Japanese promotion Pro-Wrestling Basara, an affiliate and sister promotion of DDT Pro-Wrestling . The title was established in 2013 in Union Pro Wrestling, a promotion that was revived by DDT in 2005. Three days after its folding, Union was replaced by a new promotion named Pro-Wrestling Basara, which launched in January 2016.
Title History
Combined reigns
As of ,
See also
Professional wrestling in Japan
References
Category:DDT Pro-Wrestling championships | {
"pile_set_name": "Wikipedia (en)"
} | 0.021935 | [
{
"begin": 0,
"end": 23,
"score": 0.013952625
},
{
"begin": 23,
"end": 210,
"score": 0.015410362
},
{
"begin": 210,
"end": 313,
"score": 0.013050216
},
{
"begin": 313,
"end": 441,
"score": 0.016035106
},
{
"begin": 441,
"end": 456,
"score": 0.011453647
},
{
"begin": 456,
"end": 473,
"score": 0.05653196
},
{
"begin": 473,
"end": 482,
"score": 0.016798683
},
{
"begin": 482,
"end": 492,
"score": 0.014716201
},
{
"begin": 492,
"end": 525,
"score": 0.019158829
},
{
"begin": 525,
"end": 578,
"score": 0.009509998
}
] |
Heavily funded mobility startup Lime has announced plans to let its users book electric scooters up to 15 minutes in advance.
The San Mateo-based company, which recently raised a whopping $310 million at a $2.4 billion valuation, is piloting the new reservation feature in a handful of markets around the world, including Brisbane (Australia), Tel Aviv (Israel), and Lyon (France). It hasn’t said when it will expand the offering to other regions.
To use the new feature, which is only available in the iOS app for now, users need to tap on their desired scooter on the map, hit the reserve button, and then ensure that they unlock the scooter within the 15 minutes. During this period, the reserved scooter will not show up for other users in the Lime app, and no one else will be able to unlock it.
During the beta period, billing will only begin when the person who has made the reservation unlocks the scooter, though the announcement seems to suggest that there may be an additional charge when — or if — this feature officially rolls out more widely.
Wheel deal
Electric scooters emerged as one of the big breakout trends of 2018, and 2019 is already shaping up for more of the same. Besides Lime’s recent raise, which took its total funding to more than $760 million since inception two years ago, Bird raised another $300 million at a $2 billion valuation, while Sweden’s Voi Technology nabbed a further $30 million.
Lime rebranded from LimeBike last year to highlight its focus on multiple mobility options, including electric bikes and car-sharing. But it is scooters that have taken cities around the world by storm, with Lime now operating in dozens of conurbations across the Americas, Europe, the Middle East, and the Asia-Pacific region.
Being able to reserve a scooter is an incremental upgrade on the surface, but it makes the service more reliable for the end user — there is nothing more annoying than planning a journey around a scooter that’s located a few blocks away, only to discover that someone else has nabbed it before you got there. This feature makes the Lime service just that little bit stickier — if a user can guarantee that there will be an available scooter, they are more likely to use the service regularly. | {
"pile_set_name": "OpenWebText2"
} | 0.038053 | [
{
"begin": 0,
"end": 126,
"score": 0.009648831
},
{
"begin": 126,
"end": 383,
"score": 0.014716201
},
{
"begin": 383,
"end": 449,
"score": 0.0076010567
},
{
"begin": 449,
"end": 669,
"score": 0.016173938
},
{
"begin": 669,
"end": 803,
"score": 0.0186035
},
{
"begin": 803,
"end": 1060,
"score": 0.019297661
},
{
"begin": 1060,
"end": 1072,
"score": 0.031014297
},
{
"begin": 1072,
"end": 1195,
"score": 0.017492844
},
{
"begin": 1195,
"end": 1430,
"score": 0.018742332
},
{
"begin": 1430,
"end": 2252,
"score": 0.048868883
}
] |
Hyperkalemia during surgery: is it an early warning of propofol infusion syndrome?
We present a case of severe hyperkalemia in a 48-year-old man after short-term infusion of an average dose of propofol. We suspected that the hyperkalemia in this patient was a sign of propofol infusion syndrome. The patient was undergoing a video-assisted esophagectomy, for which one-lung ventilation, with air/oxygen, isoflurane, and continuous epidural analgesia was supplemented with propofol infusion. In the intraoperative period, the patient developed severe hyperkalemia with mild acidosis but no cardiovascular failure. There were no other evident causes of hyperkalemia as documented by laboratory data. The procedure was abandoned and the patient was taken to postoperative recovery, where his potassium levels returned to normal at the end of 10 h. | {
"pile_set_name": "PubMed Abstracts"
} | 0.029298 | [
{
"begin": 0,
"end": 83,
"score": 0.023460433
},
{
"begin": 83,
"end": 203,
"score": 0.037194733
},
{
"begin": 203,
"end": 296,
"score": 0.026722329
},
{
"begin": 296,
"end": 491,
"score": 0.027580723
},
{
"begin": 491,
"end": 613,
"score": 0.011106567
},
{
"begin": 613,
"end": 698,
"score": 0.017423427
},
{
"begin": 698,
"end": 844,
"score": 0.010481823
}
] |
Robert Bradshaw (figure skater)
Robert Bradshaw (October 8, 1952 – March 26, 1996) was an American figure skater. He won gold medals at the 1972 Nebelhorn Trophy and International St. Gervais. He placed 12th at the 1973 World Championships.
Early years
Robert Bradshaw was born to Bob and Freda Bradshaw in Los Angeles, California. He and his brother Dennis grew up in Sherman Oaks, California.
Bradshaw married Maralee Marrs on Nov 18, 1972. Together they had a son, Dennis Bradshaw (Den Bradshaw). In addition to his skating career, he was also a master jeweler and created "Frith and Bradshaw Jewelers" with his partner Larry Frith. Bradshaw died from cancer on March 26, 1996.
Skating career
Bradshaw decided to become a figure skater at the age of eight. He was coached by Frank Carroll at Van Nuys Iceland in the San Fernando Valley. He won the silver medal in men's singles at the 1973 U.S. Figure Skating Championships. He was an alternate on the U.S. men's Olympic figure skating team. Serious tendonitis in both of his knees and a motorcycle accident forced him to turn professional.
Bradshaw was the first figure skater to successfully perform a double axel jump initiated and performed with the arms folded in competition. This variation of the Axel requires significant height to be able to complete the rotations, rather than the more common technique of performing a lower jump with very fast rotation generated by pulling the arms into the body.
After retiring from competition, Bradshaw began teaching at Van Nuys Iceland before being offered a position as head coach at Squaw Valley Olympic Training Center in Tahoe. After moving his family to Truckee and teaching at Squaw for approximately one year, the former site of the 1960 Winter Olympics roof collapsed after the maintenance company in charge of removing the snow from the building's roof failed to maintain the building. Bradshaw moved to Sacramento, California and became head coach at Birdcage Ice Arena in Citrus Heights.
Results
References
Category:1954 births
Category:1996 deaths
Category:American male single skaters | {
"pile_set_name": "Wikipedia (en)"
} | 0.033074 | [
{
"begin": 0,
"end": 32,
"score": 0.012703137
},
{
"begin": 32,
"end": 115,
"score": 0.017006932
},
{
"begin": 115,
"end": 185,
"score": 0.010551238
},
{
"begin": 185,
"end": 194,
"score": 0.0015878921
},
{
"begin": 194,
"end": 242,
"score": 0.0069763125
},
{
"begin": 242,
"end": 256,
"score": 0.0186035
},
{
"begin": 256,
"end": 335,
"score": 0.0129808
},
{
"begin": 335,
"end": 399,
"score": 0.03444787
},
{
"begin": 399,
"end": 448,
"score": 0.011175984
},
{
"begin": 448,
"end": 2112,
"score": 0.06771983
}
] |
ESSENDON players have been given extra time to respond to ASADA allegations they used banned peptide Thymosin Beta 4.
The allegations are made in show-cause notices issued last week by ASADA to 34 players on Essendon’s list in 2012.
Lawyers for the players requested an extension to the initial 10-day deadline, which expires on Monday, to argue why they should not be placed on the Register of Findings — the trigger for the AFL to begin the process of issuing infraction notices that could lead to two-year bans.
The date is after a Federal Court directions hearing on June 27 when the Bombers and James Hird will present their case that the joint AFL-ASADA investigation is unlawful. A final ruling is not expected for several months.
Essendon and the AFLPA called on ASADA to freeze the investigation until after the court case is resolved, but ASADA has not agreed to that request.
Yesterday, the AFL Players Association refused to rule out further legal action against ASADA, saying the drug body’s recent actions have been “extremely disappointing”.
It comes as an explosive email from the AFL to ASADA has been revealed as the reason why Essendon players believed they would escape doping bans.
“I would think in terms of ASADA’s duties ... that they provide that evidence so that we can give them advice based on what, if anything, has been gathered since the interim report.”
Prendergast also commented on the recent report suggesting nine other clubs were being investigated over health and safety matters.
“We were supportive of the AFL’s audit it undertook in relation to talking to all clubs in regards to the practices and procedures they have in place.”
“We are also comfortable with the subsequent steps the AFL have taken to deal with that matter and also the changes that we have worked through with the AFL to the anti-doping code.”
READ THE AFLPA’S FULL STATEMENT AT THE BOTTOM OF THE PAGE
Today’s developments come after the Herald Sun revealed an explosive email from the AFL to ASADA reveals why Essendon players believed they would escape doping bans.
The email, also sent to then prime minister Julia Gillard’s office, sheds light on a major split between the AFL and ASADA over a behind-the-scenes agreement struck in February last year.
The agreement stated that “to provide an immediate level of comfort ... it will be explained to players that under a no fault or negligence defence a player can receive a complete elimination of sanction”.
ASADA handed a copy of the agreement to players and talked them through the details on February 20 last year — 15 days after footy’s doping scandal erupted.
Sources say the players have since been of the strong belief they were not the focus of the investigation and would escape penalty over Essendon’s 2012 supplements program, owing to “exceptional circumstances” acknowledged in the agreement.
But in the email from a senior AFL figure, seen by the Herald Sun, it emerges ASADA attempted to alter the agreement two weeks later.
Revelations of the dispute, and the league’s strong backing of the players, comes as the anti-doping agency pushes to ban 34 former and current Bombers who were issued with “show cause” notices last week.
The email, which was sent on March 7 last year, says: “It is the AFL’s, Essendon Football Club’s (and its players and officials), and the AFL Players’ Association’s clear understanding that the Investigation and any subsequent actions will be conducted in accordance with your Original Statement.
“Further, the AFL, the Essendon Football Club (and its players and officials), and the AFL Players’ Association have all relied upon the Original Statement and the Investigation has commenced and is ongoing on the basis of this reliance.”
Part of the letter front he AFL to ASADA.Source:Supplied
The second half of the letter from AFL to ASADA.Source:Supplied
The email shows the extent of dealings between the AFL, ASADA and the Gillard government in the early days of the Essendon investigation.
“The wording released by ASADA on 20 February 2013 (Original Statement) (as detailed in Annexure A to this letter) was extensively negotiated between the AFL and ASADA, and, in our view, is clear on its face and unambiguous,” the email says.
Sources say the agreement will be a critical element of the players’ defence to ASADA’s show-cause notices.
Essendon stars and their lawyers are still of the belief that players have not been administered a banned substance, but also that they would escape any sanction if it was discovered they had been deceived, provided they co-operated under the terms of the February agreement.
Players were bemused when ASADA chief executive Ben McDevitt last week appeared to suggest six-month suspensions would be available if they came forward and cooperated, which sources said they had done.
The reliability of the original agreement is believed to have been a discussed at a meeting between players and their lawyers on Monday night.
— with Brendan Lucas
Acting AFLPA chief executive Ian Prendergast.Source:News Limited
STATEMENT FROM ACTING AFLPA BOSS IAN PRENDERGAST:
“Following the serious development of players being issued show cause notices by ASADA, and the subsequent media coverage, I’d like to provide clarity around the current situation and process from here.
The players met on Monday night and were briefed by their legal team, consisting of AFL Players’ Association lawyers Bernie Shinners and Brett Murphy, in addition to Tony Hargreaves; who are jointly instructing David Grace QC and Ben Ihle of Counsel.
The players’ legal team has now written to ASADA to request an extension to the 10 day period in which they were asked to respond, and to request a copy of all documents and other materials that ASADA proposes to put to the Anti-Doping Rule Violation Panel in respect of the players.
To date, the players’ lawyers have not been provided with the evidence which would enable players to respond to the show cause notices, and their requests to be provided with this material have been refused.
The CEO of ASADA, Ben McDevitt, has publicly urged players to come forward and co-operate with ASADA, and suggested that players may be able to utilise a plea of ‘no significant fault or negligence’, and have their penalties reduced on the basis of ‘substantial assistance’.
In saying this, Mr. McDevitt seems to be suggesting that players have not fully co-operated with ASADA, yet nothing could be further from the truth. The players have done nothing but cooperate with ASADA, as they were advised to do by their Association, their club, the AFL and by ASADA officials. ASADA’s investigators have praised the players, who they considered professional, co-operative and sincere in their efforts to assist the investigation.
In circumstances where not one player believes he has taken a prohibited substance, and where the players have not been provided the evidence on which ASADA relies to make this claim, why would any player consider the approach that Mr. McDevitt suggests.
ASADA, as a model litigant, has a duty to provide players with the evidence to enable them to respond to the show cause notices. If it refuses to provide this information voluntarily, then the players will be forced to take legal action to ensure that ASADA complies with its model litigant obligations and acts fairly with respect to the players.
The players’ legal team will also ask ASADA to stay the show cause process, including referral of these matters to the ADRVP, until after the club’s Federal Court action has been concluded.
It is important to note that this request is not a delaying tactic — the players are, in fact, keen for this matter to be resolved, given the length of time in which this has now dragged on.
However, it makes no sense to subject players to the next stage in this process, in circumstances where the club’s legal action may subsequently render the process invalid. We therefore urge ASADA and the Club to take steps to expedite this process in the Federal Court to finalise this matter at the earliest opportunity.
Again, the players’ lawyers are yet to be provided any evidence implicating players in a breach of the AFL Anti-Doping Code. In the absence of any such evidence, questions of ‘defences’ and ‘reduced sanctions’ are premature.
Nevertheless, if the evidence does establish a breach of the code, then the steps taken by players to assure themselves that substances administered were compliant with the WADA Code must be taken into account.
The players took all reasonable steps to ensure that the substances they were to be administered were compliant with the WADA Code, and were provided with written guarantees to this effect. If it turns out that those substances were not compliant, and the players were deceived by those who they were asked to trust, they should not be punished as a result.” | {
"pile_set_name": "Pile-CC"
} | 0.070517 | [
{
"begin": 0,
"end": 118,
"score": 0.029125832
},
{
"begin": 118,
"end": 234,
"score": 0.012356056
},
{
"begin": 234,
"end": 517,
"score": 0.029640866
},
{
"begin": 517,
"end": 690,
"score": 0.08290337
},
{
"begin": 690,
"end": 741,
"score": 0.011592479
},
{
"begin": 741,
"end": 891,
"score": 0.012703137
},
{
"begin": 891,
"end": 1062,
"score": 0.13476147
},
{
"begin": 1062,
"end": 1209,
"score": 0.13700475
},
{
"begin": 1209,
"end": 1393,
"score": 0.012078391
},
{
"begin": 1393,
"end": 8929,
"score": 0.07211506
}
] |
Tripping at a Nepalese Wedding: cultural exchange in a remote Nepal village
After spending the last year teaching English in South Korea, I traveled with my boyfriend David (also a Tripper) around Nepal, India, Thailand, Laos, Malaysia, and Singapore. In Nepal, we met up with a Tripper named Tika.
Tika lives in Kathmandu and runs a trekking company called Adventure Mountain Explore. He kindly invited us to join him on a family trip to his wife's hometown (a remote village in Ghorka), to attend his brother-in-law's traditional wedding ceremony and celebration. It was an almost surreal experience. I had never pictured myself taking some of the craziest bus rides of my life to a wedding in a village that had previously been visited by only one other foreigner.
Tika's family and the villagers in his wife's hometown were incredibly warm and welcoming. I think we must have met every member of the community over the three days we were there. We stayed with a neighbor who I bonded with despite the language barrier between us.
The meal we shared the day after the ceremony was one of the most memorable I've had during my travels. We looked on as two goats were killed and butchered for lunch. As the meal was prepared for the entire village we played cards and drank Nepali tea with some of the local men and Tika. When lunch was ready they lined up plates in an L-shape on the grass for us to eat. We ate in shifts; when one person finished somebody else would come and fill their spot. Several women walked around giving second helpings of rice, mutton (goat) curry, and vegetables.
I don't think either of us have ever danced so much. The musicians, children, and women called on us to dance at every opportunity and we couldn't say no. Somebody would sing a short snippet of a song we named Jim Jim (not sure the real name) and then the trumpets would start and we would begin dancing. Watching the women of the village in their rich red clothes singing the Jim Jim song to us is one moment I will never forget.
I hope one day Tika and his family visit us wherever we settle down (somewhere in the U.S.?). In the meantime, David and I are continuing our travels and very much looking forward to our next Tripping adventure!
Want to know more about Danielle's adventures Tripping at a Nepalese wedding? Connect with her via her Tripping profile and follow her adventures via her blog.If you're in Nepal, you can Trip with Tika. Click here to connect with him via his Tripping profile and here to visit his trekking company site.
About
Tripping is the world's largest search engine for vacation rentals. Compare top rental sites at once to get the best deal on your next trip. With over 2.5 MILLION vacation homes and short-term rentals on Tripping, you're sure to find the perfect place to stay. | {
"pile_set_name": "Pile-CC"
} | 0.021658 | [
{
"begin": 0,
"end": 76,
"score": 0.015896274
},
{
"begin": 76,
"end": 253,
"score": 0.02193547
},
{
"begin": 253,
"end": 300,
"score": 0.124380715
},
{
"begin": 300,
"end": 388,
"score": 0.009718247
},
{
"begin": 388,
"end": 568,
"score": 0.0069763125
},
{
"begin": 568,
"end": 605,
"score": 0.015896274
},
{
"begin": 605,
"end": 770,
"score": 0.25676212
},
{
"begin": 770,
"end": 862,
"score": 0.010967735
},
{
"begin": 862,
"end": 952,
"score": 0.019158829
},
{
"begin": 952,
"end": 2815,
"score": 0.13565879
}
] |
Floodwaters turned two northern California wine country communities into islands reachable only by boat began on Wednesday, swamping thousands of homes and businesses.
A Guerneville neighborhood sits in floodwaters on 27 February 2019
The Russian river in wine country north of San Francisco crested at more than 46ft (14 meters) on Wednesday night, Sonoma county officials said. The river frequently floods in rainy weather but it had not reached that level in 25 years.
An estimated 2,000 buildings became inundated, mainly in and around the community of Guerneville.
“Guerneville has essentially become an island,” the Sonoma county spokeswoman, Briana Khan, said.
A woman with a dog sails a kayak on a flooded street in Guerneville on 27 February 2019
Mailboxes sit underwater in a flooded neighborhood in Forestville.
Jeff Bridges, a hotel co-owner who is president of the Russian River Chamber of Commerce, spent the day canoeing through Guerneville and gave a ride to a couple and their dog who were stranded in a low-lying apartment.
Five people whose homes were flooded were bunking down at his two-bedroom home, Bridges said.
“We saw quite a few fish swimming by my front porch,” he said.
The flood was the fourth Bridges has experienced in 33 years and the locals took the disaster calmly.
“It’s the price you pay to live in paradise,” he said. “Buffalo, New York, puts up with blizzards. Miami and Houston put up with hurricanes … we have floods.”
Homes and businesses sit under water in a flooded neighborhood of Guerneville.
Left: the top of a pickup truck peeks out from under flood waters in Forestville.
Right: a military vehicle sits on a bridge over the Russian river in Guerneville.
No injuries were reported in the Guerneville area and by Wednesday night the rain had eased, but about 3,500 people in two dozen river communities remained under evacuation orders.
In addition, two sewage treatment plants were not working, leading to concerns about potential sewage spills.
Workers of the Pacific Gas & Electric utility company are seen on a flooded street in Forestville.
The water began receding on Thursday but is not expected to return to the river’s banks until later in the day.
The river was one of several in northern California that was engorged by days of rain from western US storms. The weather system also dumped heavy snow in the Sierra Nevada, throughout the Pacific north-west and into Montana.
Ryan Lance and Anthony Nash of the Russian River fire protection district swift water rescue team help evacuate residents in lower Guerneville. | {
"pile_set_name": "OpenWebText2"
} | 0.060927 | [
{
"begin": 0,
"end": 168,
"score": 0.030670939
},
{
"begin": 168,
"end": 236,
"score": 0.06252546
},
{
"begin": 236,
"end": 382,
"score": 0.020130653
},
{
"begin": 382,
"end": 474,
"score": 0.008885254
},
{
"begin": 474,
"end": 573,
"score": 0.012008976
},
{
"begin": 573,
"end": 672,
"score": 0.009371166
},
{
"begin": 672,
"end": 761,
"score": 0.08447654
},
{
"begin": 761,
"end": 829,
"score": 0.028782474
},
{
"begin": 829,
"end": 1049,
"score": 0.22422299
},
{
"begin": 1049,
"end": 2594,
"score": 0.104076885
}
] |
---
abstract: 'We investigate quantum interrogation techniques which allow imaging information about semi-transparent objects to be obtained with lower absorption rates than standard classical methods. We show that a gain proportional to $\log N$ can be obtained when searching for defects in an array of $N$ pixels, if it is known that at most $M$ of the pixels can have transparencies different from a predetermined theoretical value. A logarithmic gain can also be obtained when searching for infrequently occurring large structures in arrays.'
address: |
${}^1$ Hewlett-Packard Laboratories, Filton Road,\
Stoke Gifford, Bristol BS34 8QZ, U.K.\
${}^3$ Centre for Quantum Computation, Clarendon Laboratory,\
Department of Physics, University of Oxford, Parks Road,\
Oxford OX1 3PU, U.K.
author:
- 'Adrian Kent${}^{1,2}$ and David Wallace${}^3$'
date: February 2001
title: 'Quantum Interrogation and the Safer X-ray'
---
\#1[\#1|]{} \#1[| \#1]{} \#1[\#1 |]{} \#1[| \#1]{} \#1\#2[ \#1 | \#2 ]{} \#1[ \#1 ]{} \#1\#2[ \#1 , \#2 ]{} § \#1[[**Lemma$~#1$**]{} ]{} \#1[[**Theorem$~#1$**]{} ]{} \#1[[**Corollary$~#1$**]{} ]{} [[v]{}]{}
${}^2$ On leave from DAMTP, University of Cambridge, Silver Street, Cambridge CB3 9EW, U.K.
[2]{}
Introduction
============
The well-known Elitzur-Vaidman quantum interrogation scheme[@ev] uses interferometry in a way which sometimes allows photo-sensitive objects to be detected without absorbing a photon. In EV’s original example, starting from a mixed supply of “good” bombs that will explode if a single photon hits the trigger and of dud bombs which reflect photons without exploding, a guaranteed supply of unexploded good bombs can be produced. EV’s probabilistic scheme was significantly refined by Kwiat et al.[@kwiatetal], who showed that the probability of absorption-free detection of a photo-sensitive object can be made arbitrarily close to one by a quantum Zeno interferometry technique.
These schemes both distinguish perfectly opaque from perfectly transparent (or, in the original formulation, perfectly reflecting) objects. They inspired the hope that effectively absorption-free quantum interrogation methods could also be used to discriminate semi-transparent objects of different transparencies. Such absorption-free discrimination, if possible, would be of great practical value. It could, for example, allow a “safe X-ray”, in which images of a patient’s internal structure could be obtained with arbitrarily low absorption of harmful X-rays.
In fact, though, the Kwiat et al. quantum Zeno technique does not allow absorption-free discrimination between partially opaque objects[@kwiatscripta]. More generally, Mitchison and Massar have shown[@mm] that there is a non-zero bound on the probabilities of absorption involved in any scheme discriminating between two imperfectly opaque objects.
The Mitchison-Massar bound might be taken as dampening hope of finding any seriously valuable imaging applications of quantum interrogation other than discriminating a partially opaque and a completely transparent object. However, such pessimism would be unjustified. We describe here two quantum interrogation schemes which show that quantum information can indeed be used to extract imaging information about semi-transparent objects with significantly reduced absorption rates. Though the safe X-ray is impossible, a somewhat safer X-ray is viable, at least in theory.
We represent the object to be imaged as an array of $N$ pixels, labelled by $i$ from $1$ to $N$, with transparencies $\alpha_i$ for the relevant radiation. That is, the interaction between a photon and the $i$-th pixel is described by $$\ket{ \gamma^{\rm in}_i } \ket{i} \rightarrow \alpha_i
\ket{ \gamma^{\rm out}_i } \ket{i} +
\beta_i \ket{ i^* } \, ,$$ where $\ket{ \gamma^{\rm in}_i } $ and $\ket{ \gamma^{\rm out}_i}$ describe incoming and outgoing photons in a beam passing through the $i$-th pixel, $\ket{i}$ is the initial state of the $i$-th pixel, $\ket{ i^* }$ is the excited state of the $i$-th pixel after absorbing a photon, and $ | \alpha_i |^2 + | \beta_i |^2 = 1$, with $ 0 \leq | \alpha_i | \leq 1 $.
Our aim is to extract useful imaging information about the pixel array transparencies while minimizing the expected number of photons absorbed in the array. Specifically, we are interested in quantum methods which do better in this respect than standard X-ray imaging. A standard X-ray image is effectively obtained by firing a number of photons separately through each of a number of different pixels, counting the number of outgoing photons, and statistically inferring information about the individual pixel transparencies or some joint functions thereof. This “classical” method makes no essential use of the fact that quantum information is being generated in the imaging process. Indeed, it makes no use of quantum theory at all, beyond the fact that photons are quantised. Effectively the same method could be used with classical radiation, assuming some finite bound on the sensitivity with which the amplitude of the outgoing radiation can be measured, and indeed this is how most standard imaging schemes work in practice.
From the perspective of quantum information theory, however, the classical method seems unlikely to be optimal for general problems. The pixel array behaves like a non-unitary oracle in its action on incoming quantum states. It is well known in quantum computing that interrogating a unitary oracle by quantum superposition states and processing the outputs can be far more efficient than invoking it only on the basis states which define its action. It should not be surprising that this turns out also to be true of non-unitary oracles. In fact, as we show here, it is true in simple examples which arise naturally as imaging problems.
Testing an array for defects
============================
Consider the following situation. We know that the transparency of pixel $i$ should be $\alpha_i$, if nothing untoward has occurred. However, we are concerned that there may be a small number of pixels whose transparency is in fact significantly different from the theoretical value, and we wish to check on this. To be precise, we have some fixed parameter $\epsilon$, and know that up to $M$ of the pixels may have an altered transparency $\alpha'_i$, where $| \alpha'_i - \alpha_i | \geq \epsilon $, while the rest of the transparencies are unaltered. We wish to be statistically certain, to within some prescribed degree of confidence $(1- \delta)$, whether or not there are any altered transparency pixels. If there are, we wish to identify them.
This problem would arise, for example, for pixel arrays manufactured by a generally reliable process that occasionally suffers from some specific defect on individual pixels. It is also an idealisation of the imaging problem that arises when we have previously taken an X-ray of a (then) healthy patient and now want to know whether any significant change has occurred, if we may assume that any changes will be confined to a small part of the image.
In the following discussion we take $M$, $\delta$ and $\epsilon$ to be fixed, with $N$ varying. We are interested in the behaviour for large $N$; in particular we assume $N$ is large compared to $M^2$, $\epsilon^{-2}$ and $\delta^{-1}$. We also assume the $\alpha_i$ are generally not close to $0$ or $1$.
The classical method requires estimating the transparency of each pixel separately. This is done by firing photons through each pixel and ensuring that the transparencies can all be identified, either as the expected $\alpha_i$ or as differing by at least $\epsilon$, with confidence $(1- \delta )$ that none of the $N$ identifications is erroneous. A classically obtained image giving this degree of confidence separately for each of the individual pixel identification requires $O( \epsilon^{-2} N )$ absorptions. However, as $N$ grows, the chance that at least one of the $N$ pixel transparencies will be misestimated by more than $\epsilon$ grows logarithmically in $N$. Allowing for this, we see that the classical solution to the problem defined requires an absorption rate of $O( \epsilon^{-2} N \log (N) )$.
Consider now the following quantum method. Each incoming photon is split into an equally weighted superposition of states incident on each of the pixels. That is: $$\ket{\gamma_{\rm in} } \rightarrow {1 \over {\sqrt{N}}} \sum_{i=1}^N
\ket{\gamma_{\rm in}^i } \, .$$ Let the actual transparency of pixel $i$ be $\beta_i$. After passing through the pixels, the photon, if it was not absorbed, is in the state $${C \over {\sqrt{N}}} \sum_{i=1}^N \beta_i \ket{ \gamma_{\rm out}^{i} } \, ,$$ where $C$ is a normalisation constant and $\ket{\gamma_{\rm out}^i }$ are the states of photons emerging on the far side of pixel $i$.
We now need to know whether the photon was absorbed or not. If the absorptions themselves are not easily detected, this can in principle be tested by carrying out a von Neumann measurement of the photon number of the outgoing beam state. Assuming no absorption, we now carry out a further von Neumann measurement, measuring the projection $P_{\psi}$ onto the state $$\ket{ \psi } = {C' } \sum_{i=1}^N \alpha_i \ket{
\gamma_{\rm out}^i } \, .$$ If we obtain eigenvalue $0$, we know that the normalised outgoing state was not $\ket{\psi}$, and hence that not all the pixel transparencies can have the theoretical value. In this case, we apply a second measurement, simultaneously measuring the projections onto the states $\ket{\gamma_{\rm out}^i}$ for $i$ from $1$ to $N$. In other words, we look to see which of the outgoing beams we find a photon in. We take the answer $i$ to indicate that pixel $i$ is defective.
Reducing the probability of a false negative — a defective pixel array producing eigenvalue $1$ throughout the sequence of tests — to $\delta$ requires $O( \log ( \delta^{-1}) N \epsilon^{-2} )$ such tests. and hence (given our assumptions about the $\alpha_i$) this order of absorptions. Comparing the classical technique, and considering only the $N$-dependence for large $N$ (since the other parameters are fixed), we find a reduction of a factor of $O( \log N )$ in the absorption rate.
When the defect test is positive, the probability of mis-identifying a good pixel as defective when we measure the outgoing beam is $O ( M / N )$. If this level of certainty is acceptable, a pixel thus identified as defective can be excluded from later tests. Up to $M$ defective pixels can then be identified as defective, with the probability of any erroneous identification being $O ( M^2 / N )$. If these certainty levels are insufficient, we may require more than one positive result to identify a defective pixel. For any fixed level of certainty, however, the overall gain over the classical method remains proportional to $\log N$.
These calculations assume that the theoretical values of the $\alpha_i$ are determined with absolute precision. In the realistic case in which these values are themselves subject to errors, of sizes bounded by $\epsilon'$, the conclusions hold so long as $\epsilon' \ll (M \epsilon / N )$.
Searching for infrequently occurring large structures
=====================================================
We again consider an array of $N$ pixels, and suppose now that we are looking for a particular type of rarely occurring image. We model this as follows. Our aim is to decide, with confidence $(1 - \delta )$, whether the array has a particular pattern $\{ \alpha_i^0 \}$ of transparencies. We suppose that the prior probability of this pattern occuring is some small but non-zero number $p$, and that with probability $(1-p)$ the pixel transparencies are randomly drawn from identical independent probability distributions. To be definite, we suppose that in this latter case the pixel transparencies are uniformly distributed in the complex unit disc. We suppose also that $\exp ( - \sqrt{N} ) \ll \delta p $.
We neglect constant factors throughout this section, considering only the degree of dependence on the parameters $N, \delta, p$.
Classically, we can only approach this problem by obtaining statistical estimates of some or all of the $| \alpha_i |$, and comparing the estimates to $| \alpha_i^0 | $. Estimating the $| \alpha_i | $ on $r$ pixels to within error $\epsilon$ requires $ \approx r \epsilon^{-2} $ photon measurements and absorptions. Suppose that $r$ such measurements produce the estimates $ | | \alpha_i | - | \alpha_i^0 | | < \epsilon$. For this to give us the required confidence that we have found an example of the image requires that $\epsilon^{r} \approx \delta p$. Minimizing with respect to $\epsilon$, we find this strategy requires $\approx - \log ( \delta p )$ absorptions.
In a quantum approach to the problem, we proceed as in the previous example, preparing an equal superposition of photon states incident on the pixels and, if there is no absorption, testing whether the emerging state is $\ket{ \psi^0 } = {C' } \sum_{i=1}^N \alpha_i^0 \ket{
\gamma_{\rm out}^i }$. In the case where the pixel transparencies were randomly drawn from uniform distributions, the probability that they are such that the emerging state $\ket { \psi }$ obeys $ | \braket{ \psi_0 }{ \psi } |^2 >
{ 1 \over { \sqrt{N}} }$ is $\approx \exp ( - \sqrt{N} )$, which is negligible in our calculations. So we may assume that a randomly drawn array will have transparencies such that $ | \braket{ \psi_0}{ \psi } |^2 < { 1 \over { \sqrt{N}} }$. We can confidently conclude that the image sought is present after $x$ successful (and no unsuccessful) tests, where $ ( {1 \over { \sqrt{N} } } )^x \approx \delta p $, so that $x \approx \max ( {{ - \log ( \delta p ) } \over { \log N }} , 1 )$. As this represents the order of the number of absorptions required, we again find a logarithmic quantum advantage.
These arguments generalise to a search for an infrequently occurring image which may be any one of $N$ known possibilities whose transparencies define $N$ orthogonal states $\ket{ \psi_i }$.
Conclusions
===========
The methods we have described show that quantum interrogation can have useful advantages over standard classical methods for realistic large array imaging problems. It is perhaps worth noting that these methods apply equally well to time-dependent imaging problems. A single array in our model could, for example, represent a smaller array being repeatedly probed at a sequence of times.
A further example of a problem in which there is a logarithmic quantum advantage has been found by Massar et al.[@mmp]. It would be good to have a general understanding of the range of problems in which there is a quantum advantage. It would also be useful to identify the advantage attainable by optimal techniques, both for the problems we have described and more generally. Here the bounds obtained in independent work by Massar et al.[@mmp] may be of help.
Acknowledgements
================
We gratefully acknowledge discussions with Graeme Mitchison, and thank him in particular for stimulating us to consider the defective pixel identification step in our first quantum interrogation example. AK was supported by a Royal Society University Research Fellowship and by PPARC. DW was supported by an EPSRC Research Studentship.
[99]{}
A. Elitzur and L. Vaidman, Found. Phys. [**23**]{} 987 (1993). P. Kwiat et al., Phys. Rev. Lett. [**74**]{} 4763 (1995). P. Kwiat, Physica Scripta [**T76**]{} 115 (1998). G. Mitchison and S. Massar, Phys. Rev. A. [**63**]{} 032105 (2001). S. Massar, G. Mitchison and S. Pironoio, quant-ph/0102116.
| {
"pile_set_name": "ArXiv"
} | 0.014091 | [
{
"begin": 0,
"end": 202,
"score": 0.006247444
},
{
"begin": 202,
"end": 437,
"score": 0.0136749605
},
{
"begin": 437,
"end": 548,
"score": 0.008677006
},
{
"begin": 548,
"end": 559,
"score": 0.0095794145
},
{
"begin": 559,
"end": 614,
"score": 0.017909339
},
{
"begin": 614,
"end": 655,
"score": 0.017909339
},
{
"begin": 655,
"end": 723,
"score": 0.012841969
},
{
"begin": 723,
"end": 785,
"score": 0.0090240855
},
{
"begin": 785,
"end": 811,
"score": 0.029812546
},
{
"begin": 811,
"end": 15682,
"score": 0.019297661
}
] |
Q:
How to get pycharm to output colours when running pytest?
When I run pytest from terminal, I will get colours for the output, but when I run pytest from pycharm (which outputs to the Run toolbar), it is coloured the same as the rest of the stdout.
Is there any way of getting colours out of pytest when run through pycharm?
A:
Set --color=yes to force colored output. Either in your pytest.ini:
[pytest]
addopts=--color=yes
Or in PyCharm, in run configuration add --color=yes in the "Additional Arguments" field:
| {
"pile_set_name": "StackExchange"
} | 0.025006 | [
{
"begin": 0,
"end": 62,
"score": 0.021796638
},
{
"begin": 62,
"end": 254,
"score": 0.018325835
},
{
"begin": 254,
"end": 330,
"score": 0.032902762
},
{
"begin": 330,
"end": 335,
"score": 0.019297661
},
{
"begin": 335,
"end": 376,
"score": 0.01527153
},
{
"begin": 376,
"end": 403,
"score": 0.0801064
},
{
"begin": 403,
"end": 412,
"score": 0.022213135
},
{
"begin": 412,
"end": 432,
"score": 0.008399341
},
{
"begin": 432,
"end": 523,
"score": 0.022351967
}
] |
"TIME_SHORT_DAYS_FORMAT" = "%dh";
"TIME_SHORT_DAY_FORMAT" = "%dh";
"TIME_SHORT_HOURS_FORMAT" = "%dj";
"TIME_SHORT_HOUR_FORMAT" = "%dj";
"TIME_SHORT_MINUTES_FORMAT" = "%dm";
"TIME_SHORT_MINUTE_FORMAT" = "%dm";
"TIME_SHORT_SECONDS_FORMAT" = "%dd";
"TIME_SHORT_SECOND_FORMAT" = "%dd";
"tw__email_share_affirmative_button" = "Izinkan";
"tw__email_share_detail_message_format" = "Dapatkan pembaruan dan informasi lainnya dari %@ bila Anda mengizinkan mereka untuk mengakses email Anda di akun Twitter @%@.";
"tw__email_share_detail_message_not_signed_in" = "(belum masuk)";
"tw__email_share_detail_message_this_app" = "aplikasi ini";
"tw__email_share_heading" = "Sebarkan alamat email Anda";
"tw__email_share_negative_button" = "Jangan sekarang";
"tw__share_tweet" = "Sebarkan Tweet";
"tw__share_tweet_generic_template_format" = "Lihat Tweet @%1$@: %2$@";
"tw__share_tweet_subject_format" = "Tweet dari %1$@ (@%2$@)";
"tw__sign_in_with_twitter_button" = "Masuk dengan Twitter";
"tw__single_image" = "Satu gambar dilampirkan";
"tw__test_string" = "Tes";
"tw__tweet_image_accessibility" = "Lampiran";
"tw__tweet_profile_accessibility" = "Profil";
"tw__tweet_retweeted_by_user" = "Di-retweet oleh %@";
| {
"pile_set_name": "Github"
} | 0.009579 | [
{
"begin": 0,
"end": 34,
"score": 0.004303795
},
{
"begin": 34,
"end": 68,
"score": 0.0053103273
},
{
"begin": 68,
"end": 104,
"score": 0.004685583
},
{
"begin": 104,
"end": 139,
"score": 0.006455692
},
{
"begin": 139,
"end": 177,
"score": 0.008399341
},
{
"begin": 177,
"end": 214,
"score": 0.008260509
},
{
"begin": 214,
"end": 252,
"score": 0.006247444
},
{
"begin": 252,
"end": 289,
"score": 0.0066639404
},
{
"begin": 289,
"end": 340,
"score": 0.0036269883
},
{
"begin": 340,
"end": 1217,
"score": 0.0073233927
}
] |
1. Field of the Invention
The present invention relates to techniques for communicating between integrated circuits. More specifically, the present invention relates to a method and an apparatus for using capacitively coupled communication techniques to communicate between stacked assemblies of laminated integrated circuit (IC) chips.
2. Related Art
Advances in semiconductor technology have made it possible to fabricate a single IC (Integrated Circuit) chip that contains hundreds of millions of transistors. One of the advantages of integrating systems onto a single IC chip is that it increases the operating speed of the overall system. This is because in an alternative design of multiple chips, the signals between system components have to cross chip boundaries, which typically reduces the system's operating speed due to the lengthy chip-to-chip propagation delays and limited number of chip-to-chip wires. In contrast, in a single-chip solution, the signals between system components no longer have to cross chip boundaries, thereby significantly increasing the overall system speed. Moreover, integrating systems onto a single IC chip significantly reduces overall costs because fewer chips are required to perform a given computational task.
However, some systems cannot be integrated into a single chip due to their high complexity and large size. Note that multiple IC chips are typically integrated onto a printed circuit board that contains multiple layers of signal lines for inter-chip communication. Furthermore, signal lines on an IC chip are about 100 times more densely packed than signal lines on a printed circuit board. Consequently, only a tiny fraction of the signal lines on a chip can be routed across the printed circuit board to other chips. For this reason, in such systems, inter-chip communication becomes the bottleneck for increasing the operating speed. Moreover, increases in IC integration densities are expected to exacerbate this bottleneck.
To overcome this inter-chip communication bottleneck, researchers have recently developed an alternate technique, known as “Proximity Communication,” for communicating between semiconductor chips. Proximity Communication in an I/O technology that allows two face-to-face chips to communicate without wires. It involves integrating arrays of capacitive transmitters and receivers onto active surfaces of IC chips to facilitate inter-chip communication. If a first chip is situated face-to-face with a second chip so that transmitter regions on the first chip are capacitively coupled with receiver regions on the second chip, it is possible to transmit signals directly from the first chip to the second chip without having to route the signal through intervening signal lines within a printed circuit board.
Although Proximity Communication promises much higher I/O density and lower power, it requires accurate alignment between the two communicating chips. Mechanical misalignment degrades performance by reducing signal and augmenting crosstalk noise; if the chips are sufficiently misaligned, noise may dominate the desired signal, and communication may fail. There are two main types of misalignment: in-plane misalignment and chip separation. Tilt and rotation manifest as aberrations of these two effects.
Several techniques have been developed to mitigate in-plane misalignment in the horizontal (x, y) plane. It can be corrected by adjusting the spatial placement of data on the sending or transmitting (Tx) chip, depending on the relative position of the receiving (Rx) chip. However, the data steering circuitry is complex, costly in power, and works only over a small spatial range—typically two pad pitches. Also, the electronic alignment scheme proposed by Drost et al. in “Electronic Alignment for Proximity Communication,” IEEE International Solid-State Circuits Conference, 15-19 Feb. 2004, vol. 1, 2004 only works for capacitively-coupled Proximity Communication. No analogous method has yet been developed for inductively coupled communication; in fact, crosstalk noise is a major limitation of such an inductively coupled scheme even in the absence of misalignment, because magnetic fields must have closed return paths, and these loops are often unconfined and large. Recent demonstrations of inductively-coupled data links showed that in the absence of active crosstalk reduction schemes, noise limits the achievable bit-error-rate (BER) to greater than 10−4 even for a large channel pitch of 60 microns, as described by Miura et al. in “A 1Tb/s 3 W Inductive-coupling Transceiver for Inter-Chip Clock and Data Link,” ISSC Digest Technical Papers, pp. 142-143, February 2006.
Chip separation also degrades performance by reducing signal level and augmenting crosstalk noise. Unfortunately, it cannot be easily corrected by electronic means. Although in theory it is possible to adapt signaling levels and pad sizes to mitigate the degradation introduced by chip separation, these schemes are overly complex and infeasible to implement in practice. Reliable communication therefore mainly relies on tight tolerances in packaging technologies that can ensure an adequately-small and well-controlled separation between the two communicating chips.
Multiple access schemes are well established in modern wireless telecommunication systems using electromagnetic (radio) waves propagating over large distances. Multiple devices in a cellular network, for example, can communicate simultaneously with a base station over the same space because each device is assigned a different time slot, frequency band, or code. The multiple access schemes used in wireless communication systems are effective at allowing multiple channels to operate across the same space over long distances with minimal interference. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.011801 | [
{
"begin": 0,
"end": 26,
"score": 0.01263372
},
{
"begin": 26,
"end": 117,
"score": 0.014646785
},
{
"begin": 117,
"end": 337,
"score": 0.0053103273
},
{
"begin": 337,
"end": 352,
"score": 0.014438537
},
{
"begin": 352,
"end": 513,
"score": 0.017701091
},
{
"begin": 513,
"end": 644,
"score": 0.013397297
},
{
"begin": 644,
"end": 919,
"score": 0.013744377
},
{
"begin": 919,
"end": 1097,
"score": 0.012772553
},
{
"begin": 1097,
"end": 1257,
"score": 0.008503466
},
{
"begin": 1257,
"end": 5807,
"score": 0.020824814
}
] |
Q:
Read committed Snapshot VS Snapshot Isolation Level
Could some one please help me understand when to use SNAPSHOT isolation level over READ COMMITTED SNAPSHOT in SQL Server?
I understand that in most cases READ COMMITTED SNAPSHOT works, but not sure when go for SNAPSHOT isolation.
Thanks
A:
READ COMMITTED SNAPSHOT does optimistic reads and pessimistic writes. In contrast, SNAPSHOT does optimistic reads and optimistic writes.
Microsoft recommends READ COMMITTED SNAPSHOT for most apps that need row versioning.
Read this excellent Microsoft article: Choosing Row Versioning-based Isolation Levels. It explains the benefits and costs of both isolation levels.
And here's a more thorough one:
http://msdn.microsoft.com/en-us/library/ms345124(SQL.90).aspx
A:
[![Isolation levels table][2]][2]
See the example below:
Read Committed Snapshot
Change the database property as below
ALTER DATABASE SQLAuthority
SET READ_COMMITTED_SNAPSHOT ON WITH ROLLBACK IMMEDIATE
GO
Session 1
USE SQLAuthority
GO
BEGIN TRAN
UPDATE DemoTable
SET i = 4
WHERE i = 1
Session 2
USE SQLAuthority
GO
BEGIN TRAN
SELECT *
FROM DemoTable
WHERE i = 1
Result – Query in Session 2 shows old value (1, ONE) because current transaction is NOT committed. This is the way to avoid blocking and read committed data also.
Session 1
COMMIT
Session 2
USE SQLAuthority
GO
SELECT *
FROM DemoTable
WHERE i = 1
Result – Query in Session 2 shows no rows because row is updated in session 1. So again, we are seeing committed data.
Snapshot Isolation Level
This is the new isolation level, which was available from SQL Server 2005 onwards. For this feature, there is a change needed in the application as it has to use a new isolation level.
Change database setting using below. We need to make sure that there is no transaction in the database.
ALTER DATABASE SQLAuthority SET AllOW_SNAPSHOT_ISOLATION ON
Now, we also need to change the isolation level of connection by using below
Session 1
USE SQLAuthority
GO
BEGIN TRAN
UPDATE DemoTable
SET i = 10
WHERE i = 2
Session 2
SET TRANSACTION ISOLATION LEVEL SNAPSHOT
GO
USE SQLAuthority
GO
BEGIN TRAN
SELECT *
FROM DemoTable
WHERE i = 2
Result- Even if we have changed the value to 10, we will still see old record in session 2 (2, TWO).
Now, let’s commit transaction in session 1
Session 1
COMMIT
Let’s come back to session 2 and run select again.
Session 2
SELECT *
FROM DemoTable
WHERE i = 2
We will still see the record because session 2 has stated the transaction with snapshot isolation. Unless we complete the transaction, we will not see latest record.
Session 2
COMMIT
SELECT *
FROM DemoTable
WHERE i = 2
Now, we should not see the row as it's already updated.
See: SQL Authority, Safari Books Online
A:
No comparison of Snapshot and Snapshot Read Committed is complete without a discussion of the dreaded "snapshot update conflict" exception that can happen in Snapshot, but not Snapshot Read Committed.
In a nutshell, Snapshot isolation retrieves a snapshot of committed data at the start of a transaction, and then uses optimistic locking for both reads and writes. If, when attempting to commit a transaction, it turns out that something else changed some of that same data, the database will rollback the entire transaction and raise an error causing a snapshot update conflict exception in the calling code. This is because the version of data affected by the transaction is not the same at the end of the transaction as it was at the start.
Snapshot Read Committed does not suffer from this problem because it uses locking on writes (pessimistic writes) and it obtains snapshot version information of all committed data at the stat of each statement.
The possibility of snapshot update conflicts happening in Snapshot and NOT Snapshot Read Committed is an extremely significant difference between the two.
| {
"pile_set_name": "StackExchange"
} | 0.012981 | [
{
"begin": 0,
"end": 56,
"score": 0.032559406
},
{
"begin": 56,
"end": 179,
"score": 0.01527153
},
{
"begin": 179,
"end": 287,
"score": 0.013466713
},
{
"begin": 287,
"end": 294,
"score": 0.009857078
},
{
"begin": 294,
"end": 299,
"score": 0.019297661
},
{
"begin": 299,
"end": 370,
"score": 0.10031791
},
{
"begin": 370,
"end": 437,
"score": 0.014160873
},
{
"begin": 437,
"end": 522,
"score": 0.008815838
},
{
"begin": 522,
"end": 611,
"score": 0.012841969
},
{
"begin": 611,
"end": 3868,
"score": 0.0142302895
}
] |
Clock recovery circuits are used in high-speed receivers to recover timing information from an incoming data signal. A basic clock recovery circuit 101 implemented as part of an integrated circuit (IC) is illustrated in FIG. 1. Digital information in the incoming data signal arrives at a signaling pin 103 of the IC. The digital information is often encoded to ensure a minimum transition density needed for clock recovery. The clock recovery circuit 101 generates a recovered clock from the incoming data signal, which is then fed over a feedback path 105 to an input of the clock recovery circuit. Both the feedback path and the incoming data signal are compared by a phase detector 109, which determines whether the recovered clock signal is early or late relative to the incoming data signal. Phase difference information from the phase detector is passed through a filter 113 and accumulated to control a charge pump 115. In turn, the charge pump 115 generates a control signal for a variable frequency oscillator (VFO) 117, which advances or delays frequency and phase of the recovered clock in order to align its edges with the incoming data signal. This structure implements a phase-locked loop (PLL) that, over time, closely aligns the recovered clock with phase and frequency of the incoming data signal. An offset circuit 106 creates a phase-shifted copy of the recovered clock to generate a sampling clock, used to align a data sampler 107 to the midpoint of a data interval. In some cases the offset circuit 106 is an integral part of VFO 117. As indicated by reference numeral 111, the data sampler 107 can itself be a part of the phase detector 109, with a single circuit 111 used for both clock and data recovery.
Conventional clock recovery designs such as depicted in FIG. 1A are often rooted in a form of binary phase detector known as a “bang-bang” or Alexander phase detector. Comprised of relatively simple logic, a bang-bang phase detector identifies logic state transition between successive digital symbols and takes an “edge sample” exactly at the expected transition time. If the recovered clock is precisely aligned with the transition edges of the data signal (discounting intersymbol interference), the edge sample should be exactly at the voltage midpoint between logic states. However, depending on direction of transition, an edge sample offset from the midpoint means the edge sampling clock is early or late relative to the data signal. This early and late information is used to incrementally advance or retard the recovered clock to align it with the transitions in the incoming data signal.
Binary phase detectors are advantageous in that they typically use simple logic and are well suited for power-efficient digital clock recovery designs. However, designs based on these circuits are often characterized by large steady state dithering and low bandwidth, due to high-loop latency attributable to filtering of up and down binary signals and converting these signals into a VFO control signal.
By contrast, linear phase detection techniques result in a phase-error signal proportional to the difference between an incoming data signal and a recovered clock, and these techniques therefore promise significantly lower steady state dither jitter at higher loop bandwidth. However, linear phase detection techniques often suffer from large static phase error and unreliable operation at high frequencies; they are also difficult to combine with digital filtering techniques. To elaborate, conventional linear phase detection techniques generate variable-width pulse signals that gate pull-up and pull-down of a signal line to generate a VFO control signal. Manufacturing variations, capacitive effects, and other issues make it difficult to match precisely these impedances so as to reliably avoid unintended static phase offset. In addition, as the data rates increase, it becomes correspondingly difficult to generate suitable variable-width pulses, i.e., these pulse-widths and associated processing should be of high precision and should be relatively short when compared to a unit interval (which is difficult at higher speeds). As implied earlier, processing typically requires (a) only generating clock recovery updates when there is a transition in the incoming data signal, (b) correctly correlating early or late transitions with a leading or lagging recovered clock, and (c) applying low pass filtering so as to minimize the effects of random noise. Specific filtering requirements become more complex for non-conventional signaling techniques, such 4-PAM signaling.
What is needed is an improved high-bandwidth clock recovery architecture that is area and power efficient and that provides reduced static phase error and dither jitter. Such an architecture would be well-suited to increasingly-small digital designs and digital designs that are power sensitive. Ideally, such an architecture would combine benefits of conventional binary phase detection and linear phase detection techniques while omitting their respective disadvantages. Further still, such an architecture ideally would accommodate non-traditional signaling techniques, such as multi-PAM (MPAM) signaling. The present invention addresses these needs and provides further, related advantages.
The subject matter defined by the enumerated claims may be better understood by referring to the following detailed description, which should be read in conjunction with the accompanying drawings. This description of one or more particular embodiments, set out below to enable one to build and use various implementations of the technology set forth by the claims, is not intended to limit the enumerated claims, but to exemplify their application to certain methods and devices. The description set out below exemplifies (i) a clock recovery circuit that uses two-point control of a phase-locked loop (PLL), (ii) an integrated circuit having one or more such clock recovery circuits, and (iii) related methods, systems and devices. While the specific examples are presented, the principles described herein may also be applied to other methods and devices as well. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.011592 | [
{
"begin": 0,
"end": 117,
"score": 0.010967735
},
{
"begin": 117,
"end": 225,
"score": 0.008364634
},
{
"begin": 225,
"end": 318,
"score": 0.004997955
},
{
"begin": 318,
"end": 425,
"score": 0.010759487
},
{
"begin": 425,
"end": 601,
"score": 0.00930175
},
{
"begin": 601,
"end": 798,
"score": 0.0095794145
},
{
"begin": 798,
"end": 928,
"score": 0.011731312
},
{
"begin": 928,
"end": 1158,
"score": 0.006282152
},
{
"begin": 1158,
"end": 1316,
"score": 0.010273575
},
{
"begin": 1316,
"end": 6176,
"score": 0.008364634
}
] |
The present invention relates to new antifungal polypeptides that exhibit broad-spectrum antifungal activity against pathogenic and other fungi. Specifically, the present invention relates to a variant amino acid sequence defensin protein derived from an alfalfa antifungal protein and its use as an antifungal polypeptide in plant disease control against plant pathogenic fungi. The present invention relates to the antifungal polypeptides obtainable from plants in the genus Medicago. The antifungal polypeptides may be applied directly to a plant, applied to a plant in the form of microorganisms that produce the polypeptides, or the plants may be genetically modified to produce the polypeptides. The present invention also relates to microorganisms and plants transformed with DNA sequences encoding the amino acid sequence variant alfalfa antifungal protein (AFP), and compositions useful in controlling plant pathogenic fungi.
Protection of agriculturally important crops from insects and diseases has become a major concern in the agricultural industry. Fungus infection is a particular problem in damp climates and is additionally a major concern during crop storage. Plants have developed a certain degree of natural resistance to pathogenic fungi; however, modern growing methods, harvesting and storage systems frequently provide a favorable environment for plant pathogens.
Adding to the problem is the number of different fungi that may cause problems. Fungal damage can be caused by a fungus of genera such as Alternaria, Ascochyta, Botrytis, Cercospora, Colletotrichum, Diplodia, Erysiphe, Fusarium, Gaeumanomyces, Helminthosporium, Macrophomina, Nectria, Peronospora, Phoma, Phymatotrichum, Phytophthora, Plasmopara, Podosphaera, Puccinia, Pythium, Pyrenophora, Pyricularia, Rhizoctonia, Scerotium, Sclerotinia, Septoria, Thielaviopsis, Uncinula, Venturia, and Verticillium among others. Therefore, fungicidal compounds are not always effective because antifungal activity associated with a particular compound may be limited to a few species.
One approach to inhibiting plant pathogenic activity has been to identify and isolate compounds that exhibit high levels of activity against these pathogens. Several classes of polypeptides and proteins exhibiting antifungal activity against a variety of plant pathogenic fungi have been isolated (Bowles, 1990; Brears et al., 1994). The antifungal polypeptides and proteins include chitinases, cysteine-rich chitin-binding proteins, β-1,3-glucanases, permatins (including zeamatins), thionins, ribosome-inactivating proteins, and non-specific lipid transfer proteins. These proteins are believed to play important roles in plant defense against fungal infection. The use of natural protein products to control plant pathogens has been demonstrated, for example, in EPO 0 392 225.
Recently, another group of plant proteins has been found to function as defensins in combating infections by plant pathogens (PCT International Publication WO 93/05153). The plant defensins are a family of small proteins that possess potent antimicrobial and antifungal activity (for review, see Broekaert et al., 1997). The plant defensins are characterized by a conserved pattern of eight cysteine residues forming what has been referred to as a cysteine-stabilized α-helix that stabilizes folding characteristics of these proteins (Kobayashi et al., 1991). Multiple sequence comparisons of several defensins reveal that these proteins have eight cysteines, two glycines, an aromatic residue, and one acidic residue in common (Broekaert et al., 1995). This small degree of sequence conservation suggests that the cysteine-stabilized α-helix motif provides a scaffold for accommodating a variety of antimicrobial activities. Two small cysteine-rich proteins isolated from radish seed that exhibit this conserved motif, Rs-AFP1 and Rs-AFP2, were found to inhibit the growth of many pathogenic fungi when the pure protein was added to an in vitro antifungal assay medium. Transgenic tobacco plants containing the gene encoding Rs-AFP2 protein were found to be more resistant to attack by fungi than non-transformed plants. Defensin amino acid sequence variants of the radish Rs-AFP2 were identified that exhibited improved antifungal activity (De Samblanx et al, 1997). Certain amino acid modifications to non-conserved amino acids based on the alignment of the protein with a host of other plant defensins resulted in improvement in the antifungal activity of Rs-AFP2, particularly in the presence of Ca2+. The amino acid variants all contained an arginine substitution for a naturally occurring amino acid, which increased the net positive charge on the resulting amino acid sequence variant.
Proteins similar to radish seed Rs-AFP2 have been isolated from seeds of other plants (WO 93/105153; Broekaert et al., 1995). All the proteins in this group share similarity in their amino acid sequence, but differ in their antifungal activities against various fungi, especially in the presence of different mono- and divalent salts. The activity of some antifungal proteins is dramatically reduced in the presence of 1 mM CaCl2 and 50 mM KCl (Terras et al., 1992). The usefulness of an antifungal protein for genetically engineering plant disease resistance can be greatly influenced by the sensitivity of the antifungal activity to salt concentration, since metal ions such K+, Na+, Ca2+ and Mg2+ are required for normal physiological functions and are therefore abundantly present in plant cells. Furthermore, the small size of these proteins suggests that minor modifications to the amino acid sequence could effect dramatic changes in the biological activity of the proteins.
Recombinant DNA technology has recently led to the development of transgenic plants that can express proteins that have antimicrobial activity against certain pests. For example, methods for transforming a wide variety of different dicotyledonous plants and obtaining transgenic plants have been reported in the literature (see Gasser and Fraley, 1989; Fisk and Dandekar, 1993; Christou, 1994). Similarly, methods for producing transgenic plants among the monocotyledonous plants are also well documented. Successful transformation and plant regeneration have been achieved in asparagus (Asparagus officinalis; Bytebier et al. 1987), barley (Hordeum vulgare; Wan and Lemaux, 1994), maize (Zea mays; Rhodes et al. 1988; Gordon-Kamm et al., 1990; Fromm et al. 1990; Koziel et al., 1993), oats (Avena sativa; Somers et al., 1992), orchardgrass (Dactylis glomerata; Horn et al., 1988), rice (Oryza sativa; including indica and japonica varieties; Toriyama et al., 1988; Zhang et al., 1988; Luo and Wu 1988; Zhang and Wu, 1988; Christou et al., 1991), rye (Secale cereale; De la Pena et al., 1987), sorghum (Sorghum bicolor; Cassas et al., 1993), sugar cane (Saccharum spp.; Bower and Birch, 1992), tall fescue (Festuca arundinacea; Wang et al., 1992), turfgrass (Agrostis palustris; Zhong et al., 1993), and wheat (Triticum aestivum; Vasil et al., 1992; Troy Weeks et al., 1993; Becker et al., 1994).
A number of publications have discussed the use of plant and bacterial glucanases, chitinases, and lysozymes produced in transgenic plants exhibiting increased resistance to various microorganisms such as fungi (EP 0 292 435, EP 0 290 123, EP 0 392 225, EP 0 307 841, EP 0 332 104, EP 0 440 304, EP 0 418 695, EP 0 448 511, WO 91/06312, WO 88/00976, WO 90/07001 and U.S. Pat. No. 4,940,840). The protection obtained from expression of osmotin-like proteins is discussed in WO 91/18984. Alfalfa AFP (AlfAFP) is a member of the plant defensin family isolated from the seeds of alfalfa, Medicago sativa, and exhibits broad spectrum antifungal activity including activity against the potato pathogen Verticillium dahliae and the wheat pathogen Fusarium graminearum (U.S. Pat. Nos. 6,121,436, and 6,316,407). Expression of AlfAFP in potato was shown to confer resistance to early dying disease caused by Verticillium in potato (Gao et al, 2000). However, plants expressing AlfAFP also show a reduction in potato tuber size. AlfAFP was unable to provide an adequate level of protection to plants infected with Fusarium head blight even though the protein exhibited in vitro efficacy against Fusarium graminearum.
There is thus a continuing need to identify biocidal compounds, particularly those that will be effective against plant pathogenic fungi, whether applied as compositions directly to an infected plant or expressed in transgenic plants in amounts sufficient to provide protection against the pathogens. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.032731 | [
{
"begin": 0,
"end": 145,
"score": 0.029125832
},
{
"begin": 145,
"end": 380,
"score": 0.02124131
},
{
"begin": 380,
"end": 487,
"score": 0.019297661
},
{
"begin": 487,
"end": 702,
"score": 0.02054715
},
{
"begin": 702,
"end": 935,
"score": 0.008503466
},
{
"begin": 935,
"end": 1063,
"score": 0.01492445
},
{
"begin": 1063,
"end": 1178,
"score": 0.01999182
},
{
"begin": 1178,
"end": 1388,
"score": 0.012356056
},
{
"begin": 1388,
"end": 1468,
"score": 0.05493369
},
{
"begin": 1468,
"end": 8624,
"score": 0.029812546
}
] |
Q:
How to import data from PostgreSQL to Hadoop?
I'm just a beginner in Hadoop and one of my colleges asked me for help in migrating some of PostgreSQL tables to Hadoop. Since I don't have much experience with PostgreSQL (I know databases though), I am not sure what would be the best way for this migration to happen. One of my ideas was to export the tables as gson data and then to process them from the Hadoop, as in this example: http://www.codeproject.com/Articles/757934/Apache-Hadoop-for-Windows-Platform. Are there better ways to import data (tables & databases) from PostgreSQL to Hadoop?
A:
Sqoop (http://sqoop.apache.org/) is a tool precisely made for this. Go through the documentation, sqoop provides the best and the easiest way to transfer your data.
| {
"pile_set_name": "StackExchange"
} | 0.019298 | [
{
"begin": 0,
"end": 50,
"score": 0.006178028
},
{
"begin": 50,
"end": 172,
"score": 0.012078391
},
{
"begin": 172,
"end": 321,
"score": 0.01492445
},
{
"begin": 321,
"end": 516,
"score": 0.014577369
},
{
"begin": 516,
"end": 601,
"score": 0.008815838
},
{
"begin": 601,
"end": 606,
"score": 0.019297661
},
{
"begin": 606,
"end": 674,
"score": 0.028954152
},
{
"begin": 674,
"end": 772,
"score": 0.012356056
}
] |
Ledsham railway station
Ledsham railway station was on the Chester and Birkenhead Railway near Little Sutton and about a mile from the hamlet of Ledsham on the Wirral Peninsula in Cheshire, England. The station was originally named 'Sutton' but renamed Ledsham on the opening of the Hooton to Helsby branch to avoid confusion with the newly built station named Little Sutton. The station opened on 23 September 1840 at the same time as the railway line, and was closed on 20 July 1959 due to a decline in passenger numbers.
In October 1839, Sutton was the scene of a serious riot. On completion of the works a gang of Irish navvies working from the Birkenhead end met with a gang of English & Welsh navvies working from the Chester end when the contractors' wages clerk for the Irish gang made off with the pay for his men. Violent fighting between the two gangs ensued over two days involving some 2,000 men; military were sent from Liverpool and Chester, including a piece of ordnance from Chester, and 28 rioters were jailed.
In 1891, the track from Ledsham Junction (half a mile south of the station) to Rock Ferry was quadrupled and Ledsham Station acquired four platforms. After the station closed the quadruple track was reduced to double in the 1970s. Two remaining platforms were in existence until the 1990s when they were demolished to accommodate a new road bridge which was built on the realignment of the A550. The double track through the station site now forms part of the Wirral Line to Chester, operated by Merseyrail.
Services
References
Further reading
External links
Ledsham railway station on Disused Stations
Category:Disused railway stations in Cheshire
Category:Former Birkenhead Railway stations
Category:Railway stations opened in 1840
Category:Railway stations closed in 1959
Category:1840 establishments in England
Category:1959 disestablishments in England | {
"pile_set_name": "Wikipedia (en)"
} | 0.025521 | [
{
"begin": 0,
"end": 24,
"score": 0.00044469655
},
{
"begin": 24,
"end": 200,
"score": 0.016798683
},
{
"begin": 200,
"end": 377,
"score": 0.0129808
},
{
"begin": 377,
"end": 526,
"score": 0.012772553
},
{
"begin": 526,
"end": 584,
"score": 0.043031808
},
{
"begin": 584,
"end": 827,
"score": 0.049212243
},
{
"begin": 827,
"end": 1032,
"score": 0.055732824
},
{
"begin": 1032,
"end": 1183,
"score": 0.011175984
},
{
"begin": 1183,
"end": 1264,
"score": 0.0063515683
},
{
"begin": 1264,
"end": 1895,
"score": 0.016104523
}
] |
Clojure, Multi-core, AWS Cluster Compute & Lattes - brisance
http://dosync.posterous.com/clojure-multi-core-amazon-cluster-compute-lat
======
almost
From the article:
(defn ping []
(-> (http/get "http://localhost:5123" :as :string)
:content))
(defn multi-ping []
(->> (repeatedly 16 #(ping))
(apply str)))
Can anyone tell me what --> and ->> do in this context? I've been trying to
find out myself but given that they're both impossible to search for on
Google...
~~~
KirinDave
They're called "thrush" but many of us pronounce them "thread" and "thread
end".
(-> x expr1 expr2 ... exprN) evaluates x, then takes the result and puts it as
the _first_ argument in expr1, evaluates that, and puts the result in the
_first_ argument of expr2, repeating until exprN, where the result is
returned.
(->> x expr1 expr2 exprN) does the same thing, but instead of making it the
first argument it makes it the _last_ argument of subsequent expressions.
Clojure's culture generally agrees that the "subject" of function calls should
be the first argument, so in general the -> operator is all you need.
Sometimes you're shuttling data around, and then ->> comes into play.
Please note that multi-ping in this is atypical and constructed that way for
didactic purposes (i.e., to be transformed later). Usually you'd see it as:
(defn multi-ping [] (apply str (repeat 16 ping)))
For readability, some people might prefer to use a let. I think with only 2
levels of nesting, it should be pretty easy to see what's up and I wouldn't
bother, but that'd look like:
(defn [] multi-ping
(let [pings (repeat 16 ping)]
(apply str pings)))
~~~
swannodette
I went ahead and changed my code to use let. I agree there's no reason to
throw people off on such a simple snippet.
~~~
almost
Probably a good idea, but thanks anyway for introducing me to another cool
feature of Clojure!
------
skorgu
I was confused by:
> In fact for $3.20 (the price of a latte) I can play around with Clojure code
> on a high performance 8-core 64bit server for two hours.
An m2.4xlarge spot instance is ~$0.80/hr and has "26 EC2 Compute Units (8
virtual cores with 3.25 EC2 Compute Units each)".
Are the cluster instances that much closer to bare metal than 'normal' ec2
instances or am I missing something?
~~~
swannodette
33.5 EC2 compute units and very low latency between instances. More details
here:
<http://aws.amazon.com/ec2/hpc-applications/>
~~~
skorgu
I suppose he's going for the 16 cores instead of 8 given the interconnect
isn't used. It would be interesting to see a performance comparison between
the xlarges and the cluster instances on simple speedups like this.
| {
"pile_set_name": "HackerNews"
} | 0.038396 | [
{
"begin": 0,
"end": 63,
"score": 0.013466713
},
{
"begin": 63,
"end": 137,
"score": 0.019297661
},
{
"begin": 137,
"end": 145,
"score": 0.021380141
},
{
"begin": 145,
"end": 152,
"score": 0.013119632
},
{
"begin": 152,
"end": 170,
"score": 0.007496933
},
{
"begin": 170,
"end": 176,
"score": 0.033761155
},
{
"begin": 176,
"end": 181,
"score": 0.033761155
},
{
"begin": 181,
"end": 202,
"score": 0.014646785
},
{
"begin": 202,
"end": 263,
"score": 0.006212736
},
{
"begin": 263,
"end": 2811,
"score": 0.10634898
}
] |
Simultaneous spectrophotometric determination of nitroaniline isomers after cloud point extraction by using least-squares support vector machines.
Cloud point extraction has been used for the preconcentration of m-nitroaniline, o-nitroaniline and p-nitroaniline and later simultaneous spectrophotometric determination using polyethylene glycol tert-octylphenyl ether (Triton X-100) as surfactant. The resolution of a ternary mixture of the nitroaniline isomers (after extraction by cloud point) by the application of least-squares support vector machines (LS-SVM) was performed. The chemical parameters affecting the separation phase and detection process were studied and optimized. Under the optimum experimental conditions (i.e. pH 7.0, Triton X-100=0.6%, equilibrium time 20 min and cloud point 75 degrees C), calibration graphs were linear in the range of 0.2-20.0, 0.1-15.0 and 0.1-17.0 microg ml(-1) with detection limits of 0.08, 0.05 and 0.06 microg ml(-1) for m-nitroaniline, o-nitroaniline and p-nitroaniline, respectively. The experimental calibration matrix was designed with 21 mixtures of these chemicals. The concentrations were varied between calibration graphs concentrations of nitroaniline isomers. The root mean square error of prediction (RMSEP) for m-nitroaniline, o-nitroaniline and p-nitroaniline were 0.0146, 0.0308 and 0.0304, respectively. This procedure allows the simultaneous determination of nitroaniline isomers in synthetic and real matrix samples good reliability of the determination was proved. | {
"pile_set_name": "PubMed Abstracts"
} | 0.015757 | [
{
"begin": 0,
"end": 147,
"score": 0.016243355
},
{
"begin": 147,
"end": 397,
"score": 0.012078391
},
{
"begin": 397,
"end": 579,
"score": 0.01228664
},
{
"begin": 579,
"end": 684,
"score": 0.012078391
},
{
"begin": 684,
"end": 1035,
"score": 0.011037151
},
{
"begin": 1035,
"end": 1121,
"score": 0.019852988
},
{
"begin": 1121,
"end": 1219,
"score": 0.033074442
},
{
"begin": 1219,
"end": 1368,
"score": 0.0100653265
},
{
"begin": 1368,
"end": 1531,
"score": 0.018325835
}
] |
INTRODUCTION {#sec1-1}
============
The management protocol for differentiated thyroid cancer includes whole body iodine-131 imaging to detect residual thyroid tissue and distant metastasis after thyroidectomy. However, the diagnostic dose of radioiodine may fail to detect the non-functioning or poorly functioning metastasis. Hybrid SPECT-CT imaging may be used in such cases to detect both the functioning and non-functioning metastases in the same study.
CASE REPORT {#sec1-2}
===========
A 43-year-old Asian female reported to our institute with a mass in the anterior part of her neck, increasing in size for the past one year, with retrosternal extension. Fine needle aspiration cytology was inconclusive with regard to the benign or malignant nature of the mass. The patient underwent total thyroidectomy and papillary thyroid carcinoma was diagnosed on histopathology. Whole body iodine-131 scan (I-131 WBS) was performed after six weeks of thyroxine abstinence, using a dual-head gamma camera fitted with medium energy collimators (Infinia Hawkeye 4, GE, Milwaukee, USA), 48 hours after oral administration of 74 MBq of I-131. A large radioiodine--avid focus was seen in the neck, in the midline, with an additional focus in the upper part of the left lung \[[Figure 1](#F0001){ref-type="fig"}\]. Mild, irregular tracer uptake was also detected in both lung bases, suggestive of pulmonary metastases.
{#F0001}
Hybrid SPECT-CT fusion imaging was then performed on the same camera. The focus in the neck was localized to the residual thyroid tissue, 1 cm below the lower border of the thyroid cartilage, on the left side \[[Figure 2a](#F0002){ref-type="fig"}\]. In addition, multiple radio-opaque nodules were detected in both the lungs, on the CT image. Radioiodine concentration was seen in a few of these nodules on the fused SPECT-CT images; most of the nodules did not show any radioiodine avidity at the dose used \[[Figure 2b](#F0002){ref-type="fig"}‐[d](#F0002){ref-type="fig"}\]. The patient was subsequently given high-dose radioiodine therapy at another institute by one of the authors (CSB). The post-therapy I-131 WBS acquired there showed extensive I-131 avid metastases in both lungs \[[Figure 3](#F0003){ref-type="fig"}\].
{#F0002}
{#F0003}
DISCUSSION {#sec1-3}
==========
The lung is one of the most common sites for distant metastases from differentiated thyroid carcinoma (DTC).\[[@CIT1]\] The reported rate of pulmonary metastases from DTC varies from 2 to 20%.\[[@CIT2]\] I-131 WBS plays an important diagnostic role in the detection of lung metastasis from DTC. However, in cases with considerable residual thyroid tissue, even post-therapy WBS may fail to show I-131 concentration in the lungs owing to significant neck uptake.\[[@CIT3]\] It has been reported that the sensitivity of a chest X-ray in the detection of lung metastases (52%) is lower than that of WBS (64%) and thoracic CT (82%).\[[@CIT4]\] It is generally believed that the CT images provided by a SPECT-CT system are of little diagnostic value as they do not possess the image properties of a diagnostic CT.\[[@CIT5]\] However, while the hybrid system CT component cannot replace a CT scan of diagnostic quality, it appears to be sufficient for the anatomical localization of scintigraphic foci.\[[@CIT6]\] Integrated I-131 SPECT-CT imaging has an additional value in patients with thyroid cancer, for characterization of equivocal tracer uptake seen on planar imaging as well as for precise localization of malignant lesions in the neck, chest, and skeleton. This localization of I-131 uptake may have a clinical impact on patient management by influencing referral for I-131 treatment, tailoring of the administered radioiodine dose, and / or the addition of surgery or external radiation therapy when indicated.\[[@CIT7]\] While most previous studies have performed this procedure after a therapeutic dose of radioiodine,\[[@CIT8]\] the present case illustrates that hybrid SPECT-CT fusion may identify the full extent of pulmonary metastases, when combined with low-dose (diagnostic) I-131 whole body scan.
The authors gratefully acknowledge the technical assistance of Mr. Madan Parmar in the acquisition and processing of the SPECT-CT images.
**Source of Support:** Nil
**Conflict of Interest:** None declared
| {
"pile_set_name": "PubMed Central"
} | 0.015272 | [
{
"begin": 0,
"end": 23,
"score": 0.004425273
},
{
"begin": 23,
"end": 36,
"score": 0.027409043
},
{
"begin": 36,
"end": 212,
"score": 0.019297661
},
{
"begin": 212,
"end": 329,
"score": 0.020824814
},
{
"begin": 329,
"end": 460,
"score": 0.0095794145
},
{
"begin": 460,
"end": 483,
"score": 0.0047897073
},
{
"begin": 483,
"end": 495,
"score": 0.02809576
},
{
"begin": 495,
"end": 666,
"score": 0.18450552
},
{
"begin": 666,
"end": 774,
"score": 0.058130227
},
{
"begin": 774,
"end": 4870,
"score": 0.05253629
}
] |
<pe-steps [(activeIndex)]="activeIndex" (change)="onChangeStep($event)">
<!-- Hierarchical data with zero configuration -->
<pe-step label="Hierarchical data with zero configuration">
<p-organizationChart [value]="dataBasic"></p-organizationChart>
</pe-step>
<!-- Advanced customization -->
<pe-step label="Advanced customization">
<p-organizationChart [value]="dataAdvanced" styleClass="company">
<ng-template let-node pTemplate="department">
<div class="node-header ui-corner-top">
{{node.label}}
</div>
<div class="node-content ui-corner-bottom">
<img src="/assets/data/avatar/{{node.data.avatar}}" width="32">
<div>{{node.data.name}}</div>
</div>
</ng-template>
<ng-template let-node pTemplate="default">
{{node.label}}
</ng-template>
</p-organizationChart>
</pe-step>
<!-- Selection and events -->
<pe-step label="Selection and events">
<p-organizationChart [value]="dataAdvanced" styleClass="company"
selectionMode="single" [(selection)]="selectedNode"
(onNodeSelect)="onNodeSelect($event)">
<ng-template let-node pTemplate="department">
<div class="node-header ui-corner-top">
{{node.label}}
</div>
<div class="node-content ui-corner-bottom">
<img src="/assets/data/avatar/{{node.data.avatar}}" width="32">
<div>{{node.data.name}}</div>
</div>
</ng-template>
<ng-template let-node pTemplate="default">
{{node.label}}
</ng-template>
</p-organizationChart>
</pe-step>
</pe-steps>
<p-dialog header="VCard" [(visible)]="display"
modal="modal" width="320" [responsive]="true">
<i class="fa fa-address-card-o"></i>
<ul style="padding: 0.2em 0.8em;">
<li>Full name: {{selectedVCard?.fullName}}</li>
<li>Birthday: {{selectedVCard?.birthday}}</li>
<li>Address: {{selectedVCard?.address}}</li>
<li>E-mail: {{selectedVCard?.email}}</li>
</ul>
</p-dialog>
<p-growl [value]="msgs"></p-growl> | {
"pile_set_name": "Github"
} | 0.006386 | [
{
"begin": 0,
"end": 73,
"score": 0.0021258665
},
{
"begin": 73,
"end": 128,
"score": 0.030670939
},
{
"begin": 128,
"end": 192,
"score": 0.010551238
},
{
"begin": 192,
"end": 264,
"score": 0.0038525905
},
{
"begin": 264,
"end": 279,
"score": 0.011384231
},
{
"begin": 279,
"end": 316,
"score": 0.015132698
},
{
"begin": 316,
"end": 361,
"score": 0.007496933
},
{
"begin": 361,
"end": 435,
"score": 0.0027072257
},
{
"begin": 435,
"end": 493,
"score": 0.0072539765
},
{
"begin": 493,
"end": 2353,
"score": 0.014716201
}
] |
Pedal or peroneal bypass: which is better when both are patent?
We compared autogenous vein pedal and peroneal bypasses, focusing on extremities that could have a bypass to either artery. From 1985 to 1993 we performed a total of 175 pedal and 77 peroneal autogenous vein bypasses for rest pain (n = 75, 30%) and tissue loss (n = 177, 70%). One hundred ninety-six (78%) in situ saphenous vein and 56 (22%) reversed or composite vein bypasses were performed. One hundred fifty-two of these 252 bypasses were performed in extremities with both the pedal and peroneal arteries patent by arteriography. The vascular surgeon chose to perform 99 pedal and 53 peroneal vein bypasses in these 152 extremities. The angiogram score of the outflow arteries were similar for pedal and peroneal bypasses with the Society for Vascular Surgery and the International Society for Cardiovascular Surgery and modified scoring systems. At 2 years the primary and secondary patency rates for pedal bypasses (70% and 77%) were not significantly different compared with those for peroneal bypasses (60% and 72%). Limb salvage rates at 2 years were similar for pedal and peroneal bypasses for all patients (74% and 73%), patients with both pedal and peroneal arteries patent (83% and 72%), diabetics (76% and 66%), and patients with tissue necrosis (77% and 71%). Pedal and peroneal artery bypasses with equivalent angiogram scores have similar long-term graft patency and limb salvage. The choice between pedal or peroneal artery bypass should be based on the quality of vein and the surgeon's preference. | {
"pile_set_name": "PubMed Abstracts"
} | 0.026722 | [
{
"begin": 0,
"end": 64,
"score": 0.0224908
},
{
"begin": 64,
"end": 188,
"score": 0.027237365
},
{
"begin": 188,
"end": 341,
"score": 0.01721518
},
{
"begin": 341,
"end": 458,
"score": 0.032559406
},
{
"begin": 458,
"end": 599,
"score": 0.03221605
},
{
"begin": 599,
"end": 702,
"score": 0.026035614
},
{
"begin": 702,
"end": 916,
"score": 0.012772553
},
{
"begin": 916,
"end": 1090,
"score": 0.012008976
},
{
"begin": 1090,
"end": 1340,
"score": 0.0039914227
},
{
"begin": 1340,
"end": 1582,
"score": 0.017909339
}
] |
The instant invention relates generally to hair grooming devices and more specifically it relates to a hair coloring comb. Numerous hair grooming devices have been provided in prior art that are adapted to apply hair dye, perfume, viscous solutions, water, treatment solutions and the like to the hair. For example, U.S. Pat. Nos. 4,747,420 to Alaimo; 4,934,388 to Gibbs; 5,056,480 to Murray, Sr. and 5,059,050 to Guglielmo all are illustrative of such prior art.
While these units may be suitable for the particular purpose to which they address, they would not be as suitable for the purposes of the present invention as heretofore described. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.014994 | [
{
"begin": 0,
"end": 123,
"score": 0.020685982
},
{
"begin": 123,
"end": 303,
"score": 0.0073233927
},
{
"begin": 303,
"end": 321,
"score": 0.011175984
},
{
"begin": 321,
"end": 326,
"score": 0.015063282
},
{
"begin": 326,
"end": 464,
"score": 0.0087811295
},
{
"begin": 464,
"end": 644,
"score": 0.019436494
}
] |
Release of calcitonin gene-related peptide-like (CGRP-LI) immunoreactivity from rat isolated soleus muscle by low pH, capsaicin and potassium.
Capsaicin (10 microM), KCl (80 mM) or superfusion with a low pH medium (pH 5 or 6) produced a significant increase of calcitonin gene-related peptide-like immunoreactivity (CGRP-LI) outflow from the superfused rat isolated soleus muscle. CGRP-LI outflow produced by capsaicin or pH 5 medium was totally abolished in a calcium free medium containing EDTA (1 mM) and the effect of pH 5 medium was prevented by a previous application of capsaicin. Ruthenium red (10 microM) produced a marked inhibition of CGRP-LI release produced by capsaicin or pH 5 medium (69 and 84%, resp.), without affecting that evoked by KCl. These findings demonstrate that protons activate capsaicin-sensitive primary afferents in rat skeletal muscle through a Ruthenium red-sensitive mechanism. Proton-induced CGRP-LI release in skeletal muscle could be of relevance during exercise and/or skeletal muscle ischemia. | {
"pile_set_name": "PubMed Abstracts"
} | 0.017423 | [
{
"begin": 0,
"end": 143,
"score": 0.013883209
},
{
"begin": 143,
"end": 381,
"score": 0.019158829
},
{
"begin": 381,
"end": 588,
"score": 0.0112454
},
{
"begin": 588,
"end": 758,
"score": 0.0039914227
},
{
"begin": 758,
"end": 913,
"score": 0.030155903
},
{
"begin": 913,
"end": 1033,
"score": 0.007635765
}
] |
Abstract
Objective
The objective of the study was to evaluate the ability of the noninvasive magnetic resonance techniques to monitor the scaffold-aided process of articular cartilage repair.
Materials and methods
Defects of 4 mm in diameter and 3 mm in depth were created in right knees of 30 adolescent white New Zealand rabbits. Fourteen rabbits were implanted with poly(lactide-co-glycolic acid) (PLGA) scaffold trimmed to match the size and the shape of the defect (PLGA+ group). No procedure was applied to the remaining 16 animals (PLGA− group). Animals were sacrificed sequentially at 4, 12, and 24 weeks after the surgery and magnetic resonance T2-weighted images (400 MHz) of the dissected bone plugs at eight different echo times were taken to derive T2 relaxation time. The images and the T2 time dependencies versus the tissue depth were statistically analyzed. Histological results of bone plugs were evaluated using semiquantitative histological scales.
Results
The results obtained for PLGA repair tissue were evaluated versus the PLGA− group and the healthy tissue harvested from the opposite knee (reference group), and compared with histological results (hematoxylin and eosin staining). The magnetic resonance images and T2 relaxation time profiles taken 4 weeks after surgery for both the PLGA− and PLGA+ group did not reveal the tissue reconstruction. After 12 weeks of treatment T2 time dependence indicates a slight reconstruction for PLGA+ group. The T2 time dependence obtained for PLGA+ samples taken after 24 weeks of treatment resembled the one observed for the healthy cartilage, indicating tissue reconstruction in the form of fibrous cartilage. The tissue reconstruction was not observed for PLGA− samples.
Conclusion
The study revealed correlation between magnetic resonance and histology data, indicating the potential value of using MRI and spatial variation of T2 as the noninvasive tools to evaluate the process of articular cartilage repair. It also suggested, that the PLGA scaffold-aided treatment could help to restore the proper architecture of collagen fibrils.
Keywords
Cartilage repair T2 spatial variation MRI T2 anisotropy PLGA
Abbreviations
PGA
Poly(glycolic acid)
PLA
Poly(lactic acid)
PLGA
Poly(lactide-co-glycolic acid)
ROI
Region of interest
FOV
Field of view
SFM
Serum-free medium
PLGA+
Group treated with PLGA scaffold
PLGA−
Group treated without PLGA scaffold
This work was supported by Government Granted Project KBN 3 PO5 E 049 23. | {
"pile_set_name": "Pile-CC"
} | 0.02263 | [
{
"begin": 0,
"end": 9,
"score": 0.010204159
},
{
"begin": 9,
"end": 20,
"score": 0.0121478075
},
{
"begin": 20,
"end": 194,
"score": 0.014785618
},
{
"begin": 194,
"end": 217,
"score": 0.010620655
},
{
"begin": 217,
"end": 336,
"score": 0.09333697
},
{
"begin": 336,
"end": 489,
"score": 0.02809576
},
{
"begin": 489,
"end": 557,
"score": 0.013327881
},
{
"begin": 557,
"end": 786,
"score": 0.027409043
},
{
"begin": 786,
"end": 879,
"score": 0.021796638
},
{
"begin": 879,
"end": 2516,
"score": 0.027752401
}
] |
Right alongside the cash and credit cards, I keep a number of strange things in my wallet.
The largest is a folded-up page from the July 6, 2009 issue of Fortune magazine. In a profile, Scott Boras, widely regarded as the most powerful agent in professional baseball, describes a dinner with one of his mentors after a record-breaking contract:
“He said that if you are really effective at what you do, 95% of the things said about you will be negative. Keep your head on straight, don’t get emotional, take the heat, and just make sure your clients are smiling.”
Doing anything remotely interesting will bring criticism. Attempting to do anything large-scale and interesting will bring armies of detractors and saboteurs. This is fine – if you are willing to take the heat.
There are good reasons to be willing, even eager.
Colin Powell makes the case: pissing people off is both inevitable and necessary. This doesn’t mean that the goal is pissing people off. Pissing people off doesn’t mean you’re doing the right things, but doing the right things will almost inevitably piss people off.
Understand the difference.
Being responsible sometimes means pissing people off. Good leadership involves responsibility to the welfare of the group, which means that some people will get angry at your actions and decisions. It’s inevitable, if you’re honorable. Trying to get everyone to like you is a sign of mediocrity: you’ll avoid the tough decisions, you’ll avoid confronting the people who need to be confronted, and you’ll avoid offering differential rewards based on differential performance because some people might get upset. Ironically, by procrastinating on the difficult choices, by trying not to get anyone mad, and by treating everyone equally “nicely” regardless of their contributions, you’ll simply ensure that the only people you’ll wind up angering are the most creative and productive people in the organization.
Don’t go through life with kid gloves on. The stakes are too high, and it is oftentimes more important to give people what they need, rather than what they want.
This includes ourselves. By facing the fire early and often, we ensure the confidence and breathing room later to do bigger and better things.
Or to just sit back in a hammock with the peace of mind that only comes with belief that you did your best.
Be criticized for doing small “safe” things, or be criticized for doing big things that you’re passionate about. That is the choice. The criticism will come either way, whether in the form of self-talk (the former) or ankle biters (the latter).
Let the critics criticize. It’s the builders who count.
A version of this post first appeared on FourHourWorkWeek.com. Tim Ferriss is the #1 bestselling author of The 4-Hour Workweek, The 4-Hour Body and The 4-Hour Chef.
| {
"pile_set_name": "OpenWebText2"
} | 0.075711 | [
{
"begin": 0,
"end": 91,
"score": 0.016590435
},
{
"begin": 91,
"end": 173,
"score": 0.026722329
},
{
"begin": 173,
"end": 346,
"score": 0.009718247
},
{
"begin": 346,
"end": 456,
"score": 0.13206954
},
{
"begin": 456,
"end": 566,
"score": 0.043031808
},
{
"begin": 566,
"end": 625,
"score": 0.055333257
},
{
"begin": 625,
"end": 726,
"score": 0.21715863
},
{
"begin": 726,
"end": 778,
"score": 0.016798683
},
{
"begin": 778,
"end": 829,
"score": 0.04818217
},
{
"begin": 829,
"end": 2823,
"score": 0.22989221
}
] |
Lazio confirm Hoedt for July
By Football Italia staff
The saga of Wesley Hoedt's transfer from AZ Alkmaar to Lazio is over, as the Biancocelesti confirm that he will be joining them in July.
The player had his medicals with the team today as negotiations went on to bring the player in either before the end of this transfer window or in time for the summer.
The clubs have reached an agreement for the latter, as club spokesman Stefano De Martino spoke to Lazio Style Radio 89.3 and revealed the final details.
“Hoedt is going to be a Lazio player from July 1st. On that date he'll be able to wear the Biancocelesti jersey.”
The club further confirmed the news via their Twitter account.
Image via @OfficialSSLazio
Watch Serie A live in the UK on Premier Sports for just £9.99 per month including live LaLiga, Eredivisie, Scottish Cup Football and more. Visit: https://www.premiersports.com/subscribenow | {
"pile_set_name": "OpenWebText2"
} | 0.029126 | [
{
"begin": 0,
"end": 29,
"score": 0.0055532837
},
{
"begin": 29,
"end": 55,
"score": 0.01721518
},
{
"begin": 55,
"end": 193,
"score": 0.018742332
},
{
"begin": 193,
"end": 362,
"score": 0.011731312
},
{
"begin": 362,
"end": 516,
"score": 0.008642297
},
{
"begin": 516,
"end": 569,
"score": 0.019714156
},
{
"begin": 569,
"end": 631,
"score": 0.007913429
},
{
"begin": 631,
"end": 695,
"score": 0.024490505
},
{
"begin": 695,
"end": 723,
"score": 0.004928539
},
{
"begin": 723,
"end": 912,
"score": 0.027237365
}
] |
Q:
What affects air quality indoors after home improvement?
We installed a new A/C in the corner room of our house a little while back, because we wanted to use it as a nursery. Installation went fine and the little one sleeps in there every night. A few months later we decided to get a baby cam, which happens to have an air quality monitor build in. I noticed strange things happening to the air quality in the room, which reaches concerning levels at times, hence my question:
What affects air quality indoors after home improvement?
Could the A/C unit itself blow in bad air?
Could the carpet or the ceiling cause bad air quality?
Could furniture (mattress / sofa / closet / drawer) cause bad air quality?
Now, I am obviously aware that keeping the windows closed and consuming air should gradually worsen the air quality, but what has been happening the last nights is more weird than that - the air quality suddenly goes from pretty good to bad in a matter of a few minutes. Now it could be a problem with the sensor, of course, but I did confirm with a secondary sensor, who gave similar results.
So, any idea what could cause sudden bursts of pollution into the air?
Is that an indication of mold or would you expect an A/C to be able to actually worsen the air quality (I generally thought it would improve it)?
A:
"Air quality" is an ambiguous phrase.
This baby monitor that you bought, on what basis does it determine the air quality in the room? Carbon monoxide, carbon dioxide, radon, particulates, pollen, VOCs, smoke?
There are literally thousands of things that can affect air quality. I don't think I would get too worried about a baby monitor, that doubles as an air quality sensor, giving you an overall poor reading without knowing why it is showing a poor reading.
Open the room (and your house) once a week and get fresh air into the room. If you are really concerned get a better piece of equipment to monitor your air quality that shows specifics about the content of the air. That would give you a better idea how to remedy poor air quality.
Good luck!
| {
"pile_set_name": "StackExchange"
} | 0.028267 | [
{
"begin": 0,
"end": 61,
"score": 0.006212736
},
{
"begin": 61,
"end": 180,
"score": 0.025520578
},
{
"begin": 180,
"end": 251,
"score": 0.009787662
},
{
"begin": 251,
"end": 355,
"score": 0.0112454
},
{
"begin": 355,
"end": 483,
"score": 0.01193956
},
{
"begin": 483,
"end": 540,
"score": 0.007948137
},
{
"begin": 540,
"end": 583,
"score": 0.07251463
},
{
"begin": 583,
"end": 638,
"score": 0.029812546
},
{
"begin": 638,
"end": 713,
"score": 0.035477944
},
{
"begin": 713,
"end": 2084,
"score": 0.051737156
}
] |
My blog on Fashion and beauty,and nail art, mainly inspired by my day to day life, I'm not a profesional but I hope to inspire others.
xx
Please contact me [email protected]
Wednesday, 20 November 2013
Sad News
Sad News
This is Laura's mum, I write with sadness to inform all of Laura s followers, if they have not heard that Laura was tragically killed on July 21st this year. It has been with very mixed givings as to whether to write this as I know Laura s last blog was written the day before the accident.
Laura was involved in a road traffic accident as a passenger in a vehicle that had broken down on the side of the road. As her family and friends have been truly devastated it has taken a while to put together a Community Facebook page Little Laura, and we are in the process of building a webpage all in Little Laura's name to continue the fundraising work that Laura was doing for RDA (Riding for the disabled) and giving support to the primary school that Laura loved working for, Marshlands.
Looking through this blog has given family and friends tremendous support and all the lovely photographs that have been posted.
Laura was only twenty, but packed a lot of things into her short life, she will always be remembered as a bright sparkingly beautiful star with a caring and compassionate personality towards others. | {
"pile_set_name": "Pile-CC"
} | 0.031186 | [
{
"begin": 0,
"end": 135,
"score": 0.013883209
},
{
"begin": 135,
"end": 183,
"score": 0.060527626
},
{
"begin": 183,
"end": 212,
"score": 0.00843405
},
{
"begin": 212,
"end": 222,
"score": 0.030670939
},
{
"begin": 222,
"end": 232,
"score": 0.030670939
},
{
"begin": 232,
"end": 391,
"score": 0.14597784
},
{
"begin": 391,
"end": 524,
"score": 0.010828903
},
{
"begin": 524,
"end": 645,
"score": 0.06132676
},
{
"begin": 645,
"end": 1021,
"score": 0.019575324
},
{
"begin": 1021,
"end": 1349,
"score": 0.007739889
}
] |
Harry Potter Fans Will Be Able to Buy Butterbeer Doughnuts Soon Album
October 12, 2017 04:00 Views: 10
The magic of Harry Potter is coming to Sugar Shack Donuts.
The chain’s Virginia Beach location recently unveiled an upcoming flavor that will be familiar to fans of the J.K. Rowling books and films: butterbeer. Inspired by the drink sold in the wizard village of Hogsmeade, the doughnuts look absolutely delicious. Not only are they covered in glaze, gold sprinkles, and stars, the sweet treats are topped with golden snitches made from doughnut holes. Yum.
The Virginia Beach shop’s Instagram account showed them off on in early October, teasing that they’d be available later in the month.
“Yes, we will have Butterbeer Donuts this month, but no we don’t yet,” the caption read. “In the meantime, bring your favorite HP novel for a free house donut today. Physical books only, no ebooks.”
Yes, we will have Butterbeer Donuts this month, but no we don’t yet. In the meantime, bring your favorite HP novel for a free house donut today. Physical books only, no ebooks. #vbdonuts #virginiabeach #harrypotter #butterbeer #donuts #donutshop #sugarshack #sugarshackdonuts
The doughnuts are expected to be in short supply once they launch, the shop told Hello Giggles. The Virginia Beach location so far only plans to sell them on a limited number of dates: Oct. 14, 15, 21, and 22. Those hoping to try the butterbeer doughnuts are advised to call ahead.
Ah, if only we could summon them. We might just have to enjoy the doughnuts via pictures and envy the lucky Muggles who get to eat them. | {
"pile_set_name": "Pile-CC"
} | 0.031529 | [
{
"begin": 0,
"end": 70,
"score": 0.031185975
},
{
"begin": 70,
"end": 104,
"score": 0.015896274
},
{
"begin": 104,
"end": 164,
"score": 0.0729142
},
{
"begin": 164,
"end": 280,
"score": 0.025692256
},
{
"begin": 280,
"end": 317,
"score": 0.08367105
},
{
"begin": 317,
"end": 421,
"score": 0.048525527
},
{
"begin": 421,
"end": 559,
"score": 0.10828095
},
{
"begin": 559,
"end": 564,
"score": 0.018881164
},
{
"begin": 564,
"end": 699,
"score": 0.019158829
},
{
"begin": 699,
"end": 1596,
"score": 0.013952625
}
] |
Q:
Disable Escape key in Safari for getting out of full screen mode
I use Safari in Full Screen mode on OS X Mavericks all the time. I also use the escape key in web pages fairly frequently for various things (depends on the webpage).
One unfortunate side effect of these two facts is that I will occasionally turn off Full Screen mode inadvertently by hitting the escape key on a page that doesn't intercept the escape key.
Is there a way to disable the "Escape turns off full screen mode" behavior in Safari?
A:
Now, you could go ahead and brute-force disable the Escape key in
Safari. But that'd defeat the purpose of still allowing Escape to work
as a shortcut in the aforementioned places, which I'd rather avoid.
See here for an example to remap Escape to ⌥Escape with a Keyboard Maestro macro:
| {
"pile_set_name": "StackExchange"
} | 0.028954 | [
{
"begin": 0,
"end": 69,
"score": 0.010828903
},
{
"begin": 69,
"end": 136,
"score": 0.013536129
},
{
"begin": 136,
"end": 238,
"score": 0.009926494
},
{
"begin": 238,
"end": 428,
"score": 0.04406188
},
{
"begin": 428,
"end": 514,
"score": 0.0186035
},
{
"begin": 514,
"end": 519,
"score": 0.019297661
},
{
"begin": 519,
"end": 585,
"score": 0.1250247
},
{
"begin": 585,
"end": 595,
"score": 0.03770977
},
{
"begin": 595,
"end": 658,
"score": 0.01721518
},
{
"begin": 658,
"end": 812,
"score": 0.044748597
}
] |
The present invention relates generally to a system for dispensing particles. In particular, the invention relates to an apparatus and method for monitoring and controlling the velocity of particles in a pneumatic product application system.
Agricultural implements such as air seeders and row crop planters employ pneumatic means to convey product such as seed and fertilizer from a centralized hopper to distribution on the ground. Controlling particle flow at an acceptable operating speed can be a difficult task Too much air velocity and thus increased particle velocity can result in product damage and product bouncing or blowing out of the ground furrow. High particle velocity can also result in increased wear on the plastic air lines of an air seeder and excess consumption of fan power. Too little air velocity can result in plugging of air delivery lines.
The air velocity is difficult to optimize for a number of reasons. The minimum carry velocity varies for different product mass flow rates and for different product types, both of which may change during a field operation.
Another issue adding to the difficulty in optimizing the air flow velocity occurs when the configuration of the cart is altered. The delivery hoses in the air system may be reconfigured in a number of ways upsetting the balance of the air flow system. Even during field operation, if the air seeding system operates on a side slope, the resistance to particle flow will become greater in the line which have raised and vice versa for the lower lines.
Prior art methods of monitoring the particle flow of a system generally count the seeds at some point in the delivery system to ensure the proper number of seeds is being placed into the ground. Other systems simply monitor the air flow velocity, which provides a general indication of operating levels, but is not accurate since different products have different carry velocities.
Many air carts are equipped with methods of adjusting the air flow through the delivery lines by means of damping mechanisms and fan speed adjustment. One such system is disclosed in United States provisional patent application Ser. No. 60/086,422. This prior art system requires interaction of the operator to increase or decrease the air velocity.
The drawbacks of prior art include the need for manual adjustments to damping mechanisms and fan speed, complexity of the manual adjustments, and lost time and money on operation and maintenance of the air carts.
There are also further difficulties when the air cart is configured for double or triple shoot applications since each product may have a different carrying velocity.
Thus, there is a need for a system of monitoring and controlling particle velocity automatically in an air delivery system | {
"pile_set_name": "USPTO Backgrounds"
} | 0.016938 | [
{
"begin": 0,
"end": 78,
"score": 0.02124131
},
{
"begin": 78,
"end": 242,
"score": 0.0067333565
},
{
"begin": 242,
"end": 434,
"score": 0.015896274
},
{
"begin": 434,
"end": 663,
"score": 0.02397547
},
{
"begin": 663,
"end": 799,
"score": 0.016173938
},
{
"begin": 799,
"end": 869,
"score": 0.009857078
},
{
"begin": 869,
"end": 936,
"score": 0.016521018
},
{
"begin": 936,
"end": 1092,
"score": 0.007531641
},
{
"begin": 1092,
"end": 1221,
"score": 0.018881164
},
{
"begin": 1221,
"end": 2777,
"score": 0.017006932
}
] |
include README.md
recursive-include synnefo/webproject/static *
recursive-include synnefo/webproject/templates *
recursive-include docs *
prune docs/_build
recursive-include extras *
| {
"pile_set_name": "Github"
} | 0.007775 | [
{
"begin": 0,
"end": 18,
"score": 0.0095794145
},
{
"begin": 18,
"end": 64,
"score": 0.009162918
},
{
"begin": 64,
"end": 113,
"score": 0.012841969
},
{
"begin": 113,
"end": 138,
"score": 0.022351967
},
{
"begin": 138,
"end": 156,
"score": 0.0052409116
},
{
"begin": 156,
"end": 183,
"score": 0.020130653
}
] |
High power devices such as IGBTs (insulated gate bipolar transistors), power MOSFETs (metal oxide semiconductor field effect transistors), power diodes, etc. are typically assembled by sawing (dicing) individual dies from a wafer and placing the individual dies in packages. Electrical connections are made to each packaged die by wire bonding, metal ribbons, metal clips, etc. It is advantageous for many power devices with a vertical current path between electrodes at opposing sides of the die to be made as thin as possible to reduce the on-state resistance (Rdson) of the device. However, conventional high power semiconductor packages are not designed for very thin dies, e.g. dies <50 μm thick. Dies that are less than 50 μm thick are highly susceptible to cracking during the sawing (dicing) and die attach processes due to the forces involved. As such, conventional semiconductor dies typically have a vertical current path much thicker than 50 μm. Dies of such thickness have higher Rdson and inefficient heat transfer due to the thick semiconductor limitation. In addition, most conventional packages provide only single-sided or double-sided cooling which lowers continuous heat dissipation for high power devices. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.0928 | [
{
"begin": 0,
"end": 275,
"score": 0.10892494
},
{
"begin": 275,
"end": 378,
"score": 0.13700475
},
{
"begin": 378,
"end": 585,
"score": 0.01527153
},
{
"begin": 585,
"end": 702,
"score": 0.020963646
},
{
"begin": 702,
"end": 853,
"score": 0.04783881
},
{
"begin": 853,
"end": 958,
"score": 0.029812546
},
{
"begin": 958,
"end": 1072,
"score": 0.038911518
},
{
"begin": 1072,
"end": 1226,
"score": 0.0070804367
}
] |
Performance of the Advia Centaur second-generation troponin assay TnI-Ultra compared with the first-generation cTnI assay.
A cardiac troponin concentration above the 99th percentile limit of a reference population is a sensitive marker of myocardial necrosis. Current guidelines require troponin assays to have a total imprecision of < or =10% at the 99th percentile limit. In this study, the Advia Centaur second-generation TnI-Ultra assay was validated and compared with its predecessor the cardiac troponin I (cTnI) assay, with a focus on the current guidelines for diagnosis of acute myocardial damage. An imprecision profile of the TnI-Ultra assay was evaluated by analysing different pools over 20 days. The imprecision of the cTnI assay was used as comparison. The reference range was established based on TnI-Ultra analysis in 221 individuals. The cTnI concentration that could be determined with a total imprecision of 10% was 0.05 microg/L for the TnI-Ultra assay and 0.3 microg/L for the cTnI assay. The 99th percentile limit in the distribution of a reference population was 0.06 microg/L as determined with the TnI-Ultra assay. The TnI-Ultra assay provides significantly improved sensitivity when compared with the cTnI assay and a total imprecision of < or =10% is obtained at the 99th percentile limit of value distribution of a reference population. Using the TnI-Ultra assay, slightly increased cTnI concentration can be detected reliably following the current guidelines. | {
"pile_set_name": "PubMed Abstracts"
} | 0.013258 | [
{
"begin": 0,
"end": 123,
"score": 0.0066986484
},
{
"begin": 123,
"end": 260,
"score": 0.02929751
},
{
"begin": 260,
"end": 374,
"score": 0.011800728
},
{
"begin": 374,
"end": 607,
"score": 0.013536129
},
{
"begin": 607,
"end": 710,
"score": 0.015479778
},
{
"begin": 710,
"end": 768,
"score": 0.01561861
},
{
"begin": 768,
"end": 852,
"score": 0.012772553
},
{
"begin": 852,
"end": 1011,
"score": 0.014577369
},
{
"begin": 1011,
"end": 1141,
"score": 0.0131890485
},
{
"begin": 1141,
"end": 1489,
"score": 0.0100653265
}
] |
Q:
flag declined with message "declined - Answers don't need to be flagged just because they're link-only."
Although these types of flags have been received positively in the past (you can see my flagging history, if you are allowed). I strongly believe that links should be used in comments and not answers.
Stack Overflow itself have been providing this flagging option while reviewing low quality or other type of answers.
A:
He's right, they don't. We should also note that you flagged three link-only answers on that particular question. Doesn't that tell you something about the question? That just maybe it's the question's fault and not the answer's?
The right course of action here is not deleting all the answers for being link-only, but deleting the question for soliciting those link-only answers (and because, in this case, it's a terrible question). Instead casting a single flag on the question explaining why you think it should be deleted would be an appropriate action that moderators could better evaluate. Something like:
This question is just filled with link-only answers. It is closed and has low views and should be deleted.
Please don't just look at answers and think "oh it's only a link, I should flag it." That's a bad train of thought. Actually evaluate the answer in the context of the question.
| {
"pile_set_name": "StackExchange"
} | 0.05813 | [
{
"begin": 0,
"end": 109,
"score": 0.017492844
},
{
"begin": 109,
"end": 237,
"score": 0.036851373
},
{
"begin": 237,
"end": 311,
"score": 0.015757442
},
{
"begin": 311,
"end": 428,
"score": 0.05133759
},
{
"begin": 428,
"end": 433,
"score": 0.019297661
},
{
"begin": 433,
"end": 457,
"score": 0.0224908
},
{
"begin": 457,
"end": 547,
"score": 0.021102477
},
{
"begin": 547,
"end": 599,
"score": 0.016798683
},
{
"begin": 599,
"end": 663,
"score": 0.0168681
},
{
"begin": 663,
"end": 1333,
"score": 0.09763293
}
] |
Preferential response of acute myeloid leukemias with translocation involving chromosome 17 to human recombinant granulocyte colony-stimulating factor.
Induction of proliferation and differentiation in response to the addition of recombinant human granulocyte colony-stimulating factor (G-CSF) was studied by both suspension and semisolid cultures in a series of acute myeloid leukemias (AML). Induction of proliferation by G-CSF alone was observed in six of 27 cases of AML. All acute promyelocytic leukemias with the specific chromosomal translocation t(15;17) and one case of myelomonocytic leukemia with balanced chromosomal translocation involving chromosome 17 at band q12q21 were induced to proliferate strongly by the G-CSF. However, contrary to the long-term proliferative effect observed with granulocyte/macrophage colony-stimulating factor (GM-CSF), G-CSF activity can be characterized by its capability to initiate and promote the growth of responding AML cells but not to sustain long-term proliferation. Finally, no terminal differentiation was found, as assessed by morphology, cytochemistry, and cell surface marker analysis. These results indicate that G-CSF may be sufficient to provide a specific signal for induction of a transient proliferation in AML without induction of terminal differentiation. The cells with the highest response are clonal leukemia cells, all bearing a translocation involving the chromosome region 17q12q21 in which the G-CSF gene has been recently located. | {
"pile_set_name": "PubMed Abstracts"
} | 0.012009 | [
{
"begin": 0,
"end": 152,
"score": 0.03427619
},
{
"begin": 152,
"end": 394,
"score": 0.004720291
},
{
"begin": 394,
"end": 476,
"score": 0.0070110206
},
{
"begin": 476,
"end": 733,
"score": 0.013605545
},
{
"begin": 733,
"end": 1019,
"score": 0.004997955
},
{
"begin": 1019,
"end": 1143,
"score": 0.017631676
},
{
"begin": 1143,
"end": 1321,
"score": 0.007948137
},
{
"begin": 1321,
"end": 1503,
"score": 0.009718247
}
] |
Clinical results of percutaneous closure of large secundum atrial septal defects in children using the Amplatzer septal occluder.
We reviewed our experience using the Amplatzer septal occluder (AGA Medical, Golden Valley, MN, USA) to close large, secundum-type atrial septal defects (ASDs) in children. Between June 2002 and December 2005, 52 patients (mean age 13.5 +/- 8.7 years) underwent transcatheter closure of large (> or =25 mm), secundum ASDs with the use of the Amplatzer septal occluder (ASO). Groups 1 and 2 included patients with a retroaortic rim of <5 mm (n = 39) or > or =5 mm (n = 13), respectively. All procedures were performed with general anesthesia and transesophageal echocardiographic guidance except for 10 patients, which involved local anesthesia and three-dimensional transthoracic echocardiography. Successful device implantations, device sizes, approaches, complications, and closure rates were assessed. Device implantation was successful in 50 patients (96.1%), with no difference between groups (95% vs 100%, P>0.05). In 2 patients, implantation failed because of embolism or deployment failure. Device were larger in group 1 than in group 2 (29.7 +/- 4.2 vs 26.7 +/- 3.8 mm, P = 0.04). The right upper pulmonary-vein approach was more common in group 1 than in group 2 (P = 0.0001). Complications and closure rates did not differ between the groups (P > 0.05). Transcatheter closure of large, secundum ASD by using the ASO device was feasible, and complication rates were low. A deficient retroaortic rim did not preclude successful device implantation; however, a large device may be needed to close large ASD. Close long-term follow-up is necessary to determine the safety of transcatheter closure of large ASDs in children. | {
"pile_set_name": "PubMed Abstracts"
} | 0.015688 | [
{
"begin": 0,
"end": 130,
"score": 0.14777246
},
{
"begin": 130,
"end": 303,
"score": 0.021518974
},
{
"begin": 303,
"end": 505,
"score": 0.004303795
},
{
"begin": 505,
"end": 617,
"score": 0.009648831
},
{
"begin": 617,
"end": 828,
"score": 0.015202113
},
{
"begin": 828,
"end": 935,
"score": 0.009718247
},
{
"begin": 935,
"end": 1051,
"score": 0.00614332
},
{
"begin": 1051,
"end": 1129,
"score": 0.036508016
},
{
"begin": 1129,
"end": 1220,
"score": 0.0071151447
},
{
"begin": 1220,
"end": 1760,
"score": 0.028267438
}
] |
Welcome to my blog!
As a lighting designer for over 25 years, I have helped create an incredible array of environments. Lighting, a crucial part of any event, helps enhance the mood while creating a logical path for eye to follow. It is with this approach that I speak as a digital photographer and image maker.
(well, thats all I have for now. Check back soon for more profound words....LOL)
Aug212015
Clouds……
So when did WordPress 4.3 come out? Some nice new updates from what I can see from the 3 minute intro video. Someday I’m actually going to have to take a few hours and actually learn WordPress from the ground up. At the very least, I might want to search for a cheat sheet online. Siri?
Been bumbling about the interface for over 7 years now and I STILL feel like I am barely getting by. I guess that just part of the fun though. Dive in and learn to swim later….
(mike, whats with all the ….’s?)
Aaaannyway!
Todays image
Sharing my work. That was the original purpose of this blog. Inspired by Trey Ratcliff, my journey into the world of HDR, travel, and event illumination felt like a great foundation of content of which to share on a daily basis. Hard to believe it was over 7 years ago that I posted for the first time! A challenge to do this daily though. Trey, I don’t know how you do it!!!
This blog has of course changed a bit over the past few years (I’m actually about to launch yet another theme again soon!), but its still in essence the same. A jumbled collage of random observations of nothing with some cool images to keep you interested! Its been a little difficult to keep posting on a daily basis as there are so many places to share your art, not of which were really either available when I started this, or places that I was a part of. I think I might need a social media schedule 🙂
Till then, let the randomness continue….
Here is a quick one I cooked up from a recent “cloud and storm chasing” afternoon here down in South Florida. Lots happening up in the sky this time of year. I wonder how many people actually take to time to enjoy the view. Do you? | {
"pile_set_name": "Pile-CC"
} | 0.038912 | [
{
"begin": 0,
"end": 20,
"score": 0.009232334
},
{
"begin": 20,
"end": 121,
"score": 0.0100653265
},
{
"begin": 121,
"end": 232,
"score": 0.016173938
},
{
"begin": 232,
"end": 313,
"score": 0.010759487
},
{
"begin": 313,
"end": 347,
"score": 0.022074303
},
{
"begin": 347,
"end": 390,
"score": 0.01999182
},
{
"begin": 390,
"end": 395,
"score": 0.068918526
},
{
"begin": 395,
"end": 406,
"score": 0.030842619
},
{
"begin": 406,
"end": 416,
"score": 0.012841969
},
{
"begin": 416,
"end": 2103,
"score": 0.14059398
}
] |
Vans Vault Sk8-Hi Boat Strap – Java Brown
A sick markdown of $70 off retail has been located at Kith for two select sizes of the java brown Vans Vault Sk8-Hi Boat Strap LX editions! Boasting a canvas upper with pattern-embossed premium leather accounting for the midfoot strap and heel wrap, dark brown leather also lines the perimeter of the shoe just above the midsole while the insides are lined with light blue & white cotton material. These are a dope look for the casual office setting or for a night out and who could be mad at more than 60% savings?!
Size 11.5 and 13 ONLYKith currently ships internationally to Canada, Mexico, Australia and Europe | {
"pile_set_name": "Pile-CC"
} | 0.06732 | [
{
"begin": 0,
"end": 42,
"score": 0.016035106
},
{
"begin": 42,
"end": 183,
"score": 0.12824467
},
{
"begin": 183,
"end": 441,
"score": 0.0066639404
},
{
"begin": 441,
"end": 560,
"score": 0.25676212
},
{
"begin": 560,
"end": 657,
"score": 0.021102477
}
] |
It's back dated to the oldest outstanding trade with the counterparty.
Clement Abrams@ENRON
09/08/2000 04:31 PM
To: Tana Jones/HOU/ECT@ECT
cc:
Subject: Re: Duke Energy Marketing Limited Partnership/Enron Canada Corp.
Hey,
What's with the out dated effective date. 1996? I had just got to Enron in
December 1996.
Clem
Tana Jones@ECT
09/05/00 05:02 PM
To: Clement Abrams/Corp/Enron@ENRON, Cindy Richardson/Corp/Enron@ENRON
cc:
Subject: Duke Energy Marketing Limited Partnership/Enron Canada Corp.
Attached for your approval is the form of Enron Corp. Guaranty in favor of
the referenced Counterparty, which guarantees the obligations of ENA under
an ISDA Master Agreement. We will need the standard executed copy.
In addition, we will need the following closing documents: Certificate of
Incumbency.
Upon approval and execution, please call me at x33399 to pick up the
documents. Thank you for your assistance in this matter. | {
"pile_set_name": "Enron Emails"
} | 0.03771 | [
{
"begin": 0,
"end": 73,
"score": 0.024147147
},
{
"begin": 73,
"end": 98,
"score": 0.0040781926
},
{
"begin": 98,
"end": 119,
"score": 0.004251733
},
{
"begin": 119,
"end": 152,
"score": 0.04234509
},
{
"begin": 152,
"end": 160,
"score": 0.027752401
},
{
"begin": 160,
"end": 237,
"score": 0.0055185757
},
{
"begin": 237,
"end": 243,
"score": 0.02262963
},
{
"begin": 243,
"end": 286,
"score": 0.019436494
},
{
"begin": 286,
"end": 292,
"score": 0.005830948
},
{
"begin": 292,
"end": 980,
"score": 0.0495556
}
] |
NEW YORK, April 4, 2017 – WorkFusion RPA Express, a free Robotic Process Automation (RPA) product for enterprise operations, has launched globally, designed for businesses to begin or accelerate their digitization efforts.
Over 2000 users from 850 companies have participated in WorkFusion RPA Express Early Access program since February 2016, and the initial participants have seen as much as 30% increase in speed of RPA adoption.
EPAM Systems, Inc., one of WorkFusion’s partners, improved delivery for its banking and financial services clients’ by using RPA Express to automate data entry, generate invoices and offers, create new accounts, and exchange information between systems. “RPA Express is part of a broader cognitive services strategy to help our clients fuel growth, uncover new opportunities and stay competitive,” said Eli Feldman, CTO, Advanced Technology, EPAM. “Our first impressions working with RPA Express are very positive.”
RPA Express lets customers automate the manual work of integrating Citrix, Oracle, SAP and other vital core systems by eliminating the “swivel chair” tasks of entering credentials, navigating application interface, and performing core systems functions. While some RPA vendors provide free trials, WorkFusion is the first software company to provide a scalable, unlimited RPA product for free.
Heads up! On May 22, 2018, we updated our Privacy Policy and Terms of Service to make them clearer and to address some new privacy laws in Europe. If you keep using Automation.com after May 25, 2018, you're letting us know that you're okay with the updates. | {
"pile_set_name": "Pile-CC"
} | 0.015966 | [
{
"begin": 0,
"end": 223,
"score": 0.0020651272
},
{
"begin": 223,
"end": 434,
"score": 0.008572881
},
{
"begin": 434,
"end": 689,
"score": 0.006282152
},
{
"begin": 689,
"end": 883,
"score": 0.0028460578
},
{
"begin": 883,
"end": 951,
"score": 0.009093502
},
{
"begin": 951,
"end": 1206,
"score": 0.015410362
},
{
"begin": 1206,
"end": 1346,
"score": 0.008052262
},
{
"begin": 1346,
"end": 1357,
"score": 0.13835071
},
{
"begin": 1357,
"end": 1494,
"score": 0.007878721
},
{
"begin": 1494,
"end": 1604,
"score": 0.0066639404
}
] |
Q:
Do monads not guarantee the applicability of layered/non-layered monadic values to non-layered/non-monadic functions, and is this a good/bad thing?
I'm just trying to get monads, so bear with me if I ask a bad question, but...
If monads only require:
(a -> M a), where M is the monadic type constructor, and
(M a -> (a -> M b) -> M b), which is the bind operation (which I understand as mapping a monad onto a non-monadic to monadic value function)
...doesn't this mean that:
(M a -> a) and
(M (M a) -> M a) are not implicitly required?
Won't this usually cause a problem?
Suppose we have a set of functions, S, which all have the type (x -> y), where x and y are arbitrary types.
Now, suppose I program using a set of monadic functions M, where their types are x -> M y.
Doesn't this mean that once I turn a type into M y, I can't use any of the (x -> y) functions? Or, can I assume that I can do (M x -> (x -> y) -> (y -> M y) -> M y)?
Furthermore, don't we usually want to extract the original type when programming? When switching between something, like async a -> a or maybe a -> a... Isn't that a common operation? I can definitely see the case where somebody wants to optimize a monad out if they see it as negligible (e.g. a logging monad).
Additionally, what about layered monads without flattening? I understand that lists can be seen as monads where restricting flattening is a clear and logical choice, but what about the hypothetical case of async (async a) monadic values where async has no flatten function? Does bind only imply one layer of "monadic reduction" where we can often assume that (M a -> (a -> M a) -> M a) can often be seen as (M a -> (M a -> a) -> (a -> M a) -> M a), and (M M a -> (a -> M a) -> M a or M M a) may not work? Is there a true difference between flattening and non-flattening monads?
A:
Won't this usually cause a problem?
You might say that this is "by design". One of the possible uses is IO; once you have a value tainted with IO, you have to "bubble up"; you can't hide the fact that a function is doing IO under a pure value.
wouldn't that mean I either have to manually convert each (a -> b) -> (a -> M b) by applying a monadic constructor somewhere?
This is easier than you think because every Monad is also a Functor and an Applicative Functor:
randomDice :: IO Int
randomDice = randomRIO (1,6)
cheat :: Int -> Int
cheat = (+1)
main = do
dice <- randomDice
dice' <- cheat <$> randomDice
Having all of the fmap, <$>, liftA/liftM and pure/return machinery at our disposal, it makes it very simple to easily use pure functions in the monadic contexts.
(M (M a) -> M a) is not implicitly required
That one is false. You only need bind to implement it.
join :: (Monad m) => m (m a) -> m a
join x = x >>= id
| {
"pile_set_name": "StackExchange"
} | 0.019853 | [
{
"begin": 0,
"end": 152,
"score": 0.012217224
},
{
"begin": 152,
"end": 232,
"score": 0.13610743
},
{
"begin": 232,
"end": 256,
"score": 0.052136723
},
{
"begin": 256,
"end": 314,
"score": 0.018325835
},
{
"begin": 314,
"end": 455,
"score": 0.008711713
},
{
"begin": 455,
"end": 483,
"score": 0.011314815
},
{
"begin": 483,
"end": 499,
"score": 0.010481823
},
{
"begin": 499,
"end": 545,
"score": 0.010342991
},
{
"begin": 545,
"end": 582,
"score": 0.040628307
},
{
"begin": 582,
"end": 2810,
"score": 0.043718524
}
] |
Check out our new site Makeup Addiction
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
I Have 99 problems and they're all due monday | {
"pile_set_name": "OpenWebText2"
} | 0.190426 | [
{
"begin": 0,
"end": 40,
"score": 0.0669207
},
{
"begin": 40,
"end": 62,
"score": 0.027065687
},
{
"begin": 62,
"end": 84,
"score": 0.027065687
},
{
"begin": 84,
"end": 106,
"score": 0.027065687
},
{
"begin": 106,
"end": 128,
"score": 0.027065687
},
{
"begin": 128,
"end": 150,
"score": 0.027065687
},
{
"begin": 150,
"end": 172,
"score": 0.027065687
},
{
"begin": 172,
"end": 194,
"score": 0.027065687
},
{
"begin": 194,
"end": 216,
"score": 0.027065687
},
{
"begin": 216,
"end": 328,
"score": 0.1024659
}
] |
Q:
How to subset a local macro in Stata
Suppose I have a local macro containing some variable names
local indep "cat dog pig"
How do I drop pig from the macro, if I want the macro to contain only cat and dog?
A:
The context is that you want to remove variable names from a string listing them. The subinstr() solution in the OP's answer works only if the text to remove occurs just once as an entire variable name, and does not occur as part of another variable name. Thus the result of removing pig from this list with equivalent but not identical syntax is
. local names "cat dog pig piglet"
. local names : subinstr local names "pig" "", all
. di "`names'"
cat dog let
That is not what you want. The solution is to insist that what is removed must be a word. In Stata, words are or could be separated by spaces (other than being bound by double quotes); in the case of Stata variable names, distinct variable names are always distinct words.
. local names "cat dog pig piglet"
. local names : subinstr local names "pig" "", word
. di "`names'"
cat dog piglet
When handling lists of variable names, Stata doesn't care about multiple spaces rather than single spaces, so neither need you. But if they offend, they can be reduced to single spaces.
See also the functions subinstr() and subinword() for approaches similar in spirit. In some older versions of Stata there were rather strict limits on string length for such functions, which made use of the construct used above : subinstr advisable for all but very short lists.
Here, however, is a quite different solution:
. local names "cat dog pig piglet"
. local pig "pig"
. local names : list names - pig
. di "`names'"
cat dog piglet
In a program, that is often much better, especially if you want to remove several names (more generally "words") at once.
| {
"pile_set_name": "StackExchange"
} | 0.153929 | [
{
"begin": 0,
"end": 41,
"score": 0.010898319
},
{
"begin": 41,
"end": 102,
"score": 0.010481823
},
{
"begin": 102,
"end": 128,
"score": 0.355017
},
{
"begin": 128,
"end": 212,
"score": 0.34388447
},
{
"begin": 212,
"end": 217,
"score": 0.019297661
},
{
"begin": 217,
"end": 299,
"score": 0.014160873
},
{
"begin": 299,
"end": 473,
"score": 0.013258465
},
{
"begin": 473,
"end": 565,
"score": 0.2712817
},
{
"begin": 565,
"end": 600,
"score": 0.16620636
},
{
"begin": 600,
"end": 1835,
"score": 0.29756662
}
] |
1. Field of the Invention
The present invention relates to wiper devices for reciprocatingly wiping, for example, the rear or front windshield or head lamps of an automobile, the sight glasses of some industrial equipments and so forth. More particularly, the invention is concerned with a wiper device having a rise-up mechanism.
2. Description of the Prior Art
Wiper devices have been known, each of which has a mechanism which, when the wiper switch is turned off, lowers the wiper blades to a position below the lower end of their wiping stroke. When the wiper switch is turned on again, this mechanism operates to raise the blades up to the operating position before wiping is commenced. This mechanism, therefore, is generally referred to as a "rise-up mechanism". Usually, this rise-up mechanism is used in a concealed-type automotive wiper device which is adapted to conceal the wiper blades below the bonnet when the wiper device is not used. The rise-up mechanism is used also in a wiper device for a power-driven automotive rear windshield adapted to be raised and lowered by remote control. Namely, in order to permit a smooth upward and downward movement of the power-driven rear windshield, the rise-up mechanism usually keeps the wiper blades away from the rear windshield and puts them into contact with the rear windshield only when wiping becomes necessary. The rise-up mechanism is used also in various equipments having power-driven windows to keep the wiper blades below or above the area to be wiped so as not to hinder the movement of the window panels. Thus, the term "rise-up mechanism" should be interpreted to also include a mechanism which keeps the wiper blades at a position above the upper end of the wiping stroke, when the blades are not in operation.
An example of a rise-up mechanism is shown in the specification of U.S. Pat. No. 3,253,206. This mechanism has a crank arm connected to an output shaft driven by a wiper motor through a worm gear having a center offset from the axis of the output shaft, so that a crank pin provided on the crank shaft moves along a non-circular path so as to move, when the wiper switch is turned off, the wiper blades to a position out of the area wiped by the wiper blades during the wiping operation. This rise-up mechanism, however, requires a complicated construction including a special eccentric blade driving mechanism and a solenoid-actuated clutch for controlling the switch.
Under this circumstance, there is an increasing demand for a wiper device having a rise-up mechanism of a simple construction. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.016729 | [
{
"begin": 0,
"end": 26,
"score": 0.01263372
},
{
"begin": 26,
"end": 237,
"score": 0.02262963
},
{
"begin": 237,
"end": 331,
"score": 0.015479778
},
{
"begin": 331,
"end": 363,
"score": 0.007670473
},
{
"begin": 363,
"end": 550,
"score": 0.02054715
},
{
"begin": 550,
"end": 693,
"score": 0.033246122
},
{
"begin": 693,
"end": 771,
"score": 0.032387726
},
{
"begin": 771,
"end": 952,
"score": 0.018048171
},
{
"begin": 952,
"end": 1103,
"score": 0.0129808
},
{
"begin": 1103,
"end": 2581,
"score": 0.032559406
}
] |
Review: Hello Waffle shadows
Hello Waffle's description: "Ocean green with intense gold shift and green sparkles."
My verdict: I am so glad Christine allowed me to buy this one. I am not a full size person, but Archean Earth is just worth it. It is the prettiest green ever and it's definitely made its way onto my all around favourite shades list. It is quite bright and it just makes your eyelids look like they're glowing. I love that it doesn't lean bright blue like a lot of greens do.
Hello Waffle's description: "Rose gold shimmer, more on the rosy side."
My verdict: 23 is so damn gorgeous. It's similar to Fyrinnae's Rapunzel Had Extensions, but where that leans gold on me, 23 truly is a lot rosier with a hint of orange. It is a lovely, neutral all over shade for lazy days, but it's also a great base colour for crazier looks. The apparent patchiness is due to the veins on my wrist, since it applies extremely smoothly and evenly.
Hello Waffle's description: "Satin greyed purple with a copper sheen."
My verdict: Another one of Hello Waffle's famed purples. It's part of the Catssic Literature collection, which is an absolute must-have for someone like me. I mean, I'm a lit student and I have a cat tattoo (and two darling kitties). Match made in heaven. Catticus Finch is a true chameleon: it ranges from a slightly purple-y grey to bright lavender with an almost pink shift, depending on how you apply it. It needs PE to truly have that gorgeous shift, but using it over normal primer makes a perfectly office-safe neutral. Then again, even the full-on purple with copper shift is muted enough for work, since it is still quite light.
Hello Waffle's description: "Green duochrome over a periwinkle sky blue with flecks of starry gold."
My verdict: To this day, The Great Catsby is still one of the only blues I own and actually wear. It is bright, it is fun, it is absolutely gorgeous! It is much brighter than the swatches on the HW site make it appear to be, but the green shift is almost impossible to photograph. It actually looks more green than blue on me in natural daylight. It really is quite daring, but it also makes for a kick-ass liner if you're not quite brave enough to use it on your lid. It still amazes me how well this shade captures the feel of that one scene in the Great Gatsby.
Hello Waffle's description: I didn't actually write these down when they were available, oops.
My verdict: This shadow was part of the Kitty Kingdom Collection and it is no longer available for purchase (except for some leftover stock which will be listed later this month). As you might know from my previous posts, I love all things gold and this truly is very, very gold. It is cooler than Box Cat, ranging from olive to yellow gold depending on the lighting. It isn't anything you haven't seen before, though, so don't fret if you aren't able to pick it up when Christine relists the extra stock. Oh and excuse the wonky swatch: I got attacked by some melting snow the second I stepped outside to take these pictures.
Hello Waffle's description: Kitty Kingdom shade. I'm an idiot.
My verdict: Skittles' more orange sister. It is more copper than it is gold and it is very, very bright. I've had it look both brown and orange, depending on the angle and the lighting. Again, very pretty but not worth fretting over if you can't buy it.
Hello Waffle's description: Yep, still an idiot.
My verdict: Pepper! might just be the single most unique shadow I own and I'm still a little undecided whether or not that's a good thing. The base is a greyish green that appears very pale (and slightly chalky) when you apply too much but blends out to a more golden green, while the red glitters are absolutely huge. I love the colour in my swatches, but I find it quite hard to apply evenly and it might just be a little too unique for me. I really need to play with it a little more and see if I can make it work.
Hello Waffle's description: "Copper with gold shimmer."
My verdict:I'd call this orange instead of copper, but that's really just semantics. It's quite bright, with a dark base that shows itself in unnatural lighting. I love oranges (okay, okay, copper) so this shade is right up my alley. The shimmer is quite subtle, as opposed to some of the more glittery Hello Waffle shades.
Hello Waffle's description: "Golden silver shimmer."
My verdict: I have no idea what to call this one. It looks grey in the bag, but shifts between a dark silver and a coppery goldish brown when applied. I didn't actually expect to like it much when I saw the sample baggy, but it truly transforms into something incredibly interesting and versatile on my skin. It's a lovely base colour but it's also perfect for a one shade look since it changes so much depending on lighting and application.
Hello Waffle's description: "Shimmery orange peach that leans copper with a gold undertone."
My verdict: This shade is mad gorgeous. Pun intended. It is part of the seasonal Painted Flowers collection, so unfortunately this one is unavailable right now, but I just had to include it. It is described as a orange peach, but instead of a copper undertone, I seem to get a shift that is much more of a soft pink. It's hard to properly photograph it. It is very sparkly, but the colour is muted enough that it is still very wearable. I really need to depot this one and use it one more often.
Whoops. I swatched these the day after Christmas, but then life happened and I forgot to edit and post them. Chrismas itself was pretty much just one big food coma, followed by both my parents and myself falling ill with the flu. Fun times. It did help us balance out all the extra calories, but not quite voluntarily. The day after Christmas also brought us at least 10cm of snow, which turned to ice within a day and washed away with the rain a couple of days later. The woes of living in the Netherlands.2015 so far has been a bit of a blur. Time's been passing quickly, but it doesn't really feel like it has truly started yet. Lectures are done (no more Groningen! no more spending 16 hours a week on the train!) so I've been at my parents' for the past couple of weeks, only going to Utrecht to meet up with a friend. The plan was to work out a lot, but my stomach's been playing up again so I mostly just cuddled with Luna while working on my many deadlines. None of my final assignments are very taxing but they still need to be done, so I've been slowly but surely getting them done. Three more assignments and two more finals and then the semester is finally over. I can't wait to finally have some normalcy again, some time to cook and sleep and not have to sit on a train for four hours a day. I'll be starting my MA thesis soon (writing it, the planning and drafting stages are done already), which will be the only thing requiring me to go up to Groningen from time to time. I also really need to find an internship, yaiks.Okay, enough mindless chatter. Onto the business of the day, which is Hello Waffle swatches! The shop has been closed since the massive Black Friday sale, but it will be reopening for its first birthday tomorrow (on the 12th) with a brand new site and another massive sale. She has a gorgeous new collection of mattes and everything is 20% off with the codetill January 14th, 9am EST. I have so many items in my cart already that it's a little embarrassing. Okay, very embarrassing...Just to enable you guys even further, I wanted to post some swatches of my Black Friday order and some random samples I bought off someone on IMAM. I have fallen head over heels in love with Hello Waffle, both with the shop and with the products. Seriously, they have the prettiest purples ever.Christine offers halflings (1/3 tsp in a 3 gram jar) for $3.25 and full sizes (3/4 tsp with sifter) for $6.00. The prices are currently listed in CAD, which is why they appear a little higher. Sample packs are around $6.25 for five and $12.50 for ten, but she also sells sample sets of each collection. There is an option to buy have your sample sets send by lettermail, which is significantly cheaper than normal shipping. The lettermail listing includes the shipping costs in the price and needs to be checked out separately. Hello Waffle used to have a flat rate international shipping of $6, but this has changed recently and I'm not quite sure what it is now. It seems to be 8.34 CAD for most countries, which translates to about $7.00 USD.Her current TAT is 10-20 business days, beginning the following business day from order placement. I ordered most of these during the Black Friday sale and poor Christine got ridiculously swamped, so it took a little longer to ship my package. There were some problems with the make up bags, but my order shipped as soon as they arrived. I ordered on the 28th and the 30th of November, the combined order shipped on the 10th of December and it arrived on the 16th. Very decent for international shipping, which unfortunately doesn't come with tracking.Christine is the absolute best. I'm not saying this to be a suck-up: she is actually the nicest indie owner I have encountered so far. She let me buy Archean Earth even when it wasn't part of her Black Friday catalogue and answered all of my emails and silly little requests with astonishing speed and patience. I ended up placing two orders, which she combined before refunding me the surplus in shipping costs. When my order arrived, I noticed she had upgraded my halfling of 23 as well as giving me a free Catssic Literature sticker to match my make up bag.These swatches were done over Fyrinnae's Pixie Epoxy. They are loose powders and need a sticky base to work properly.I love Hello Waffle, plain and simple. The formula truly is a very loose powder, but it's so easy to work with and it blends so well. They're not as flashy as for instance Femme Fatale's duochromes, which makes them extremely wearable, but they're bright enough to create some crazy looks. I wasn't blown away by the Kitty Kingdom shades, but considering the time frame between idea and realisation as well as the cause, it's still money well spent. They're decent shadows, just not as great as the other ones. And honestly, Christine is the absolute queen of purples and rose golds. My wallet is weeping already because I need more, more, more.You can buy Hello Waffle's shadows here . She'll be reopening tomorrow, the 12th of January at 10am EST. Useto get 20% off your order.These opinions are my own. I was not compensated in any way for this post. | {
"pile_set_name": "OpenWebText2"
} | 0.033246 | [
{
"begin": 0,
"end": 29,
"score": 0.040628307
},
{
"begin": 29,
"end": 34,
"score": 0.038224805
},
{
"begin": 34,
"end": 120,
"score": 0.015896274
},
{
"begin": 120,
"end": 186,
"score": 0.036851373
},
{
"begin": 186,
"end": 251,
"score": 0.04234509
},
{
"begin": 251,
"end": 357,
"score": 0.03049926
},
{
"begin": 357,
"end": 434,
"score": 0.089577995
},
{
"begin": 434,
"end": 499,
"score": 0.028954152
},
{
"begin": 499,
"end": 572,
"score": 0.06372416
},
{
"begin": 572,
"end": 10577,
"score": 0.3511902
}
] |
Ethical issues in the introduction of case management for elderly people.
As case management is under development in France for elderly people, this study sets out to identify and analyse key situations responsible for ethical dilemmas for French case managers. We based our study on the analyses of individual interviews made with case managers and focus-group discussions, bringing together all case managers working in local organisations running for at least a year. We identified three situations giving rise to ethical dilemmas: in the order of importance, the refusals of care, the practicalities of collecting and sharing personal data and the allocation of resources. These three situations can lead to conflict between the principle of beneficence and those of respect for autonomy, non-maleficence and justice. We describe here how French case managers practically deal with these situations. | {
"pile_set_name": "PubMed Abstracts"
} | 0.017632 | [
{
"begin": 0,
"end": 74,
"score": 0.011175984
},
{
"begin": 74,
"end": 262,
"score": 0.0039914227
},
{
"begin": 262,
"end": 471,
"score": 0.0070457286
},
{
"begin": 471,
"end": 677,
"score": 0.016035106
},
{
"begin": 677,
"end": 822,
"score": 0.018048171
},
{
"begin": 822,
"end": 903,
"score": 0.033932835
}
] |
A fan in Europe looks to have received the Skylanders Imaginators Starter Pack nearly 2 weeks ahead of the release.
He posted some images of the unboxing, but more importantly shared images of the Poster as well, which confirms the Skylanders Imaginators lineup.
We’ve known the names and had seen some in-game representations, but this is the first time we’ve seen the figures themselves.
Here are the remaining Skylanders Imaginators figures that Skylanders has yet to officially unveil. Head to SkylandersInquirer.com for the names and more info! #Skylanders #skylandersimaginators #Skylander A photo posted by Jason Inquires (@jasoninquires) on Sep 28, 2016 at 9:09am PDT
Be sure to get your figure pre-orders in now to get them at the bundle rates.
Take a look at all the images below:
Source: DarkSpyro
Be sure to check out my weekly podcast , The Toys For Games ‘Cast . Talk all things in ‘Toys To Life’ genre! | {
"pile_set_name": "OpenWebText2"
} | 0.048869 | [
{
"begin": 0,
"end": 116,
"score": 0.014022041
},
{
"begin": 116,
"end": 264,
"score": 0.026207292
},
{
"begin": 264,
"end": 392,
"score": 0.016729267
},
{
"begin": 392,
"end": 493,
"score": 0.045091953
},
{
"begin": 493,
"end": 553,
"score": 0.016104523
},
{
"begin": 553,
"end": 679,
"score": 0.0028287037
},
{
"begin": 679,
"end": 758,
"score": 0.025692256
},
{
"begin": 758,
"end": 796,
"score": 0.016729267
},
{
"begin": 796,
"end": 815,
"score": 0.0053450353
},
{
"begin": 815,
"end": 924,
"score": 0.018187003
}
] |
776 N.W.2d 101 (2009)
2009 WI App 158
FLYNN
v.
FLYNN.
No. 2008AP2692.
Court of Appeals of Wisconsin.
September 2, 2009.
Unpublished Opinion Affirmed.
| {
"pile_set_name": "FreeLaw"
} | 0.012148 | [
{
"begin": 0,
"end": 23,
"score": 0.008225801
},
{
"begin": 23,
"end": 39,
"score": 0.005830948
},
{
"begin": 39,
"end": 45,
"score": 0.043031808
},
{
"begin": 45,
"end": 55,
"score": 0.033074442
},
{
"begin": 55,
"end": 71,
"score": 0.0019696802
},
{
"begin": 71,
"end": 102,
"score": 0.0066639404
},
{
"begin": 102,
"end": 121,
"score": 0.028782474
},
{
"begin": 121,
"end": 151,
"score": 0.036336336
}
] |
This invention relates to a method and an apparatus for automatically setting the weaving reversing position in automatic arc welding wherein the electrode is subjected to weaving or to-and-fro oscillating movement within the transverse extent of the welding groove or bevel. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.012425 | [
{
"begin": 0,
"end": 275,
"score": 0.012425472
}
] |
Alexander Coggin
Photographer
Alexander Coggin has an utterly unique way of looking at the world. Now based in London after several years in Berlin, the American is happiest wandering the streets with his camera, feeding his visual curiosity and capturing scenes and subtexts he happens across.
With an extraordinary eye for the unusual, the unexpected and the unlikely, he captures fantastic combinations of colour and texture. The subjects change according to what he finds, but he conjures weird and wonderful compositions from even the most everyday scenarios.
A trained actor, his theatrical training still influences his image-making – he is interested in backstory, body language, and the gap between perception and reality. His bold use of flash adds a magical realism to his pictures, which wouldn’t look out of place on the big screen. | {
"pile_set_name": "Pile-CC"
} | 0.029641 | [
{
"begin": 0,
"end": 17,
"score": 0.0334178
},
{
"begin": 17,
"end": 31,
"score": 0.014716201
},
{
"begin": 31,
"end": 100,
"score": 0.024490505
},
{
"begin": 100,
"end": 297,
"score": 0.025692256
},
{
"begin": 297,
"end": 432,
"score": 0.055732824
},
{
"begin": 432,
"end": 568,
"score": 0.013327881
},
{
"begin": 568,
"end": 736,
"score": 0.019019997
},
{
"begin": 736,
"end": 849,
"score": 0.032731086
}
] |
Q:
Distinct SQLite query-result to Python List or Tuple
I have a query that returns e.g. the following result:
Row1: "Schmidt"
Row2: "Schmidt, Meier"
Row3: "Mustermann, Schmidt"
Question: how do I get the results in a Python tuple or list etc:?
I would like the following list:
"Meier, Mustermann, Schmidt".
Each name appears only once.
Python code which executes the query (used to populate entries for a comboBox):
class DatabaseManager(object):
def init(self, db):
self.conn = sqlite3.connect(db)
self.cur = self.conn.cursor()
def get_names(self):
sSql = "SELECT DISTINCT name "\
" FROM patient "\
" ORDER BY 1"
return self.cur.execute(sSql)
And this is called from an instance which populates the results into a comboBox:
def populate_names(self, combobox):
rows = self.db.get_names()
for row in rows:
combobox.addItem(row[0])
A:
Create an empty list to hold the names.
Loop through each name in the query result.
If the current name is not already in the list, add it.
Something like this:
names = []
for row in sql_result:
if row['name'] not in names:
names.append(row['name'])
| {
"pile_set_name": "StackExchange"
} | 0.020408 | [
{
"begin": 0,
"end": 57,
"score": 0.0087811295
},
{
"begin": 57,
"end": 113,
"score": 0.011314815
},
{
"begin": 113,
"end": 129,
"score": 0.011731312
},
{
"begin": 129,
"end": 152,
"score": 0.004407919
},
{
"begin": 152,
"end": 180,
"score": 0.009509998
},
{
"begin": 180,
"end": 248,
"score": 0.0112454
},
{
"begin": 248,
"end": 282,
"score": 0.026035614
},
{
"begin": 282,
"end": 312,
"score": 0.015410362
},
{
"begin": 312,
"end": 342,
"score": 0.014091457
},
{
"begin": 342,
"end": 1204,
"score": 0.018048171
}
] |
Chemiluminescent detection of senescence-associated β galactosidase.
Identifying molecules that serve as markers for cell aging is a goal that has been pursued by several groups. Senescence-associated β galactosidase (SA-βgal) staining is broadly used and very easily detected. β-gal is a lysosomal enzyme strongly correlated to the progression of cell senescence. Here, we describe a simple, fast, and quantitative protocol to quantify SA-βgal activity in cell lysate extracts by a chemiluminescent method using galacton as substrate. | {
"pile_set_name": "PubMed Abstracts"
} | 0.015549 | [
{
"begin": 0,
"end": 69,
"score": 0.0068374802
},
{
"begin": 69,
"end": 179,
"score": 0.017631676
},
{
"begin": 179,
"end": 365,
"score": 0.013327881
},
{
"begin": 365,
"end": 535,
"score": 0.024147147
}
] |
Age-related differences in nephrotoxicity of cadmium.
Nephrotoxic effects can be quantified by measurement of renal excretion of p-amino-hippurate (PAH). Intraperitoneal administration of cadmium in increasing single doses to adult rats is followed by a biphasic effect on renal PAH excretion. Administration of low doses (250 or 500 micrograms/100 g b.wt. CdCl2) results in a significant increase whereas a single dose of 750 micrograms/100 g b.wt. CdCl2 is followed by a distinct diminution of renal PAH excretion. Repeated administrations of 500 micrograms/100 g b.wt. CdCl2 for 2 or 3 consecutive days result in a marked reduction of PAH excretion which is reversible 5 or 6 d following administration. In juvenile rats cadmium does not produce any statistically significant alteration in renal PAH excretion, likely caused by the immaturity of renal tubular transport processes. | {
"pile_set_name": "PubMed Abstracts"
} | 0.024662 | [
{
"begin": 0,
"end": 54,
"score": 0.024833864
},
{
"begin": 54,
"end": 154,
"score": 0.03427619
},
{
"begin": 154,
"end": 294,
"score": 0.08555053
},
{
"begin": 294,
"end": 357,
"score": 0.019852988
},
{
"begin": 357,
"end": 450,
"score": 0.013050216
},
{
"begin": 450,
"end": 517,
"score": 0.04543531
},
{
"begin": 517,
"end": 572,
"score": 0.036679696
},
{
"begin": 572,
"end": 707,
"score": 0.018048171
},
{
"begin": 707,
"end": 883,
"score": 0.067320265
}
] |
PIA Press ReleaseMonday, January 02, 2012
ISABELA CITY, Basilan, Jan 2 (PIA) – The Office of the Presidential Adviser on the Peace Process (OPAPP) announced that the national government has recently signed a memorandum of agreement with key provinces under the Autonomous region in Muslim Mindanao (ARMM) to implement PAMANA or Payapa at Masaganang Pamayanan program (Peaceful and Resilient Communities).
The agreements (MOA) with the local government units of Maguindanao, Lanao del Sur, Tawi-Tawi, Basilan and Sulu was formalized, Friday (December 30, 2011), their partnership with the national government to implement PAMANA.
“The MOA signing for PAMANA projects in peace and development communities of MNLF is good news in this season of hope; it is a good way to end the year and start 2012 where implementation of the projects will start right away,” Deles pointed out in her speech.
She said that the 1996 FPA ushered in the constitution of PDCs, one of the mechanisms for the rehabilitation of the rebels and communities, providing them with new opportunities to find peaceful means of livelihood and other social and economic benefits.
Although PAMANA is not part of the implementation of the peace pact, it still supports the PDCs as the government’s direct action to further spur the economic activities of the people in MNLF areas.
OPAPP said the agreements provide for funds that will be used for projects in Peace and Development Communities or PDCs of the Moro National Liberation Front (MNLF) in the ARMM.
As part of the President Aquino III administration’s affirmative action agenda for Muslim Mindanao, a budget of Php718-M was earmarked under PAMANA to benefit MNLF members in communities formerly known as MNLF bases that were transformed into Peace and Development Communities during the implementation of the 1996 GPH-MNLF Final Peace Agreement. As with regular PAMANA projects, the PAMANA-PDC projects will be implemented through partnership agreements with provincial government units.
For this endeavor, OPAPP has engaged the Federation of United Mindanawan Bangsamoro Women Multi-Purpose Cooperative (FUMBWMPC) to ensure that beneficiary communities are prepared for the entry of PAMANA. FUMBWMPC likewise acts as the third-party monitor for the transparent and accountable implementation of the projects in PDCs.
PAMANA, which is the government’s program and framework for peace and development, aims to reduce poverty, improve governance and empower communities in situations of conflict.
Meanwhile, the ARMM provincial governors expressed their gratitude to the national government.
“I’m glad that our provincial local government is part of the implementation of the PAMANA projects,” Tawi-Tawi governor Sahali said.
Parallel to this, Akbar lauded President Benigno Aquino III in giving priority to peace and development projects in the province where “different elements are situated.”
Moreover, Sulu Gov. Tan conveyed appreciation to local governments and stakeholders for their active participation in peace building. “We are hopeful for genuine peace because the government shows dedication and seriousness in peace efforts.”
Adiong said that the present administration shows and undertakes efforts that “the peace and development needs of Muslim citizens in the country especially in the south are given attention by the national government.”
On the other hand, Utto related that the signing of the MOA means more peace and development efforts in ARMM communities and signals that the work for just and lasting peace will be successful. | {
"pile_set_name": "Pile-CC"
} | 0.021797 | [
{
"begin": 0,
"end": 42,
"score": 0.0036096342
},
{
"begin": 42,
"end": 406,
"score": 0.000042842716
},
{
"begin": 406,
"end": 631,
"score": 0.010204159
},
{
"begin": 631,
"end": 893,
"score": 0.0073233927
},
{
"begin": 893,
"end": 1149,
"score": 0.0129808
},
{
"begin": 1149,
"end": 1349,
"score": 0.014855034
},
{
"begin": 1349,
"end": 1528,
"score": 0.032731086
},
{
"begin": 1528,
"end": 1876,
"score": 0.0129808
},
{
"begin": 1876,
"end": 2018,
"score": 0.0052409116
},
{
"begin": 2018,
"end": 3586,
"score": 0.013605545
}
] |
Q:
Can a Condition be neither Necessary nor Sufficient?
I've consulted the four introductory logic textbooks below, and none moot the case of an un-necessary and in-sufficient condition. Do such conditions exist?
I don't quote from Peter Smith's An Introduction to Formal Logic (Cambridge Introductions to Philosophy) for my library doesn't carry the 2 edn (Aug. 6 2020).
Nicholas J.J. Smith, Logic: The Laws of Truth (2012). p 181.
“P is a sufficient condition for Q” means that having the property P is
enough for something to have the property Q; that is, if something is P,
then it is Q. So we regard this statement as meaning the same thing as “all
Ps are Qs,” and we translate it as $∀x(Px →Qx)$. For example, “weighing
more than a ton is sufficient for being heavy” says the same as “anything that
weighs more than a ton is heavy.” “P is a necessary condition forQ” means that
something cannot possess the property Q if it does not possess the property
P—in other words, something possesses the property Q only if it possesses
the property P. So we regard this statement as meaning the same thing as
“all Qs are Ps,” and we translate it as $∀x(Qx →Px)$. For example, “weighing
more than a pound is necessary for being heavy” says the same as “only things
that weigh more than a pound are heavy” and as “anything that is heavy
weighs more than a pound.” Thus, “P is a necessary and sufficient condition
for Q” says the same thing as “all Ps and only Ps are Qs,” and translates as
$∀x(Px →Qx) ∧ ∀x(Qx →Px)$, or equivalently $∀x(Px ↔Qx)$.
Copi, Cohen, Rodych. Introduction to Logic (2019 15 ed). p 282.
The notions of necessary and suffi cient conditions provide other formulations of
conditional statements. For any specifi ed event, many circumstances are necessary for it
to occur. Thus, for a normal car to run, it is necessary that there be fuel in its tank, that
its spark plugs be properly adjusted, that its oil pump be working, and so on. So if the
event occurs, every one of the conditions necessary for its occurrence must have been
fulfilled. Hence to say
That there is fuel in its tank is a necessary condition for the car to run.
p 283.
can equally well be stated as
The car runs only if there is fuel in its tank.
which is another way of saying that
If the car runs then there is fuel in its tank.
Any of these is symbolized as $R \supset F$ . Usually “ q is a necessary condition for p” is symbolized as $p \supset q$. Likewise, “ p only if q ” is also symbolized as $p \supset q$.
For a specified situation there may be many alternative circumstances, any one of which is sufficient to produce that situation. For a purse to contain more than a dollar,
for example, it is sufficient for it to contain five quarters, or eleven dimes, or twenty-one
nickels, and so on. If any one of these circumstances obtains, the specified situation will be
realized. Hence, to say “That the purse contains five quarters is a sufficient condition for it
to contain more than a dollar” is to say “If the purse contains five quarters then it contains
more than a dollar.” In general, “ p is a sufficient condition for q ” is symbolized as $p \supset q$.
Lepore, Cumming. Meaning and Argument: An Introduction to Logic Through Language (2012 2nd rev. edn.) p 83
If $\alpha$ is a sufficient condition for $\beta$, then if $\alpha$ obtains, $\beta$ obtains as well.
p 84
If $\alpha$ is a sufficient condition for $\beta$, then if $\beta$ obtains, $\alpha$ obtains as well.
I couldn't find anything relevant in Harry Gensler's Introduction to Logic (2017 3 ed).
A:
Given that $(P\rightarrow Q)\lor (Q\rightarrow P)$ is a tautology (it's the same as (¬∨)∨(¬∨)), it is impossible for a statement to be both not necessary and not sufficient under the definitions given by Copi, Cohen and Rodych.
However, if we use the definition given by Nicholas J.J. Smith which involves quantification, it is possible for a statement to both be not necessary and not sufficient.
Consider $\forall x(Px\rightarrow Qx)\lor\forall x(Qx\rightarrow Px)$ in a model with a domain consisting of two objects $\{a,b\}$, and interpretation $Pa=1,Qa=0,Qb=1,Pb=0$. This means that neither of $\forall x(Px\rightarrow Qx)$ or $\forall x(Qx\rightarrow Px)$ are true.
A worded example of this would be the following: An odd number is neither a necessary nor sufficient condition for that same number to be even.
| {
"pile_set_name": "StackExchange"
} | 0.024491 | [
{
"begin": 0,
"end": 57,
"score": 0.011453647
},
{
"begin": 57,
"end": 189,
"score": 0.025692256
},
{
"begin": 189,
"end": 215,
"score": 0.011592479
},
{
"begin": 215,
"end": 365,
"score": 0.019575324
},
{
"begin": 365,
"end": 374,
"score": 0.00006399291
},
{
"begin": 374,
"end": 388,
"score": 0.0036790504
},
{
"begin": 388,
"end": 435,
"score": 0.0044773347
},
{
"begin": 435,
"end": 514,
"score": 0.055333257
},
{
"begin": 514,
"end": 587,
"score": 0.013050216
},
{
"begin": 587,
"end": 4414,
"score": 0.038224805
}
] |
Temporary spontaneous thrombosis of a splenic artery pseudoaneurysm in chronic pancreatitis during intravenous octreotide administration.
Splenic artery pseudoaneurysm is a well-known and potentially life-threatening complication of pancreatitis for which immediate endovascular or surgical treatment is indicated. An unusual case of spontaneous thrombosis of a splenic artery pseudoaneurysm with associated partial splenic infarction was encountered in the setting of chronic pancreatitis during intravenous octreotide administration, with recanalization 9 months later. | {
"pile_set_name": "PubMed Abstracts"
} | 0.030156 | [
{
"begin": 0,
"end": 138,
"score": 0.036336336
},
{
"begin": 138,
"end": 315,
"score": 0.024662184
},
{
"begin": 315,
"end": 571,
"score": 0.02929751
}
] |
Amanda Coyne
The Greenville News
U.S. Sen. Lindsey Graham said in January that choosing between Sen. Ted Cruz and Donald Trump for the Republican presidential nomination was "like choosing between getting shot or poisoned." On Friday morning, he recommended that President-elect Trump nominate Cruz to the U.S. Supreme Court.
"I would put Ted Cruz on that list. I would suggest that President Trump look within the Senate," Graham said when asked who Trump should nominate for the court's current vacancy. "There is some talent there. There is no stronger constitutional conservative than Ted Cruz."
Graham, who ran against Trump and Cruz in the Republican presidential primary, had supportive words Friday for the president-elect that he had vocally criticized throughout the presidential campaign, and who he did not vote for. Graham voted for independent presidential candidate Evan McMullin over Trump on election day.
"He is my president," Graham said of Trump at a Veteran's Day celebration at Greenville Memorial Hospital.
Graham expressed hope that Trump would begin his administration by pursuing legislation to repair infrastructure, which he described as an issue with bipartisan appeal. That same issue was at the forefront of debate in the South Carolina Statehouse during this year's session.
"I believe we need to rebuild our roads and bridges. Focus on something that Republicans and Democrats can agree upon," Graham said. "Enact your agenda, but if you can start out with putting points on the board, bringing us together -- we’re going to repeal and replace Obamacare, but that comes later in the year.
"The very best thing President Trump can do for us is do something that unites the country, unites Republicans and Democrats. Then we’ll get to fighting each other, which is part of democracy. It’s OK to disagree, but there’s so many things we agree upon."
South Carolina's senior senator also expressed hope that Trump would increase the size of the military, saying it is "insane" that the U.S. armed forces are at their smallest level since World War II.
"As long as there's one Marine with a rifle, the country will be safe. Looking at our budget, we might be down to one Marine," Graham joked while addressing a crowd of veterans, military families and hospital employees at the event.
Graham, a retired Air Force colonel, also called for reform to the Department of Veteran's Affairs, saying military veterans should be able to go to any health care provider and have that care fully covered by their benefits. | {
"pile_set_name": "OpenWebText2"
} | 0.168969 | [
{
"begin": 0,
"end": 13,
"score": 0.0067333565
},
{
"begin": 13,
"end": 34,
"score": 0.009093502
},
{
"begin": 34,
"end": 40,
"score": 0.0253489
},
{
"begin": 40,
"end": 45,
"score": 0.021380141
},
{
"begin": 45,
"end": 103,
"score": 0.008642297
},
{
"begin": 103,
"end": 226,
"score": 0.33859563
},
{
"begin": 226,
"end": 313,
"score": 0.07251463
},
{
"begin": 313,
"end": 328,
"score": 0.0017267241
},
{
"begin": 328,
"end": 365,
"score": 0.052935857
},
{
"begin": 365,
"end": 2549,
"score": 0.08555053
}
] |
Q:
Sort String Numbers
I have a column of type varchar that stores many different numbers.
Say for example see the picture
It should short as
12-1
12-13
12-105
12-127
12-168
Thanks
A:
1You can try something like that:
SELECT *, SUBSTRING_INDEX(row_name, '-', 1) as some_sort
FROM table_name
ORDER BY some_sort
So i guess (not tested, but idea in that way) :
12-34,12-46,12-95,12-135...etc
But question quality is low, so i can only guess what u want to do.
| {
"pile_set_name": "StackExchange"
} | 0.017007 | [
{
"begin": 0,
"end": 24,
"score": 0.010273575
},
{
"begin": 24,
"end": 94,
"score": 0.02809576
},
{
"begin": 94,
"end": 127,
"score": 0.012841969
},
{
"begin": 127,
"end": 147,
"score": 0.04783881
},
{
"begin": 147,
"end": 152,
"score": 0.014855034
},
{
"begin": 152,
"end": 158,
"score": 0.01263372
},
{
"begin": 158,
"end": 165,
"score": 0.013536129
},
{
"begin": 165,
"end": 172,
"score": 0.020963646
},
{
"begin": 172,
"end": 179,
"score": 0.040971663
},
{
"begin": 179,
"end": 467,
"score": 0.011175984
}
] |
/*
* Copyright (c) 1990, 1993, 1994, 1995, 1996
* The Regents of the University of California. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that: (1) source code distributions
* retain the above copyright notice and this paragraph in its entirety, (2)
* distributions including binary code include the above copyright notice and
* this paragraph in its entirety in the documentation or other materials
* provided with the distribution, and (3) all advertising materials mentioning
* features or use of this software display the following acknowledgement:
* ``This product includes software developed by the University of California,
* Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
* the University nor the names of its contributors may be used to endorse
* or promote products derived from this software without specific prior
* written permission.
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
* WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <pcap-types.h>
#include <memory.h>
#include <stdio.h>
#include <string.h>
#include "pcap-int.h"
#include <pcap/namedb.h>
#ifdef HAVE_OS_PROTO_H
#include "os-proto.h"
#endif
static inline int skip_space(FILE *);
static inline int skip_line(FILE *);
/* Hex digit to integer. */
static inline u_char
xdtoi(u_char c)
{
if (c >= '0' && c <= '9')
return (u_char)(c - '0');
else if (c >= 'a' && c <= 'f')
return (u_char)(c - 'a' + 10);
else
return (u_char)(c - 'A' + 10);
}
/*
* Skip linear white space (space and tab) and any CRs before LF.
* Stop when we hit a non-white-space character or an end-of-line LF.
*/
static inline int
skip_space(FILE *f)
{
int c;
do {
c = getc(f);
} while (c == ' ' || c == '\t' || c == '\r');
return c;
}
static inline int
skip_line(FILE *f)
{
int c;
do
c = getc(f);
while (c != '\n' && c != EOF);
return c;
}
struct pcap_etherent *
pcap_next_etherent(FILE *fp)
{
register int c, i;
u_char d;
char *bp;
size_t namesize;
static struct pcap_etherent e;
memset((char *)&e, 0, sizeof(e));
for (;;) {
/* Find addr */
c = skip_space(fp);
if (c == EOF)
return (NULL);
if (c == '\n')
continue;
/* If this is a comment, or first thing on line
cannot be Ethernet address, skip the line. */
if (!PCAP_ISXDIGIT(c)) {
c = skip_line(fp);
if (c == EOF)
return (NULL);
continue;
}
/* must be the start of an address */
for (i = 0; i < 6; i += 1) {
d = xdtoi((u_char)c);
c = getc(fp);
if (c == EOF)
return (NULL);
if (PCAP_ISXDIGIT(c)) {
d <<= 4;
d |= xdtoi((u_char)c);
c = getc(fp);
if (c == EOF)
return (NULL);
}
e.addr[i] = d;
if (c != ':')
break;
c = getc(fp);
if (c == EOF)
return (NULL);
}
/* Must be whitespace */
if (c != ' ' && c != '\t' && c != '\r' && c != '\n') {
c = skip_line(fp);
if (c == EOF)
return (NULL);
continue;
}
c = skip_space(fp);
if (c == EOF)
return (NULL);
/* hit end of line... */
if (c == '\n')
continue;
if (c == '#') {
c = skip_line(fp);
if (c == EOF)
return (NULL);
continue;
}
/* pick up name */
bp = e.name;
/* Use 'namesize' to prevent buffer overflow. */
namesize = sizeof(e.name) - 1;
do {
*bp++ = (u_char)c;
c = getc(fp);
if (c == EOF)
return (NULL);
} while (c != ' ' && c != '\t' && c != '\r' && c != '\n'
&& --namesize != 0);
*bp = '\0';
/* Eat trailing junk */
if (c != '\n')
(void)skip_line(fp);
return &e;
}
}
| {
"pile_set_name": "Github"
} | 0.00951 | [
{
"begin": 0,
"end": 49,
"score": 0.0072192685
},
{
"begin": 49,
"end": 98,
"score": 0.016729267
},
{
"begin": 98,
"end": 119,
"score": 0.018187003
},
{
"begin": 119,
"end": 192,
"score": 0.012078391
},
{
"begin": 192,
"end": 268,
"score": 0.007982845
},
{
"begin": 268,
"end": 345,
"score": 0.015132698
},
{
"begin": 345,
"end": 423,
"score": 0.009440582
},
{
"begin": 423,
"end": 497,
"score": 0.010898319
},
{
"begin": 497,
"end": 577,
"score": 0.009440582
},
{
"begin": 577,
"end": 3757,
"score": 0.018048171
}
] |
Q:
getting this error in Caret
I'm getting the following error and I don't know what may have gone wrong.
I'm using R Studio with the 3.1.3 version of R for Windows 8.1 and using the Caret package for datamining.
I have the following training data:
str(training)
'data.frame': 212300 obs. of 21 variables:
$ FL_DATE_MDD_MMDD : int 101 101 101 101 101 101 101 101 101 101 ...
$ FL_DATE : int 1012013 1012013 1012013 1012013 1012013 1012013 1012013 1012013 1012013 1012013 ...
$ UNIQUE_CARRIER : Factor w/ 13 levels "9E","AA","AS",..: 11 10 2 5 8 9 11 10 10 10 ...
$ DEST : Factor w/ 150 levels "ABE","ABQ","ALB",..: 111 70 82 8 8 31 110 44 53 80 ...
$ DEST_CITY_NAME : Factor w/ 148 levels "Akron, OH","Albany, NY",..: 107 61 96 9 9 29 106 36 97 78 ...
$ ROUNDED_TIME : int 451 451 551 551 551 551 551 551 551 551 ...
$ CRS_DEP_TIME : int 500 520 600 600 600 600 600 600 602 607 ...
$ DEP_DEL15 : Factor w/ 2 levels "0","1": 1 2 1 1 1 1 1 2 1 1 ...
$ CRS_ARR_TIME : int 746 813 905 903 855 815 901 744 901 841 ...
$ Conditions : Factor w/ 28 levels "Blowing Snow",..: 2 2 2 2 2 2 2 2 2 2 ...
$ Dew.PointC : num -14.4 -14.4 -14.4 -14.4 -14.4 -14.4 -14.4 -14.4 -14.4 -14.4 ...
$ Events : Factor w/ 10 levels "","Fog","Fog-Rain",..: 1 1 1 1 1 1 1 1 1 1 ...
$ Gust.SpeedKm.h : num NA NA NA NA NA NA NA NA NA NA ...
$ Humidity : int 68 68 71 71 71 71 71 71 71 71 ...
$ Precipitationmm : num NA NA NA NA NA NA NA NA NA NA ...
$ Sea.Level.PressurehPa: num 1021 1021 1022 1022 1022 ...
$ TemperatureC : num -9.4 -9.4 -10 -10 -10 -10 -10 -10 -10 -10 ...
$ VisibilityKm : num 16.1 16.1 16.1 16.1 16.1 16.1 16.1 16.1 16.1 16.1 ...
$ Wind.Direction : Factor w/ 18 levels "Calm","East",..: 9 9 7 7 7 7 7 7 7 7 ...
$ WindDirDegrees : int 320 320 330 330 330 330 330 330 330 330 ...
$ Wind.SpeedKm.h : num 20.4 20.4 13 13 13 13 13 13 13 13 ...
- attr(*, "na.action")=Class 'omit' Named int [1:22539] 3 32 45 87 94 325 472 548 949 1333 ...
.. ..- attr(*, "names")= chr [1:22539] "3" "32" "45" "87" ...
and when I execute the following command:
ldaModel <- train(DEP_DEL15~.,data=training,method="lda",preProc=c("center","scale"),na.remove=TRUE)
I get:
Something is wrong; all the Accuracy metric values are missing:
Accuracy Kappa
Min. : NA Min. : NA
1st Qu.: NA 1st Qu.: NA
Median : NA Median : NA
Mean :NaN Mean :NaN
3rd Qu.: NA 3rd Qu.: NA
Max. : NA Max. : NA
NA's :1 NA's :1
Error in train.default(x, y, weights = w, ...) : Stopping
A:
It is probably due to having about outcome factor with levels "0" and "1".
There is a specific warning issued when this happens: At least one of the class levels are not valid R variables names; This may cause errors if class probabilities are generated because the variables names will be converted to: X0, X1"
It seems that people uniformly ignore warnings so I'm going to make this throw an error in the next version.
| {
"pile_set_name": "StackExchange"
} | 0.030156 | [
{
"begin": 0,
"end": 32,
"score": 0.018742332
},
{
"begin": 32,
"end": 109,
"score": 0.04165838
},
{
"begin": 109,
"end": 216,
"score": 0.012425472
},
{
"begin": 216,
"end": 253,
"score": 0.03049926
},
{
"begin": 253,
"end": 267,
"score": 0.0136749605
},
{
"begin": 267,
"end": 313,
"score": 0.0068374802
},
{
"begin": 313,
"end": 389,
"score": 0.009857078
},
{
"begin": 389,
"end": 505,
"score": 0.0065945243
},
{
"begin": 505,
"end": 601,
"score": 0.0047897073
},
{
"begin": 601,
"end": 3156,
"score": 0.10031791
}
] |
FILED
UNITED STATES COURT OF APPEALS
NOV 07 2018
FOR THE NINTH CIRCUIT MOLLY C. DWYER, CLERK
U.S. COURT OF APPEALS
DEISY YAQUELIN ORDONEZ- No. 17-71840
GODOY; CALEB JOEL SAUCEDA-
ORDONEZ, Agency Nos. A206-843-750
A206-843-751
Petitioners,
v. ORDER WITHDRAWING
MEMORANDUM
JEFFERSON B. SESSIONS III, Attorney DISPOSITION, GRANTING
General, PETITION FOR REHEARING,
AND DENYING PETITION FOR
Respondent. REHEARING EN BANC
Before: ROGERS,* BYBEE, and WATFORD, Circuit Judges.
Judges Bybee and Watford voted to grant the petition for rehearing, and
Judge Rogers voted to deny the petition for rehearing. The memorandum
disposition filed on June 29, 2018 is withdrawn.
Judges Bybee and Watford voted to deny the petition for rehearing en banc,
and Judge Rogers recommended denying the petition for rehearing en banc. The
full court has been advised of the petition for rehearing en banc, and no judge has
requested a vote on whether to rehear the matter en banc. Fed. R. App. P. 35.
*
The Honorable John M. Rogers, United States Circuit Judge for the
U.S. Court of Appeals for the Sixth Circuit, sitting by designation.
The petition for panel rehearing is GRANTED. The petition for rehearing
en banc is DENIED.
2
FILED
NOT FOR PUBLICATION
NOV 07 2018
UNITED STATES COURT OF APPEALS MOLLY C. DWYER, CLERK
U.S. COURT OF APPEALS
FOR THE NINTH CIRCUIT
DEISY YAQUELIN ORDONEZ- No. 17-71840
GODOY; CALEB JOEL SAUCEDA-
ORDONEZ, Agency Nos. A206-843-750
A206-843-751
Petitioners,
v. MEMORANDUM*
JEFFERSON B. SESSIONS III, Attorney
General,
Respondent.
On Petition for Review of an Order of the
Board of Immigration Appeals
Argued and Submitted April 11, 2018
Pasadena, California
Before: ROGERS,** BYBEE, and WATFORD, Circuit Judges.
Deisy Ordonez–Godoy appeals the Board of Immigration Appeals’ (“BIA”)
denial of her petition for asylum, withholding of removal, and relief under the
*
This disposition is not appropriate for publication and is not precedent
except as provided by Ninth Circuit Rule 36-3.
**
The Honorable John M. Rogers, United States Circuit Judge for the
U.S. Court of Appeals for the Sixth Circuit, sitting by designation.
Convention Against Torture. “Where, as here, the BIA adopts the IJ’s decision
while adding some of its own reasoning, we review both decisions.”
Lopez–Cardona v. Holder, 662 F.3d 1110, 1111 (9th Cir. 2011). “We review
constitutional claims and questions of law de novo and review factual findings
under the deferential substantial evidence standard, treating them as ‘conclusive
unless any reasonable adjudicator would be compelled to conclude to the
contrary.’” Id. (quoting 8 U.S.C. § 1252(b)(4)(B)). The IJ found Ordonez–Godoy
credible, and thus we accept her statements as true.
To be eligible for asylum, Ordonez–Godoy must establish that she is unable
or unwilling to return to Honduras “because of persecution or a well-founded fear
of persecution on account of race, religion, nationality, membership in a particular
social group, or political opinion.” Mashiri v. Ashcroft, 383 F.3d 1112, 1119 (9th
Cir. 2004) (quoting 8 U.S.C. § 1101(a)(42)(A)). “[I]f an applicant establishes past
persecution, it triggers a rebuttable presumption of a well-founded fear of future
persecution.” Salazar–Paucar v. INS, 281 F.3d 1069, 1073–74 (9th Cir. 2002).
“We have repeatedly held that threats may be compelling evidence of past
persecution, particularly when they are specific and menacing and are accompanied
by evidence of violent confrontations [and] near confrontations.” Mashiri, 383
F.3d at 1119.
2
1. Ordonez–Godoy established past persecution based on her membership
through marriage in a politically active family. Ordonez–Godoy and her husband’s
family lived in a small town in Honduras controlled by the National Party. A
family organization, the Figueroas, backed the party through violence and
intimidation. The Figueroas began targeting Ordonez–Godoy’s family, who
opposed the National Party, in 2011 when her husband drove a man the Figueroas
had shot to the hospital. Over the next three years, until Ordonez–Godoy entered
the United States, Ordonez–Godoy’s husband and family received death threats by
phone and in person, which were specific, direct, and menacing, and accompanied
by violent and fatal attacks. Once, when Ordonez–Godoy’s husband and father
were running late for work, they drove past a vehicle resembling their family car,
which had been attacked, killing two people and injuring two others inside the car.
Shortly after this shooting, the Figueroas called and threatened Ordonez–Godoy’s
father-in-law, stating that the family “had gotten lucky” and “were still in danger of
death.” Ordonez–Godoy’s husband fled the country and entered the United States
in April 2012.
While Ordonez–Godoy remained in Honduras, four members of her
husband’s family were murdered and three others survived assassination attempts.
Her husband’s aunt was shot in the face while holding her baby in her lap and the
3
aunt’s partner was killed, but the kids in the home “were able to run under the beds
and hide.” Ordonez–Godoy’s husband’s uncle was shot while laying on a
hammock outside with his children, and Ordonez–Godoy and her in-laws heard the
shots from their home. The murders were coming “one after another.” The family
lived in fear, stayed at home, ceased working, and the police did nothing to address
the threats. Family members left the city, went into hiding, or fled the country.
Ordonez–Godoy entered the United States with her five-year-old son in July 2014.
The threats, attacks, and murders provide compelling evidence of past persecution.
See id. at 1121 (“Viewed cumulatively, . . . evidence of a death threat, violent
physical attacks against [the petioner’s] husband and sons, a near-confrontation
with a violent mob, vandalism, economic harm and emotional trauma compels a
finding of past persecution.”).
2. Having shown past persecution, Ordonez–Godoy is entitled to a
presumption of a well-founded fear of future persecution. Id. at 1119. An
applicant may establish a well-founded fear by showing a “pattern or practice” of
persecution of people she is “similarly situated” or “closely tied” to. Mgoian v.
I.N.S., 184 F.3d 1029, 1035–36 (9th Cir. 1999) (citations omitted). A family is a
“prototypical example” of a similarly situated group. Id. at 1036 (citations
omitted). “[W]e have explicitly held that an individual applicant may be eligible
4
for asylum, even in the absence of direct persecution against [the petitioner]
personally, if she is able to demonstrate a well-founded fear of persecution based
on acts of violence against her friends or family members.” Id. Ordonez–Godoy
has established a well-founded fear of future persecution.
The BIA held that Ordonez–Godoy could not show that “any harm suffered
by her or her relatives was on account of her family or a political opinion.” The
facts compel a contrary conclusion. The attacks against Ordonez–Godoy’s family
show a pattern of killing the members of her husband’s family who participated in
politics and those who supported them. Ordonez–Godoy is similarly situated to
her husband’s family; she lived with them and participated in the political
campaigns that got them killed. Although the Figueroas once told Ordonez–Godoy
that they had no particular interest in her specifically, that fact alone is not
dispositive—neither physical harm nor direct threats are required to find
persecution. Mashiri, 383 F.3d at 1120; Mgoain, 184 F.3d at 1037; see also Hoxha
v. Ashcroft, 319 F.3d 1179, 1183 (9th Cir. 2003) (“Because the record reveals that
the amount of persecution directed toward [the targeted group] generally is
extensive, the level of individualized risk [the petitioner] must show . . . is
comparatively low.”). As long as her husband’s family remains a target,
Ordonez–Godoy is in danger, even if she is collateral to the political feud.
5
In Mgoian v. I.N.S., the petitioner’s uncle was murdered, and two other
uncles and her parents fled the country in light of death threats. 184 F.3d at
1033–34. The BIA found the petitioner failed to “link” these events “in any
meaningful way to her fear of being persecuted.” Id. at 1033. On appeal, we
granted the petition for review, finding the petitioner showed “much more than
mere isolated violence” and provided “ample proof that the violence against her
family members [was] ‘closely tied’ to her.” Id. at 1036–37. The “violent acts
against other members of the group put her on notice that she may be next.” Id. at
1037. Like the petitioner in Mgoian, Ordonez–Godoy “fully demonstrated that
acts of violence occurred against her family members and that those acts are
sufficiently connected to her personally to justify a well-founded fear of
persecution in any person similarly situated.” Id. at 1036.1 Ordonez–Godoy
provided facts that would compel a reasonable fact finder to find she has a well-
founded fear of future persecution.
We grant Ordonez–Godoy’s petition for review, reverse the decision of the
BIA, and remand so the Attorney General may exercise his discretion to determine
whether to grant Ordonez–Godoy asylum. 8 U.S.C. § 1158(b)(1).
1
Because we find that Ordonez–Godoy established a claim of asylum, we do
not address her remaining claims.
6
PETITION GRANTED.
7
FILED
NOV 7 2018
Ordonez-Godoy v. Sessions, 17-71840 (CA9) MOLLY C. DWYER, CLERK
U.S. COURT OF APPEALS
Judge Rogers, Circuit Judge, dissenting
The BIA’s denial of Ordonez-Godoy’s application for asylum should be
upheld. “In order to reverse the BIA, we must determine ‘that the evidence not only
supports [a contrary] conclusion, but compels it—and also compels the further
conclusion’ that the petitioner meets the requisite standard for obtaining relief,”
Garcia-Milian v. Holder, 755 F.3d 1026, 1031 (9th Cir. 2014) (alteration in original)
(quoting INS v. Elias-Zacarias, 502 U.S. 478, 481 n.1 (1992)), but here the record
does not compel reversal.
Substantial evidence supports the BIA’s conclusion that Ordonez-Godoy did
not suffer past persecution. Ordonez-Godoy was never physically harmed or directly
threatened by the Figueroas. Ordonez-Godoy credibly testified to threats against her
husband by the Figueroas, but she also testified that she was not on the Figueroas hit
list, and she did not testify that any threats were made against her specifically.
Moreover, she testified that during her only direct interaction with the Figueroas—
when an armed group of gang members came to her home shortly after her husband
fled Honduras—a gang member told her he was friends with her father and expressed
no interest in harming her. Ordonez-Godoy remained in the country for nearly two
years following the incident without harm.
Ordonez-Godoy v. Sessions, No. 17-71840; dissent
Absent a sufficient showing of past persecution, Ordonez-Godoy cannot
benefit from a presumption of a fear of future persecution, and substantial evidence
supports the BIA’s determination that Ordonez-Godoy did not establish a well-
founded fear of future persecution on account of a protected ground. First,
substantial evidence supports the BIA’s conclusion that Ordonez-Godoy is unlikely
to be persecuted based on her relationship with her husband’s politically active
family. During Ordonez-Godoy’s single direct encounter with the Figueroas they
expressed no desire to harm her even though they were aware that she was living
with her husband’s family; she lived in her husband’s family’s home for nearly two
more years without incident; and there is no evidence that anyone in Ordonez-
Godoy’s hometown has been specifically targeted because of his or her relationship
with the Sauceda-Velasquez family.
Substantial evidence also supports the BIA’s conclusion that Ordonez-Godoy
did not establish a well-founded fear of future persecution based on her political
opinion. It is true that the Figueroas have targeted her husband’s uncle and cousin,
who were political candidates for mayor, as well as her husband’s aunt and other
uncle, who served as campaign managers. But the record here does not compel the
finding that the Figueroas imputed these political beliefs to Ordonez-Godoy. Again,
Ordonez-Godoy has had a single interaction with the Figueroas and they expressed
no interest in harming her, despite knowing that she lived with her husband’s
~2~
Ordonez-Godoy v. Sessions, No. 17-71840; dissent
politically active family. She lived with her husband’s family without incident
throughout the mayoral campaign, and she lived in Honduras without harm for more
than a year after the assassination of her husband’s uncle. Her husband’s parents
have continued to live in Honduras since that time without harm, despite the
inclusion of her father-in-law on the Figueroas’ hit list.
The IJ and BIA looked at the record and decided that, although awful violence
had been visited upon members of Ordonez-Godoy’s family, Ordonez-Godoy
herself had not demonstrated that she was the target of such violence. Regardless of
whether or not we agree with that conclusion, there is substantial evidence to support
it, and reasonable factfinders would not be compelled to disagree with it.
Application of the deferential standard of review set forth by the Supreme Court and
this Circuit requires denial of the petition.
Given that Ordonez-Godoy’s asylum petition was properly denied, I address
briefly her remaining claims. First, because Ordonez-Godoy failed to establish
eligibility for asylum, she necessarily failed to satisfy the higher standard for
withholding of removal. Second, we do not have jurisdiction to consider the merits
of Ordonez-Godoy’s CAT claim because Ordonez-Godoy did not appeal the IJ’s
adverse CAT decision to the BIA, and so failed to exhaust her administrative
remedies with respect to that claim.
~3~
Ordonez-Godoy v. Sessions, No. 17-71840; dissent
Finally, Ordonez-Godoy was not denied due process. First, the transcript of
Ordonez-Godoy’s hearing does not support her assertion that the IJ demonstrated
actual bias or prejudgment. Second, Ordonez-Godoy’s claim that the IJ denied her
due process by denying her motion to consolidate was not adequately raised before
the BIA. Last, the BIA’s evidentiary rulings did not deny Ordonez-Godoy due
process.
The petition for review should be denied.
~4~
| {
"pile_set_name": "FreeLaw"
} | 0.082903 | [
{
"begin": 0,
"end": 80,
"score": 0.103539884
},
{
"begin": 80,
"end": 131,
"score": 0.040971663
},
{
"begin": 131,
"end": 218,
"score": 0.01193956
},
{
"begin": 218,
"end": 298,
"score": 0.06412373
},
{
"begin": 298,
"end": 311,
"score": 0.14418322
},
{
"begin": 311,
"end": 389,
"score": 0.0495556
},
{
"begin": 389,
"end": 406,
"score": 0.018464668
},
{
"begin": 406,
"end": 467,
"score": 0.015202113
},
{
"begin": 467,
"end": 476,
"score": 0.03221605
},
{
"begin": 476,
"end": 16699,
"score": 0.040971663
}
] |
IN LIFE THERE ARE MANY LOVES, AND IN MINE ONE PASSION: SCULPTURE
Ann Jon is a professional sculptor who has studied, created, exhibited and taught sculpture for more than 40 years, locally, regionally, nationally and internationally, in America and in Europe.
She grew up in Denmark, and her work is inspired by that country’s medieval architecture, by ancient cultures worldwide, and more recently, by the topography and spirituality of mountains, canyons and deserts.
Her sculptures are informed by studies and intuition. They range in scale from the intimate to the monumental, and use both traditional and experimental materials and techniques.
Since 1998 she has been the Director of SculptureNow, a non-profit art and educational organization which presents an annual exhibition of large-scale, outdoor sculptures in the Berkshires, and offers sculpture programs for students in the public schools.
She has curated and organized numerous public art exhibitions and is committed to promoting sculpture in the public arena and to giving young people the opportunity to create their own three-dimensional art.
Her current studio and home is in one of the Berkshire Hilltowns.
When she is not in her studio, office, or out teaching in a school, she cross-country skis, hikes, and kayaks. | {
"pile_set_name": "Pile-CC"
} | 0.018187 | [
{
"begin": 0,
"end": 65,
"score": 0.03461955
},
{
"begin": 65,
"end": 261,
"score": 0.008711713
},
{
"begin": 261,
"end": 472,
"score": 0.008468757
},
{
"begin": 472,
"end": 527,
"score": 0.020824814
},
{
"begin": 527,
"end": 652,
"score": 0.015410362
},
{
"begin": 652,
"end": 909,
"score": 0.0056921155
},
{
"begin": 909,
"end": 1118,
"score": 0.008954669
},
{
"begin": 1118,
"end": 1185,
"score": 0.013605545
},
{
"begin": 1185,
"end": 1296,
"score": 0.12888865
}
] |
Sieh sofort die neuesten unterhaltungen
Information
Sieh sofort die neuesten unterhaltungen zu jedem thema. Dmc plumbing & tutaj bukmacher heating holds current mn licenses for plumbing & pipefitting, including high-pressure steam/condensate and medical gas applications our contracting history includes design-build construction, traditional plan & spec projects, cost plus fee applications, and we are an experienced best value contractor. Very professional, courteous & time efficient. Electric boillers are very simple and work in the same way as a kettle, heating water that passes over an element they can come in a variety of different types and there are options that are identical in shape and size to a gas or oil boiler with few moving parts they are exceptionally quiet and low-maintenance. You are implying that we mugged him off and that is not true," he said "we are an emergency plumber, and we charge emergency rates we are expensive, but we did agree the charge with him before we did the work he could have got someone else to do the job but chose not to.". Government and industry are working together on a robot-like autopilot system that could eliminate the need for a second human pilot in the cockpit. We ensure that our products are installed correctly every time - guaranteed! From our experience, a large percentage of pipe blockages are simply hair or toilet paper or other blockages that have not damaged the drainage system and the $99 offer is great value in those circumstances. A combi boiler as described above is a combination boiler which essentially means it combines two typically separate household functions (water heating and central heating) into one highly efficient unit the resultant system means that the need for a hot water tank is gone since the water flowing through the system is heated at source when the hot water tap is turned on, hence the name “combi”. If your pressure gauge has dropped to 0-bar, that doesn’t necessarily mean it’s faulty; that’s just as good an indication of a leak, as a faulty pressure gauge. If you are concerned that an appliance is not operating safely, or your appliances are not in good working order, have a safety inspection carried out by a registered gas installer. Ballycullen road,firhouse,dublin 24. A combi (or combination) boiler is an ingenious space-saving idea, and an increasingly popular choice in uk homes in fact, combis now account for well over half of all the new domestic boilers installed in britain every year. If you are in need of a boiler service, then don’t hesitate to get in contact with a member of our team at egp plumbers on 0116 264 5115 or you can use our contact form and a member of our team with get in contact with you promptl. Wood cottages, codsall wood. Every month, one lucky winner will be selected at random to receive a £100 voucher. Had never used them and found them today on yelp they deserve their 5 star rating! they came same day and knocked out a kitchen sink leak by quickly replacing a cracked pvc part charlie was super nice and polite.... You may be looking for advice, or just researching your options? let us help, we can guide you through the process with our expert knowledge what’s more, all of our help and advice is free! call us today and book your home visit. Our friendly, knowledgeable staff can help find the parts you’ll need to complete virtually any size plumbing or heating job. If this is your first repair, your boiler may not need replacing just yet compare the cost of the repair to the cost of replacing a repair averages between. If you're based in england or wales, please contact the energy saving advice service 9esas) on 0300 123 1234 advisors are available from monday to friday, between 9am to 8pm (calls cost no more than a national rate call). Some boiler comfort features include. You'll get a landlord gas safety certificate for all your landlord owned gas appliances we cover repairs to your boiler and controls, including thermostat and programmer with parts, and unlimited callouts if you choose our landlord heating cover, we'll also cover repairs to your radiators and pipework, hot water cylinder and full central heating system. Ap provides around-the-clock plumbing services when you need us we’ll be there with a fully stocked truck 24 hours a day, 365 days a year! Atmospheric, open-combustion furnaces and boilers, as well as fan-assisted furnaces and boilers, should be vented into masonry chimneys, metal double-wall chimneys, or another type of manufactured chimney masonry chimneys should have a fireclay, masonry liner or a retrofitted metal flue liner. Providing total customer service and total peace of mind is our promise and that's what we deliver with emergency response service, any time of the night or day, whatever the weather. Please enter your cintas order number and the zip code of the ship-to address on your order. Plumbers, gasfitters and drainlayers. Bob the plumber charges by the job, not the hour, which saves you money know the price before we do the work! In the case of property owned by the council, contact housing services, using the details below, to report the problem. What is the 'sim swap' scam and how to protect yourself. The survey itself covers a number of areas of the property’s drainage it is not just about looking at the drains themselves in terms of any damage all of the information in the home buyer drain survey can then be used during the purchase process for many people it can have an affect on offer figures but for others it is just useful to make plans on what work needs to be done post purchase. Advanced got my heating working quickly and gave me an estimate for a new system. Tree roots damaging drains in mk40. To check out, your trolley needs to be £40 for delivery. Social investment manager tim craven. We are dublin's largest independent boiler repair specialists we have gained an outstanding reputation within the boiler and central heating industry we have been trading in excess of 40 years this means we have the experience and knowledge to have your heating system up and running again in no time there have thousands of types makes and models of boilers manufactured within the last four decades, so experience is vital you can rest assured that our specialist technicians can solve your problem we have some senior technicians with over 35 years experience specializing solely with boilers this means you are in safe hands. Find out about the which? car survey. Dhs also work in partnership with. This can prove problematic in smaller homes, most of which should almost certainly opt for the combi option larger homes, though, will benefit from the ability to provide oodles of hot water to several sources at once. The best case scenario is we find a bunch of nappies, sanitary pads or other waste that we can flush away to fix the problem worst case, there’s a cracked pipe that’s allowing soil to enter and water to escape. For all the latest deals, guides and loopholes - join the 10m who get it. Joule cyclone electric boiler system fit combines all the advantages of electric wet space heating with the cyclone pre plumbed cylinder available in sizes 6kw – 12kw on the boiler side with a 200l un-vented cyclone cylinder other models are available talk to the office today to find out more. Call now for a fast response, and check out our plumbing. It is important for your boiler’s health to make sure that you utilise baxi-certified and gas safe engineers to carry out any installations and repairs on your home’s unit it may appear that there are savings to be made using unofficial third-party engineers and installers however, this opens up your appliance to problems along the line and will break your warranty. Phone: 01425 653889 | 07770770080. We understand that replacing your boiler can feel like an big expense or investment that you can probably do without. Buying a new gas boiler is not something people tend to do everyday, so it is easy to see why some people can find the process of browsing the boilers available a little bit confusing below we have tried to make it a bit easier for you buy outlining the differences between the different gas boiler types available. Brand new heatrea sadia electric boiler 9kw for sale pls contact on 07427128355 sell price £1499.00. We have great offers in your area not your location? We have been in the plumbing business for over thirty years we are a family owned. Wall mounted gas fired combi boiler with large lcd display. California boiler maintains a fleet of self-contained, skid-mounted boilers and boiler support equipment available for rent. If you're interested in real technical nitty gritty, why not take a look at a few of the many patents covering how kettle-like appliances work? here are four i've picked out, but you'll find lots more in the records. Make plumbing solutions your 24-hour emergency plumbing service company call now for your low-cost estimate! Proudly serving toronto, mississauga, oakville, thornhill, richmond hill, aurora, newmarket, pickering, ajax, whitby & oshawa. A combi – or combination – boiler is a single, compact unit that functions as both a water heater and a central heating boiler this space saver heats water immediately, rather than heating and storing, which removes the need for a bulky hot water storage cylinder or cold water storage tank, as found with old boiler systems. Baxi back boilers are fitted behind the fireplace and small, compact units that are capable of heating enough boiling hot water for both central heating system and heated water purposes if installed along with an indirect hot water cylinder the baxi back boiler must be installed by a gas safe registered engineer. A system boiler ensures a supply of hot water is pumped efficiently to radiators around the home and to a hot water cylinder to supply baths, showers and hot taps. | {
"pile_set_name": "Pile-CC"
} | 0.021519 | [
{
"begin": 0,
"end": 40,
"score": 0.005935072
},
{
"begin": 40,
"end": 53,
"score": 0.010898319
},
{
"begin": 53,
"end": 110,
"score": 0.020130653
},
{
"begin": 110,
"end": 444,
"score": 0.006108612
},
{
"begin": 444,
"end": 491,
"score": 0.0073233927
},
{
"begin": 491,
"end": 805,
"score": 0.017631676
},
{
"begin": 805,
"end": 1079,
"score": 0.062125895
},
{
"begin": 1079,
"end": 1228,
"score": 0.028267438
},
{
"begin": 1228,
"end": 1305,
"score": 0.011523063
},
{
"begin": 1305,
"end": 9926,
"score": 0.05373499
}
] |
99 Ariz. 342 (1965)
409 P.2d 45
In the Matter of a Member of the State Bar of Arizona, William ROGERS, Jr., Respondent.
No. 8689.
Supreme Court of Arizona, En Banc.
December 16, 1965.
Rex H. Moore, Phoenix, for State Bar of Arizona.
McFARLAND, Justice.
This is a disbarment proceeding. A complaint against William Rogers, Jr., of San Francisco, California, accusing him of unprofessional conduct as a member of the Bar of this state was filed with the local administrative committee, for District No. 4-B of the State Bar.
This complaint was heard by the administrative committee. Respondent was duly served personally and by publication with an Order to Show Cause. The order of the local administrative board found "that Respondent has not answered, appeared or otherwise responded to said Order to Show Cause save and except by letter" directed to the local committee in which respondent, in response to the Order to Show Cause, admitted the truth of the charges, but not the implications set forth, and stated he *343 would make restitution.[1] However, the committee received no further communication or proof of restitution. Respondent was not represented by counsel at this hearing. The proceedings were reported by a reporter, and a transcript of his notes is a part of the files. A majority of the committee found respondent guilty of the charges as set forth in the Order to Show Cause, to-wit:
"That on or about July 28, 1959, you, while acting as attorney for Mildred Shelton, Guardian of the estate of Kathleen Shelton, a minor, collected $2,500.00 in satisfaction of a judgment in Cause No. 99033 in the Superior Court of Maricopa County, Arizona, rendered in favor of the aforesaid minor for damages for personal injuries sustained by said minor; and filed a satisfaction of said judgment, but that you thereafter failed, neglected and refused to account to said guardian or said minor for said sum or any part thereof; and
"That on or about July 28, 1959, you, while acting as attorney for Mildred Shelton, Guardian of the estate of Danny Shelton, a minor, collected $250.00 in satisfaction of a judgment in Cause No. 99033 in the Superior Court of Maricopa County, Arizona, rendered in *344 favor of the aforesaid minor for damages for personal injuries sustained by said minor and filed a satisfaction of said judgment; but that you thereafter failed, neglected and refused to account to said guardian or said minor for said sum or any part thereof."
A complete record of these proceedings, together with the committee's recommendation, was lodged with the Board of Governors of the State Bar, as required by Rule 35 of the Rules of the Supreme Court, 17 A.R.S., and the Board of Governors, without taking additional evidence and following respondent's failure to reply to the charges or appear before the Board of Governors, either in person or by attorney, after having been notified of the hearing[2], sent the complete record to this court with a recommendation of disbarment.
The Board of Governors of the Bar filed its recommendations with this court on October 8, 1965. Respondent was sent notice of the recommendation, but has not requested to be allowed to file briefs or make oral argument. Rule 37 of the Rules of the Supreme Court states:
"Rule 37. Proceedings Before Court; Brief and Oral Argument; Decision
"If the respondent desires to file briefs and make oral arguments on the record as to why the recommendations of the board should not be adopted, he shall file with the clerk of this court his request therefor within twenty days after the mailing of such notice. Following the filing of such request, this court shall fix a time for the filing of briefs by respondent and the examiner and for argument. Following the date fixed for such argument, or twenty days after the mailing of such notice if no request has been filed by respondent, this court shall consider the recommendations and the record and render its decision."
In the case of In re Peterson, 96 Ariz. 47, 391 P.2d 599, we held:
"The conduct of respondent here is unconscionable, as we said in [Re] Graham, 58 Ariz. 192, 202, 203, 118 P.2d 1093, 1097:
"`To refuse to return the $330.65 to the admitted owner but instead appropriate it to one's own use does, as the administrative committee found, constitute professional misconduct and calls for disbarment of the person guilty thereof.'" 96 Ariz. at 49, 391 P.2d at 600.
We hold, from the record and the evidence in the instant case, as was found by *345 the administrative committee, that the acts of the respondent constituted professional misconduct and call for his disbarment.
Respondent is hereby disbarred.
LOCKWOOD, C.J., STRUCKMEYER, V.C.J., and BERNSTEIN and UDALL, JJ., concur.
NOTES
[1] San Francisco, California
June 10, 1965
Local Administrative Committee
State Bar of Arizona
Title and Trust Bldg.,
Phoenix, Arizona
Gentlemen:
I want to apologize, first of all, for not having written this letter sooner and perhaps thereby have avoided unnecessary efforts on the part of members of the committee and the bar who are charged with the task of investigating Mrs. DeSoto's (Mildred Shelton) complaint. However, the delay was not intentional. I have been diligently attempting to discover the facts so that I could advise you of them.
First of all, the charges set forth in the order to show cause are true. I have no defense to any matter set forth therein and my appearance would therefore be futile.
In admitting these charges, however, I do not admit any implications that are not set forth therein. This matter together with the funds was entrusted to another party when I left Phoenix and I am now unable to determine what transpired after I left. I realize that this does not relieve me of the duty to account for the funds, and I am presently in the process of obtaining the money to reimburse the estate of the Shelton children. A delay in the arrangements has been partly responsible for my delay in writing this letter. I wanted to be able to offer the definite assurance of when the funds would be forthcoming before writing, but since the time is growing short I do not want to cause any more inconvenience to the committee.
In making these admissions I do want to state that my guilt lies in misplacing my trust and in being too gullible. I realize that these actions can be as detrimental to a client's welfare as an intentional defalcation, however, and I will accordingly submit this letter for the committee's determination. As soon as final arrangements have been completed so that I may make restitution I will advise the committee and I will abide by any instructions of the committee in that regard.
Very sincerely yours,
/s/ William Rogers Jr.
[2] Respondent was sent by registered mail, return receipt requested, a copy of the recommendations of the committee. The Postmaster of the City of San Francisco, California, returned the letter to the State Bar on July 27, 1965, as unclaimed.
| {
"pile_set_name": "FreeLaw"
} | 0.10354 | [
{
"begin": 0,
"end": 10,
"score": 0.024490505
},
{
"begin": 10,
"end": 21,
"score": 0.010828903
},
{
"begin": 21,
"end": 33,
"score": 0.0035402183
},
{
"begin": 33,
"end": 121,
"score": 0.004928539
},
{
"begin": 121,
"end": 131,
"score": 0.0040955464
},
{
"begin": 131,
"end": 166,
"score": 0.0036443423
},
{
"begin": 166,
"end": 185,
"score": 0.011037151
},
{
"begin": 185,
"end": 192,
"score": 0.020269485
},
{
"begin": 192,
"end": 234,
"score": 0.0069763125
},
{
"begin": 234,
"end": 7140,
"score": 0.104076885
}
] |
Pyrgulina pretiosa
Pyrgulina pretiosa is a species of sea snail, a marine gastropod mollusk in the family Pyramidellidae, the pyrams and their allies.
References
Higo, S. & Goto, Y. (1993) A Systematic List of Molluscan Shells from the Japanese Is. and the Adjacent Area. Elle Scientific Publications, Yao, Japan, xxii + 693 + 13 + 149 pp.
External links
To World Register of Marine Species
Category:Pyramidellidae
Category:Gastropods described in 1932 | {
"pile_set_name": "Wikipedia (en)"
} | 0.019714 | [
{
"begin": 0,
"end": 19,
"score": 0.16551583
},
{
"begin": 19,
"end": 152,
"score": 0.039254878
},
{
"begin": 152,
"end": 164,
"score": 0.008711713
},
{
"begin": 164,
"end": 175,
"score": 0.077709
},
{
"begin": 175,
"end": 186,
"score": 0.009232334
},
{
"begin": 186,
"end": 276,
"score": 0.0037311125
},
{
"begin": 276,
"end": 344,
"score": 0.0009327781
},
{
"begin": 344,
"end": 360,
"score": 0.009787662
},
{
"begin": 360,
"end": 398,
"score": 0.024490505
},
{
"begin": 398,
"end": 460,
"score": 0.011523063
}
] |
Q:
PHP Passing variables to a function and losing values
I am passing some variables to a function to round and add a dollars sign but when the values get into the function they have lost their values.
formatDollars($cost, $taxedCost, $shipping, $total)
function formatDollars($cost, $taxedCost, $shipping, $total) {
$taxedCost = '$'.round($taxedCost, 2);
$shipping = '$'.round($shipping, 2);
$total = '$'.round($total, 2);
$cost = '$'.round($cost, 2);
return array($cost, $taxedCost, $shipping, $total);
}
list($cost, $taxedCost, $shipping, $total) = formatDollars();
When I output I get the dollar signs but all my numbers have become zero.
A:
I ended up finding the answer to my own quesion
In the line that I send variables to the function it did not like not having a variable to equal to, so when I ended up saying my variables equalled sending to the function.
function formatDollars($numberFormatted)
{
$numberFormat = '$'.round($numberFormatted, 2);
return $numberFormat;
}
$cost = formatDollars($cost);
$taxedCost = formatDollars($taxedCost);
$shipping = formatDollars($shipping);
$total = formatDollars($total);
| {
"pile_set_name": "StackExchange"
} | 0.012356 | [
{
"begin": 0,
"end": 58,
"score": 0.03427619
},
{
"begin": 58,
"end": 204,
"score": 0.024833864
},
{
"begin": 204,
"end": 256,
"score": 0.0043211486
},
{
"begin": 256,
"end": 320,
"score": 0.0019523263
},
{
"begin": 320,
"end": 363,
"score": 0.0039740684
},
{
"begin": 363,
"end": 404,
"score": 0.007809305
},
{
"begin": 404,
"end": 439,
"score": 0.0022560214
},
{
"begin": 439,
"end": 472,
"score": 0.0019696802
},
{
"begin": 472,
"end": 528,
"score": 0.0036443423
},
{
"begin": 528,
"end": 1191,
"score": 0.00860759
}
] |
In conventional computing systems, a frame buffer is provided in the system's hardware which is used to store the contents of the display of the computing system at any given time. The term “frame buffer”, as used herein, refers to the entire video display interface including acceleration hardware and other components as appropriate. The frame buffer is traditionally controlled and manipulated by a software program which regulates access to the display as requested by various application programs running on the computing system. For example, in a computing system utilizing the X Windows display protocol, an 8 bit frame buffer can be provided in the computer's hardware and controlled through the X Windows application program interface. The X Windows protocol permits a number of programs, known as X clients, to communicate with the interface, known as the X server, and thus modify the viewable display.
Conventionally, an 8 bit frame buffer can display up to 256 different colors typically from a palette of 224 (or 16,777,216) colors. Each of the 256 colors can be designated and selected by a X client, through a color lookup table known as a “colormap.” A conventional colormap for an 8 bit frame buffer has 256 (28) addressable entries or cells, each cell representing a “pixel” value defining a color displayable on the display. FIG. 1 shows an example of a colormap, having 256 cells. Each cell contains a multi-bit field which, among other things, dictates the color associated with the cell, and whether the cell is a read-only cell or a read/write cell. By default, the colormap cells are considered “empty” until allocated and initialized by the server at the request of an X client. The color of an empty cell is undefined. The operation of a colormap and the X Windows protocol is described in “The Xlib Programming Manual”, by O'Reilly and Associates Inc. publishers, 1988 (ISBN 0-937175-13-7), which is hereby expressly incorporated by reference in its entirety.
The application programs (i.e., the X clients) running on the computing system manipulate the cells in a colormap through the X server interface, and the frame buffer hardware accesses the cells in the colormap to determine the color of any pixel displayed. The mechanism typically takes this form: the client may request that a specific color be made available to it by allocating an entry in the default colormap. The X server will attempt to satisfy the request but may refuse if there are no unallocated cells available. At this point, the client has several options: for example, it may try to allocate a different color, ignore the error and assume that the request succeeded, or exit with an error. Alternatively, it may create a “private colormap” which gives the client a full set of 256 cells that are not shared with any other client.
In conventional computing systems, a display or colormap “flashing” problem occurs if the display hardware of the computing system is equipped with a frame buffer capable of accessing only a single hardware colormap at any one time. For example, Sun Microsystems' CG6 frame buffer hardware, or the GX hardware, is an 8 bit frame buffer which supports only one colormap at any one time. As the user moves between a client that uses the default colormap and one that has defined a private colormap, the X server automatically updates the values in the frame buffer's hardware colormap.
For example, the default colormap may have used cells 0 and 1 to display black and white. But the private colormap may have entirely different R, G, B values, and thus colors, in these locations.
When the default colormap switches out, the private colormap values are applied to all of the displayed color images and windows, with the result that windows and images displayed in on the screen may appear to be abnormally or seemingly randomly colored since these images relied upon the values stored in the default colormap. The image associated with the X client which allocated the private colormap will, of course, appear as it should, since it is now using the colors from the private colormap. If the user then activates a window which relies on the default colormap, the default colormap is then applied to all images and the image associate with the private colormap will then appear to be abnormally or randomly colored. This problem is referred to herein variously as “display flashing”, “colormap flashing”, or simply “flashing”.
What is needed is a method and computer program product for reducing display flashing in a computing system where the display hardware of the computing system is equipped with a frame buffer capable of accessing only a single hardware colormap at any one time. The system and method should operate transparently with respect to legacy software applications, and should not require any changes to the hardware of the computing system or display devices. It with this background in mind that the present invention was developed. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.040628 | [
{
"begin": 0,
"end": 181,
"score": 0.014507953
},
{
"begin": 181,
"end": 336,
"score": 0.016937515
},
{
"begin": 336,
"end": 535,
"score": 0.026035614
},
{
"begin": 535,
"end": 745,
"score": 0.010898319
},
{
"begin": 745,
"end": 914,
"score": 0.013327881
},
{
"begin": 914,
"end": 1047,
"score": 0.01596569
},
{
"begin": 1047,
"end": 1168,
"score": 0.012703137
},
{
"begin": 1168,
"end": 1345,
"score": 0.0131890485
},
{
"begin": 1345,
"end": 1402,
"score": 0.019436494
},
{
"begin": 1402,
"end": 4984,
"score": 0.021657806
}
] |
Q:
Django + OS X + MySQL + first session variable retrieval = crash
Am experienced with Django, Apache, WSGI, MySql, etc. and have this environment setup and working fine on another OS X computer running Lion. Django session backend is db, session middleware and app are both enabled properly in settings. During first request of site view, we set a request.session key/value, which this first time thru works fine. On subsequent view though when we check if the key/value exists, we get a server-level 500 error that even with Debug mode on doesn't make it to the python interpreter to generate a full stack trace exception. The apache log generates the following messages...
[Mon Apr 16 14:26:22 2012] [notice] Apache/2.2.21 (Unix) DAV/2 mod_wsgi/3.3 Python/2.7.1 mod_ssl/2.2.21 OpenSSL/0.9.8r configured -- resuming normal operations
[Mon Apr 16 14:26:27 2012] [info] mod_wsgi (pid=2362): Create interpreter 'snap.joe|'.
[Mon Apr 16 14:26:27 2012] [info] [client 127.0.0.1] mod_wsgi (pid=2362, process='snap', application='snap.joe|'): Loading WSGI script '/var/www/venvs/snap_env/snap/wsgi/wsgi.py'.
[Mon Apr 16 14:26:32 2012] [error] [client 127.0.0.1] Premature end of script headers: wsgi.py
[Mon Apr 16 14:26:33 2012] [notice] child pid 2362 exit signal Bus error (10)
Have checked that a MySQL db table django_session row is added properly with session_data and also the cookie set in the browser after the first request contains the proper/matching session_id. If I add a simple request.session.flush() just before the existing session code, we can bypass the error obviously because there is never anything in the session. One more thing, the value we are adding to the session key/value store is a Django QuerySet object. Again, this is working on a live CentOS server, and also another Mac OS X Lion machine (albeit running Python 2.6 instead of 2.7).
Any ideas folks? Many thanks!
A:
See documented reasons at:
http://code.google.com/p/modwsgi/wiki/FrequentlyAskedQuestions#Apache_Process_Crashes
and follow further links for possible workarounds.
In short, can be shared library version conflict, using mod_python at same time, or extension module for Python that doesn't work with sub interpreter.
If this is only Python site on that Apache, set:
WSGIApplicationGroup %{GLOBAL}
for one potential quick solution.
| {
"pile_set_name": "StackExchange"
} | 0.027924 | [
{
"begin": 0,
"end": 69,
"score": 0.007878721
},
{
"begin": 69,
"end": 212,
"score": 0.014716201
},
{
"begin": 212,
"end": 308,
"score": 0.007948137
},
{
"begin": 308,
"end": 418,
"score": 0.0095794145
},
{
"begin": 418,
"end": 628,
"score": 0.015757442
},
{
"begin": 628,
"end": 679,
"score": 0.0121478075
},
{
"begin": 679,
"end": 839,
"score": 0.007739889
},
{
"begin": 839,
"end": 926,
"score": 0.017423427
},
{
"begin": 926,
"end": 1106,
"score": 0.0020651272
},
{
"begin": 1106,
"end": 2335,
"score": 0.032559406
}
] |
Jennifer Aniston created a commotion Tuesday morning on social networks, posting her first picture on Instagram.
“And now we’re friends on Instagram too. Hi Instagram,” wrote the actress, making a small nod to the “Friends” series.
For her first publication, the 50-year-old American released a selfie with David Schwimmer, Matt LeBlanc, Courtney Cox, Lisa Kudrow and Matthew Perry, the actors she shared with “Friends” .
According to the magazine “People“, the appearance of the popular actress on Instagram has not been without problems.
Several Internet users had difficulty subscribing to Aniston’s account, completely invisible on the social network.
The account, yet named simply @jenniferaniston does not appear when it is typed in the search box on Instagram.
“We know that many people have a hard time subscribing to Jennifer’s account, the ridership is amazing,” said a spokeswoman for the star in the magazine “People“.
Shortly after noon, some 244,000 people were already following the account of the actress, but this number may swell dramatically in the coming hours!
Check out the super viral Instagram post below!
View this post on Instagram And now we’re Instagram FRIENDS too. HI INSTAGRAM 👋🏻 A post shared by Jennifer Aniston (@jenniferaniston) on Oct 15, 2019 at 6:03am PDT
Source: Tvanouvelles | {
"pile_set_name": "OpenWebText2"
} | 0.093337 | [
{
"begin": 0,
"end": 113,
"score": 0.010134743
},
{
"begin": 113,
"end": 155,
"score": 0.020685982
},
{
"begin": 155,
"end": 233,
"score": 0.0072886846
},
{
"begin": 233,
"end": 424,
"score": 0.022773718
},
{
"begin": 424,
"end": 543,
"score": 0.021796638
},
{
"begin": 543,
"end": 660,
"score": 0.017701091
},
{
"begin": 660,
"end": 773,
"score": 0.018048171
},
{
"begin": 773,
"end": 937,
"score": 0.011523063
},
{
"begin": 937,
"end": 1089,
"score": 0.032902762
},
{
"begin": 1089,
"end": 1326,
"score": 0.0035402183
}
] |
Q:
Parsing the information of a URL out of a HTML tags in C
My application gets as part of its data a large html formatted file that contains large amounts of links. Something like what you would get if you search anything on Google or Yahoo or other search engines: a list of URLs and the description or other text.
I've been trying to come out with a function that can parse the URL and the description and save them into a text file but it's proven hard, at least to me. So, if I have:
<a href="http://www.w3schools.com">Visit W3Schools</a>
I would parse http://www.w3schools.com and Visit W3Schools and save them in a file.
Any way to achieve this? in plain C?
Any help is appreciated.
A:
You really need a proper html parser, but for something quick and dirty, try:
bool get_url(char **data, char **url, char **desc)
{
bool result = false;
char *ptr = strstr(*data, "<a");
if(NULL != ptr)
{
*data = ptr + 2;
ptr = strstr(*data, "href=\"");
if(NULL != ptr)
{
*data = ptr + 6;
*url = *data;
ptr = strchr(*data, '"');
if(NULL != ptr)
{
*ptr = '\0';
*data = ptr + 1;
ptr = strchr(*data, '>');
if(NULL != ptr)
{
*data = ptr + 1;
*desc = *data;
ptr = strstr(*data, "</a>");
if(NULL != ptr)
{
*ptr = '\0';
*data = ptr + 4;
result = true;
}
}
}
}
}
return result;
}
Not that data gets updated to be beyond the data parsed (it's an in-out parameter) and that the string passed in gets modified. I'm feeling lazy/too busy to do full solutions with memory allocated return strings.
Also you probably ought to return errors on the cascade of close scope braces (except the first one) which is partly why I stacked them up like that. There are other neater solutions that can be adapted to be more generic.
So basically you then call the function repeatedly until it returns false.
| {
"pile_set_name": "StackExchange"
} | 0.023289 | [
{
"begin": 0,
"end": 62,
"score": 0.013258465
},
{
"begin": 62,
"end": 169,
"score": 0.010134743
},
{
"begin": 169,
"end": 320,
"score": 0.009718247
},
{
"begin": 320,
"end": 477,
"score": 0.017423427
},
{
"begin": 477,
"end": 492,
"score": 0.012911384
},
{
"begin": 492,
"end": 547,
"score": 0.003054306
},
{
"begin": 547,
"end": 631,
"score": 0.012008976
},
{
"begin": 631,
"end": 656,
"score": 0.028782474
},
{
"begin": 656,
"end": 668,
"score": 0.023632111
},
{
"begin": 668,
"end": 1999,
"score": 0.018325835
}
] |
Four Business Ideas For Women
If you are a female that has that yearning deep within you to go in to business for yourself, this article is for you. Sometimes having the entrepreneurial spirit just isn’t enough to go for it. It helps to have some ideas to think about for the imagination to start those creative juices flowing. A good way to figure out what kind of business to start is by examining your interests and goals. Something that converges the two would be the ideal business for anyone. Also, knowing what you want to gain from the business will help guide you down the right path. To help out I have listed a few business ideas for women below. Consider one or a combination and you may just have a one of a kind service to build a business around.
Professional Blogging
If you like to write, start a blog around your favorite topic or niche. There’s lots of money made like this. All you need is a computer and a little creativity. Then, research ways to monetize the traffic and you will be on your way.
Social Media Consultant
If you are social media savvy and enjoy Twitter, Facebook, etc. you could start a business that helps people promote their products. This has the potential of unlimited growth. You can start by building fan pages for small businesses and doing product launches. Who knows what it could turn in to?
Proofreading and Editing
If you are good with English and grammar you can give a very useful service of proofreading and editing. There are many people who have great ideas but have a hard time putting them on paper properly. This is where you can come in and save the day. Also, this is something that could be done from a home office. There’s nothing like making a living from the comfort of your home.
Web Design
If you have any experience with WordPress you can design websites. There are many small businesses that would love to give their money to a local hardworking web designer like yourself. All you have to do is walk in the door with a portfolio of what you can do for them and you’re on your way. This is a very light maintenance business with recurring income. It’s not too often you hear those two characteristics when describing a business. Also, like the proofreading, it could be done at home.
While the above ideas could be done by a man or a woman I am under the belief that the fairer sex has a little more finesse and talent for detail than their male counterparts. There are many exceptions to this but I have personally witnessed women thrive in these businesses. That said, take these ideas and come up with something you will enjoy doing for a long time. Create a web design business that provides social media consulting. Start a blog that gives tips about editing and proofreading while offering the service as well. My father always told me if I could find a way to make a living doing what I love then I would never work a day in my life. I think this is true but I’m still looking. Good luck with your entrepreneurial pursuits! | {
"pile_set_name": "Pile-CC"
} | 0.031186 | [
{
"begin": 0,
"end": 30,
"score": 0.029125832
},
{
"begin": 30,
"end": 150,
"score": 0.112144895
},
{
"begin": 150,
"end": 226,
"score": 0.031185975
},
{
"begin": 226,
"end": 329,
"score": 0.044748597
},
{
"begin": 329,
"end": 427,
"score": 0.010690071
},
{
"begin": 427,
"end": 500,
"score": 0.016937515
},
{
"begin": 500,
"end": 595,
"score": 0.016590435
},
{
"begin": 595,
"end": 659,
"score": 0.02262963
},
{
"begin": 659,
"end": 763,
"score": 0.009093502
},
{
"begin": 763,
"end": 3009,
"score": 0.023460433
}
] |
Q:
Run batch file from SQL
I want to run batch file from SQL Job without using exec xp_cmdshell.
Any idea?
Thanks
A:
Instead of running batch file, i have created power shell and ran it from SQL job. It satisfy my requirement and resolved my issue.
| {
"pile_set_name": "StackExchange"
} | 0.020686 | [
{
"begin": 0,
"end": 28,
"score": 0.013119632
},
{
"begin": 28,
"end": 99,
"score": 0.027580723
},
{
"begin": 99,
"end": 109,
"score": 0.019575324
},
{
"begin": 109,
"end": 116,
"score": 0.009857078
},
{
"begin": 116,
"end": 121,
"score": 0.019297661
},
{
"begin": 121,
"end": 204,
"score": 0.028439116
},
{
"begin": 204,
"end": 255,
"score": 0.013258465
}
] |
The day marked the one-year anniversary of the pair's engagement. It had been rumored that Aniston and Theroux were going to secretly tie the knot on Aug. 10 under the guise of the actor's birthday.
In July, Aniston told the Associated Press they hadn't set a date yet. "We just want to do it when it's perfect, and we're not rushed, and no one is rushing from a job or rushing to a job. And, you know, we already feel married," she explained. | {
"pile_set_name": "Pile-CC"
} | 0.010274 | [
{
"begin": 0,
"end": 66,
"score": 0.012217224
},
{
"begin": 66,
"end": 199,
"score": 0.01492445
},
{
"begin": 199,
"end": 271,
"score": 0.013952625
},
{
"begin": 271,
"end": 389,
"score": 0.022351967
},
{
"begin": 389,
"end": 444,
"score": 0.018742332
}
] |
Chamaco
Chamaco is a masculine given name and may refer to:
Chamaco Ramirez (1941–1983), Puerto Rican singer and composer
Chamaco Rivera (born 1946), Puerto Rican singer and composer
Chamaco Valaguez (born 1957), Mexican professional wrestler
Category:Masculine given names | {
"pile_set_name": "Wikipedia (en)"
} | 0.024319 | [
{
"begin": 0,
"end": 8,
"score": 0.0681194
},
{
"begin": 8,
"end": 61,
"score": 0.049898956
},
{
"begin": 61,
"end": 124,
"score": 0.010898319
},
{
"begin": 124,
"end": 185,
"score": 0.0060739038
},
{
"begin": 185,
"end": 245,
"score": 0.006247444
},
{
"begin": 245,
"end": 276,
"score": 0.017145762
}
] |
Sunlight on Campaign Finance Disclosure
June 2, 2014, 2:30 p.m.
The recent Supreme Court decisions in the Citizens United and McCutcheon cases opened the door to an unfettered, unregulated influx of money into elections from corporations and labor unions. A first step in addressing the multitude of problems the decision created is disclosure. It is incumbent upon Congress to immediately create a robust, rapid transparency regime that takes full advantage of technology. This requires real-time, online transparency on every level of influence, from independent expenditures to lobbying to bundled campaign contributions.
Now that the Supreme Court has struck down overall contribution limits, the only remaining pillar of our campaign finance system is disclosure. Unfortunately, our current system of disclosure is not up to the task imposed by the Supreme Court. The Real Time Transparency Act Of 2014 is a crucial move toward a more transparent system that requires campaign contributions of $1,000 or more to candidates, committees and parties to be public within 48 hours. | {
"pile_set_name": "Pile-CC"
} | 0.044749 | [
{
"begin": 0,
"end": 40,
"score": 0.010412407
},
{
"begin": 40,
"end": 65,
"score": 0.007878721
},
{
"begin": 65,
"end": 258,
"score": 0.057331093
},
{
"begin": 258,
"end": 347,
"score": 0.020685982
},
{
"begin": 347,
"end": 476,
"score": 0.026722329
},
{
"begin": 476,
"end": 627,
"score": 0.012356056
},
{
"begin": 627,
"end": 772,
"score": 0.085282035
},
{
"begin": 772,
"end": 872,
"score": 0.014022041
},
{
"begin": 872,
"end": 1084,
"score": 0.007531641
}
] |
BC’s Oil and Gas Commission: A captured regulator Photo © Garth Lenz By Ben Parfitt
In June 2015 “in an effort to expedite” the building of a pipeline by Alliance Pipeline Ltd., a company called Synergy Land Services submitted falsified documents to British Columbia’s Oil and Gas Commission.
The documents were deliberately altered to suggest that archaeological work was done at two sites when in fact it had only been done at one. Yet the imprimatur of the professional archaeologist somehow magically made it onto both documents.
Two years later when the Commission (OGC) issued an “administrative finding” on the matter, it noted how Synergy’s “applications were altered to include different geographic areas and different purposes from the initial applications while retaining original signatures of the archeologist and Alliance’s company representative.”
Fraud is a serious criminal matter. Under BC’s Oil and Gas Activities Act, which guides the OGC’s work, companies found to have submitted false or misleading documents may be liable to fines of up to half a million dollars.
Synergy subsequently laid the blame for what happened on a junior employee who didn’t know better. The employee was let go and the company allegedly altered its hiring practices to “add a training component on documentation expectations.”
While the OGC later said it was not satisfied that Synergy took “all reasonable steps” to ensure the fraud did not occur, it concluded that the company had done enough to prevent it happening again.
The company was not even ordered to pay a token dime by way of a fine.
Unfortunately, this is not an isolated incident. When it comes to vigorously enforcing the rules, the OGC rarely does and today I published a report outlining this.
Regulatory failure
In just the past two-and-a-half years, three spectacular examples of regulatory failure by the OGC have surfaced.
In May 2017, word surfaced that the OGC had allowed dozens of unlicensed dams to be built on its watch by fossil fuel companies that impounded massive amounts of water behind the structures to use in their controversial, earthquake-inducing fracking operations.
Many of those “illegal works” (two of the largest unlicensed dams were described as such by BC’s Environmental Assessment Office) were subsequently found to have serious design flaws that could have had deadly consequence for any oil and gas industry personnel or landowners working or living immediately downstream.
Then, in late fall 2017, it was learned that the OGC had knowledge of numerous gas wells that had failed and were leaking methane into groundwater. What did the OGC do with that knowledge? It hid it from the public for four years, only confirming it after a copy of its “internal” audit was leaked to an investigative reporter.
In spring 2018, word surfaced about yet another damaging OGC audit. This one itemized how numerous oil and gas companies had violated operational rules aimed at protecting some of the most threatened caribou populations in the province. Once again, the OGC suppressed that information, only acknowledging it after it fell into outside hands.
The worst that appears to have happened in all three cases involving multiple violations of provincial regulations is that the OGC ordered the offending companies to fix their mistakes.
Such orders, however, are not official findings of wrongdoing—something that the OGC appears intent on avoiding.
To demonstrate this, the BC office of the Canadian Centre for Policy Alternatives looked at 115 different enforcement actions posted on the OGC website. Fully 99 of those actions involved orders where no finding of guilt was made. Another two involved tickets. Only 14 involved administrative tribunals where harsher penalties could theoretically be meted out. Even then, they rarely were.
In total, the penalties resulting from those 14 investigations totaled $92,750, a drop in the bucket compared to the more than $5 million in penalties that could have been levied.
Competing interests
From its advent 21 years ago to the present day, the OGC has outperformed on its key mandate of being a “single-window” agency that fast tracks industry development applications. But it has underperformed, spectacularly, when it comes to holding that same industry to account when it does wrong—as it all too frequently does. This suggests that the agency is captured by the industry it regulates, which is never a good thing as far as the public interest is concerned.
This state of affairs will continue and likely get worse with a predicted rapid run-up in natural gas drilling and fracking operations that would be required if one or more liquefied natural gas plants materialize on BC’s coast.
There is one effective way to reform the current state of affairs, something that both a former all-party committee of the provincial legislature recommended in the aquaculture or salmon-farming industry and that BC Auditor General Carol Bellringer more recently recommended for regulation of the province’s mining industry.
When regulators are essentially tasked with both expediting development applications and simultaneously policing the industry that it grants development approvals to, problems inevitably arise. Bellringer quite rightly concluded in the case of the mining sector that a provincial agency saddled with such a dual role was caught in an “irreconcilable conflict.”
To end that conflict and restore public confidence, one agency should review and subsequently approve or deny industry applications. A second very separate agency should do the policing work and ensure that companies abide by the rules. When those rules are broken, it should fall to the stand-alone compliance and enforcement agency to determine what the appropriate penalties will be.
British Columbians deserve to see this simple yet vital reform enacted along with a handful of other reforms aimed at turning the OGC from an agency captured by the industry it regulates to one that more properly serves the people of the province.
Topics: Environment, resources & sustainability, Features, Fracking & LNG, Transparency & accountability | {
"pile_set_name": "OpenWebText2"
} | 0.090115 | [
{
"begin": 0,
"end": 84,
"score": 0.010898319
},
{
"begin": 84,
"end": 294,
"score": 0.05613239
},
{
"begin": 294,
"end": 436,
"score": 0.018187003
},
{
"begin": 436,
"end": 536,
"score": 0.0168681
},
{
"begin": 536,
"end": 866,
"score": 0.007948137
},
{
"begin": 866,
"end": 903,
"score": 0.1539292
},
{
"begin": 903,
"end": 1091,
"score": 0.02262963
},
{
"begin": 1091,
"end": 1191,
"score": 0.046465382
},
{
"begin": 1191,
"end": 1331,
"score": 0.006525108
},
{
"begin": 1331,
"end": 6182,
"score": 0.09118898
}
] |
Dedovo
Dedovo (Bulgarian: Дедово) is a village in the Rodopi Municipality of Bulgaria. It is located roughly 26 kilometers from Plovdiv, and because of its high altitude of around 1500 meters it offers cool temperatures to many people who own holiday homes there during the summer to escape the heat of the cities. The town comprises multiple cafés and shops.
References
External links
http://www.maplandia.com/bulgaria/plovdiv/dedovo/
MAP
Facebook
Category:Villages in Plovdiv Province | {
"pile_set_name": "Wikipedia (en)"
} | 0.013606 | [
{
"begin": 0,
"end": 7,
"score": 0.010412407
},
{
"begin": 7,
"end": 88,
"score": 0.0048244153
},
{
"begin": 88,
"end": 316,
"score": 0.013327881
},
{
"begin": 316,
"end": 361,
"score": 0.004685583
},
{
"begin": 361,
"end": 373,
"score": 0.008711713
},
{
"begin": 373,
"end": 389,
"score": 0.009787662
},
{
"begin": 389,
"end": 440,
"score": 0.055732824
},
{
"begin": 440,
"end": 445,
"score": 0.021518974
},
{
"begin": 445,
"end": 455,
"score": 0.015688026
},
{
"begin": 455,
"end": 493,
"score": 0.0068721883
}
] |
1. Field of the Invention
The present invention relates to an electromagnetic field intensity computing apparatus for computing the intensity of the electromagnetic field of an electric circuit device based on the moment method.
2. Description of the Related Art
Since an unnecessary electric wave emitted by an electric circuit device interferes with TV, radio, or other electric waves, various strict restrictions have been put in place in many countries. For example, Japan has issued the VCCI Standard, the U.S. has issued the FCC Standard, and Germany has issued the VDE Standard.
To meet such electric wave restrictions, various actions should be taken using shielding technologies, filtering technologies, etc. Accordingly, it is necessary to quantitatively simulate these actions to determine the extent to which extent the electric wave can be reduced. Since the simulation of the electromagnetic analysis requires a long process time using a computer, it is necessary to prepare a high-speed and high-precision computing apparatus to compute the intensity of the electromagnetic field of an electric circuit device.
In a method of computing the electromagnetic field intensity, the electromagnetic field intensity of an object can be easily computed by a well-known logic equation, given a current flowing through each portion of the object. The current value can be logically obtained by solving the Maxwell equations (electromagnetic wave equations) under given conditions. However, no exact solution has been obtained by equations under complicated boundary conditions on an object of an optional shape.
Therefore, any solution for obtaining the current used by the electromagnetic field intensity computing apparatus refers to, more or less, an approximation. A typical approximate computation can be a small loop antenna approximation, a distributed constant line approximation, or a moment method.
In the small loop antenna approximation method, the wiring connecting the wave source circuit and the load circuit is treated as a loop antenna. In this approximation, the current through the loop is assumed to be flat and computed by the method of computing the concentrated constant circuit.
FIGS. 1A and 1B illustrate the small loop antenna approximation.
FIG. 1A shows a circuit model comprising a driver 10 that is a wave source circuit; a receiver 11 that is a load circuit; a wiring 14 connecting the driver 10 to the receiver 11, and a dielectric portion 12 inserted between the grounding wire layer 13 and wiring 14.
In FIG. 1A, the distance between the driver 10 and receiver 11 is l and the distance between the wiring 14 and the grounding wire layer 13 is h.
FIG. 1B is a diagram showing the equalizing circuit of the circuit model shown in FIG. 1A.
In FIG. 1B, the driver 10 is represented by an equalizing circuit comprising a power source V, resistor R.sub.1, and capacitor C.sub.1. The receiver 11 can be represented by an equalizing circuit comprising a capacitor C.sub.2.
A line current I flows as a loop as shown in FIG. 1B. The area of the loop is represented by S (=lh). The straight line below the line current I shown at the upper portion in FIG. 1B indicates that the line current I is constant (flat) regardless of the position of the line.
The line current I can be computed through a concentrated constant circuit comprising the equalizing circuit of the driver 10 and receiver 11 by the following equation (1). ##EQU1##
Then, using the line current I computed by the above equation (1), a radial electromagnetic field E is computed by the following approximation (2). ##EQU2##
As described above, the computation according to the small loop antenna approximation involves a very simple equation, and the computation can be performed at a high speed.
However, since the line current I is assumed to be constant on the line, the current distribution on the line varies when the frequency f refers to a high frequency, thereby considerably lowering the precision.
Thus, the computation using the small loop antenna approximation is the simplest method of all the above listed approximations, but in practice it is not used at all because it is inferior in precision if the size of the loop cannot be ignored when compared with the wave length of the electromagnetic wave.
The distributed constant circuit approximation refers to a method of considering the current distribution to improve the precision.
The distributed constant circuit approximation refers to a method of obtaining a current value by applying the equation of the distributed constant line to an object to be represented as a one-dimensional structure by an approximation.
The computation can be easily done in this method. The computation time and storage capacity are increased in proportion to the number of analysis elements. Furthermore, the analysis is made including the reflection and resonance of a line, etc. Therefore, in the distributed constant circuit approximation, a high-speed and high-precision analysis can be made on an object to which a one-dimensional approximation can be applied.
FIGS. 2A and 2B show the above described distributed constant line approximation.
The circuit model shown in FIG. 2A is the same as that shown in FIG. 1A, and the detailed description is omitted here.
FIG. 2B shows the equalizing circuit of the circuit shown in FIG. 2A.
In FIG. 2B, the equalizing circuit of the driver 10 and receiver 11 is the same as that shown in FIG. 1B.
When the frequency f becomes high and the wave length .lambda. becomes shorter than the line length l in FIG. 2A, a standing wave current flows through the line and the distribution of the current varies with the line position. In FIG. 2B, for instance, the value of the line current I is larger on the driver 10 side while the value of the line current I is smaller on the receiver 11 side. The value of the line current I at a certain point is represented by I(x) while the voltage at a certain point is represented by V(x), where x indicates a variable representing the distance from the receiver 11, that is, the origin (x=0). The driver 10 refers to (x=L).
In FIG. 2B, "Zo" indicates a characteristic impedance in a distributed constant line. "Z.sub.L " indicates a characteristic impedance at the receiver 11. `.beta.` indicates a wave number and is represented by (.beta.=.omega./c=2.pi./.lambda.). The wave length .lambda. is represented by (.lambda.=c/f). The `c` indicates the velocity of light.
The current distribution I(x) of the line can be obtained by the following equation (3). ##EQU3##
As described above, the computation done using the distributed constant line approximation allows a high-speed and high-precision analysis to be made on an object to be processed as a one-dimensional structure by an approximation.
However, some objects that cannot be processed as one-dimensional structures by an approximation are not analyzed.
The moment method is one of the solutions of an integral equation derived from the Maxwell electromagnetic wave equations, and can process a 3-dimensional object. In this method, an object is divided into small elements to compute an electric current.
Thus, since a 3-dimensional object can be processed by the moment method, an electromagnetic field intensity computing apparatus for computing the electromagnetic field intensity of an electric circuit device does computation mainly by the moment method.
In the computation by the moment method, a metal portion to be analyzed is divided into a mesh form to obtain a mutual impedance Zij among the divided metal portions. Then, the following moment equation, which governs the mutual impedance Zij, wave source Vi, and electric current Ii flowing through the divided metal portions, is solved to obtain a current value EQU [Zij][Ii]=[Vi] (4)
Using the computation result, the electromagnetic field intensity can be obtained. The "[ ]" in equation (4) indicates a matrix.
The following reference 1 describes the above mentioned moment method.
H. N. Wang, J. H. Richmond and M. C. Giilreath:
"Sinusoidal reaction formulation for radiation and scattering from conducting surface", IEEE TRANSACTIONS ANTENNAS PROPAGATION, vol. AP-23, 1975
As described above, a current value cannot be obtained in the distributed constant line approximation when an object cannot be processed as a one-dimensional structure. Therefore, the entire device including the printed board and the housing cannot be analyzed.
In the moment method, the entire electric circuit device including the printed board and the housing can be analyzed.
However, the method has the following problems (1) through (5).
(1) When the size of the device to be analyzed becomes large, the amount of computation also becomes large. Therefore, the analysis cannot be made within a practical period of time using a current computer.
(2) The conventional electromagnetic field intensity computing apparatus uses the moment method with dielectric portions on the printed board in the electric circuit device divided into a mesh form to obtain simultaneous equations using, and with the equalizing current and magnetic current flowing on the surface set as unknown values.
Therefore, a greater number of patches forming a mesh requires a longer time in solving the simultaneous equations in the moment method and also requires a large memory capacity.
(3) A long time is required in computing the immittance matrix elements among the divided surface patches in a mesh form.
(4) The above mentioned mutual impedance Zij has been computed using a double-precision real number to perform a high-speed operation. However, this computation cannot output an exact value of the mutual impedance Zij.
In detail, in the computation using the double-precision real numbers, lower-order significant numbers are lost when performing multiplication. Therefore, computing the mutual impedance Zij in this method may result in the loss of digits when the electric length (length in emitted magnetic wave length units) of the metallic mesh becomes short. As a result, the mutual impedance Zij cannot be obtained exactly.
(5) The cable pigtail portion (terminating unit of a cable) applicable to the moment method has not been appropriately developed to analyze the electromagnetic radiation from the cable pigtail.
To solve the above listed problem (1), in the Japanese Patent Application Number 6-27109, the Applicant of the present invention has suggested a method of computing current distribution by dividing an electric circuit device to be analyzed into a portion to which the distributed constant line approximation can be applied and a portion to which the approximation cannot be applied, and by computing the current distribution in the distributed constant line approximation for the applicable portion and computing the current distribution in the moment method for the inapplicable portion.
To solve the problem (2), in the Japanese Patent Application Number 6-95363, the Applicant of the present invention has suggested a computing method in which a capacitance model of a transmission line is designed and a dielectric portion is converted into a capacitor having the capacity .DELTA.C=C.sub.0 (.epsilon. eff-1) per unit length. In this method, C.sub.0 indicates the capacity per unit length, in a vacuum, of the metallic pattern having the dielectric portion inserted. ".epsilon. eff" indicates an effective dielectric constant.
The method (Japanese Patent Application Number 6-27109) obtained by combining the above described distributed constant line approximation with the moment method, and the method (Japanese Patent Application Number 6-95363) for the capacitance model of a transmission line have been only effective in a circuit of an electric current through a transmission line.
As a method of reducing the computation time for immittance matrix elements among the surface patches, the method disclosed by the following reference 2 has been conventionally used.
E. H. Newman and D. M. Pozar:
"Considerations for Efficient Wire/Surface Modelling" IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION vol. AP-28, No.1, JANUARY 1980 (reference 2)
In the above mentioned reference 2, if relative positions are equal to each other between the surface patches on a plate to be analyzed, then the mutual impedances are also equal to each other. Thus, the mutual impedance is computed between the patches having unique relative positions. The result is used for the matrix elements having similar relative positions.
However, in the method described by the reference 2, only the relative positions of the patches on a single board are referred to, but this method does not disclose the reduction of the amount of computation by analyzing the relative positional relationships among the patches on a plurality of plates.
Since the plate to be analyzed can be in various forms, the method of extracting the patches having equal relative positional relationships on one or more plates and then automatically detecting from among them the patches having unique relative positional relationships has not been developed yet. Therefore, much time and labor have been required to check the relative positional relationships among the patches and extract the relative positions.
To solve the problem (4), in the Japanese Patent Application Number 6-95362, the Applicant of the present invention has suggested a computing method in which a normal computing unit and high-precision computing unit are provided to compute the mutual impedance to obtain the electromagnetic field intensity. The high-precision computing unit is used when it is anticipated by checking the wave length, element length, and distance that there is a possibility to lose digits.
The above described high-precision computation can be done using real numbers of multiple-precision and using multiple-length integers. In either computation, since the number of digits increases, the computation time is greatly extended.
Finally, the above described problem (5) is explained in detail.
An object to be analyzed by the electromagnetic field intensity computing apparatus can be a housing, a printed substrate and a cable of an electric circuit device. The electric wave radiation from the cable is mainly caused by the pigtail, that is, the terminal processing unit of a cable.
FIGS. 3A through 3C show the radiation mechanism from the pigtail.
In FIG. 3A, 20 is a coaxial cable, and 21 is a housing of the electric circuit device.
When the read wire of a pigtail portion is long and the pigtail portion is not shielded, a common mode current I.sub.3 is induced when the electromagnetic field generated by line currents I.sub.1 and I.sub.2 as shown in FIG. 3A is radiated onto the shielded portion of the coaxial cable 20.
In this case, the line current I.sub.1 is almost equal to the line current I.sub.2 (I.sub.1.apprxeq.I.sub.2), and the differential mode offsets the electric wave radiation. However, the common code current I.sub.3 is not offset. Accordingly, the common code current I.sub.3 causes a serious electric wave.
In the case shown in FIG. 3A, the conventional method of computing the electromagnetic field intensity is the method shown in FIG. 3B. In this method, the value of the electric wave radiation is computed by equivalently computing the voltage V generated on the lead line of the pigtail portion and designing an antenna to be inserted between the housing 21 and the coaxial cable 20.
The equivalent circuit is shown in FIG. 3C. In FIG. 3C, Zin indicates an impedance in the coaxial cable 20. Z1 indicates the impedance in a pigtail lead line. Ra indicates the radiation resistor from the coaxial cable 20. An antenna structure is generated using the housing 21 of the electric circuit device as a ground to generate an electric wave.
FIGS. 4A and 4B show the problems in calculating the electromagnetic field intensity of the pigtail portion.
As shown in FIG. 4A, when a load Z0 is connected to the tip of the coaxial cable 20 of a device, the device has a pigtail portion also at a load unit. This may cause further electromagnetic wave radiation. In this case, no housing is provided at the tip of the coaxial cable 20. Therefore, no antenna model can be produced.
Thus, the electric current flowing through the lead line may be analyzed by the moment method without producing an antenna model. At this time, the following problems (a) through (c) should be solved.
(a) How is the shield of the thick and cylindrical coaxial cable 20 connected to a thin pigtail lead line 22?
(b) How is the coaxial cable 20 connected to the housing 21 if the coaxial cable 20 is directly connect ed to the housing?
(c) The electric current through the shield of the coaxial cable 20 normally flows in parallel with the cable, but flows toward a pigtail lead line 22 when the current approaches the pigtail, and changes its flow from the parallel to vertical direction as shown in FIG. 41. How is the current represented and processed?
As described above, the electromagnetic field intensity computing apparatus for computing the electromagnetic field intensity of an electric circuit device according to the moment method conventionally has the above listed problems (1) through (5). To solve the problems, the Applicant of the present invention has suggested the above described solution.
However, the suggested solution has been insufficient to precisely compute the electromagnetic field intensity at a high speed. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.01423 | [
{
"begin": 0,
"end": 26,
"score": 0.01263372
},
{
"begin": 26,
"end": 229,
"score": 0.014091457
},
{
"begin": 229,
"end": 263,
"score": 0.009371166
},
{
"begin": 263,
"end": 458,
"score": 0.012703137
},
{
"begin": 458,
"end": 586,
"score": 0.0082952175
},
{
"begin": 586,
"end": 718,
"score": 0.010273575
},
{
"begin": 718,
"end": 862,
"score": 0.01561861
},
{
"begin": 862,
"end": 1126,
"score": 0.01492445
},
{
"begin": 1126,
"end": 1352,
"score": 0.022213135
},
{
"begin": 1352,
"end": 17528,
"score": 0.022945397
}
] |
During week 5 at the galleries I met Ricardo Martinez, he is actually from around the same area that I went to school. Ricardo is from South Gate, CA, went to South East High School originally from El Salvador and he has been here for 5 years. He is pursuing a business major to hopefully become a successful accountant. Ricardo is a sophomore and his classes at CSULB include art, nutrition, and political science. He likes to read books, preferably by Dan Brown, likes to watch soccer and watch movies. | {
"pile_set_name": "Pile-CC"
} | 0.047495 | [
{
"begin": 0,
"end": 119,
"score": 0.0168681
},
{
"begin": 119,
"end": 244,
"score": 0.01631277
},
{
"begin": 244,
"end": 321,
"score": 0.0136749605
},
{
"begin": 321,
"end": 416,
"score": 0.16551583
},
{
"begin": 416,
"end": 504,
"score": 0.024490505
}
] |
Lysine-81 and threonine-82 on maize beta-glucosidase isozyme Glu1 are the key amino acids involved in beta-glucosidase aggregating factor binding.
In certain maize genotypes (nulls), beta-glucosidase specifically interacts with a chimeric lectin called beta-glucosidase aggregating factor (BGAF), resulting in high molecular weight complexes. Previously, we showed that three regions (S1-T29, E50-N127, and F466-A512) on the maize beta-glucosidase isozyme Glu1 are involved in interaction and aggregation with BGAF. Recently, we found that the peptide span I72-T82 within E50-N127 is essential and sufficient for BGAF binding, whereas the S1-T29 and F466-A512 regions are required for formation of large complexes. To define the contribution of individual amino acids in the above three regions to BGAF binding, we constructed mutant beta-glucosidases based on sequence differences between maize beta-glucosidase and sorghum beta-glucosidase (dhurrinase 2, Dhr2), which does not bind BGAF. Binding was evaluated by gel-shift assay and affinity by frontal affinity chromatography (FAC). In the gel-shift assay, Glu1 mutants K81E and T82Y failed to bind BGAF, and their FAC profiles were essentially similar to that of Dhr2, indicating that these two amino acids within the I72-T82 region are important for BGAF binding. Substitution of N481 with E (as in Dhr2) lowered affinity for BGAF, whereas none of the mutations in the S1-T29 region showed any effect on BGAF binding. To further confirm the importance of K81 and T82 for BGAF binding, we produced a number of Dhr2 mutants, and the results showed that all four amino acids (I72, N75, K81, and T82) that differ between Glu1 and Dhr2 in the peptide span I72-T82 are required to impart BGAF-binding ability to Dhr2. | {
"pile_set_name": "PubMed Abstracts"
} | 0.012634 | [
{
"begin": 0,
"end": 147,
"score": 0.008225801
},
{
"begin": 147,
"end": 343,
"score": 0.011800728
},
{
"begin": 343,
"end": 516,
"score": 0.016243355
},
{
"begin": 516,
"end": 715,
"score": 0.011731312
},
{
"begin": 715,
"end": 990,
"score": 0.015826859
},
{
"begin": 990,
"end": 1086,
"score": 0.014507953
},
{
"begin": 1086,
"end": 1319,
"score": 0.0358213
},
{
"begin": 1319,
"end": 1473,
"score": 0.012703137
},
{
"begin": 1473,
"end": 1766,
"score": 0.004893831
}
] |
Jack of Kent has posted some interesting questions on his blog regarding the image of skepticism. I’m posting this partly in response to some of his questions.
Jack has asked whether, to those whose cherished views are being questioned, skepticism comes across with “Tebbitite stridency” and posed the question “Is skepticism getting a reputation for arrogance and smugness?”
I think the answer to those questions is probably “yes”. I’m not sure whether a reputation for arrogance and smugness is justified, but you have to address the perceptions people have rather than the perceptions you would like them to have.
I tend to assume that while robust criticism may persuade fence-sitters that x is wrong, it will likely elicit a defensive response from those who currently believe that x is right. Particularly if said criticism uses language that might be considered to be rude or unkind. I admit that I do not always practice what I preach, and that is a failing I should attempt to address.
Skeptics who disagree with me and favour a more robust approach than mine might like to think about how they feel when they are referred to as smug or arrogant – and bear that feeling in mind when they are about to call someone stupid or deluded. (With reference to the use of “deluded”: Nicholas Marsh has a post that touches on the question of whether it is ethical to criticise people by implying, or explicitly stating, that they are mentally ill and notes that “attacking someone’s integrity or mental health risks undermining the open discussion that one wishes to defend – you aren’t going to win many converts by calling people frauds, mad, or both.”)
My comments above, like the majority of those on Jack of Kent’s blogpost, are speculative. It’s interesting to note that people (myself included) have tended to respond to Jack’s questions with subjective opinion. I’m not sure if much evidence has been gathered regarding the perception of skeptics, or the relative success of different approaches to arguing with people we disagree with, but I’m a little surprised that skeptics don’t seem to have asked whether there is any evidence to support the positions being taken. (Well, not at the time of writing – someone will surely quote the skeptic’s motto of “evidence or STFU” before too long.)
The only research into persuasion that I have read is contained in Robert Cialdini’s book Influence: Science and Practice.
Cialdini describes the successful use of what he describes as ‘weapons of influence’ – including reciprocal concessions, commitment and consistency, and liking. If these approaches are successful, it seems logical to assume that contrary approaches will be less successful in persuading and may even be counterproductive.
I’m writing a long blogpost on anti-vaccine campaigns at the moment and have written that the response of some parents to the misinformation they have been subjected to is understandable. For example, in the MMR scare.
People were exposed to extremely partial reporting of Wakefield’s research, were unaware of its flaws, and were not told about published research that disagreed with Wakefield’s conclusions (while unpublished research that purportedly agreed with Wakefield was promoted uncritically). Digression: There is also the issue of whether people have the tools to appraise scientific evidence. People are considering how this should be addressed. For example, Ben Goldacre asked the following question on his blog:
given that we struggle to engage children with science, while half of all science coverage is health, and people are clearly very engaged in these issues around risk: should evidence based medicine, basic epidemiology and trial design, be taught in schools?
Calling people who are concerned about vaccination “morons” (even if the concerns are ill-founded) is, I think, likely to be counterproductive. Instead of persuading them, the effect is to put them on the defensive.
Would it be practical for skeptics to use any of the weapons of influence described by Cialdini in debating? I don’t know, but I will now make some tenuous connections and speculate wildly.
Authority seems like the most obvious weapon of influence that could be deployed. The debunking of anti-vaccine canards might seem more convincing if it came from an infectious diseases specialist or immunologist rather than from me.
Liking also seems to be a weapon of influence that could be utilised. Cialdini has a chapter subheading titled “Making Friends to Influence People” and tells the story of Joe Girard, a man who made $200,000 a year selling cars and claimed to use the simple formula of presenting customers with a fair price and someone they’d like to buy from. Cialdini also lists some of the reasons for liking: physical attractiveness; similarity; compliments; contact & cooperation.
Reciprocation is the third and final of Cialdini’s weapons of influence that I shall mention. He discusses the effect of reciprocal concessions and how they might help to persuade. Interestingly, Cialdini speculates that reciprocal concessions may explain Watergate.
G Gordon Liddy apparently first presented a scheme that cost $1m to be spent on bugging, a “chase plane”, break-ins, kidnapping, mugging squads, and a yacht featuring “high-class call girls”. This was rejected – at which point Liddy came back with a slightly less-ambitious plan costing $500,000. Again, Liddy’s proposal was rejected. Finally, he submitted his burglary and bugging plan that cost $250,000. Cialdini writes that “this time the plan, still stupid but less so than the previous ones was accepted”. If Cialdini is right, then this is a good example of just how powerful weapons of persuasion can be.
Trying to persuade people by using weapons of influence might in some cases be difficult, impractical, or even impossible. But if the alternative people reach for is to call parents who don’t vaccinate “stupid” or “deluded”, then perhaps those weapons of influence are worthy of consideration.
One area where there is some evidence of the importance of presentation is that of debunking myths.
Schwarz et al [PDF] discuss attempts to improve decision-making – and the frequent failures of these attempts.
Presumably, erroneous beliefs can be dispelled by confronting them with contradictory evidence. Yet attempts to do so often increase later acceptance of the erroneous beliefs […] Any attempt to explicitly discredit false information necessarily involves a repetition of the false information, which may contribute to its later familiarity and acceptance. […] In most cases it will be safer to refrain from any reiteration of the myths and to focus solely on the facts. The more the facts become familiar and fluent, the more likely it is that they will be accepted as true and serve as the basis of people’s judgments and intentions.
What to do? Well, we could make the facts familiar to people – and make the familiarity bias work in our favour. If you have factual information that would help counter misinformation, then the best tactic may be to state the information, and to repeat it sufficiently often for the true statement(s) to ‘enter into the public consciousness’.
If debunking myths can have such unintended consequences, then what else in the presentation of skeptical views can be counterproductive? I think the language used can probably be unhelpful in some instances and, like the debunking of myths, can entrench opposition to the skeptical views being espoused. There are probably other problematic elements of the presentation of skeptic views that have not even occurred to me.
I don’t think I have the answers to the questions that have been raised regarding the image of skeptics or the debunking of myths, but I do think that the questions are worthy of discussion.
This post was brought to you by Self-Doubters Anonymous, in conjunction with the Navel-Gazing Council of Great Britain. Thank you for reading it. | {
"pile_set_name": "OpenWebText2"
} | 0.154513 | [
{
"begin": 0,
"end": 98,
"score": 0.019297661
},
{
"begin": 98,
"end": 160,
"score": 0.017701091
},
{
"begin": 160,
"end": 377,
"score": 0.21186037
},
{
"begin": 377,
"end": 435,
"score": 0.011314815
},
{
"begin": 435,
"end": 619,
"score": 0.118584804
},
{
"begin": 619,
"end": 802,
"score": 0.06412373
},
{
"begin": 802,
"end": 894,
"score": 0.09333697
},
{
"begin": 894,
"end": 998,
"score": 0.0495556
},
{
"begin": 998,
"end": 1246,
"score": 0.43451136
},
{
"begin": 1246,
"end": 7984,
"score": 0.2590451
}
] |
Q:
how to iterate through the selectors with jquery?
Suppose, I have multiple selectors used
$('.some, .next, .any, .way, .myname, .something')
and now if I would like to change each background when one background is changed, so I'm wondering how can I iterate all selectors using likely to this: $(this).each() but I know this will not work coz this will take currently selected each elements but I would like to do all the selectors in my selectors used.
A:
If you really need to do it :
var o = $('.some, .next, .any, .way, .myname, .something');
$.each(o.selector.split(/,\s*/), function(s){
var os = o.filter(s); // or $(s)
...
});
Not that this simple solution wouldn't work for any selector, a parsing would be needed if you really want to support them all (but it's probable you don't have commas in your elements id ;) ).
| {
"pile_set_name": "StackExchange"
} | 0.038396 | [
{
"begin": 0,
"end": 54,
"score": 0.018048171
},
{
"begin": 54,
"end": 96,
"score": 0.029640866
},
{
"begin": 96,
"end": 147,
"score": 0.006108612
},
{
"begin": 147,
"end": 461,
"score": 0.02397547
},
{
"begin": 461,
"end": 466,
"score": 0.019297661
},
{
"begin": 466,
"end": 496,
"score": 0.01193956
},
{
"begin": 496,
"end": 556,
"score": 0.012494888
},
{
"begin": 556,
"end": 602,
"score": 0.012217224
},
{
"begin": 602,
"end": 639,
"score": 0.015549194
},
{
"begin": 639,
"end": 847,
"score": 0.03221605
}
] |
The Electric Ballroom is an iconic music venue at the heart of Camden Town’s bustling community and has been for 80 years.
It began as a busy Irish club playing host to a wide variety of performers including the likes of Jim Reeves. In the past decades, acts such as Sid Vicious, Madness, The Clash, Richard Ashcroft, Snow Patrol, The Killers, Stereophonics, U2, Phil Lynott, The Boomtown Rats, Joy Division, Red Hot Chilli Peppers, Public Enemy, Blur, Supergrass, Garbage and The Smiths have drawn huge crowds to the venue.
Recent performers include The Vaccines, Future Islands, Black Rebel Motorcycle Club, Razorlight, Dinosaur Jr, Parquet Courts, Les Savy Fav, Interpol, Ocean Color Scene, Cage the Elephant, The Strypes, Muse, Of Monsters and Men, Foals, Sir Paul McCartney, Alt-J, Megadeth, Kaiser Chiefs, Nero, Prince and many more! | {
"pile_set_name": "OpenWebText2"
} | 0.193386 | [
{
"begin": 0,
"end": 123,
"score": 0.045091953
},
{
"begin": 123,
"end": 234,
"score": 0.017562259
},
{
"begin": 234,
"end": 526,
"score": 0.2835225
},
{
"begin": 526,
"end": 841,
"score": 0.04268845
}
] |
The influence of timeshift on circadian rhythm of sensitivity to X-irradiation in mice.
For two groups of male C3H mice an eastbound transmeridional flight was simulated by inducing a time shift of the L:D schedule of 8 hr. The assumed flight brought about a maximal reduction of the daily light and dark span, respectively. A third group remained unshifted. At seven different times during the following day, subgroups of the time shifted mice as well as of the group with unchange schedule were exposed to whole body X-irradiation. Mortality and body temperature of each animal were registered for 30 days following exposure and were regarded as indicators of radiation response. Radioresistance was found to be highest during the second half of the daily light span, confirming earlier reports by other authors. Well defined effects of the time shift and a corresponding shift of the acrophase of radioresistance could be demonstrated. There was no significant difference between the two time shifted groups, but there was a consistent slight trend towards an advantage for the group whose L:D shift resulted in a maximally reduced dark span. | {
"pile_set_name": "PubMed Abstracts"
} | 0.038225 | [
{
"begin": 0,
"end": 88,
"score": 0.040628307
},
{
"begin": 88,
"end": 224,
"score": 0.043375164
},
{
"begin": 224,
"end": 325,
"score": 0.017701091
},
{
"begin": 325,
"end": 359,
"score": 0.039598234
},
{
"begin": 359,
"end": 534,
"score": 0.07451247
},
{
"begin": 534,
"end": 682,
"score": 0.015340946
},
{
"begin": 682,
"end": 815,
"score": 0.012703137
},
{
"begin": 815,
"end": 939,
"score": 0.015063282
},
{
"begin": 939,
"end": 1145,
"score": 0.038911518
}
] |
The “Barbs” is a certifiable hit in the Middle East. A fun mix of hip-hop and early 1980s-style break dancing melded with Arabic rhythms, the routine is performed by a bunch of young Saudis, including one wearing a dark suit and bright red high-top sneakers. Their video has gone viral.
“In a region that is often dealing with some kind of conflict and turmoil, it is no wonder that people seek ways to escape from the harsh realities of life by doing what many of us love to do: dance,” wrote Rym Ghazal, a columnist for the National, a newspaper based in Abu Dhabi. “I have to admit, at first I thought it a bit silly, but then I got into it and caught myself ‘barbsing.’”
The dance, which means “untidy” or “messy” in a Saudi dialect, was created by Majed al-Esa, an artist and director known for melding Saudi culture and diction with a Western style. The dance actually starts little more than halfway through the video when the youth in the red shoes says “Put your foot like this” in Arabic. He then shuffles the other foot, tilts his back back and wriggles sideways, bobbing his head like an ostrich to the song, which some say sounds a lot like "Bring It Back" by Travis Porter.
AD
AD
But like many aspects of free expression in the Middle East, there are unforeseen consequences: Take the two poor souls in Abu Dhabi who danced the Barbs while wearing military uniforms, and then uploaded it on social media sites. The Abu Dhabi government didn’t look at it kindly – and swiftly served an arrest warrant for them and took them to court. They were charged with disrespecting the military uniform and the national army. You can see the video that got them into trouble here.
The dance has also triggered the ire of conservative columnists and critics of social media in Saudi Arabia. Some describe the video as proof of how Western influences are spoiling their society. They have publicly urged a boycott of the dance and demanded that authorities arrest the performers for their “indecent” moves. | {
"pile_set_name": "OpenWebText2"
} | 0.107637 | [
{
"begin": 0,
"end": 53,
"score": 0.123736724
},
{
"begin": 53,
"end": 259,
"score": 0.0789077
},
{
"begin": 259,
"end": 287,
"score": 0.050585672
},
{
"begin": 287,
"end": 569,
"score": 0.02655065
},
{
"begin": 569,
"end": 676,
"score": 0.39206567
},
{
"begin": 676,
"end": 858,
"score": 0.065721996
},
{
"begin": 858,
"end": 1001,
"score": 0.09494796
},
{
"begin": 1001,
"end": 1190,
"score": 0.20009461
},
{
"begin": 1190,
"end": 1195,
"score": 0.015896274
},
{
"begin": 1195,
"end": 2012,
"score": 0.13476147
}
] |
/*
* Copyright 2011 Research In Motion Limited.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package webworks.message.list.api;
import webworks.message.list.model.CustomMessage;
import net.rim.device.api.script.Scriptable;
public class MessageListItem extends Scriptable
{
public static final String FIELD_ID = "id";
public static final String FIELD_TITLE = "title";
public static final String FIELD_DESCRIPTION = "description";
public static final String FIELD_IMAGENEW = "imageNew";
public static final String FIELD_IMAGEREAD = "imageRead";
private String _id = null;
private String _title = null;
private String _description = null;
private String _imageNew = null;
private String _imageRead = null;
public MessageListItem() {
this(null,null,null,null,null);
}
public MessageListItem(CustomMessage message) {
this(message.getId(), message.getContact(), message.getSubject(), message.getImageNew(), message.getImageRead());
}
public MessageListItem(String _id, String _title, String _description,
String _imageNew, String _imageRead) {
super();
this._id = _id;
this._title = _title;
this._description = _description;
this._imageNew = _imageNew;
this._imageRead = _imageRead;
}
public Object getField(String name) throws Exception {
if (FIELD_ID.equals(name)) {
return new String(_id);
} else if (FIELD_TITLE.equals(name)) {
return new String(_title);
} else if (FIELD_DESCRIPTION.equals(name)) {
return new String(_description);
} else if (FIELD_IMAGENEW.equals(name)) {
return new String(_imageNew);
} else if (FIELD_IMAGEREAD.equals(name)) {
return new String(_imageRead);
}
return super.getField(name);
}
public boolean putField(String field, Object value) throws Exception {
if (FIELD_ID.equals(field)) {
_id = (String)value;
} else if (FIELD_TITLE.equals(field)) {
_title = (String)value;
} else if (FIELD_DESCRIPTION.equals(field)) {
_description = (String)value;
} else if (FIELD_IMAGENEW.equals(field)) {
_imageNew = (String)value;
} else if (FIELD_IMAGEREAD.equals(field)) {
_imageRead = (String)value;
}
return super.putField(field, value);
}
}
| {
"pile_set_name": "Github"
} | 0.009163 | [
{
"begin": 0,
"end": 48,
"score": 0.007462225
},
{
"begin": 48,
"end": 116,
"score": 0.0073581007
},
{
"begin": 116,
"end": 183,
"score": 0.015896274
},
{
"begin": 183,
"end": 225,
"score": 0.017909339
},
{
"begin": 225,
"end": 272,
"score": 0.007739889
},
{
"begin": 272,
"end": 344,
"score": 0.008677006
},
{
"begin": 344,
"end": 412,
"score": 0.010134743
},
{
"begin": 412,
"end": 487,
"score": 0.010898319
},
{
"begin": 487,
"end": 557,
"score": 0.0129808
},
{
"begin": 557,
"end": 2882,
"score": 0.013605545
}
] |
const program = require('commander')
const config = require('config').redis
const kue = require('kue')
program
.command('dashboard')
.option('-p|--port <port>', 'port on which to run kue dashboard', 3000)
.option('-q|--prefix <prefix>', 'prefix', 'q')
.action((cmd) => {
kue.createQueue({
redis: config,
prefix: cmd.prefix
})
kue.app.listen(cmd.port)
});
program
.on('command:*', () => {
console.error('Invalid command: %s\nSee --help for a list of available commands.', program.args.join(' '));
process.exit(1);
});
program
.parse(process.argv)
process.on('unhandledRejection', (reason, p) => {
console.error(`Unhandled Rejection at: Promise ${p}, reason: ${reason}`)
// application specific logging, throwing an error, or other logic here
})
process.on('uncaughtException', (exception) => {
console.error(exception) // to see your exception details in the console
// if you are on production, maybe you can send the exception details to your
// email as well ?
})
| {
"pile_set_name": "Github"
} | 0.012217 | [
{
"begin": 0,
"end": 37,
"score": 0.0056574075
},
{
"begin": 37,
"end": 76,
"score": 0.004425273
},
{
"begin": 76,
"end": 103,
"score": 0.0052409116
},
{
"begin": 103,
"end": 112,
"score": 0.0131890485
},
{
"begin": 112,
"end": 136,
"score": 0.009440582
},
{
"begin": 136,
"end": 210,
"score": 0.012217224
},
{
"begin": 210,
"end": 259,
"score": 0.004650875
},
{
"begin": 259,
"end": 280,
"score": 0.013258465
},
{
"begin": 280,
"end": 302,
"score": 0.011037151
},
{
"begin": 302,
"end": 1030,
"score": 0.02792408
}
] |
Q:
Are supersets an effective way to gain size?
Following is my Chest and Back split:
3 supersets of flat barbell bench press/flat dumbbell flyes (10-12
Reps)
3 supersets of incline barbell bench press/decline dumbbell flyes (7-9
Reps)
3 supersets of decline barbell bench press/incline dumbbell flyes (6-8
Reps)
Then I follow this up with 9 sets of a Back workout (No supersets
involved).
Personally, I love this routine because I get a good chest pump and my triceps and shoulders engage a lot as well (Probably exhausted to failure after the last set of the chest workout). However, my question is, would supersets be efficient as compared to doing all these exercises in isolation when the underlying goal is to gain size?
A:
Considering your goals to increase size, supersets are not as efficient in comparison to doing these exercises in isolation. During the execution of a superset, each previous set makes significant in-roads into your ability to perform the next set in sequence as optimally as without. Given all other things being equal, the increase in the cross-sectional size of a muscle is proportional to the increase in its ability to resist more weight. If you were to split the proposed superset exercises across multiple days, your ability to lift more weight on all the exercises would increase significantly, allowing for greater levels of hypertrophy.
| {
"pile_set_name": "StackExchange"
} | 0.03462 | [
{
"begin": 0,
"end": 49,
"score": 0.012564304
},
{
"begin": 49,
"end": 88,
"score": 0.12695669
},
{
"begin": 88,
"end": 156,
"score": 0.06971766
},
{
"begin": 156,
"end": 164,
"score": 0.051737156
},
{
"begin": 164,
"end": 235,
"score": 0.032731086
},
{
"begin": 235,
"end": 243,
"score": 0.051737156
},
{
"begin": 243,
"end": 314,
"score": 0.036508016
},
{
"begin": 314,
"end": 322,
"score": 0.051737156
},
{
"begin": 322,
"end": 388,
"score": 0.0186035
},
{
"begin": 388,
"end": 1392,
"score": 0.039598234
}
] |
Q:
What's the difference between this two classic expected value problems?
I was weak at probability / statistic related stuff and was trying to learn the basics online.
Somehow I came across two similar problems, which I thought both can be solved with the same concept (and should have same answer) but turns out it is not.
The first question is: Expected Value of Flips Until HT Consecutively
As @Aditya's answer shown, the answer to this question is 4.
The second question is as followed:
When flipping a fair coin repeatedly, what is the expected value of
the number of trials needed to get two tails in a row?
And the solution I know is
Let $E_n$ be the expected # of flips to have $n$ tails in a row.
Then $$E_n = \frac{1}{2}(E_{n-1} + 1) + \frac{1}{2}(E_{n-1} + 1 + E_n)$$
which implies $$E_n = 2E_{n-1} + 2$$
By the fact that $$E_1 = 2$$ We can conclude that the answer is $$E_2 = 2*2+2 = 6$$
I think I am confused but what exactly is the difference between this two questions?
In other words, why can't I use the same method for the first question for finding $E_{HT}$ to find $E_{TT}$ (vice versa)? Similarly, does that mean that $E_{HT}, E_{TT}, E_{HH}, E_{TH}$ are having different values? (Intuitively I thought they are the same...)
A:
The situation in which they are the same is slightly different from the situation you are considering. They would be the same if you did the following: flip two coins. If you got HT (resp. TT), stop and count the number of times you've done the experiment. Otherwise repeat. That's because for (ordered) pairs of flips, HT and TT are equally likely. Notice that in this scenario the total number of trials is on average $4$, so the total number of flips is on average $8$.
But you're not doing that. You're flipping coins one at a time and keeping track of the whole sequence so far. This changes matters. Specifically, if you are waiting for HT, once you have gotten an H, you are only waiting for the next T, because flipping another H just returns you back to waiting for a T. By contrast, if you are waiting for TT, once you have gotten a T, getting an H causes you to have to wait for an entire TT sequence again.
You might think about this in terms of a Markov chain with a transition diagram. In the HT case, we can take our states to be "just had a head", "just had a tails", and "done", in which case the transition matrix looks like:
$$P_{HT}=\begin{bmatrix} 1/2 & 0 & 1/2 \\ 1/2 & 1/2 & 0 \\ 0 & 0 & 1 \end{bmatrix}$$
and the expected number of flips is $1$ plus the expected time to hit state $3$ under the initial distribution $\begin{bmatrix} 1/2 & 1/2 & 0 \end{bmatrix}$.
In the TT case we instead have:
$$\begin{bmatrix} 1/2 & 1/2 & 0 \\ 1/2 & 0 & 1/2 \\ 0 & 0 & 1 \end{bmatrix}$$
and again the expected number of flips is $1$ plus the expected time to hit state $3$ under the initial distribution $\begin{bmatrix} 1/2 & 1/2 & 0 \end{bmatrix}$. Try drawing these transition diagrams to get a feel for what's going on.
| {
"pile_set_name": "StackExchange"
} | 0.03462 | [
{
"begin": 0,
"end": 76,
"score": 0.021380141
},
{
"begin": 76,
"end": 172,
"score": 0.06412373
},
{
"begin": 172,
"end": 328,
"score": 0.015896274
},
{
"begin": 328,
"end": 399,
"score": 0.029125832
},
{
"begin": 399,
"end": 460,
"score": 0.007496933
},
{
"begin": 460,
"end": 497,
"score": 0.0186035
},
{
"begin": 497,
"end": 566,
"score": 0.049898956
},
{
"begin": 566,
"end": 623,
"score": 0.08850401
},
{
"begin": 623,
"end": 651,
"score": 0.019852988
},
{
"begin": 651,
"end": 3001,
"score": 0.035306264
}
] |
This linebacker is hoping to land a Hurricane scholarship offer. And, if things go the way he hopes, his tape of the first few games this season will let him do that. And he plans to be a Cane if that happens. | {
"pile_set_name": "Pile-CC"
} | 0.100855 | [
{
"begin": 0,
"end": 65,
"score": 0.03994159
},
{
"begin": 65,
"end": 167,
"score": 0.014438537
},
{
"begin": 167,
"end": 209,
"score": 0.19936113
}
] |
Hi,
My name is Carlos and I'm trying to get familiar with linux. I decided that I wanted to try ubuntu since my friend had and recommended it to me. I tried to install it in a dell xps, everything goes smooth until is time to finish the user information step. When the install get there, and I type the information, it doesn't let me go forward. I thought it was the iso, so I downloaded it again and burned it again, but the problem persist. If anyone have had this issue before and can shed some light into it, don't hesitate in reply.
Hippytaff
April 5th, 2011, 01:20 PM
Are you using capitals or oher characters ($% etc). linux doesn't like capitals for usernames as far as I am aware. | {
"pile_set_name": "Pile-CC"
} | 0.06772 | [
{
"begin": 0,
"end": 65,
"score": 0.013466713
},
{
"begin": 65,
"end": 149,
"score": 0.016035106
},
{
"begin": 149,
"end": 260,
"score": 0.019436494
},
{
"begin": 260,
"end": 346,
"score": 0.015340946
},
{
"begin": 346,
"end": 443,
"score": 0.09065199
},
{
"begin": 443,
"end": 538,
"score": 0.021102477
},
{
"begin": 538,
"end": 549,
"score": 0.05493369
},
{
"begin": 549,
"end": 576,
"score": 0.010412407
},
{
"begin": 576,
"end": 692,
"score": 0.033761155
}
] |
Subsets and Splits