text
stringlengths 1
20.5k
| meta
dict | score
float64 0
0.99
| span_scores
list |
---|---|---|---|
1. Field of the Invention
This invention relates to a molded article, the method for manufacturing the same and the dies therefor. More particularly, this invention relates to an ornamental molded article composed of two synthetic resinous layers, and a nonwoven fabric layer with a multi-colored pattern which lies between the two synthetic resinous layers and the method and dies employed in its manufacture.
The molded article provided by this invention shows an outer appearance of marble, granite, graining or other desirable patterns of colors, and can be employed for every utility to which conventional synthetic resinous material for structure have been employed, for example, building materials, e.g., case slabs, panels, units such as a desk, a table, a washing stand, a sink or a bathtub or the like, and miscellaneous goods in which natural stones such as marbles or granite or artificial stones are used.
2. Description of the Prior Art
Hitherto, various artificial stones such as artificial marbles have been known and available commercially. These artificial marbles are composed of a thin and transparent resinous layer of so-called gel-coating as a covering which covers a basic layer with a pattern of marble. The coating compensates for the lack of resistance to chemicals, of the basic layer while providing a gloss and hardness on the surface to the basic layer. The basic layer of the conventional artificial marbles comprises resins, fillers and pigments, and their marble patterns are given by utilizing a difference in fluidity of each component in the basic layer. However, one needs a high skill in technique to repeatedly produce an artificial marble having an uniform pattern and quality, because the marble pattern in this technique is changeable according to a slight difference in mixing ratio of each component, to the degree of mixing and the speed of molding of the composition for the basic layer, and other conditions which affect fluidity of the composition. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.02263 | [
{
"begin": 0,
"end": 26,
"score": 0.01263372
},
{
"begin": 26,
"end": 131,
"score": 0.08581903
},
{
"begin": 131,
"end": 411,
"score": 0.02054715
},
{
"begin": 411,
"end": 919,
"score": 0.012841969
},
{
"begin": 919,
"end": 951,
"score": 0.007670473
},
{
"begin": 951,
"end": 1058,
"score": 0.014785618
},
{
"begin": 1058,
"end": 1229,
"score": 0.017701091
},
{
"begin": 1229,
"end": 1385,
"score": 0.022074303
},
{
"begin": 1385,
"end": 1592,
"score": 0.014091457
},
{
"begin": 1592,
"end": 1997,
"score": 0.012008976
}
] |
Q:
Returning and Summing the Odd Numbers of an Array
I'm trying to add all the odd numbers in an array and return it. Any thoughts on what I'm doing wrong?
Example:
Input:
Array- [12,6,7,15,1]
It would return 23
public static int sumOdds(int[] numbers) {
sum = 0;
for(int i = 0; i < numbers.length; i++) {
if (numbers%2==0)
return 0;
else (numbers[i] % 2 != 0) {
sum += numbers;
return sumOdds;
}
}
A:
public static int sumOdds(int[] numbers) {
int sum = 0;
for(int i = 0; i < numbers.length; i++) {
if(numbers[i] % 2 != 0) {
sum += numbers[i];
}
}
return sum;
}
This should work. return statements should not be within your if and else statements, as they will end the execution of the program immediately.
| {
"pile_set_name": "StackExchange"
} | 0.024147 | [
{
"begin": 0,
"end": 54,
"score": 0.0121478075
},
{
"begin": 54,
"end": 120,
"score": 0.017145762
},
{
"begin": 120,
"end": 158,
"score": 0.037194733
},
{
"begin": 158,
"end": 167,
"score": 0.012078391
},
{
"begin": 167,
"end": 174,
"score": 0.017562259
},
{
"begin": 174,
"end": 195,
"score": 0.010759487
},
{
"begin": 195,
"end": 214,
"score": 0.010967735
},
{
"begin": 214,
"end": 258,
"score": 0.014716201
},
{
"begin": 258,
"end": 279,
"score": 0.009371166
},
{
"begin": 279,
"end": 923,
"score": 0.008260509
}
] |
Effects of metastasectomy and other factors on survival of patients with ovarian metastases from gastric cancer: a systematic review and meta-analysis.
Ovarian metastasis from gastric cancer (Krukenberg tumor [KT]) has no consensus treatment and the role of surgical treatment is still controversial. Identifying prognostic factors for KT could help guide the management of this tumor. We used a meta-analysis to evaluate the prognostic value of metastasectomy and other factors in patients with KT to develop a treatment plan. We searched literature in PubMed, Cochrane library and EMBASE. We analyzed hazard ratios (HR) and 95% confidence intervals (CI) with respect to overall survival (OS). The meta-analysis included 12 cohort studies with 1,031 patients associated with longer OS following metastasectomy (HR = 0.41; 95% CI = 0.32-0.53; P < 0.001), R0 resection (HR = 0.37; 95% CI = 0.26-0.53; P < 0.001), metachronous ovarian metastasis (HR = 0.74; 95% CI = 0.58-0.93; P = 0.012), size of KT (<5 cm) (HR = 0.74; 95% CI = 0.58-0.95; P = 0.019), ECOG PS (Eastern Cooperative Oncology Group performance status) 0 to 1 (HR = 0.48; 95% CI = 0.29-0.80; P = 0.004), tumor confined to ovary (HR = 0.40; 95% CI = 0.16-0.99; P = 0.047), and tumor confined to pelvic cavity (HR = 0.36; 95% CI = 0.14-0.92; P = 0.033). Shorter OS was associated with peritoneal carcinomatosis (HR = 2.00; 95% CI = 1.25-3.21; P = 0.004), ascites (HR = 1.66; 95% CI = 1.19-2.31; P = 0.003) and positive CEA (HR = 1.41; 95% CI = 1.10-1.82; P = 0.007). Gastrectomy led to a slight improvement in OS, but without statistical significance (HR = 0.69; 95% CI = 0.47-1.02; P = 0.061). No significant difference in OS was observed in patients with signet-ring cells (HR = 1.17; 95% CI = 0.91-1.51; P = 0.226), bilateral ovarian metastasis (HR = 0.87; 95% CI = 0.70-1.08; P = 0.212), age ≥ 50 years (HR = 0.93; 95% CI = 0.71-1.22; P = 0.619), positive CA19-9 (HR = 1.01; 95% CI = 0.75-1.35; P = 0.960), and positive CA-125 (HR = 0.98; 95% CI = 0.73-1.33; P = 0.915). Various factors affect OS in patients with KT. | {
"pile_set_name": "PubMed Abstracts"
} | 0.020269 | [
{
"begin": 0,
"end": 152,
"score": 0.010690071
},
{
"begin": 152,
"end": 301,
"score": 0.031014297
},
{
"begin": 301,
"end": 386,
"score": 0.019019997
},
{
"begin": 386,
"end": 528,
"score": 0.008711713
},
{
"begin": 528,
"end": 591,
"score": 0.0070110206
},
{
"begin": 591,
"end": 695,
"score": 0.0051714955
},
{
"begin": 695,
"end": 1205,
"score": 0.000016269385
},
{
"begin": 1205,
"end": 1314,
"score": 0.028954152
},
{
"begin": 1314,
"end": 1527,
"score": 0.010828903
},
{
"begin": 1527,
"end": 2081,
"score": 0.0041649626
}
] |
Q:
log4net filepath is empty
Config of my log4net:
<log4net>
<appender name="ItemsChangeLogFileAppender" type="log4net.Appender.SitecoreLogFileAppender, Sitecore.Logging">
<file value="\logs\ItemChangeLogs\itemLog.{date}.txt"/>
<appendToFile value="true"/>
<layout type="log4net.Layout.PatternLayout">
<conversionPattern value="%d %m%n"/>
</layout>
</appender>
<root>
<priority value="ALL"/>
<appender-ref ref="ItemsChangeLogFileAppender"/>
</root>
<logger name="ItemsChangeLogger">
<level value="ALL"/>
<appender-ref ref="ItemsChangeLogFileAppender"/>
</logger>
class:
public class LogEvents
{
private static readonly ILog log = LogManager.GetLogger("ItemsChangeLogger");
public LogEvents()
{
XmlConfigurator.Configure();
log.Info("Some message");
}
public void Test(object sender, EventArgs args)
{
log.Info("Test");
}
}
I want to read my logs but don't find my file.
In some question (here) I use answer but filepath is empty. How to solve this problem?
A:
You have to read your configuration:
log4net.Config.XmlConfigurator.Configure("log4net.config");
This assumes the name of you configuration file is log4net.xml. The log4net.xml file has to be in your bin directory.
The \logs\ItemChangeLogs folder must exist on your file system. I would change that to something like: c:\logs\ItemChangeLogs, so you know log4net will find the dir on your c drive, instead of an other drive.
log4net configuration documentation
I normally configure log4net using an attribute in the assembly.cs file like:
// Configure log4net using the .config file
[assembly: log4net.Config.XmlConfigurator(Watch=true)]
// This will cause log4net to look for a configuration file
// called TestApp.exe.config in the application base
// directory (i.e. the directory containing TestApp.exe)
// The config file will be watched for changes.
| {
"pile_set_name": "StackExchange"
} | 0.012495 | [
{
"begin": 0,
"end": 30,
"score": 0.007739889
},
{
"begin": 30,
"end": 53,
"score": 0.015826859
},
{
"begin": 53,
"end": 63,
"score": 0.009509998
},
{
"begin": 63,
"end": 174,
"score": 0.0050326632
},
{
"begin": 174,
"end": 232,
"score": 0.0055532837
},
{
"begin": 232,
"end": 263,
"score": 0.0056921155
},
{
"begin": 263,
"end": 310,
"score": 0.007392809
},
{
"begin": 310,
"end": 351,
"score": 0.0072886846
},
{
"begin": 351,
"end": 363,
"score": 0.011800728
},
{
"begin": 363,
"end": 1908,
"score": 0.010551238
}
] |
Their outlook is solely shaped by military considerations, looking at the world through soldiers' eyes. But their nationalist xenophobia also has its roots in the style and superstitions of General Ne Win, the country's first military dictator.
He seized power in a coup in 1962 and the military have ruled ever since.
Reclusive and eccentric, Ne Win shunned contact with the outside world, turning the country then known as Burma into the hermit of Asia.
The first few years of his rule saw pogroms against the Chinese and Indian communities, forcing tens of thousands to flee the country. He also banned the teaching of English in the schools.
Fear
"Burma's military regime is extraordinarily xenophobic," says Sean Turnell, a Myanmar expert at Australia's MacquarieUniversity. "They are afraid of everything."
For years the generals' greatest fear has been that the US planned a strategic strike against them.
To prepare for that, they have built a rabbit-warren of bunkers around their new capital, Naypyidaw, in the hills some 400 kilometres north of Yangon.
They moved the seat of government and the military headquarters to the remote, purpose-built city abruptly in November 2005. Thousands of civil servants were only give a few hours' notice to pack up and move.
Myanmar's government says it wants international aid but not aid workers [AFP]
During the mass pro-democracy demonstrations in August 1988, which brought the country to a stand still for months, they feared a US invasion when ships of the US Pacific fleet moored off the country's southern coast.
Then they turned to Beijing for protection and today China remains Myanmar's most-important diplomatic ally.
The regime is also highly suspicious of the UN and other international aid agencies, fearing they are in cahoots with the West and only want to whip up opposition to military rule inside the country.
Even before the current cyclone disaster hit Myanmar, international aid workers found it hard to travel around the country and visit development projects.
Rejected
Last year the government expelled the United Nation's top representative in the country, Charles Petrie, on the grounds that he was interfering with government policy.
"We must get rid of all the white faces," Senior General Than Shwe told his cabinet several times, according to reliable military sources.
Since then the government has refused to accept several Western nominees as head of UN agencies.
Senior General Than Shwe heads Myanmar's reclusive military government [Reuters]
An American candidate was rejected last year as head of the United Nations High Commission for Refugees while two western nominees to replace the ousted UN representative were also recently turned down. Both posts have since been filled by an Asian from a developing country.
The restrictions on aid workers' movements are in part because the military regime fears that they will be gathering intelligence that might be used to undermine the government, but also because of the generals' paranoid obsession with being in total control of everything.
Given this mindset, there is no prospect the military regime will allow foreign aid workers to flood into the country, let alone allow foreign troops to enter.
"They're afraid that if foreign soldiers come in, they are the spearhead to overthrow the government," says Josef Silverstein, a retired RutgersUniversity professor and Myanmar expert.
From the generals' perspective, he says, "aid workers could be carrying weapons to give to the people, they could give them ideas of how to overthrow the government."
Subversive
The families of Myanmar's ruling generals enjoy a lavish lifestyle
For decades, the ruling military regimes have kept Myanmar isolated, fearing that opening the country up would impact both its businesses and culture, and still worse, foster subversive thoughts like freedom of speech and democracy.
Even tourists were not allowed access to the country until the 1970s, when visitors were given a strict, seven-day visa.
This changed a decade ago, when the lure of foreign currency spurred a relaxation of the rules. Nonetheless, all visitors are closely controlled and constantly monitored by military intelligence officers.
Meanwhile, there has been an almost total ban on journalists, with authorities granting media visas only for largely meaningless army-arranged ceremonies.
The generals' paranoia and distrust extends to all civilians – they believe that only the army has the ability to unite the country and protect it from foreign invaders.
From their perspective, only the military represents the nation as a whole, not the factional interests of political parties or business people.
Intimidation
The irony is, of course, that they have divided the country as never before – political parties are effectively banned, more than 2,000 political prisoners are languishing in jail, there is strict censorship of the press and the people are beaten into submission through a concerted campaign of harassment and intimidation.
Last year they alienated the country's revered Buddhist monks after they brutally cracked down on the saffron-led protests against rising food prices.
In the end, the real issue is one of control – the military government understands that it must remain united or perish.
Their greatest fear now is losing control, losing their wealth, and facing Nuremberg-style trials from a future civilian government bringing them to account.
The current military rulers, especially General Than Shwe and his family, have amassed vast fortunes through corruption and nepotism.
Little wonder then that, despite the overwhelming suffering caused by Cyclone Nargis, the generals seem so anxious to press ahead with their referendum and institutionalise their power. | {
"pile_set_name": "Pile-CC"
} | 0.206696 | [
{
"begin": 0,
"end": 104,
"score": 0.022351967
},
{
"begin": 104,
"end": 245,
"score": 0.2712817
},
{
"begin": 245,
"end": 320,
"score": 0.024147147
},
{
"begin": 320,
"end": 458,
"score": 0.17173064
},
{
"begin": 458,
"end": 594,
"score": 0.15159425
},
{
"begin": 594,
"end": 649,
"score": 0.028954152
},
{
"begin": 649,
"end": 655,
"score": 0.13969667
},
{
"begin": 655,
"end": 785,
"score": 0.2712817
},
{
"begin": 785,
"end": 818,
"score": 0.04234509
},
{
"begin": 818,
"end": 5821,
"score": 0.119872786
}
] |
Education Research: Physician identification and patient satisfaction on an academic neurology inpatient service.
To determine the relationship between neurology inpatient satisfaction and (1) number of physicians involved in the patient's care and (2) patients' ability to identify their physicians. A 10-item questionnaire addressing patient satisfaction and identification of physicians on the care team was administered to patients admitted to an academic, tertiary care, inpatient neurology service from May 1 to October 31, 2012. We hypothesized higher satisfaction among patients having fewer physicians on the care team and among patients able to identify their physicians. A total of 652 patients were enrolled. An average of 3.9 (range 3-8) physicians were involved in each patient's care. Patients were able to correctly identify on average 2.4 (60.7%) physicians involved in their care. Patients who were very satisfied correctly identified a larger percentage of physicians involved in their care (63.8% vs 50.7%, p < 0.001), were more likely to identify a physician who knew them best (94.3% vs 43.6%, p < 0.001) and who was "in charge" of their care (94.1% vs 57.6%, p < 0.001), and were more likely to have private insurance (82.8% vs 70.5%, p < 0.001) and fewer physicians involved in their care (3.84 vs 4.06, p = 0.02). Neurology inpatients' ability to identify physicians involved in their care is associated with patient satisfaction. Strategies to enhance patient satisfaction might target improving physician identification, reducing actual or perceived disparities in care based on payer status, and reducing handoffs or conducting handoffs at the bedside. | {
"pile_set_name": "PubMed Abstracts"
} | 0.005623 | [
{
"begin": 0,
"end": 114,
"score": 0.0020824813
},
{
"begin": 114,
"end": 301,
"score": 0.010481823
},
{
"begin": 301,
"end": 536,
"score": 0.009718247
},
{
"begin": 536,
"end": 682,
"score": 0.010551238
},
{
"begin": 682,
"end": 721,
"score": 0.016035106
},
{
"begin": 721,
"end": 800,
"score": 0.006212736
},
{
"begin": 800,
"end": 899,
"score": 0.007184561
},
{
"begin": 899,
"end": 1339,
"score": 0.0066986484
},
{
"begin": 1339,
"end": 1456,
"score": 0.009093502
},
{
"begin": 1456,
"end": 1680,
"score": 0.001631277
}
] |
Rutger Bregman became a social media sensation after his onstage tirade at the gathered elite in Davos this year. His call for higher taxes, open borders and a shorter working week captured the imaginations of millions who viewed the speech online. But can his utopian ideas be translated into realistic policy changes? Plus: J Oliver Conroy on David Buckel, a year on from the climate protester’s death in New York
When the Dutch historian Rutger Bregman went on stage at a World Economic Forum event in Davos this year it was as a relatively obscure author. He used his appearance to call for a proper discussion of tax and launched a tirade against what he saw as hypocritical discussions about inequality.
Bregman’s angry outburst quickly went viral, with the video being watched tens of millions of times, on the back of which he made a series of media appearances in which he continued to enhance his reputation for blunt speaking.
He tells Anushka Asthana about the ideas in his book Utopia for Realists, including a universal basic income, a 15-hour working week and open international borders.
Also today, the journalist J Oliver Conroy reflects on the first anniversary of the death of the environmental campaigner David Buckel. | {
"pile_set_name": "OpenWebText2"
} | 0.090652 | [
{
"begin": 0,
"end": 114,
"score": 0.03599298
},
{
"begin": 114,
"end": 249,
"score": 0.019436494
},
{
"begin": 249,
"end": 320,
"score": 0.018325835
},
{
"begin": 320,
"end": 416,
"score": 0.030155903
},
{
"begin": 416,
"end": 561,
"score": 0.06492286
},
{
"begin": 561,
"end": 711,
"score": 0.4151741
},
{
"begin": 711,
"end": 940,
"score": 0.13082063
},
{
"begin": 940,
"end": 1106,
"score": 0.007982845
},
{
"begin": 1106,
"end": 1244,
"score": 0.014507953
}
] |
Meatpacking’s French restaurant Bagatelle played host to Gotham Magazine’s celebration of their Fall Fashion Issue with cover stars Paul Giamatti and Maggie Siff. The Showtime stars of Billions were joined by Gotham magazine’s Editor-in Chief Samantha Yanks as well as Billions’ cast mates Toby Leonard Moore and Condola Rashad. The private affair brought VIPs and social influencers out to toast the cover stars while sipping Moet & Chandon champagne and Belvedere Vodka cocktails.
Toby Leonard Moore, Condola Rashad, Maggie Siff and Paul Giamatti
Giamatti plays U.S Attorney Chuck Rhoades who is determined to take down a hedge fund kingpin, who also employs his wife, Wendy Rhoades, played by Siff. The opening of the Season premiere of Billions was rather intense, with Giamatti gagged and bound, submissive to his dominatrix wife, Siff. And the end of Season 1 has us only guessing what’s in store for the Rhoades’. Inside the feature, Ménage A Deaux, Giamatti discussed the interesting dynamic of Chuck and Wendy’s relationship on the show: “They’re two incredibly smart people who are almost too well matched in some weird way. They both love power, they play off each other’s intensity, and they both hunger for success. We’ve dropped into their relationship near the end of something rather than the beginning, though I do think it was loving at one point. It’s a portrait of people hitting a bad spot in a marriage. How they’re going to work it out, I don’t know. But it is certainly a helluva lot of fun to play.”
The Ménage A Deaux feature was taken at the Bathhouse Studios in New York and highlights Maggie Siff in a gold lace Roberto Cavalli dress, and a Dolce & Gabbana black lace gown. Giamatti is clad in a Joseph Abboud tuxedo coat, shirt and trousers, and in a Dolce and Gabbana tuxedo and shirt. Billions’ Season 2 will premiere February 19 on Showtime. | {
"pile_set_name": "Pile-CC"
} | 0.063325 | [
{
"begin": 0,
"end": 163,
"score": 0.014993866
},
{
"begin": 163,
"end": 329,
"score": 0.020130653
},
{
"begin": 329,
"end": 483,
"score": 0.05493369
},
{
"begin": 483,
"end": 550,
"score": 0.010759487
},
{
"begin": 550,
"end": 704,
"score": 0.051737156
},
{
"begin": 704,
"end": 844,
"score": 0.16035037
},
{
"begin": 844,
"end": 923,
"score": 0.02929751
},
{
"begin": 923,
"end": 1137,
"score": 0.0053797434
},
{
"begin": 1137,
"end": 1231,
"score": 0.08850401
},
{
"begin": 1231,
"end": 1877,
"score": 0.037881445
}
] |
Q:
how to connect between bootstrap ui modal input to html page with angular
I have two pages of html. one is the main page and the other is the modal page.
I use one angular app to connect between them. I get input in the modal page and i want to show it in the main page. i don't know how to do it, although I think it might work with service.
the main page:
<!doctype html>
<html ng-app="ui.bootstrap.demo">
<head>
<script src="//ajax.googleapis.com/ajax/libs/angularjs/1.4.3/angular.js"></script>
<script src="//ajax.googleapis.com/ajax/libs/angularjs/1.4.3/angular-animate.js"></script>
<script src="//angular-ui.github.io/bootstrap/ui-bootstrap-tpls-0.13.3.js"></script>
<script src="app.js"></script>
<link href="//netdna.bootstrapcdn.com/bootstrap/3.1.1/css/bootstrap.min.css" rel="stylesheet">
</head>
<body>
<div ng-controller="ModalDemoCtrl">
<button type="button" class="btn btn-default" ng-click="open()">Open me!</button>
<table ng-controller="tableCtrl">
<thead>
<th class="col-lg-3">Username</th>
<th class="col-lg-3">Password</th>
<th class="col-lg-3">First name</th>
<th class="col-lg-3">Last name</th>
</thead>
<tbody>
<tr ng-repeat="User in Users">
<td class="col-lg-3">{{User.userN}}</td>
<td class="col-lg-3">{{User.PassW}}</td>
<td class="col-lg-3">{{User.Name}}</td>
<td class="col-lg-3">{{User.LastName}}</td>
</tr>
</tbody>
</table>
</div>
</body>
</html>
the modal page :
<!DOCTYPE html>
<html lang="en">
<head>
<script src="//ajax.googleapis.com/ajax/libs/angularjs/1.4.3/angular.js"></script>
<script src="//ajax.googleapis.com/ajax/libs/angularjs/1.4.3/angular-animate.js"></script>
<script src="//angular-ui.github.io/bootstrap/ui-bootstrap-tpls-0.13.3.js"></script>
<script src="app.js"></script>
<link href="vandors/bootstrap-3.3.5-dist/css/bootstrap.min.css" rel="stylesheet">
<meta charset="UTF-8">
<title></title>
</head>
<body>
<form ng-app="ui.bootstrap.demo" ng-controller="ModalDemoCtrl" ng-submit="ok()">
<div class="modal-header">
<h3>users</h3>
</div>
<div class="modal-body">
<div class="panel-body">
<div class="form-group">
<label>Username : </label>
<input type="text" placeholder="Ariel73" ng-model="userN">
</div>
<div class="form-group">
<label>Password : </label>
<input type="text" placeholder="Aa123456" ng-model="PassW">
</div>
<div class="form-group">
<label>First name : </label>
<input type="text" placeholder="Ariel" ng-model="Name">
</div>
<div class="form-group">
<label>Last name : </label>
<input type="text" placeholder="Livshits" ng-model="LastName">
</div>
</div>
<div class="modal-footer">
<button type="submit" class="btn btn-success">submit</button>
</div>
</div>
</form>
</body>
</html>
the app page :
app = angular.module('ui.bootstrap.demo', ['ngAnimate', 'ui.bootstrap']);
app.controller('ModalDemoCtrl', function ($scope, $modal) {
$scope.open = function () {
var modalInstance = $modal.open({
templateUrl: 'table.html',
controller: 'ModalInstanceCtrl',
});
};
});
// Please note that $modalInstance represents a modal window (instance) dependency.
// It is not the same as the $modal service used above.
angular.module('ui.bootstrap.demo').controller('ModalInstanceCtrl', function ($scope, $modalInstance) {
$scope.ok = function () {
$modalInstance.close($scope);
};
$scope.cancel = function () {
$modalInstance.dismiss('cancel');
};
});
app.controller('tableCtrl',function($scope){
$scope.Users = [
{'userN' : 'Ariel', 'PassW' : 'Aa123456', 'Name' : 'Ariel', 'LastName' : 'Livshits'},
{'userN' : 'Ariel', 'PassW' : 'Aa123456', 'Name' : 'Ariel', 'LastName' : 'Livshits'},
{'userN' : 'Ariel', 'PassW' : 'Aa123456', 'Name' : 'Ariel', 'LastName' : 'Livshits'}
];
$scope.addRow = function () {
$scope.Users.push({'userN' : $scope.userN, 'PassW' : $scope.PassW, 'Name' : $scope.Name, 'LastName' : $scope.LastName});
$scope.userN = '';
$scope.PassW = '';
$scope.Name = '';
$scope.LastName = '';
}
});
A:
Angular is used with Single Page Applicaton layout, it seems that must only exists a single page for application (ng-app) and it may use multiple partials or templates.
Usually the main page contais the web layout (header, navbar, content, footer) and with the templates switch the content according to the current state (managed by the url)
In your example the main page will be the "single page" and the modal will be s partial/template. This template could be request to the server as response of table.html or defined as a template within the main page using <script type='text/ng-template' id='table.html'>.
app = angular.module('ui.bootstrap.demo', ['ngAnimate', 'ui.bootstrap']);
app.controller('AppCtrl', function($scope, $modal, $log) {
$scope.Users = [{
'userN': 'Ariel',
'PassW': 'Aa123456',
'Name': 'Ariel',
'LastName': 'Livshits'
}, {
'userN': 'Ariel',
'PassW': 'Aa123456',
'Name': 'Ariel',
'LastName': 'Livshits'
}, {
'userN': 'Ariel',
'PassW': 'Aa123456',
'Name': 'Ariel',
'LastName': 'Livshits'
}];
$scope.open = function() {
var modalInstance = $modal.open({
templateUrl: 'table.html',
controller: 'ModalInstanceCtrl'
});
modalInstance.result.then(function(newUser) {
$scope.Users.push(newUser);
}, function() {
$log.info('Modal dismissed at: ' + new Date());
});
};
});
// Please note that $modalInstance represents a modal window (instance) dependency.
// It is not the same as the $modal service used above.
app.controller('ModalInstanceCtrl', function($scope, $modalInstance) {
$scope.ok = function() {
$modalInstance.close({
'userN': $scope.userN,
'PassW': $scope.PassW,
'Name': $scope.Name,
'LastName': $scope.LastName
});
};
$scope.cancel = function() {
$modalInstance.dismiss('cancel');
};
});
<!doctype html>
<html ng-app="ui.bootstrap.demo">
<head>
<script src="//ajax.googleapis.com/ajax/libs/angularjs/1.4.3/angular.js"></script>
<script src="//ajax.googleapis.com/ajax/libs/angularjs/1.4.3/angular-animate.js"></script>
<script src="//angular-ui.github.io/bootstrap/ui-bootstrap-tpls-0.13.3.js"></script>
<script src="app.js"></script>
<link href="//netdna.bootstrapcdn.com/bootstrap/3.1.1/css/bootstrap.min.css" rel="stylesheet">
</head>
<body>
<div ng-controller="AppCtrl">
<button type="button" class="btn btn-default" ng-click="open()">Open me!</button>
<table>
<thead>
<th class="col-lg-3">Username</th>
<th class="col-lg-3">Password</th>
<th class="col-lg-3">First name</th>
<th class="col-lg-3">Last name</th>
</thead>
<tbody>
<tr ng-repeat="User in Users">
<td class="col-lg-3">{{User.userN}}</td>
<td class="col-lg-3">{{User.PassW}}</td>
<td class="col-lg-3">{{User.Name}}</td>
<td class="col-lg-3">{{User.LastName}}</td>
</tr>
</tbody>
</table>
</div>
<script type="text/ng-template" id="table.html">
<form ng-submit="ok()">
<div class="modal-header" >
<h3>users</h3>
</div>
<div class="modal-body">
<div class="panel-body">
<div class="form-group">
<label>Username :</label>
<input type="text" placeholder="Ariel73" ng-model="userN">
</div>
<div class="form-group">
<label>Password :</label>
<input type="text" placeholder="Aa123456" ng-model="PassW">
</div>
<div class="form-group">
<label>First name :</label>
<input type="text" placeholder="Ariel" ng-model="Name">
</div>
<div class="form-group">
<label>Last name :</label>
<input type="text" placeholder="Livshits" ng-model="LastName">
</div>
</div>
<div class="modal-footer">
<button type="submit" class="btn btn-success">Submit</button>
</div>
</div>
</form>
</script>
</body>
</html>
| {
"pile_set_name": "StackExchange"
} | 0.023975 | [
{
"begin": 0,
"end": 78,
"score": 0.011384231
},
{
"begin": 78,
"end": 159,
"score": 0.01263372
},
{
"begin": 159,
"end": 206,
"score": 0.011731312
},
{
"begin": 206,
"end": 348,
"score": 0.01263372
},
{
"begin": 348,
"end": 363,
"score": 0.010551238
},
{
"begin": 363,
"end": 379,
"score": 0.009093502
},
{
"begin": 379,
"end": 413,
"score": 0.0026204558
},
{
"begin": 413,
"end": 420,
"score": 0.019019997
},
{
"begin": 420,
"end": 507,
"score": 0.0051367874
},
{
"begin": 507,
"end": 8831,
"score": 0.007670473
}
] |
Montgomery High School (Montgomery, Texas)
Montgomery High School a high school in unincorporated Montgomery County, Texas, west of the City of Montgomery. A part of the Montgomery Independent School District. It feeds from the town of Montgomery, as well as a large portion of unincorporated Montgomery County, including most of west and south shores of Lake Conroe. In the years of 2013, 2014, and 2015, Montgomery High School was named one of Newsweek's Best schools in America. Montgomery High School offers Dual Credit and Advanced Placement courses for students.
History
The original regional grade school, then called Area Private School, opened in 1850 on what is now the Church Of Christ In Montgomery. After the creation of Montgomery ISD, the first high school opened in 1931 on what is now Montgomery Middle School. The school was moved to a new site in 1967 west of town on Highway 105, where the school still currently stands. A huge increase in local population caused the school to be expanded in 1998 and again in 2005. The 1967 building was razed, and the current school was built at the site. After reaching well above maximum occupancy, a new high school, Lake Creek High School, was built for the district, opening in 2018.
In 2014, the school placed second in the national "lip-dub" competition "Macy’s All School Lip Dub Challenge," winning $15,000. The school was cleared by police in 2016 after a bomb threat. In 2017, it was discovered that the Treasurer of the Belles dance-team had embezzled nearly $15,000 over the past two and a half years as she deposited school checks into her personal account.
In 2019, a hazing assault by members of the school's varsity football team occurred on several younger players, who were "violated in some way with crutches, pool cues, or sports drink bottles." An anonymous tip was reported through the Montgomery ISD bullying tip line a day later, and an investigation was launched by the Montgomery County Sheriff's Office. The County DA recused himself due to personal connections. The students were ultimately given informal probation, and the school forfeited the following football game as a result. A school board member claimed that the investigation had been mishandled and that it had the appearance of a "coverup". A petition calling for Superintendent Beau Rees's immediate resignation garnered nearly 1000 signatures.
Demographics
As of the 2018-2019 school year, MHS had 1773 students enrolled.
78.3% were White
13.5% were Hispanic
3.8% were African American
1.5% were Asian
0.5% were American Indian
0.2% were Pacific Islander
2.3% were part of Two or More races
21.4% of students were Economically Disadvantaged, and 0.5% were English Language Learners.
Academics
At the beginning of each school year, the Texas Education Agency assigns schools a grade based on three different indices: Student Achievement, School Progress, and Closing the Gaps. For each index, schools are classified as "Met Standard" if they receive a grade of at least 60 out of 100. In 2018, Montgomery High School received an overall score of 88 and was classified as "Met Standard." The school received scores of 90 in Student Achievement, 81 in School Progress, and 83 in Closing the Gaps. In addition, the agency also awards schools with "Distinction Designations" if they outperform schools with similar demographics. In 2018, Montgomery High School did not receive any of the seven possible Distinction Designations.
Feeder patterns
The following elementary schools (K-5) feed into Montgomery High School:
Lincoln
Madeley Ranch
Montgomery Elementary
Stewart Creek (partial)
Montgomery Junior High (6-8) is the sole junior high feeder into Montgomery High School.
Notable alumni
Bailie Key, Artistic gymnast and Olympic gold medalist
Kyle Bennett, BMX racer and Olympic gold medalist
Quinton Spears, NFL linebacker
Greg Smith, NFL lineman-turned local county figure
Marcus Reed, NFL lineman
Scott Ross, NFL linebacker
References
External links
Montgomery High School
Montgomery High School Layout PDF
HAR Demographic and School Boundaries Breakdown
Category:High schools in Montgomery County, Texas
Category:Educational institutions established in 1931
Category:Hazing | {
"pile_set_name": "Wikipedia (en)"
} | 0.014161 | [
{
"begin": 0,
"end": 43,
"score": 0.0050673713
},
{
"begin": 43,
"end": 157,
"score": 0.010828903
},
{
"begin": 157,
"end": 211,
"score": 0.0067680646
},
{
"begin": 211,
"end": 369,
"score": 0.016798683
},
{
"begin": 369,
"end": 483,
"score": 0.009648831
},
{
"begin": 483,
"end": 570,
"score": 0.0032104922
},
{
"begin": 570,
"end": 579,
"score": 0.010620655
},
{
"begin": 579,
"end": 714,
"score": 0.010898319
},
{
"begin": 714,
"end": 830,
"score": 0.008086969
},
{
"begin": 830,
"end": 4247,
"score": 0.058130227
}
] |
2011 in Poland
Events during the year 2011 in Poland.
Incumbents
Elections
Bold indicates government parties.
Events
January
1 January – 5 places: Wolbórz, Nowe Brzesko, Pruchnik, Czyżew and Gościno received city rights.
9 January – The nineteenth finale of the Great Orchestra of Christmas Charity.
10 January – A test HD version of TVP1 is launched, named TVP1 HD.
31 January – President of Poland Bronislaw Komorowski signed a law introducing a 35 percent quota for electoral lists.
February
7 February – Warsaw summit of the Weimar Triangle.
19 February – Performance by the famous DJ Armin van Buuren in Poznań.
25 February – Abolition of the Property Commission of the Catholic Church.
March
1 March – The first time Poland celebrated a new national holiday: National Day of Remembrance "Soldiers accursed".
25 March – The Polish Sejm adopted a government proposal declining pension contributions transferred to open pension funds.
April
1 April – Start of the Polish Census 2011.
29 April – The court annulled the Walbrzych presidential election.
May
17 May – Sejm investigative committee for Christopher Olewnik adopted a report on its work.
June
5 June – Rebranding of phone company Era to T-Mobile Poland.
28 June – Lukasz Kaminski sworn in as president of the Institute of National Remembrance.
July
1 July – Poland takes over the Presidency of the Council of the European Union from Hungary for a six-month term.
29 July – Committee for Investigation of National Aviation Accidents of the Polish National Aviation Authority announced a report on the causes of the Smolensk catastrophe on 10 April 2010.
August
1 August – "The Law of 5 January 2011 - Election Code" comes into force.
4 August – The Polish President, Bronislaw Komorowski, officially announces the Parliamentary election date, set for 5 October 2011.
12 August – Four people have been killed and 30 people injured after a train derailed between Warsaw and Katowice in Poland.
18 August – The Gdynia District Court acquitted Adam Darski, the leader of death metal band Behemoth, accused of insulting religious feelings.
September
3 September – Opening of the Polish National Stadium (Earlier called: Stadium of the Decade)
8–9 September – Tenth Jubilee International Ignatius Reimann Festival in Krosnowice.
October
9 October – Polish Parliamentary Elections, 2011.
Unknown date
A Liquefied natural gas (LNG) plant was set up in Swinoujscie.
Deaths
January
2 January – Cezary Kuleszyński, hurdler. (b. 1937)
7 January:
Krzysztof Kolberger, Polish actor. (b. 1950)
Włodzimierz Ławniczak, Polish journalist (b. 1959)
9 January – Jerzy Woźniak, Polish soccer player, Polish representative (b. 1932)
14 January – Zdzisław Szczotkowski, Polish lector (b. 1945)
23 January – Tomasz Wełnicki, Polish journalist, politician (b. 1957)
24 January – Włodzimierz Kłopocki, Polish actor (b. 1934)
25 January – Andrzej Szypulski, Polish screenwriter and novelist (b. 1936)
27 January – Jan Baszkiewicz, Polish lawyer, historian, political scientist (b. 1930)
February
1 February – Stanisław Michalski, Polish actor (b. 1932)
4 February – Janusz Pezda, Polish politician and governor of Jelenia Góra (b. 1943)
6 February:
Jerzy Banaśkiewicz – Polish Catholic cleric, poet (b. 1937)
Magdalena Tesławska – Polish film and theatre costume designer (b. 1945)
9 February:
Andrzej Przybielski, Polish jazz trumpeter (b. 1944)
Janusz Maciejewski, Polish philologist, literary critic (b. 1930)
10 February:
Józef Życiński, Polish Catholic cleric, Archbishop of Lublin (b. 1948)
Antoni Halor, Polish film and theatre director, artist literary (b. 1937)
15 February:
Sławomir Radoń, Polish historian, General Director of State Archives (b. 1957)
Karin Stanek, Polish singer, lead singer of the band Czerwono-Czarni (b. 1946)
21 February – Jerzy Nowosielski, Polish painter, illustrator, set designer (b. 1923)
March
3 March – Irena Kwiatkowska, Polish actor (b. 1912)
4 March – Lucyna Legut, Polish actor (b. 1926)
19 March – Anna Kajtochowa, Polish writer, novelist, journalist (b. 1928)
23 March – Antoni Jurasz, Polish actor (b. 1922)
26 March:
Roman Piętka, Polish neounic priest, Archimandrite (b. 1937)
Paul Baran, American computer scientist of Polish descent (b. 1926)
April
3 April:
Marian Pankowski, Polish writer (b. 1919)
Andrzej Butruk, Polish actor, lector, satirist (b. 1964)
16 April:
Henryk Zomerski, Polish bass guitarist (b. 1942)
Tadeusz Pawlusiak, Polish ski jumper (b. 1946)
18 April – Andrzej Piszczatowski, Polish actor (b. 1945)
20 April – Halina Skibniewska, Polish architect, politician, Deputy Speaker of the Sejm (b. 1921)
25 April – Ryszard Nawrocki, Polish actor (b. 1940)
27 April – Zdzisław Rutecki, Polish speedway, speedway sports coach (b. 1960)
29 April – Waldemar Baszanowski, Polish weightlifter, World and European champion, Olympic champion (b. 1935)
May
12 May – Piotr Żyżelewicz, Polish drummer, member of the teams: Armia, Izrael, Voo Voo and 2Tm2, 3 (b. 1965)
15 May – Krystyna Dmochowska, Polish actor (b. 1956)
17 May – Ewa Szumańska, Polish writer, reporter, satirist (b. 1921)
18 May – Włada Majewska, Polish radio journalist, actress, singer (b. 1911)
25 May:
Edward Żentara, Polish actor (b. 1956)
Marek Nawara, Polish politician (b. 1956)
27 May:
Małgorzata Dydek, Polish basketball player (b. 1974)
Jacek Puchała, Polish surgeon (b. 1956)
29 May – Krystyna Skuszanka, Polish theatre director and principal of theatres (b. 1924)
June
4 June – Jerzy Świątkiewicz, Polish lawyer (b. 1925)
6 June – Stefan Kuryłowicz, Polish architect (b. 1949)
13 June – Onil, Polish rapper (b. 1980)
18 June – Marek Szufa, Polish pilot, vice-champion in gliding Aerobatic Flying (b. 1954)
25 June – Jan Kułakowski, Polish politician and trade-unionist (b. 1930)
27 June – Maciej Zembaty, Polish poet, translator, musician, satirist (b. 1944)
30 June – Tadeusz Skutnik, Polish journalist and poet (b. 1947)
July
12 July – Roman Stanisław Ingarden, mathematical physicist (b. 1920)
16 July:
Albin Małysiak, Polish cleric, Roman Catholic Bishop of Kraków (b. 1917)
Kazimierz Neumann, Polish rower (b. 1933)
20 July – Rafał Balcewicz, Polish ice hockey player (b. 1987)
21 July:
Andrzej Zalewski, Polish radio journalist (b. 1924)
Kazimierz Świątek, Polish Catholic spiritual, Roman Catholic Cardinal (b. 1914)
23 July – Janusz Gniatkowski, Polish singer (b. 1928)
August
5 August – Andrzej Lepper, Polish unionist, politician, Deputy Prime Minister, Minister of Agriculture (b. 1954)
6 August – Roman Opałka, Polish painter and graphic artist (b. 1931)
13 August – Jerzy Masztaler, Polish football coach (b. 1946)
19 August – Janusz Kierzkowski, Polish track cyclist (b. 1947)
21 August – Maria Kornatowska, Polish film critic, essayist, lecturer at the Łódź Film School (b. 1943)
22 August – Andrzej Urbanowicz, Polish painter and visual artist (b. 1938)
September
3 September – Andrzej Maria Deskur, Polish Catholic cleric, Cardinal (b. 1924)
6 September:
Janusz Morgenstern, Polish film director (b. 1922)
Damian Szojda, Polish Franciscan, an interpreter the Bible (b. 1932)
15 September – Regina Smendzianka, Polish pianist and pedagogue (b. 1924)
16 September – Maria Sawicka, Polish social activist, lawyer (b. 1923)
17 September:
Magda Teresa Wójcik, Polish actress, film director (b. 1934)
Tomasz Zygadło, Polish film director, screenwriter (b. 1947)
See also
2011 in Polish television
References
Category:2011 in Poland
pl:2011#Wydarzenia w Polsce | {
"pile_set_name": "Wikipedia (en)"
} | 0.039598 | [
{
"begin": 0,
"end": 15,
"score": 0.016173938
},
{
"begin": 15,
"end": 55,
"score": 0.014160873
},
{
"begin": 55,
"end": 67,
"score": 0.05373499
},
{
"begin": 67,
"end": 79,
"score": 0.014785618
},
{
"begin": 79,
"end": 114,
"score": 0.014022041
},
{
"begin": 114,
"end": 122,
"score": 0.012078391
},
{
"begin": 122,
"end": 132,
"score": 0.015688026
},
{
"begin": 132,
"end": 229,
"score": 0.0036964044
},
{
"begin": 229,
"end": 309,
"score": 0.007149853
},
{
"begin": 309,
"end": 7609,
"score": 0.11665283
}
] |
[
{
"Message": "The following variables were not declared: atOtherHomes.",
"Code": null,
"Path": null,
"Locations": [
{
"Line": 2,
"Column": 17
}
],
"Extensions": {
"specifiedBy": "http://spec.graphql.org/June2018/#sec-All-Variable-Uses-Defined"
},
"Exception": null
}
]
| {
"pile_set_name": "Github"
} | 0.005484 | [
{
"begin": 0,
"end": 3,
"score": 0.03444787
},
{
"begin": 3,
"end": 82,
"score": 0.008017553
},
{
"begin": 82,
"end": 100,
"score": 0.008954669
},
{
"begin": 100,
"end": 118,
"score": 0.013952625
},
{
"begin": 118,
"end": 137,
"score": 0.009162918
},
{
"begin": 137,
"end": 145,
"score": 0.01721518
},
{
"begin": 145,
"end": 164,
"score": 0.0064904
},
{
"begin": 164,
"end": 185,
"score": 0.006525108
},
{
"begin": 185,
"end": 193,
"score": 0.020269485
},
{
"begin": 193,
"end": 342,
"score": 0.009162918
}
] |
#38 Green Thumbs: Radishes (grades 3-8)
Radishes aren't fussy. Provide them with a covered, moist towel, and away they grow. In just a day the seeds will sprout. By the end of the week you'll get sprouts one or two inches tall. Because radishes grow so fast, tropisms are easy to observe: see roots grow toward water, leaves tilt toward light, stems bend against gravity. Kids will draw, measure and graph growth, eat a tiny sun salad, study toxic stress!
Lesson 17: To observe how the root and hypocotyl of an upside-down radish seedling reorient in response to gravity. To distinguish between positive and negative geotropisms.
Lesson 18: To observe how radish roots grow in response to abrupt changes in moisture.
Lesson 19: To compare cotyledons with true leaves according to structure, function and origin.
Lesson 20: To graph the data collected in activity 14. To interpret radish growth in terms of a sigma curve.
Our radish seeds didn't sprout! What did we do wrong?
Possibly your seeds are too old, or have been stored in a warm and/or moist environment, using up their energy reserves before you planted them. In any batch, there will be some seeds that simply don't sprout -- packages generally tell you the germination rate (the percentage that are likely to succeed). But if you plant a half-dozen or more fresh seeds, at least half of them should have sprouted. It's mathematically pretty unlikely that you'd have planted only duds from a larger batch. It is frustrating, but seeds are tiny, and often fragile, packets of life subject to changing conditions around them. If your radish seeds were supplied in a kit from another company, please contact them directly. Or purchase a fresh replacement package from your local garden store.Our radishes aren't growing true leaves. What's the problem?
Without seeing your arrangement, we can only guess. The sprouts probably aren't getting enough light to develop properly. If this is the case, plants will also become very "leggy" (on long, weak, thin stems) and will lean precariously toward the strongest light source. The sprouts may also be quite pale. Classrooms have large windows and bright fluorescent bulbs that usually provide adequate light, but homes are often darker. A south-facing window may help (check sprouts carefully for wilting or sunburn if in direct sunlight). Positioning a desk lamp, either incandescent or fluorescent, as near as possible to the sprouts for several hours a day can also be helpful. Turn the planters around occasionally to correct leaning. If your climate is mild, placing the plants on a porch or patio in dappled shade might help, too, and the fresh air and bright light helps discourage mold and mildew. Be sure to monitor plants carefully for drying or overheating. One other possibility is that your sprouts have become too dry between waterings, or the soil stays too wet. Keep them consistently moist, but not soggy.Our radishes are growing too fast/too slow to match your model answers. How do we adapt?
Here's where "cookbook" science gets real. The results of your experiments will never be precisely average, especially where growing things are concerned. This can be disconcerting, but it is the nature of, well, nature! Our model answers are the best average we could observe from growing plants in typical classroom conditions in a temperate climate (lots of steady light, temperatures moderately warm during the day and cool at night). If your radishes are way ahead of schedule, they're growing in "better-than-average" conditions. If they're too slow, they may be getting less light or warmth than our test sprouts. Probably the most important thing to remember is this: science is the process of observing what actually happens, not forcing hoped-for results to match an ideal schedule. Scientists develop hypotheses (tentative assumptions) based on what they observe, and then experiment (design ways to interact with their subjects) to check the accuracy of a hypothesis. If it was wrong, they develop and test a new hypothesis. You're doing good science if you're doing these things, whether or not your results match the answer key.Our plants are growing lots of mold. Should we start over?
Molds and mildews thrive in warm, humid climates. If this is your situation, try any of the following:• BLEACH! Pre-sterilize containers by dipping in a solution of 10% chlorine bleach and 90% water. If dipping isn't workable, apply generously with a spray bottle or clean sponge. You can also add a couple of drops of bleach to the water in your growing systems. Too much will be toxic to the plants. You can also rinse the seeds for 15 seconds in a 10% bleach solution before you sprout them. Seeds are often "infected" with mold spores before you plant them.• AND/OR: Gently lift the seedlings and replace the paper towels as needed. A fuss, but better than the alternative. You might be able to lift out fuzzy clumps of mildew with a toothpick or a small paint brush moistened with slightly chlorinated water.• AND/OR: Open containers to fresh air and dappled sunshine at times you can keep an eye on them. Monitor the plants for wilting, yellow patches, curled or darkened edges - sunshine can be quite a shock to previously sheltered seedlings. Be sure they don't dry out. You might wish to offer extra credit to a responsible student to monitor the seedlings every hour or so.NOTE: Because molds can cause allergic reactions, avoid inhaling them when handling your plants. Wear a dust mask or scarf over your nose and mouth to minimize your exposure. Finally, if your plants are growing well, they should survive having some mold growing on or around them.EXTENSION ACTIVITY: Do real science on your own! Study mold and mildew! We've read (haven't tried) that spraying seedlings with CHAMOMILE tea discourages mildew on new seedlings. Other kitchen SPICES, such as thyme and oregano, may help, since they are a traditional means of keeping food from spoiling. A weak solution of the widely popular TEA TREE OIL, dispersed in water with a few drops of liquid hand soap, might be very effective. A solution of BAKING SODA (sodium bicarbonate), about one teaspoon per pint of water, has recently been found to fend off certain mildews in the garden. Spray lightly and monitor closely, though, since too much sodium can be deadly. And the latest scoop from the horticultural world is that MILK misted on plants inhibits some garden pathogens. (It could foster others, though, so stay observant.)
#38 RADISHES IN ACTION!See how one homeschooler has used this lesson (and other TOPS modules!) with great success at this website.If you come up with any other great results, we'd love to pass them on to others, so be sure to let us know!
National Science Education Standards (NRC 1996)
TEACHING Standards
These 20 activity sheets promote excellence in science teaching by these NSES criteria:Teachers of science...A: ...plan an inquiry-based science program. (p. 30)B: ...guide and facilitate learning. (p. 32)C: ...engage in ongoing assessment of their teaching and of student learning. (p. 37)D: ...design and manage learning environments that provide students with the time, space, and resources needed for learning science. (p. 43)
CONTENT Standards
These 20 activity sheets contain fundamental content as defined by these NSES guidelines (p. 109). • Represent a central event or phenomenon in the natural world. • Represent a central scientific idea and organizing principle. • Have rich explanatory power. • Guide fruitful investigations. • Apply to situations and contexts common to everyday experiences. • Can be linked to meaningful learning experiences. • Are developmentally appropriate for students at the grade level specified. | {
"pile_set_name": "Pile-CC"
} | 0.049899 | [
{
"begin": 0,
"end": 40,
"score": 0.00930175
},
{
"begin": 40,
"end": 64,
"score": 0.038224805
},
{
"begin": 64,
"end": 126,
"score": 0.31089294
},
{
"begin": 126,
"end": 163,
"score": 0.043718524
},
{
"begin": 163,
"end": 229,
"score": 0.094410956
},
{
"begin": 229,
"end": 373,
"score": 0.015757442
},
{
"begin": 373,
"end": 457,
"score": 0.05493369
},
{
"begin": 457,
"end": 574,
"score": 0.019019997
},
{
"begin": 574,
"end": 632,
"score": 0.009718247
},
{
"begin": 632,
"end": 7772,
"score": 0.050242316
}
] |
Q:
Python: How to read stdout of subprocess in a nonblocking way
I am trying to make a simple python script that starts a subprocess and monitors its standard output. Here is a snippet from the code:
process = subprocess.Popen([path_to_exe, os.path.join(temp_dir,temp_file)], stdout=subprocess.PIPE)
while True:
output=process.stdout.readline()
print "test"
The problem is that the script hangs on output=process.stdout.readline() and that the line print "test" only executes after the subprocess is terminated.
Is there a way to read standard output and print it without having to wait for the subprocess to terminate?
The subprocess which I am starting is a Windows binary for which I do not have the source code.
I have found several similar questions, but the answers are only applicable on Linux or in case I have the source of the suprocess I am starting.
A:
Check select module
import subprocess
import select
import time
x=subprocess.Popen(['/bin/bash','-c',"while true; do sleep 5; echo yes; done"],stdout=subprocess.PIPE)
y=select.poll()
y.register(x.stdout,select.POLLIN)
while True:
if y.poll(1):
print x.stdout.readline()
else:
print "nothing here"
time.sleep(1)
EDIT:
Threaded Solution for non posix systems:
import subprocess
from threading import Thread
import time
linebuffer=[]
x=subprocess.Popen(['/bin/bash','-c',"while true; do sleep 5; echo yes; done"],stdout=subprocess.PIPE)
def reader(f,buffer):
while True:
line=f.readline()
if line:
buffer.append(line)
else:
break
t=Thread(target=reader,args=(x.stdout,linebuffer))
t.daemon=True
t.start()
while True:
if linebuffer:
print linebuffer.pop(0)
else:
print "nothing here"
time.sleep(1)
| {
"pile_set_name": "StackExchange"
} | 0.026894 | [
{
"begin": 0,
"end": 66,
"score": 0.028782474
},
{
"begin": 66,
"end": 169,
"score": 0.011592479
},
{
"begin": 169,
"end": 202,
"score": 0.024147147
},
{
"begin": 202,
"end": 302,
"score": 0.0063862763
},
{
"begin": 302,
"end": 317,
"score": 0.018464668
},
{
"begin": 317,
"end": 354,
"score": 0.011523063
},
{
"begin": 354,
"end": 371,
"score": 0.010481823
},
{
"begin": 371,
"end": 526,
"score": 0.019297661
},
{
"begin": 526,
"end": 634,
"score": 0.011800728
},
{
"begin": 634,
"end": 1766,
"score": 0.019019997
}
] |
Q:
What sort of check should be used for my frenzy ability's stay-in-control aspect?
My D&D 3.5e character is a half-shark/half-man, and I want to give him a boost ability that allows him to indulge in his frenzy or instinct and gain bonuses during battle. Doing so, however, would run him the chance of losing control and attacking anything, friend or foe. What sort of check would make the most sense as far as maintaining control of/snapping out of the frenzy? A Will Check that gets harder every round, INT vs WIS check, or maybe a Concentration check?
I was looking to create a sort of boost ability for my character since we need another melee fighter and our strongest characters seem to have exactly those. Of course, their boosts cause them some major fatigue after using them and I wanted to try and find a way around that because we've almost been tossed the excrement end of the stick coming out of a tournament or a major fight, and unable to defend ourselves or barely run away from whatever relatively easy troubles happen to us right after. But I suppose a half shark would bring some great non-combat skills too
A:
One, most tables really hate this kind of thing
These kinds of effects tend to ruin, or severely sidetrack, campaigns, to the point that the rampaging character makes it impossible to actually make any kind of progress. Make absolutely certain that every single player in the game is on board with this. It is not enough, in this case, to just check with the DM; just because the DM is OK with it does not necessarily mean your fellow players are, and every one of those players has an expectation and right to enjoying the game. You don't have a right to ruin that enjoyment, which this character very well might.
We get very many questions from DMs trying to prevent this kind of thing, because it's messing up the game for everyone.
Two, you can create a character like this without homebrew
Just so you are aware, the Frenzied Berserker from Complete Warrior behaves like this. Which is a reason why it's frequently banned. But if it's not, and the group is 100% on board with this character, taking levels in Frenzied Berserker is a good way to model this character. It provides fairly substantial bonuses, and reasonably-thorough rules on how the frenzy is triggered and how the berserker behaves while frenzied.
Three, you can and should base your homebrew on the Frenzied Berserker
The relevant rules for the Frenzied Berserker are below.
The character can enter a frenzy as a free action. [...] In addition, if she takes damage from an attack, spell, trap, or any other source, she automatically enters a frenzy at the start of her next action, as long as she still has at least one daily usage of the ability left. To avoid entering a frenzy in response to a provoking effect, the character must make a successful Will save (DC 10 + points of damage taken since her last action) at the start of her next turn.
While frenzied, the character cannot use any Charisma-, Dexterity-, or Intelligence-based skills (except for Intimidate), the Concentration skill, or any abilities that require patience or concentration, nor can she cast spells, drink potions, activate magic items, or read scrolls. She can use any feat she has except Combat Expertise, item creation feats, or metamagic feats. [...]
Should she run out of enemies before her frenzy expires, her rampage continues. She must then attack the nearest creature (determine randomly if several potential foes are equidistant) and fight that opponent without regard to friendship, innocence, or health (the target's or her own).
Here, you see that it's a Will save to avoid going into an unintentional frenzy, and once frenzied it just lasts a certain duration. The bonuses from the frenzy (not quoted) are fairly substantial, so that (arguably) makes some sense. In your case, it may not (probably should not as a racial ability), so probably 1/round make a Will save to end the frenzy.
| {
"pile_set_name": "StackExchange"
} | 0.091726 | [
{
"begin": 0,
"end": 86,
"score": 0.02124131
},
{
"begin": 86,
"end": 259,
"score": 0.08796701
},
{
"begin": 259,
"end": 360,
"score": 0.13924801
},
{
"begin": 360,
"end": 466,
"score": 0.03736641
},
{
"begin": 466,
"end": 559,
"score": 0.03049926
},
{
"begin": 559,
"end": 717,
"score": 0.040284947
},
{
"begin": 717,
"end": 1059,
"score": 0.25676212
},
{
"begin": 1059,
"end": 1132,
"score": 0.04680874
},
{
"begin": 1132,
"end": 1137,
"score": 0.019297661
},
{
"begin": 1137,
"end": 3990,
"score": 0.2008281
}
] |
Q:
Windows authentication auto login in .net core API
I want to do auto login to .net core API using windows authentication.
I have enabled windows authentication and rest all authentication is kept disabled. now I am trying to run the API. its prompt popup for enter the credentials for login.
I do not want any popup which asks users to enter login details. its should auto authenticate using the current login user. however, if I enter login details in that popup, still it's not getting authenticate, it keep asking me to enter the credentials.
Tried approach:
In IIS, application pool's identity set custom account, (current login account which is administrator)
Enable Anonymous authentication along with windows authentication. (when I do this then API does not give popup for login but its give null object for User.Identity.Name)
Reference:
I have implemented windows authentication by referring to this article
Note: When I run API from visual studio (IIS Express) its works fine, but when I host API to local IIS, then I am facing a challenge as I described above
A:
You have to whitelist a domain specified in the hosts file in order for windows authentication to work:
Click Start, click Run, type regedit, and then click OK.
In Registry Editor, locate the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters
Right-click Parameters, click New, and then click DWORD (32-bit) Value.
Type DisableStrictNameChecking and press ENTER.
Double-click the DisableStrictNameChecking registry value and type 1 in the Value data box, click OK
In Registry Editor, locate and then click the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0
Right-click MSV1_0, point to New, and then click Multi-String Value.
Type BackConnectionHostNames, and then press ENTER.
Right-click BackConnectionHostNames, and then click Modify.
In the Value data box, type the host name or the host names for the sites that are on the local computer, and then click OK.
Quit Registry Editor, and then restart the IISAdmin service.
| {
"pile_set_name": "StackExchange"
} | 0.033418 | [
{
"begin": 0,
"end": 55,
"score": 0.0057962397
},
{
"begin": 55,
"end": 127,
"score": 0.009648831
},
{
"begin": 127,
"end": 297,
"score": 0.012841969
},
{
"begin": 297,
"end": 551,
"score": 0.015688026
},
{
"begin": 551,
"end": 567,
"score": 0.011037151
},
{
"begin": 567,
"end": 671,
"score": 0.008642297
},
{
"begin": 671,
"end": 842,
"score": 0.012425472
},
{
"begin": 842,
"end": 854,
"score": 0.007705181
},
{
"begin": 854,
"end": 925,
"score": 0.008711713
},
{
"begin": 925,
"end": 2100,
"score": 0.012841969
}
] |
Introduction {#sec1-1}
============
Rhabdomyolysis is a well-known side effect of statin therapy. Manifestations are usually limited to muscle aches and weakness. When statins are used in patient with other risk factors for muscle injury, severe muscle damage may result. We report a case where introduction of simvastatin in a patient with unsuspected hypothyroidism caused severe rhabdomyolysis and acute kidney injury.
Case Report {#sec1-2}
===========
A 52-year-old Indian woman presented at King Abdulaziz University Hospital\'s emergency department with complaints of generalized, dull and constant myalgia. She expressed an \'inability to put her weight on her feet\'. These symptoms persisted for three days and were associated with weakness, fatigue and a decreased urine output for two days. Her medical history included diabetes mellitus under insulin administration, hypertension, anemia secondary to fibroids and coronary artery disease with an inferior myocardial infraction (20 days before). The patient had no history of renal disease with a baseline creatinine of 106 μmol/L. Simvastatin (80 mg daily) was initiated by her cardiologist after she underwent cardiac catheterization 20 days prior to presentation. In addition, she was taking insulin, diuretics, losartan, aspirin and clopidogrel.
The patient\'s vital signs were as follows: temperature, 37°C; pulse, 60 beats per minute (paced); blood pressure, 130/65 mmHg and respiration, 18 breaths per minute. Physical examination showed paleness, obesity and dull appearance. Her system examination was largely unremarkable. No palpable goiter was observed on neck examination and there was no delayed relaxation of ankle jerk. Laboratory evaluation at admission revealed creatine kinase (CK) of 81,660 U/L; aspartate aminotransferase (AST), 2,497 U/L; alanine aminotransferase (ALT), 1,304 U/L; blood urea nitrogen (BUN), 88 mg/dL; creatinine, 5.1 mg/dL. Arterial blood gases demonstrated mild metabolic acidosis. Her serum potassium was 6.2 mmol/L and thyroid stimulating hormone (TSH), 22.7 U/L (normal range, 0.27-4.2) with a serum free thyroxine (FT~4~) of 12.6 Pmol/L. Her serum cholesterol level was 258 mg/dL; triglyceride, 196 mg/dL and low density lipoprotein (LDL), 134 mg/dL.
She was diagnosed with rhabdomyolysis and oliguric acute renal failure. Simvastatin was discontinued and she was administered forced alkaline diuresis (intravenous normal saline with bicarbonate). L-thyroxine (25 mcg) was administered initially and subsequently the dose was increased to 50 mcg daily. At discharge (15 days after hospitalization), laboratory results showed CK level of 1865 U/L and creatinine level of 1.8 mg/dL. Thyroxine administration was continued as an outpatient; however, no hydroxymethylglutaryl coenzyme (HMGCoA) reductase inhibitor was restarted in view of severe rhabdomyolysis. After six weeks, her CK was 151 U/L; creatinine level decreased to 1.4 mg/dL; AST level decreased to 186 U/L; and ALT decreased to 51 U/L. FT~4~ was 14.5 Pmol/L with a TSH of 2.06 U/L. On follow-up visit, she continued to report some mild residual weakness one month after hospitalization.
Discussion {#sec1-3}
==========
HMGCoA reductase inhibitors are effective in primary as well as secondary prevention of coronary disease.[@CIT1] Therefore, these agents are used as the first choice for hypercholesterolemia in this subset of the population, especially atrovastatin and simvastatin.[@CIT2] According to the research firm IMS Health, HMGCoA reductase inhibitors represent the highest class of drugs in the United States with regard to their sale; atorvastatin and simvastatin were the first and second most prescribed statins in 2006, respectively.[@CIT3]
They are usually well tolerated. However, they can cause a variety of musculoskeletal complications, including clinical mysotis and rhabdomyolysis.[@CIT4] The reported risk of rhabdomyolysis with simvastatin monotherapy is low and dose related (0.02% at 20 mg daily, 0.07% at 40 mg daily and 0.3% at 80 mg daily).[@CIT5] Several factors that increase the risk for both myopathy and rhabdomyolysis have been identified, including advanced age, chronic renal insufficiency, metabolic disorders such as diabetes or hypothyroidism, major surgery, alcohol abuse and medications that inhibit cytochrome P450 (CYP) 3A-4.[@CIT6] Hypothyroidism frequently leads to asymptomatic mild to moderate elevation in the CK level.[@CIT7] Marked elevation in CK with rhabdomyolysis has been reported only in a very small number of cases with unnoticed hypothyroidism using HMGCoA reductase inhibitors.[@CIT8][@CIT9] Our patient received 80 mg of simvastatin without being diagnosed for primary hypothyroidism. The severity of hypothyroidism might be associated with an elevation in CK. The mechanism by which CK elevation occurs in hypothyroidism patients who are also receiving HMGCoA reductase inhibitors remains unclear.[@CIT10] This group of drugs may represent an additional risk factor for myopathy and rhabdomyolysis in patients with hypothyroidism.
Conclusion {#sec1-4}
==========
We describe a case of severe rhabdomyolysis with undiagnosed hypothyroidism receiving a large dose of simvastatin. We emphasize the need to assess the possibility of hypothyroidism not only before treatment with HMGCoA reductase inhibitors but also during treatment, particularly marked increase in CK levels. Furthermore, in order to avoid the deleterious effects of these drugs, we recommend vigilant screening with regard to CK levels both upon initiation and during continued treatment with HMGCoA reductase inhibitors in individuals with hypothyroidism.
**Source of Support:** Nil
**Conflict of Interest:** None declared.
| {
"pile_set_name": "PubMed Central"
} | 0.020547 | [
{
"begin": 0,
"end": 23,
"score": 0.0053103273
},
{
"begin": 23,
"end": 36,
"score": 0.027409043
},
{
"begin": 36,
"end": 99,
"score": 0.021796638
},
{
"begin": 99,
"end": 164,
"score": 0.094410956
},
{
"begin": 164,
"end": 273,
"score": 0.01721518
},
{
"begin": 273,
"end": 423,
"score": 0.022773718
},
{
"begin": 423,
"end": 446,
"score": 0.004182317
},
{
"begin": 446,
"end": 458,
"score": 0.02809576
},
{
"begin": 458,
"end": 617,
"score": 0.13521013
},
{
"begin": 617,
"end": 5733,
"score": 0.09655894
}
] |
The role of magnetic resonance imaging and spectroscopy in transplantation: from animal models to man.
Critical success factors in solid organ and vascular transplantation are the assessment of graft status/viability as well as stringent monitoring of transplant recipients, preferentially using noninvasive techniques. This review addresses the application of magnetic resonance imaging (MRI) and spectroscopy (MRS) in the field of transplantation. The first section is devoted to the description of the main MR techniques used for monitoring the status of the graft noninvasively. Subsequently, the role of MRI/MRS in the analysis of the viability of organs for transplantation is discussed. Since chronic rejection remains a major difficulty, development of new therapies is still ongoing. Thus, the third part is devoted to the use of MRI/MRS for monitoring graft rejection in animal models of transplantation. This is followed by a discussion of clinical studies of transplantation involving MRI/MRS. Finally, a general appraisal is made on available imaging techniques for the non-invasive characterization of grafts in situ, highlighting the role of MR methods in the field of transplantation. | {
"pile_set_name": "PubMed Abstracts"
} | 0.016035 | [
{
"begin": 0,
"end": 103,
"score": 0.018464668
},
{
"begin": 103,
"end": 320,
"score": 0.009857078
},
{
"begin": 320,
"end": 450,
"score": 0.0036443423
},
{
"begin": 450,
"end": 583,
"score": 0.016173938
},
{
"begin": 583,
"end": 694,
"score": 0.011453647
},
{
"begin": 694,
"end": 793,
"score": 0.020269485
},
{
"begin": 793,
"end": 915,
"score": 0.011523063
},
{
"begin": 915,
"end": 1006,
"score": 0.0090240855
},
{
"begin": 1006,
"end": 1200,
"score": 0.006212736
}
] |
Dębowa
Dębowa may refer to the following places:
Dębowa, Opole Voivodeship (south-west Poland)
Dębowa, Pomeranian Voivodeship (north Poland)
Dębowa, Subcarpathian Voivodeship (south-east Poland) | {
"pile_set_name": "Wikipedia (en)"
} | 0.027752 | [
{
"begin": 0,
"end": 7,
"score": 0.03221605
},
{
"begin": 7,
"end": 50,
"score": 0.043031808
},
{
"begin": 50,
"end": 96,
"score": 0.009162918
},
{
"begin": 96,
"end": 142,
"score": 0.011106567
},
{
"begin": 142,
"end": 195,
"score": 0.005865656
}
] |
Q:
CrittercismIOS conflict with MvvmCross
I'm integrating crash reporting via CrittercismIOS and i have used component on Xamarin Component store
https://components.xamarin.com/view/crittercism
but app crash with error reported.
2015-11-25 10:49:50.621 MyApp[40227:2065265] critical: Stacktrace:
2015-11-25 10:49:50.621 MyApp[40227:2065265] critical: at <unknown> <0xffffffff>
2015-11-25 10:49:50.621 MyApp[40227:2065265] critical: at System.Reflection.MonoCMethod.InternalInvoke (object,object[]) [0x00016] in /Users/builder/data/lanes/2356/9ce9e8b9/source/maccore/_build/Library/Frameworks/Xamarin.iOS.framework/Versions/git/src/mono/mcs/class/corlib/System.Reflection/MonoMethod.cs:650
2015-11-25 10:49:50.621 MyApp[40227:2065265] critical: at System.RuntimeType.CreateInstanceMono (bool) [0x000ca] in /Users/builder/data/lanes/2356/9ce9e8b9/source/maccore/_build/Library/Frameworks/Xamarin.iOS.framework/Versions/git/src/mono/mcs/class/corlib/ReferenceSources/RuntimeType.cs:113
2015-11-25 10:49:50.622 MyApp[40227:2065265] critical: at System.RuntimeType.CreateInstanceSlow (bool,bool,bool,System.Threading.StackCrawlMark&) [0x0001a] in /Users/builder/data/lanes/2356/9ce9e8b9/source/maccore/_build/Library/Frameworks/Xamarin.iOS.framework/Versions/git/src/mono/mcs/class/corlib/ReferenceSources/RuntimeType.cs:87
2015-11-25 10:49:50.622 MyApp[40227:2065265] critical: at System.RuntimeType.CreateInstanceDefaultCtor (bool,bool,bool,System.Threading.StackCrawlMark&) [0x0002a] in /Users/builder/data/lanes/2356/9ce9e8b9/source/maccore/_build/Library/Frameworks/Xamarin.iOS.framework/Versions/git/src/mono/external/referencesource/mscorlib/system/rttype.cs:5734
2015-11-25 10:49:50.622 MyApp[40227:2065265] critical: at System.Activator.CreateInstance (System.Type,bool) [0x00040] in /Users/builder/data/lanes/2356/9ce9e8b9/source/maccore/_build/Library/Frameworks/Xamarin.iOS.framework/Versions/git/src/mono/external/referencesource/mscorlib/system/activator.cs:214
2015-11-25 10:49:50.622 MyApp[40227:2065265] critical: at System.Activator.CreateInstance (System.Type) [0x00000] in /Users/builder/data/lanes/2356/9ce9e8b9/source/maccore/_build/Library/Frameworks/Xamarin.iOS.framework/Versions/git/src/mono/external/referencesource/mscorlib/system/activator.cs:147
2015-11-25 10:49:50.622 MyApp[40227:2065265] critical: at Cirrious.MvvmCross.Touch.Views.MvxTouchViewsContainer.CreateViewOfType (System.Type,Cirrious.MvvmCross.ViewModels.MvxViewModelRequest) <IL 0x00077, 0x002fb>
2015-11-25 10:49:50.622 MyApp[40227:2065265] critical: at Cirrious.MvvmCross.Touch.Views.MvxTouchViewsContainer.CreateView (Cirrious.MvvmCross.ViewModels.MvxViewModelRequest) <IL 0x0003e, 0x0018f>
2015-11-25 10:49:50.623 MyApp[40227:2065265] critical: at Cirrious.MvvmCross.Touch.Views.MvxCanCreateTouchViewExtensionMethods.CreateViewControllerFor (Cirrious.MvvmCross.Touch.Views.IMvxCanCreateTouchView,Cirrious.MvvmCross.ViewModels.MvxViewModelRequest) <IL 0x00007, 0x0004a>
2015-11-25 10:49:50.623 MyApp[40227:2065265] critical: at Cirrious.MvvmCross.Touch.Views.Presenters.MvxTouchViewPresenter.Show (Cirrious.MvvmCross.ViewModels.MvxViewModelRequest) <IL 0x00003, 0x00037>
2015-11-25 10:49:50.623 MyApp[40227:2065265] critical: at Cirrious.MvvmCross.Touch.Views.MvxTouchViewDispatcher/<>c__DisplayClass4.<ShowViewModel>b__3 () <IL 0x00028, 0x00090>
2015-11-25 10:49:50.623 MyApp[40227:2065265] critical: at Cirrious.MvvmCross.Touch.Views.MvxTouchUIThreadDispatcher.RequestMainThreadAction (System.Action) <IL 0x00028, 0x000e8>
2015-11-25 10:49:50.623 MyApp[40227:2065265] critical: at Cirrious.MvvmCross.Touch.Views.MvxTouchViewDispatcher.ShowViewModel (Cirrious.MvvmCross.ViewModels.MvxViewModelRequest) <IL 0x00024, 0x0015b>
2015-11-25 10:49:50.623 MyApp[40227:2065265] critical: at Cirrious.MvvmCross.ViewModels.MvxNavigatingObject.ShowViewModelImpl (System.Type,Cirrious.MvvmCross.ViewModels.IMvxBundle,Cirrious.MvvmCross.ViewModels.IMvxBundle,Cirrious.MvvmCross.ViewModels.MvxRequestedBy) <IL 0x00030, 0x00145>
2015-11-25 10:49:50.623 MyApp[40227:2065265] critical: at Cirrious.MvvmCross.ViewModels.MvxNavigatingObject.ShowViewModel (System.Type,Cirrious.MvvmCross.ViewModels.IMvxBundle,Cirrious.MvvmCross.ViewModels.IMvxBundle,Cirrious.MvvmCross.ViewModels.MvxRequestedBy) <IL 0x00006, 0x0004f>
2015-11-25 10:49:50.624 MyApp[40227:2065265] critical: at Cirrious.MvvmCross.ViewModels.MvxNavigatingObject.ShowViewModel<T_REF> (Cirrious.MvvmCross.ViewModels.IMvxBundle,Cirrious.MvvmCross.ViewModels.IMvxBundle,Cirrious.MvvmCross.ViewModels.MvxRequestedBy) <IL 0x0000e, 0x0005b>
MvvmCross version is 3.5.1 and Crittercism 2.4 on Xamarin Component Store.
If i remove in FinishedLaunching this code
CrittercismIOS.Crittercism.Init("00ac4950703d418c9cef9b7818cc307300444503");
App works fine (it works fine also with Xamarin.Insight, but it is not possible to use both dll).
A:
Version 2.5 resolve this issue
https://components.xamarin.com/view/crittercism
| {
"pile_set_name": "StackExchange"
} | 0.0928 | [
{
"begin": 0,
"end": 43,
"score": 0.034962907
},
{
"begin": 43,
"end": 149,
"score": 0.024833864
},
{
"begin": 149,
"end": 197,
"score": 0.0072192685
},
{
"begin": 197,
"end": 232,
"score": 0.04818217
},
{
"begin": 232,
"end": 299,
"score": 0.004893831
},
{
"begin": 299,
"end": 383,
"score": 0.012564304
},
{
"begin": 383,
"end": 697,
"score": 0.010273575
},
{
"begin": 697,
"end": 993,
"score": 0.011384231
},
{
"begin": 993,
"end": 1331,
"score": 0.020408317
},
{
"begin": 1331,
"end": 4990,
"score": 0.03427619
}
] |
Coronary vascular responsiveness to adenosine is impaired additively by blockade of nitric oxide synthesis and a sulfonylurea.
We sought to define effects of glibenclamide, a sulfonylurea known to block ATP-dependent potassium (KATP) channels, and Nomega-nitro-L-arginine methyl ester (L-NAME), an L-arginine analog known to block nitric oxide (NO) synthesis, on coronary vascular responsiveness to adenosine. The role of adenosine in coronary flow regulation becomes increasingly important when KATP channel function or NO synthesis is impaired. Both variables are potentially altered in patients with coronary artery disease taking a sulfonylurea. Dose-response curves relating coronary conductance to plasma adenosine concentration were obtained by using intracoronary infusions of adenosine (10 to 1,000 microg/min) in chronically instrumented dogs. ED50, the plasma concentration of adenosine needed to produce 50% of the maximal increase in conductance under baseline conditions, increased threefold after either 1 or 10 mg/kg of L-NAME. ED50 also increased in response to glibenclamide in a dose-related fashion (5.7-fold increase per 1 mg/kg body weight of glibenclamide). Effects of combined blockade of KATP channels and NO synthesis were additive, with increases in ED50 as high as 15-fold. Both L-NAME and glibenclamide increased systemic pressure and reduced coronary conductance, confirming the roles of NO and KATP channels in regulating coronary and systemic vascular tone under rest conditions as well as during stress. Coronary vascular responsiveness to adenosine is blunted in vivo by both L-NAME and glibenclamide. Effects of the sulfonylurea and blockade of NO synthesis are additive and can limit coronary vasodilation as well as other responses involving KATP channels and NO. | {
"pile_set_name": "PubMed Abstracts"
} | 0.014994 | [
{
"begin": 0,
"end": 127,
"score": 0.012494888
},
{
"begin": 127,
"end": 410,
"score": 0.013397297
},
{
"begin": 410,
"end": 547,
"score": 0.015826859
},
{
"begin": 547,
"end": 650,
"score": 0.021518974
},
{
"begin": 650,
"end": 854,
"score": 0.030327583
},
{
"begin": 854,
"end": 1044,
"score": 0.014022041
},
{
"begin": 1044,
"end": 1181,
"score": 0.015479778
},
{
"begin": 1181,
"end": 1302,
"score": 0.0186035
},
{
"begin": 1302,
"end": 1537,
"score": 0.020269485
},
{
"begin": 1537,
"end": 1800,
"score": 0.016729267
}
] |
Geography of Gaelic games
The two dominant sports of the Gaelic games are traditionally played in separate regions of Ireland. Hurling is traditionally played mainly in the provinces of Munster and Leinster, whereas Gaelic football is played in every county but is dominant in Ulster and Connacht and certain parts of the other provinces.
Munster
The traditional hurling-football divide in Munster runs along a line from Tubber in north County Clare through Corofin to Labasheeda. Across the Shannon in County Limerick the line divides the footballing territory in the hilly west Limerick from the hurling territory in the lush lowlands of east and central Limerick. In County Cork the line also divides east from west, starting at Mallow and extending south towards Cork city and on to the coast. Further west beyond the footballing west Cork is the almost entirely footballing territory in County Kerry, with only a very small hurling region north of Tralee in Ardfert, Ballyheigue and Causeway. The entire counties of Tipperary and Waterford are considered to be traditionally hurling regions.
Leinster
In Leinster the traditional hurling region is located in the south west of the province. The entire County Kilkenny is considered hurling territory, with very little football activity. Most of County Wexford is in the hurling region along with Counties Carlow, Laois and Offaly. The other Leinster counties are considered footballing counties.
Connacht
Connacht is almost entirely Gaelic football territory, with only Galway competing in the Liam MacCarthy Cup. In County Galway the hurling-football divide follows a line from Galway City to Ballinasloe. The divide in Galway probably stands out more than in other counties. The hurling territory in Galway stands out strongly from the rest of the province; as a result, the Galway team plays in the Leinster Championship. Another very small hurling region is in eastern County Mayo around Ballyhaunis.
Ulster
Ulster is also almost entirely a footballing region; the hurling region is located in the Glens of Antrim.
Links
Gaelic Athletic Association county
Gaelic games
Hurling
Football
Dual county
See also
Geography of Australian rules football
Geography of association football
References
Category:Gaelic games
Category:Gaelic games terminology | {
"pile_set_name": "Wikipedia (en)"
} | 0.031873 | [
{
"begin": 0,
"end": 26,
"score": 0.014160873
},
{
"begin": 26,
"end": 128,
"score": 0.017076347
},
{
"begin": 128,
"end": 340,
"score": 0.012356056
},
{
"begin": 340,
"end": 349,
"score": 0.15568043
},
{
"begin": 349,
"end": 483,
"score": 0.023460433
},
{
"begin": 483,
"end": 669,
"score": 0.0186035
},
{
"begin": 669,
"end": 800,
"score": 0.017006932
},
{
"begin": 800,
"end": 1000,
"score": 0.036508016
},
{
"begin": 1000,
"end": 1099,
"score": 0.05253629
},
{
"begin": 1099,
"end": 2320,
"score": 0.0334178
}
] |
var searchData=
[
['index',['index',['../structguac__layer.html#a686a85d9d758ba5f2f4426a4c4ae13ba',1,'guac_layer::index()'],['../structguac__stream.html#a487951c2cc77b2e1637e3aa0b5faaa60',1,'guac_stream::index()']]],
['info',['info',['../structguac__client.html#ab67a82a9f940360dac0ec0ca96d446cf',1,'guac_client']]],
['init_5fhandler',['init_handler',['../structguac__client__plugin.html#af650493e50e6abd9b0bb33c917bd0b95',1,'guac_client_plugin']]]
];
| {
"pile_set_name": "Github"
} | 0.002256 | [
{
"begin": 0,
"end": 16,
"score": 0.0035055103
},
{
"begin": 16,
"end": 219,
"score": 0.0053797434
},
{
"begin": 219,
"end": 321,
"score": 0.008503466
},
{
"begin": 321,
"end": 458,
"score": 0.0045120427
}
] |
(M1.PH.44)
A 62-year-old male is rushed to the emergency department (ED) for what he believes is his second myocardial infarction (MI). His medical history is significant for severe chronic obstructive pulmonary disease (COPD) and a prior MI at the age of 58. After receiving aspirin, morphine, and face mask oxygen in the field, the patient arrives to the ED tachycardic (105 bpm), diaphoretic, and normotensive (126/86). A 12 lead electrocardiogram shows ST-elevation in I, aVL, and V5-V6. The attending physician suspects a lateral wall infarction. Which of following beta-blockers should be given to this patient and why?
Review Topic | {
"pile_set_name": "Pile-CC"
} | 0.012495 | [
{
"begin": 0,
"end": 11,
"score": 0.0131890485
},
{
"begin": 11,
"end": 136,
"score": 0.03599298
},
{
"begin": 136,
"end": 260,
"score": 0.009718247
},
{
"begin": 260,
"end": 423,
"score": 0.013813793
},
{
"begin": 423,
"end": 492,
"score": 0.010551238
},
{
"begin": 492,
"end": 552,
"score": 0.078108564
},
{
"begin": 552,
"end": 626,
"score": 0.1621016
},
{
"begin": 626,
"end": 638,
"score": 0.01561861
}
] |
Fianna Fáil and Fine Gael/Labour governments are known quantities. The civil service really runs the State, using elected politicians as spokesmen - and it is usually men - and change comes at a snail’s pace. As soon as one of the parties get too big for its boots, we switch to the other, and the cycle continues.
As the current Government argues that our choice is stability or chaos, we are at risk of returning to this tired formula at this month's General Election, and for the foreseeable future. Insider would argue that this “stability” also comes with risks – Fianna Fáil brought the country to its knees through cutting taxes and increasing spending, while Fine Gael was calling from the sidelines for even lower taxes and even higher spending!
So what is the alternative? The political Left in Ireland is often written off as the “loony left” - well meaning, but unable to govern ,and not credible on the economy. This political narrative is unusual in Europe, where there are typically large centre-left parties that lead governments. Galway West could lead the country in showing this is possible in Ireland - we are unique in having many credible centre-Left candidates in Seamus Sheridan (Green Party ), Niall Ó Tuathail (Social Democrats ), Catherine Connolly (Independent ), and Trevor Ó Clochartaigh (Sinn Féin ).
As a result, Insider will try to divine what a resultant centre-Left programme for government could look like, and how Galway’s candidates would represent this.
Public services
A common belief across the Left is that the basic public services – health, education, childcare, and housing – should be mostly financed and run by government. How would Team Galway contribute?
Niall Ó Tuathail has experience in major health reform in the NHS in England and has outlined detailed policy on how to fix the Irish health service. He also has former minister of state at the department of health Róisín Shortall as a party leader. Independent Catherine Connolly is a clinical psychologist who has also spent many years challenging the local HSE leadership in her role as a councillor.
Insider would argue that a smart investment in our public services would create a fairer society and is in everyone’s long-term interests – even those paying the most tax. For example, for every euro invested in primary care we save six euros in hospitals. This would be better for our health and better for our pockets.
Supporting business and the marginalised
In politics, you are either pro-society or pro-business. Anyone outside politics knows that to have a strong society you need to have strong businesses. So how does the Galway Left stack up on business?
Seamus Sheridan is arguably the most credible business candidate in the country on business. He and his brother have built cheese empire Sheridan’s over the past few decades, employing more than 100 people. Ó Tuathail is more recently on the entrepreneurial path, setting up a software design firm working in healthcare and news. Previously, he worked at McKinsey & Company, a prestigious consulting firm trusted for advice by CEOs and governments across the world.
With two TDs with real experience of starting businesses, Ireland could better support Irish businesses to get set up and improve our society by providing jobs, improving our quality of life with products and services, and paying taxes.
The Left argues there is a minimum standard below which no person should have to live, and therefore aims to protect the most marginalised in society. What are the credentials of the Galway candidates on these issues?
Sen Trevor Ó Clochartaigh has a credible track record of raising the issues of Traveller ethnicity, direct provision, and campaigning for the survivors of State institutions in the Seanad. Cllr Connolly has been outspoken on supporting victims of domestic violence and single mothers. All four candidates canvassed for a Yes during the recent marriage referendum, with Ó Tuathail leading the Yes Equality campaign in Galway.
The environment and Gaeilge
Storm Imogen was the ninth storm this year – an average of one every four days. This is not normal and Insider believes climate change must be tackled. A Green TD like Seamus Sheridan in government would force the environment up the agenda – not just climate change but other local environmental issues such as large-scale fish farms and sustainable agriculture. Cllr Connolly has been a relentless campaigner against a new road for Galway, in favour of improving public transport first.
Depending on who you talk to, the Irish language is somewhere between on the edge of extinction and potentially on the cusp of a mini-revival. Wherever we are on this, most would agree the language needs some support to survive and thrive. Three of our candidates – Ó Clochartaigh, Connolly, and Ó Tuathail - are Gaeilgeoirs, with Trevor being the Sinn Féin spokesman for the language and Gaeltacht. With such a team in government, we would have strong advocates for our native tongue in the Dáil.
The catch - no massive tax cuts
There is always a catch! With an emphasis on State-funded public service, such a government would not be able to promise the short-term tax cuts on offer from Fianna Fáil, Fine Gael, and Labour.
What would Insider say to those who turn red looking at their paycheck each month? She would ask them to take the short-term pain for long-term gain. Investing smartly in our public services will reduce the long-term cost of the services and improve the value for money we get from our taxes. Supporting local businesses will provide employment and make our economy less dependent on multinationals. Protecting the most marginalised will allow us to create a more equal society that will be a source of pride and will reduce future costs for the State. Ireland playing a leading role in tackling climate change globally could secure our environment for future generations. Keeping our teanga beo will allow future generations the option of making it the main language on this island.
Galway West can lead the State in returning a majority of credible centre-left TDs with integrity and competence – Insider recommends we do it! | {
"pile_set_name": "OpenWebText2"
} | 0.092263 | [
{
"begin": 0,
"end": 67,
"score": 0.08330294
},
{
"begin": 67,
"end": 209,
"score": 0.14911842
},
{
"begin": 209,
"end": 315,
"score": 0.02124131
},
{
"begin": 315,
"end": 504,
"score": 0.056931525
},
{
"begin": 504,
"end": 756,
"score": 0.045778666
},
{
"begin": 756,
"end": 785,
"score": 0.011592479
},
{
"begin": 785,
"end": 927,
"score": 0.2885035
},
{
"begin": 927,
"end": 1049,
"score": 0.04818217
},
{
"begin": 1049,
"end": 1334,
"score": 0.013952625
},
{
"begin": 1334,
"end": 6207,
"score": 0.031529333
}
] |
Q:
how to trigger the click event without clear default click event on jstree
using jstree, i use the next code to Trigger click , but , i can not see the defalut click event, like : the blue background when i click ,
this is my code :
<div id="wrap">
<div id="header">header</div>
<div id="main">
<div id="demo1" style="float:left;width:50%;">
<ul>
<li>
<a id='a' href="">aaa</a>
<!-- UL node only needed for children - omit if there are no children -->
<ul>
<li><a id="a_1" href="#"> bbb</a></li>
<li><a id="a_2" href="#"> ccc</a></li>
</ul>
</li>
</ul>
</div>
<div id="content">www</div>
</div>
</div>
<div id="footer">
footer
</div>
<script type="text/javascript">
$(function () {
$("#demo1").jstree({
"themes": {
"theme": "default",
"dots": true,
"icons": true,
"url": "themes/default/style.css"
},
"plugins" : [ "themes", "html_data" ]
});
$('#a_1').click(function(){
$('#content').html('bbb \'s content')
//return false;
})
$('#a_2').click(function(){
$('#content').html('ccc \'s content')
//return false;
})
});
</script>
i find some code like this :
.bind("create.jstree", function (e, data) {
alert(data)
})
its mean is : alert data when someone cerate a new file ,
so
does jstree has a method like "click.jstree" ?
thanks
A:
What you have is fine on the events side, you're just missing a plugin...in the new 1.0 model the ui bits are a separate plugin, if you just change your plugins from this:
"plugins" : [ "themes", "html_data" ]
To this:
"plugins" : [ "themes", "html_data", "ui" ]
You'll get the current node selection coloring, you can give it a try here.
| {
"pile_set_name": "StackExchange"
} | 0.025521 | [
{
"begin": 0,
"end": 80,
"score": 0.029984225
},
{
"begin": 80,
"end": 222,
"score": 0.05852979
},
{
"begin": 222,
"end": 240,
"score": 0.0082952175
},
{
"begin": 240,
"end": 256,
"score": 0.02054715
},
{
"begin": 256,
"end": 290,
"score": 0.008364634
},
{
"begin": 290,
"end": 310,
"score": 0.010551238
},
{
"begin": 310,
"end": 365,
"score": 0.009857078
},
{
"begin": 365,
"end": 382,
"score": 0.04165838
},
{
"begin": 382,
"end": 403,
"score": 0.018881164
},
{
"begin": 403,
"end": 1971,
"score": 0.014646785
}
] |
Q:
Cannot create JavaScript breakpoints in Visual Studio 2017
I cannot insert breakpoints into JavaScript files in visual studio 2017. Anyone else having this issue and has anyone found a solution?
edit:
The other questions were related to breakpoints not being HIT. I can't even insert breakpoints into JS to begin with. The option is not in the context menu in Visual Studio.
edit 2: Even if I create a brand new JS file (since this project was created in VS2015) I still can't insert a breakpoint. The option just isn't listed in the context menu.
A:
I test it using a simple JavaScript app in VS2015 and VS2017 Enterprise version.
It really has this menu item in VS2015, but not in VS2017:
VS2015:
VS2017:
One workaround is that just as Jimmy's suggestion, use the F9 or add it in A with mouse in above screen shot.
Other community members also submitted this feedback to the product team here:
https://developercommunity.visualstudio.com/content/problem/25474/right-click-add-breakpoint-option-not-in-list.html
| {
"pile_set_name": "StackExchange"
} | 0.024319 | [
{
"begin": 0,
"end": 63,
"score": 0.008642297
},
{
"begin": 63,
"end": 137,
"score": 0.013466713
},
{
"begin": 137,
"end": 200,
"score": 0.017492844
},
{
"begin": 200,
"end": 206,
"score": 0.012217224
},
{
"begin": 206,
"end": 269,
"score": 0.053335425
},
{
"begin": 269,
"end": 324,
"score": 0.03616466
},
{
"begin": 324,
"end": 380,
"score": 0.01228664
},
{
"begin": 380,
"end": 503,
"score": 0.01561861
},
{
"begin": 503,
"end": 554,
"score": 0.011731312
},
{
"begin": 554,
"end": 1024,
"score": 0.008954669
}
] |
To continue, please select:
Your information has been submitted successfully!
CONSUMER GOODS
Connected Vending Quenches Consumers’ Thirst
The Challenge
As soda sales in retail outlets wane, beverage distributors must find new channels to get products to consumers. One major global food and beverage company also saw an opportunity to improve the profitability of its vending machines, soda fountains and coolers by relying on the Internet of Things (IoT) technology.
The company asked Cognizant to help address challenges such as out-of-stock situations and equipment theft. It also wanted to increase insights about consumer behavior and lower restocking costs.
Our Approach
Cognizant managed a multivendor effort to build an equipment network that would leverage connected services. We also oversaw technology prototyping and selection. Our recommendation: an IoT technology solution that included both data analytics and software to interpret sensor data, which could in turn send automated alerts to management.
Now, when supplies in individual locations are low, the company’s new IoT solution automatically orders new products and its drivers avoid visiting locations that have sufficient supply. Sensors issue alerts on potential malfunctions in equipment. If equipment is moved, security personnel are able to constantly monitor its location.
Can Do: Smart Vending Machines Stay Stocked and Safe
Better intelligence about vending equipment means the beverage company can optimize the product mix in any given location while preventing stock-outs. Sensors in the equipment recognize potential malfunctions and flag possible theft, which also lessens downtime, enables preventive maintenance and lowers costs. | {
"pile_set_name": "Pile-CC"
} | 0.014855 | [
{
"begin": 0,
"end": 28,
"score": 0.010412407
},
{
"begin": 28,
"end": 79,
"score": 0.039598234
},
{
"begin": 79,
"end": 95,
"score": 0.0253489
},
{
"begin": 95,
"end": 141,
"score": 0.06332459
},
{
"begin": 141,
"end": 156,
"score": 0.019575324
},
{
"begin": 156,
"end": 270,
"score": 0.017354012
},
{
"begin": 270,
"end": 473,
"score": 0.0052409116
},
{
"begin": 473,
"end": 582,
"score": 0.058130227
},
{
"begin": 582,
"end": 670,
"score": 0.012217224
},
{
"begin": 670,
"end": 1727,
"score": 0.016173938
}
] |
Ever wanted your own self-driving car? You can buy one today—but it may be a while until it officially becomes your personal chauffeur.
Tesla recently announced that all vehicles currently in production have full self-driving hardware pre-installed. To illustrate, they released a video from the driver’s perspective “behind the wheel” of a self-driving Tesla in action.
While private companies make headlines publicly testing fully autonomous vehicles, no one has yet offered a product anybody can buy. Tesla is closer, but not quite there yet either.
We’re still a ways away from a fully worked out set of laws and regulations. And the software still needs perfecting before it takes over the wheel of thousands of cars. But over time, the regulatory environment will be forced to adapt as more cars hit the road and other companies follow in Tesla’s footsteps. Most of the big automakers are also working on their own tech.
Only time will tell how that unfolds.
Regulations aside, you can still buy a Tesla today in anticipation of the day a software update makes it self-driving. Or for a first-person taste of the future, you can take a ride in a self-driving Tesla right now in the video below.
Image credit: Tesla/Vimeo | {
"pile_set_name": "OpenWebText2"
} | 0.049899 | [
{
"begin": 0,
"end": 39,
"score": 0.033074442
},
{
"begin": 39,
"end": 136,
"score": 0.010204159
},
{
"begin": 136,
"end": 251,
"score": 0.007705181
},
{
"begin": 251,
"end": 372,
"score": 0.013605545
},
{
"begin": 372,
"end": 506,
"score": 0.018187003
},
{
"begin": 506,
"end": 555,
"score": 0.014091457
},
{
"begin": 555,
"end": 633,
"score": 0.025005542
},
{
"begin": 633,
"end": 726,
"score": 0.016035106
},
{
"begin": 726,
"end": 867,
"score": 0.0168681
},
{
"begin": 867,
"end": 1232,
"score": 0.010759487
}
] |
Wernicke\'s encephalopathy (WE) is a potentially fatal, neuropsychiatric syndrome and absolutely a neurological emergency caused most commonly by thiamine deficiency\[[@CIT0001]\]. It is recognized by the constellation of symptoms including ataxia, confusional state, and diplopia. The disorder is still significantly missed, leading to death or to the chronic form of the encephalopathy recognized as Korsakoff\'s syndrome\[[@CIT0002]\]. Herein, we describe the disease in a girl who suffered from acute myeloblastic leukemia (AML).
A 12-year-old female, known case of AML M4 was consulted due to mild confusion, diplopia, and ataxia. Her disease had started 6 months prior to admission. She had received bone marrow transplantation from her brother 40 days before. On neurological examination, she was mildly confused with right sixth nerve palsy and truncal ataxia; also, she demonstrated gait ataxia and impaired finger to nose test prominently on the right side. For the better evaluation, brain MRI was recommended. On T2 weighted axial brain MRI ([Fig. 1](#F0001){ref-type="fig"}), parts A and B), hyperintense lesions in middle cerebellar peduncles, and similar intensities in the tectum and tegmentum of midbrain on the left side were detected; furthermore, on brain T1 weighted MRI with contrast ([Fig. 1](#F0001){ref-type="fig"}, part C), severely intense enhancement in mammillary bodies was seen; on the other hand, diffusion weight brain MRI revealed hyperintense lesions in the medial portions of thalami ([Fig. 1](#F0001){ref-type="fig"}, part D).
{#F0001}
According to the clinical findings in conjunction with imaging studies, the diagnosis of WE was made and thiamin was started. In the next day visit, ocular palsy had resolved completely.
We believe that malnutrition stemming from persistent loss of appetite as a result of the chemotherapeutic agents or the leukemia itself may have provoked thiamin deficiency and had caused WE.
The clinical settings in which WE takes place is growing; conspicuously, in conditions like alcohol consumption, prolonged feeding through parenteral routes, hyperemesis gravidarum, AIDS, anorexia nervosa, thyrotoxicosis, malabsorption states, dialysis, malignancy, and gastroplasty with postoperative vomiting\[[@CIT0003]\].
Previously, few authors have described the association of acute lymphoblastic leukemia (ALL) and Wernicke\'s encephalopathy\[[@CIT0004]--[@CIT0009]\]; likewise, on the subject of AML, the reports are scarce, too\[[@CIT0010], [@CIT0011]\]. Baek et al\[[@CIT0010]\], described a case of acute WE arising following allogeneic peripheral blood stem cell transplantation accompanying with prolonged administration of total parenteral nutrition. Also, Pitella et al\[[@CIT0011]\] reported a 30-year-old female suffering from WE associated with promyelocytic leukemia which was detected at autopsy.
In WE, characteristic radiologic findings on brain MRI consist of symmetric signal changes in the thalami, mamillary bodies, tectal plate, and periaqueductal area\[[@CIT0012]\]. Atypical MRI findings comprise symmetric alterations of the cerebellum, vermis of cerebellum, cranial nerve nuclei, red nuclei, dentate nuclei, caudate nuclei, splenium, and cerebral cortex\[[@CIT0012]\].
In conclusion, the possible occurrence of Wernicke\'s encephalopathy should be regarded in young patients encountering confusion or other neurological deficits who are suffering from malignancies especially when concurrent chemotherapy is administrated. It is significant that clinical suspicion is of utmost importance in the diagnosis and treatment of WE since delayed diagnosis may potentially cause devastating results.
| {
"pile_set_name": "PubMed Central"
} | 0.05813 | [
{
"begin": 0,
"end": 181,
"score": 0.030327583
},
{
"begin": 181,
"end": 282,
"score": 0.031357653
},
{
"begin": 282,
"end": 439,
"score": 0.046465382
},
{
"begin": 439,
"end": 534,
"score": 0.019436494
},
{
"begin": 534,
"end": 637,
"score": 0.038053125
},
{
"begin": 637,
"end": 690,
"score": 0.018048171
},
{
"begin": 690,
"end": 768,
"score": 0.04543531
},
{
"begin": 768,
"end": 969,
"score": 0.0495556
},
{
"begin": 969,
"end": 1023,
"score": 0.036336336
},
{
"begin": 1023,
"end": 4094,
"score": 0.010967735
}
] |
The invention relates to an improved container construction and more particularly to a four-sided plastic box and lid particularly useful in automatic packaging operations.
When packaging small hardware items for sale particularly at consumer outlets, it is desirable to utilize packages which may be conveniently suspended from display racks. Additionally, the packages may include a window so that the contents of the package are viewable by the potential customer. Another feature desired in such packages is compatibility with automatic filling equipment. Thus, a container may be automatically filled with materials at one station and moved to a distinct station where a lid for the container is positioned and attached to the container.
Various prior art packaging items and equipment have been suggested to accomplish the desired objectives. The present invention constitutes an improvement over such prior art. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.015966 | [
{
"begin": 0,
"end": 173,
"score": 0.008954669
},
{
"begin": 173,
"end": 344,
"score": 0.017770508
},
{
"begin": 344,
"end": 468,
"score": 0.0071151447
},
{
"begin": 468,
"end": 560,
"score": 0.013536129
},
{
"begin": 560,
"end": 743,
"score": 0.011037151
},
{
"begin": 743,
"end": 849,
"score": 0.008017553
},
{
"begin": 849,
"end": 918,
"score": 0.015202113
}
] |
Mulugeta Buli
Mulugeta Buli (1917–1960), was an Ethiopian military general and politician.
Biography
After completing mission school Buli attended the Tafari Makonnen School and the Holeta Military Academy, and was the only Oromo officer cadet in the latter institution. He was an opponent of Italian fascism, and fled to Kenya and Djibouti during the Italian occupation of Ethiopia. He fought in the Battle of Maychew as an officer in Haile Selassie's elite Guard contingent which was better trained and equipped than most other Ethiopian units. As commander of the Imperial Body Guard from 1941 until 1955, he established the Kagnew Battalions and the Ethiopian Public Security Department. He served as chief of staff of the armed forces, chief of staff of the emperor, and as a member of the Ethiopian government, in which capacity he created a private security cabinet for Emperor Selassie.
Organizers of the 1960 Ethiopian coup attempt wanted Buli to become Chief of Staff because of his popularity among members of the armed forces. After refusing he was taken hostage (along with 20 other government officials) by the rebels. When it became apparent that the take-over was doomed to fail General Buli was killed with 14 others on 17 December 1960 by forces under Brigadier-General Mengistu Neway, a leader of the coup - and a fellow veteran of the battle of Maychew.
Ivo Strecker of Johannes Gutenberg-Universität Mainz called Buli "one of the most charismatic figures among the young Ethiopian elite" of his era. Author Bahru Zewde suggests that Buli was rumoured to be engineering a coup of his own to depose Selassie in the early 1950s, but had never substantiated these rumours. There is now a technical college in Addis Ababa named in honour of Buli.
References
Category:Ethiopian generals
Category:1917 births
Category:1960 deaths | {
"pile_set_name": "Wikipedia (en)"
} | 0.060927 | [
{
"begin": 0,
"end": 14,
"score": 0.036679696
},
{
"begin": 14,
"end": 92,
"score": 0.017909339
},
{
"begin": 92,
"end": 104,
"score": 0.013119632
},
{
"begin": 104,
"end": 274,
"score": 0.0072192685
},
{
"begin": 274,
"end": 387,
"score": 0.073313765
},
{
"begin": 387,
"end": 550,
"score": 0.023460433
},
{
"begin": 550,
"end": 695,
"score": 0.02262963
},
{
"begin": 695,
"end": 898,
"score": 0.007809305
},
{
"begin": 898,
"end": 1043,
"score": 0.02655065
},
{
"begin": 1043,
"end": 1851,
"score": 0.13251819
}
] |
Section: Development
Priority: optional
Homepage: https://buck.build
Standards-Version: 3.9.2
Package: buck
Version: v<VERSION>
Maintainer: [email protected]
Recommends: watchman, nailgun
Depends: openjdk-8-jre-headless, python3, python3-distutils
Architecture: all
Copyright: LICENSE
Readme: README.md
Changelog: Changelog
Files: buck /usr/local/bin
Description: A fast build system that encourages the creation of small, reusable modules over a variety of platforms and languages. https://buck.build
| {
"pile_set_name": "Github"
} | 0.010343 | [
{
"begin": 0,
"end": 21,
"score": 0.0056227
},
{
"begin": 21,
"end": 40,
"score": 0.008885254
},
{
"begin": 40,
"end": 69,
"score": 0.00843405
},
{
"begin": 69,
"end": 94,
"score": 0.00930175
},
{
"begin": 94,
"end": 109,
"score": 0.074912034
},
{
"begin": 109,
"end": 129,
"score": 0.004997955
},
{
"begin": 129,
"end": 158,
"score": 0.008121678
},
{
"begin": 158,
"end": 188,
"score": 0.0136749605
},
{
"begin": 188,
"end": 248,
"score": 0.01596569
},
{
"begin": 248,
"end": 502,
"score": 0.0054144515
}
] |
While fans are still reeling from the October announcement that Rage Against the Machine frontman Zack de la Rocha is quitting the band over artistic differences, Rage releases a towering collection of cover tunes as their swan song.
In this 14-song collection, Rage covers Springsteen, the Stooges and Cypress Hill as well as Bob Dylan and the Rolling Stones. Under the direction of wonder producer Rick Rubin, the band attempts to get at each song’s essence not through imitation, but interpretation.
On this record, the Rage boys prove to be innovative stylists.
Their thrash ‘n’ burn version of Dylan’s “Maggie’s Farm” is outstanding, as Rage adjusts the tempo and arrangement to reflect the song’s angry-no-more roar.
They do the same for the Stones’ “Street Fighting Man,” again wresting possession of a well-known song from the originator and claiming it as their own.
But their cover of Detroit’s MC5’s “Kick Out Jams” doesn’t equal the original’s hard-core center. Still that’s a small complaint for a great rock album that at least for now is going to be the final studio opus from the broken down Machine.
NINE INCH NAILS
“Nineinchnails: Things Falling Apart”
Nothing Records
For five years there wasn’t an electronic, metallic, or even gothic peep out of Nine Inch Nails, making many believe the band was unofficially deceased. Then in 1999 all that changed. The band released the incredible double disc “The Fragile” with which Trent Reznor and company reclaimed and polished NIN’s reputation as one of the sharpest blades in cutting edge music.
A year, a successful world-wide tour and a pair of Grammy nominations later, Reznor – a studio rat at heart – has taken the time to produced “Nineinchnails: Things Falling Apart,” a re-mixed inside-out retooling of some of the excellent “Fragile” pieces.
The new record includes six of the original’s best, as well as a cover of Gary Numan’s “Metal” and Trent’s own “The Great Collapse” (a song written for “The Fragile” that didn’t make the final cut).
For most bands this would be unusual, but in fact it’s the third time Reznor has re-examined his work in re-mixed versions.
Unfortunately, on “Thing’s Falling Apart,” the re-mixes are less auspicious than either “Fixed” or “Further Down the Spiral” – his past re-mix efforts. The new disc is further sucked down the spiral by three separate versions of “Starf-kers, Inc.” none of which tops the original featuring Marilyn Manson.
The basic problem is this disc never comes close to bettering “The Fragile,” making Reznor seem rather like an artist who paints a mustache on the Mona Lisa because he doesn’t know when to lay the brush down.
STEVIE RAY VAUGHAN and DOUBLE TROUBLE
“SRV”
Legacy/Epic
Eyes clamped shut, his face contorted in the classic ugly face and his fingers flying in the high stratospheric range of his beat-up Fender Stratocaster is how you want to remember Stevie Ray Vaughan, the Texas guitar slinger, dead 10 years now.
The helicopter crash that took the man’s life didn’t stop his music, which has remained in catalog since and is now being celebrated on a terrific four-disc tribute “SRV.”
The set’s 54 tracks are gleaned from Vaughan’s performances and studio work with his band Double Trouble between ’77 and his final concert at Alpine Valley in Wisconsin August 25, 1990, the night of his death. While the studio work is interesting and a pleasure to listen to, Vaughan was a player who lived for the stage. His Carnegie Hall tracks and the trio of Alpine Valley songs are testament to that.
While the three discs of music are all very fine, it’s the brief fourth disc fans will appreciate most. Here Vaughan is captured on a DVD featuring five un-aired, never released TV performances from the PBS music series “Austin City Limits.”
Collections such as this have in the past relied on liner notes and photographs to bring their subjects to life. On “SRV,” the inclusion of concert performance in DVD format may be the smartest box set innovation of the year, and sets the standard for future collections.
3LW
“3LW”
½ Epic
If one cute teenage girl who can sing is good, two has to be better and three is even better. With that kind of marketing behind 3LW (Three Little Women) how can this pop infused R&B/hip-hop trio miss?
The Lil’ Women, who range in age from 14 to 17, display some solid vocal abilities on their debut disc.
While they are technically a superior ensemble that at times is remarkably reminiscent of the early Supremes, they are stylistically scattered. The trio seems artistically divided as it delves into Britney-pop, soul-lite ballads and even hip-hop.
The trio is best when they tackle straight-ahead contemporary R&B like the song “I’m Gonna Make You Miss Me.” This disc’s other standout is “I Can’t Take It,” on which the girls sing with gangsta rapper Nas. | {
"pile_set_name": "Pile-CC"
} | 0.078508 | [
{
"begin": 0,
"end": 234,
"score": 0.044405237
},
{
"begin": 234,
"end": 362,
"score": 0.0253489
},
{
"begin": 362,
"end": 504,
"score": 0.0121478075
},
{
"begin": 504,
"end": 568,
"score": 0.08581903
},
{
"begin": 568,
"end": 726,
"score": 0.2712817
},
{
"begin": 726,
"end": 880,
"score": 0.085282035
},
{
"begin": 880,
"end": 979,
"score": 0.06132676
},
{
"begin": 979,
"end": 1122,
"score": 0.038224805
},
{
"begin": 1122,
"end": 1139,
"score": 0.17034957
},
{
"begin": 1139,
"end": 4852,
"score": 0.08170467
}
] |
That's actually the way I do it at the moment.
But it is clumsy to expose an interator class/struct for that.
Calling opApply with additional arguments
would result in a more native and simpler solution.
There would be also only stack allocated memory (not sure, but I give that
argument a shot :P).
It's also seems to be an artificial limitation. - Does someone know if I'm
right here?
class Foo
{
int opApply(int delegate(ref Type [, ...]) dg, uint arg = 0)
{
int ret = 0;
foreach(V item; items)
{
if(item.size <= size) break; //use of an additional argument for filtering
if(uint ret = dg(item)) break;
}
return ret;
}
}
Daniel Keep Wrote:
Mandel wrote:
Hi,
I like to know if this feature request is even feasible
and what others think of it, of course.
class Foo {
int opApply(int delegate(ref Type [, ...]) dg, float f, char[] s) {
/*...*/
}
}
float f = 1.5;
char[] s = "abc";
foreach(x; xs; foo; f, s)
{
}
The idea is to pass additional values from foreach to opApply.
Would be great to filter values in opApply for example.
(or even chaining foreach in opApply...) | {
"pile_set_name": "Pile-CC"
} | 0.134761 | [
{
"begin": 0,
"end": 47,
"score": 0.01492445
},
{
"begin": 47,
"end": 110,
"score": 0.20522906
},
{
"begin": 110,
"end": 152,
"score": 0.030327583
},
{
"begin": 152,
"end": 204,
"score": 0.016937515
},
{
"begin": 204,
"end": 279,
"score": 0.024833864
},
{
"begin": 279,
"end": 300,
"score": 0.17661177
},
{
"begin": 300,
"end": 375,
"score": 0.022213135
},
{
"begin": 375,
"end": 387,
"score": 0.014507953
},
{
"begin": 387,
"end": 397,
"score": 0.11600884
},
{
"begin": 397,
"end": 1073,
"score": 0.03736641
}
] |
In some situations, including emergencies, an incapacitated telephone user may be unable to reach the phone to make or take a call. The state of affairs may be even more complicated when a cellular telephone is used, since the phone does not operate to receive calls if it is turned off. Given these circumstances, incapacitated users may be unable to communicate with others to receive help when assistance is most needed. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.018881 | [
{
"begin": 0,
"end": 132,
"score": 0.019297661
},
{
"begin": 132,
"end": 288,
"score": 0.01665985
},
{
"begin": 288,
"end": 423,
"score": 0.04543531
}
] |
{
"images" : [
{
"filename" : "fall_promo_menu_left.png",
"idiom" : "universal",
"scale" : "1x"
},
{
"filename" : "[email protected]",
"idiom" : "universal",
"scale" : "2x"
},
{
"filename" : "[email protected]",
"idiom" : "universal",
"scale" : "3x"
}
],
"info" : {
"author" : "xcode",
"version" : 1
}
}
| {
"pile_set_name": "Github"
} | 0.002968 | [
{
"begin": 0,
"end": 17,
"score": 0.05373499
},
{
"begin": 17,
"end": 23,
"score": 0.016243355
},
{
"begin": 23,
"end": 70,
"score": 0.016173938
},
{
"begin": 70,
"end": 99,
"score": 0.0131890485
},
{
"begin": 99,
"end": 120,
"score": 0.007635765
},
{
"begin": 120,
"end": 127,
"score": 0.01492445
},
{
"begin": 127,
"end": 133,
"score": 0.016243355
},
{
"begin": 133,
"end": 183,
"score": 0.016035106
},
{
"begin": 183,
"end": 212,
"score": 0.0131890485
},
{
"begin": 212,
"end": 418,
"score": 0.0056921155
}
] |
/* crypto/rsa/rsa_pk1.c */
/* Copyright (C) 1995-1998 Eric Young ([email protected])
* All rights reserved.
*
* This package is an SSL implementation written
* by Eric Young ([email protected]).
* The implementation was written so as to conform with Netscapes SSL.
*
* This library is free for commercial and non-commercial use as long as
* the following conditions are aheared to. The following conditions
* apply to all code found in this distribution, be it the RC4, RSA,
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
* included with this distribution is covered by the same copyright terms
* except that the holder is Tim Hudson ([email protected]).
*
* Copyright remains Eric Young's, and as such any Copyright notices in
* the code are not to be removed.
* If this package is used in a product, Eric Young should be given attribution
* as the author of the parts of the library used.
* This can be in the form of a textual message at program startup or
* in documentation (online or textual) provided with the package.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* "This product includes cryptographic software written by
* Eric Young ([email protected])"
* The word 'cryptographic' can be left out if the rouines from the library
* being used are not cryptographic related :-).
* 4. If you include any Windows specific code (or a derivative thereof) from
* the apps directory (application code) you must include an acknowledgement:
* "This product includes software written by Tim Hudson ([email protected])"
*
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
*/
#include "constant_time_locl.h"
#include <stdio.h>
#include "cryptlib.h"
#include <openssl/bn.h>
#include <openssl/rsa.h>
#include <openssl/rand.h>
int RSA_padding_add_PKCS1_type_1(unsigned char *to, int tlen,
const unsigned char *from, int flen)
{
int j;
unsigned char *p;
if (flen > (tlen - RSA_PKCS1_PADDING_SIZE)) {
RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_1,
RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE);
return (0);
}
p = (unsigned char *)to;
*(p++) = 0;
*(p++) = 1; /* Private Key BT (Block Type) */
/* pad out with 0xff data */
j = tlen - 3 - flen;
memset(p, 0xff, j);
p += j;
*(p++) = '\0';
memcpy(p, from, (unsigned int)flen);
return (1);
}
int RSA_padding_check_PKCS1_type_1(unsigned char *to, int tlen,
const unsigned char *from, int flen,
int num)
{
int i, j;
const unsigned char *p;
p = from;
if ((num != (flen + 1)) || (*(p++) != 01)) {
RSAerr(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1,
RSA_R_BLOCK_TYPE_IS_NOT_01);
return (-1);
}
/* scan over padding data */
j = flen - 1; /* one for type. */
for (i = 0; i < j; i++) {
if (*p != 0xff) { /* should decrypt to 0xff */
if (*p == 0) {
p++;
break;
} else {
RSAerr(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1,
RSA_R_BAD_FIXED_HEADER_DECRYPT);
return (-1);
}
}
p++;
}
if (i == j) {
RSAerr(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1,
RSA_R_NULL_BEFORE_BLOCK_MISSING);
return (-1);
}
if (i < 8) {
RSAerr(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1,
RSA_R_BAD_PAD_BYTE_COUNT);
return (-1);
}
i++; /* Skip over the '\0' */
j -= i;
if (j > tlen) {
RSAerr(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_1, RSA_R_DATA_TOO_LARGE);
return (-1);
}
memcpy(to, p, (unsigned int)j);
return (j);
}
int RSA_padding_add_PKCS1_type_2(unsigned char *to, int tlen,
const unsigned char *from, int flen)
{
int i, j;
unsigned char *p;
if (flen > (tlen - 11)) {
RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_TYPE_2,
RSA_R_DATA_TOO_LARGE_FOR_KEY_SIZE);
return (0);
}
p = (unsigned char *)to;
*(p++) = 0;
*(p++) = 2; /* Public Key BT (Block Type) */
/* pad out with non-zero random data */
j = tlen - 3 - flen;
if (RAND_bytes(p, j) <= 0)
return (0);
for (i = 0; i < j; i++) {
if (*p == '\0')
do {
if (RAND_bytes(p, 1) <= 0)
return (0);
} while (*p == '\0');
p++;
}
*(p++) = '\0';
memcpy(p, from, (unsigned int)flen);
return (1);
}
int RSA_padding_check_PKCS1_type_2(unsigned char *to, int tlen,
const unsigned char *from, int flen,
int num)
{
int i;
/* |em| is the encoded message, zero-padded to exactly |num| bytes */
unsigned char *em = NULL;
unsigned int good, found_zero_byte;
int zero_index = 0, msg_index, mlen = -1;
if (tlen < 0 || flen < 0)
return -1;
/*
* PKCS#1 v1.5 decryption. See "PKCS #1 v2.2: RSA Cryptography Standard",
* section 7.2.2.
*/
if (flen > num)
goto err;
if (num < 11)
goto err;
em = OPENSSL_malloc(num);
if (em == NULL) {
RSAerr(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2, ERR_R_MALLOC_FAILURE);
return -1;
}
memset(em, 0, num);
/*
* Always do this zero-padding copy (even when num == flen) to avoid
* leaking that information. The copy still leaks some side-channel
* information, but it's impossible to have a fixed memory access
* pattern since we can't read out of the bounds of |from|.
*
* TODO(emilia): Consider porting BN_bn2bin_padded from BoringSSL.
*/
memcpy(em + num - flen, from, flen);
good = constant_time_is_zero(em[0]);
good &= constant_time_eq(em[1], 2);
found_zero_byte = 0;
for (i = 2; i < num; i++) {
unsigned int equals0 = constant_time_is_zero(em[i]);
zero_index =
constant_time_select_int(~found_zero_byte & equals0, i,
zero_index);
found_zero_byte |= equals0;
}
/*
* PS must be at least 8 bytes long, and it starts two bytes into |em|.
* If we never found a 0-byte, then |zero_index| is 0 and the check
* also fails.
*/
good &= constant_time_ge((unsigned int)(zero_index), 2 + 8);
/*
* Skip the zero byte. This is incorrect if we never found a zero-byte
* but in this case we also do not copy the message out.
*/
msg_index = zero_index + 1;
mlen = num - msg_index;
/*
* For good measure, do this check in constant time as well; it could
* leak something if |tlen| was assuming valid padding.
*/
good &= constant_time_ge((unsigned int)(tlen), (unsigned int)(mlen));
/*
* We can't continue in constant-time because we need to copy the result
* and we cannot fake its length. This unavoidably leaks timing
* information at the API boundary.
* TODO(emilia): this could be addressed at the call site,
* see BoringSSL commit 0aa0767340baf925bda4804882aab0cb974b2d26.
*/
if (!good) {
mlen = -1;
goto err;
}
memcpy(to, em + msg_index, mlen);
err:
if (em != NULL)
OPENSSL_free(em);
if (mlen == -1)
RSAerr(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2,
RSA_R_PKCS_DECODING_ERROR);
return mlen;
}
| {
"pile_set_name": "Github"
} | 0.010343 | [
{
"begin": 0,
"end": 27,
"score": 0.012078391
},
{
"begin": 27,
"end": 85,
"score": 0.004581459
},
{
"begin": 85,
"end": 109,
"score": 0.013536129
},
{
"begin": 109,
"end": 161,
"score": 0.015063282
},
{
"begin": 161,
"end": 199,
"score": 0.005587992
},
{
"begin": 199,
"end": 270,
"score": 0.0112454
},
{
"begin": 270,
"end": 346,
"score": 0.010273575
},
{
"begin": 346,
"end": 391,
"score": 0.016798683
},
{
"begin": 391,
"end": 416,
"score": 0.00999591
},
{
"begin": 416,
"end": 9127,
"score": 0.023803791
}
] |
GFI Russia
GFI Russia is a Russian video game developer. It was founded in 1996 as MiST Land South by a group of friends and located in Zelenograd, Moscow. It was purchased in 2003 by Game Factory Interactive and reorganize into GFI Russia in 2006.
MiST Land South was chosen by Game Factory Interactive (GFI) to develop the next two installments in the Jagged Alliance series: Jagged Alliance 3 and Jagged Alliance 3D. The MiST Land South has't completed the development because of Strategy First (the owners of the Jagged Alliance intellectual property) had withdrawn the license from GFI.
Games
MiST Land South
MiST Land South released three strategy games since its inception:
History of Wars: Napoleon (2000)
Paradise Cracked (2002)
The Power of Law (2004)
The Power of Law: Police stories (2004)
Alfa: Antiterror (2005)
Аlfa: Antiterror. Male work (2005)
GFI Russia
Gluc'Oza: Action! (2007)
Hired Guns - The Jagged Edge (2007) (game-engine and idea from cancelled Jagged Alliance 3D)
4th Batalion (cancelled in 2007)
Warfare (2008)
References
External links
GFI Russia at MobyGames
Category:Video game companies established in 1996
Category:Video game companies of Russia
Category:Zelenograd
Category:1996 establishments in Russia | {
"pile_set_name": "Wikipedia (en)"
} | 0.025177 | [
{
"begin": 0,
"end": 11,
"score": 0.08850401
},
{
"begin": 11,
"end": 59,
"score": 0.037023053
},
{
"begin": 59,
"end": 158,
"score": 0.016104523
},
{
"begin": 158,
"end": 251,
"score": 0.015340946
},
{
"begin": 251,
"end": 423,
"score": 0.014855034
},
{
"begin": 423,
"end": 595,
"score": 0.015202113
},
{
"begin": 595,
"end": 602,
"score": 0.017006932
},
{
"begin": 602,
"end": 620,
"score": 0.016937515
},
{
"begin": 620,
"end": 687,
"score": 0.012841969
},
{
"begin": 687,
"end": 1253,
"score": 0.043375164
}
] |
---
abstract: 'Faraday waves in a cigar-shaped Bose-Einstein condensate are created. It is shown that periodically modulating the *transverse* confinement, and thus the nonlinear interactions in the BEC, excites small amplitude *longitudinal* oscillations through a parametric resonance. It is also demonstrated that even without the presence of a continuous drive, an initial transverse breathing mode excitation of the condensate leads to spontaneous pattern formation in the longitudinal direction. Finally, the effects of strongly driving the transverse breathing mode with large amplitude are investigated. In this case, impact-oscillator behavior and intriguing nonlinear dynamics, including the gradual emergence of multiple longitudinal modes, are observed.'
author:
- 'P.'
- 'C.'
- 'M. A.'
title: 'Observation of Faraday Waves in a Bose-Einstein Condensate'
---
[^1]
In 1831, Faraday studied the behavior of liquids that are contained in a vessel subjected to oscillatory vertical motion [@Faraday1831]. He found that fluids including alcohol, white of egg, ink and milk produce regular striations on their surface. These striations oscillate at half the driving frequency and are termed Faraday waves. They are considered to be an important discovery. Since then, the more general topic of pattern formation in driven systems has been met with great interest, and patterns have been observed in hydrodynamic systems, nonlinear optics, oscillatory chemical reactions, and biological media [@Cross1993].
In this paper we study pattern formation by modulating the nonlinearity in a Bose-Einstein condensate (BEC). Nonlinear dynamics arise from the interatomic interactions in this ultracold gas. In the past the observation of interesting phenomena has motivated researchers to propose and implement various techniques to manipulate the nonlinearity. Such control has been accomplished for example by exploiting Feshbach resonances [@Inouye1998]. In our experiment we investigate an alternative technique, namely periodically modulating the nonlinearity by changing the radial confinement of an elongated, cigar-shaped BEC held in a magnetic trap. The radial modulation leads to a periodic change of the density of the cloud in time, which is equivalent to a change of the nonlinear interactions and the speed of sound. This can, in turn, lead to the parametric excitation of longitudinal sound-like waves in the direction of weak confinement. This process is analogous to Faraday’s experiment where the vertical motion of the vessel produced patterns that were laterally spread out.
It has been shown theoretically that for a BEC, a Faraday type modulation scheme in the case of small driving frequencies leads one to the same type of analysis as would the direct modulation of the interatomic interaction, e.g., by a Feshbach resonance [@Staliunas2002; @Staliunas2004]. In both cases, the dynamics are governed by a Mathieu equation that is typical for parametrically driven systems. Floquet analysis reveals that a series of resonances exist, consisting of a main resonance at half the driving frequency, and higher resonance tongues at integer multiples of half the driving frequency [@Staliunas2002].
In our experiment we exploit this transverse modulation scheme for three different applications. First, we apply a relatively weak continuous modulation, demonstrate the emergence of longitudinal Faraday waves, and study their behavior as a function of the excitation frequency. Second, we investigate longitudinal patterns that emerge as a consequence of an initial transverse breathing mode excitation without the presence of a continuous drive. This has important consequences in the context of damped BEC oscillations and has been studied theoretically in [@Kagan2001]. Since the first experiments with BECs, the study of collective excitations has been a central theme [@Jin1996; @Mewes1996]. The transverse breathing mode, which we exploit in our experiments, plays a prominent role: Chevy et al. [@Chevy2002] showed that this mode exhibits unusual properties, namely an extremely high quality factor and a frequency nearly independent of temperature. Finally, in a third set of measurements we study the situation of a relatively strong modulation, resonantly driving the transverse breathing mode. We show that the condensate responds as an impact oscillator, which leads to intriguing multimode dynamics.
The experiments were carried out in a newly constructed BEC machine that produces cigar-shaped condensates of $^{87}$Rb atoms in the $|F=1,m_{F}=-1\rangle$ state. The typical atom number in the BEC is $5 \cdot10^{5}$, and the atoms are evaporatively cooled until no thermal cloud surrounding the condensate is visible any more. The atoms are held in a cylindrically symmetric Ioffe-Pritchard type magnetic trap with the harmonic trapping frequencies of $\{\omega_{xy}/(2\pi),\omega_{z}/(2\pi)\}=\{160.5,7\}$Hz. The weakly confined z-direction is oriented horizontally. For the experiments described below, the following collective mode frequencies are of particular importance: first, there exists a high-frequency transverse breathing mode. For our trap geometry, this mode has a frequency of $\omega_{\bot}/(2\pi) = 321$ Hz [@Stringari1996; @Garcia1996], very close to the limit of vanishing axial confinement $2\cdot\omega_{xy}/(2\pi)$. The second set of modes in which we are interested here consists of axial modes which, for large quantum numbers, correspond to sound waves in the z-direction. The frequencies of this discrete set of modes can be approximately calculated as given in [@Fliesser1997; @Stringari1998].
In order to investigate the parametric driving process mentioned above, we first performed a set of “spectroscopy” experiments in which we continuously modulated the transverse trapping confinement at a fixed modulation frequency and observed the subsequent emergence of longitudinal Faraday waves. For each excitation frequency the modulation amplitude was adjusted such that the longitudinal patterns emerged typically at some point after 10 to 30 oscillations. On the breathing mode resonance, a trap modulation of 3.6% was used, while at many other frequencies trap modulations of up to 42.5% were chosen to obtain clearly visible patterns [@trapmodulation]. This range of modulation depths is similar to the range used in numerical simulations in [@Staliunas2004]. Representative examples for the resulting patterns are shown in Fig. \[faradaypatterns\]. All experimental images in this manuscript were taken by destructive in-trap imaging.
The average spacing of adjacent maxima in the resulting pattern is plotted against the driving frequency in Fig. \[spectroscopy\]. The data lie on a clear curve, with the exception of the points near a driving frequency of 160.5 Hz, corresponding to the transverse dipole mode resonance (i.e. transverse slosh motion)[@Stringari1996]. However, inspection of our experimental images reveals that, at this frequency, we also excite the transverse breathing mode at 321 Hz. Excitation of the breathing mode is a very effective way of creating longitudinal patterns. Therefore the patterns obtained at 160.5 Hz are actually the same as those produced at 321 Hz. In order to rationalize the data, we first note that parametric excitation with a certain driving frequency excites oscillations predominantly at half the driving frequency, the main resonance also observed in Faraday’s experiments. The dispersion relation of longitudinal collective modes that become sound-like for high quantum numbers is given in [@Fliesser1997; @Stringari1998] and is used to calculate the expected spacing between density maxima. The resulting spacings are plotted as the step-like curve in Fig. \[spectroscopy\] and are in excellent agreement with our experimental data, corroborating the assumption and theory of a parametric driving process.
=3.375in
=3.375in
In a second set of experiments we show that the longitudinal modes are driven by the transverse breathing motion even without the presence of a continuous external drive. In particular, this disproves the influence of any tiny residual axial trap modulation that has existed during the presence of our continuous drive due to experimental imperfections [@trapmodulation]. For this, we excited the transverse breathing mode at 321 Hz by driving the transverse trap confinement for a few cycles, and then let the condensate evolve without the presence of the drive. For a gentle excitation, we do not see longitudinal patterns immediately after the end of the drive, but can observe them emerge at later times. A weaker excitation delays the emergence of longitudinal modes out to later times, while in the case of strong excitations the patterns can emerge within the first three cycles. In order to follow the evolution, we quantify the presence of longitudinal patterns as described in [@Patternquantify]. Fig. \[onset\] shows the evolution after the end of a moderate excitation. For this data, we excited the condensate for only two cycles, varying the transverse trap frequency by 9% with a modulation frequency of 321 Hz during the modulation. Immediately after the excitation, the obtained images showed no longitudinal waves, and our pattern visibility measure, plotted in the figure, is initially picking up high frequency noise along the longitudinal axis. A main contribution to this noise is the imaging noise of our detection system. Weak pattern formation is observed starting at five periods after the end of the modulation, and strong longitudinal patterns then appear after about nine periods. A similar behavior is known for example from parametric amplifiers in optics: if no input signal amplitude is present, a signal emerging from noise (or zero point energy) can form if the amplification is large enough. This behavior is also found by our numerical simulations based on the Gross-Pitaevskii equation. In simulations with similar parameters as in the experiment, no pattern formation is observed for several breathing mode periods. From the onset of pattern formation, it takes just three periods for patterns to grow to their full strength. We find that the onset time of pattern formation in the simulations is earlier when more noise is added to the initial relaxed wave function.
=3.375in
This experiment is closely related to the theoretical situation described in [@Kagan2001], where a single and sudden jump in the transverse trap frequency was used to excite the breathing mode, instead of a sinusoidal trap frequency modulation. We have used a trap jumping excitation in the case of very elongated BECs to demonstrate a second observation about the onset of longitudinal patterns, namely the fact that these patterns can start to emerge in spatially localized domains, rather than uniformly across the whole cloud. To show this effect, we produced condensates in a very elongated cigar-shaped trap with trapping frequencies of $\{\omega_{xy}/(2\pi),\omega_{z}/(2\pi)\}=\{286.1,2.8\}$Hz. We temporarily jumped to a different trap of $\{\omega_{xy}/(2\pi),\omega_{z}/(2\pi)\}=\{88.4,5.1\}$Hz for the duration of 1.3 ms, then jumped back to the first trap and let the cloud evolve. After about 10 ms, we observed BECs in which a perfectly periodic density modulation was stretching over almost the entire cloud; but it is also not uncommon to observe patterns in several separate domains, as shown in Fig. \[domains\]. Considering that the speed of sound in the elongated cloud is only about 2 mm/s [@Zaremba1998; @Stringari1998], it is plausible that over the time scale of this experiment different regions of the BEC can get independently excited and evolve into longitudinal patterns independently from each other.
=3.375in
In the experiments described so far, our parametric excitation has led to longitudinal modes oscillating at half the frequency of the parametric driving frequency. In the case of strong parametric amplification, it is theoretically expected that modes at other frequencies (higher resonance tongues), in particular modes at the driving frequency, can be excited, too [@Staliunas2002]. This motivated our third set of experiments in which we started again with a condensate in a trap with trap frequencies of $\{\omega_{xy}/(2\pi),\omega_{z}/(2\pi)\}=\{160.5,7\}$Hz. We then continuously modulated our transverse trap frequency by about 19% with a modulation frequency of 321 Hz. The resulting breathing motion is seen in Fig. \[impactosci\] where we plot the Thomas-Fermi radius of the cloud in the transverse direction versus time. The graph clearly shows that the cloud, upon strong excitation, gradually starts behaving as an impact oscillator, i.e., as an oscillator bouncing off a stiff wall during each period. A classical impact oscillator, realized for example by a ball bouncing off a stiff surface, is a paradigm for nonlinear dynamics, nonlinear resonances and chaotic behavior. In the present case, the role of the stiff wall was played by the strong mean-field repulsion during the slim phase of the oscillations when the BEC is strongly compressed in the transverse direction. Theoretically, the instability of the breathing mode upon strong driving and the impact oscillator behavior have been analyzed in [@Ripoll1999]. The behavior of the cloud radius in the transverse direction was also reproduced in our numerical simulation of the azimuthally symmetric 3D Gross-Pitaevskii equation, displayed as the solid line in Fig. \[impactosci\]. However, the numerics, when starting with a thoroughly relaxed wave function in the initial trap, show a sign of longitudinal pattern formation only after 18 ms, while in the experiment, longitudinal patterns clearly formed already during the third period (9 ms). This, again, hints at the importance of initial noise in the condensate that seeds the parametric amplification. In the experiment, the patterns start out similar to those displayed in Fig. \[faradaypatterns\] for the case of a weak drive at 321 Hz. But, upon the action of the strong drive, they quickly evolve into more complicated patterns, involving the excitation of several other modes. The inset of Fig. \[impactosci\] shows an image taken after 5.2 driving periods (a), together with the Fourier transform (b). The Fourier spectrum reveals that several modes corresponding to the first resonance tongue of longitudinal modes with nearly half the driving frequency are excited. In addition, modes at twice the distance from the central Fourier peak are visible. Those modes belong to the second resonance tongue of the main resonance.
=3.375in
In conclusion, we have experimentally observed the effects of parametric resonances in a BEC. The observed resonances lead to Faraday waves along the long BEC axis. These results advance the understanding of collective mode behavior in a condensate, which is one of the key tools to study BEC dynamics. In addition, we have shown that strongly driving the transverse breathing mode leads to an instability whereupon the mode amplitude increases exponentially, accompanied by the strong excitation of multiple sound-like modes.
[Hi!]{}
The study is contained in the appendix of the paper M. Faraday, Philos. Trans. R. Soc. London [**121**]{}, 299 (1831).
For a comprehensive review, see M. C. Cross and P. C. Hohenberg, Rev. Mod. Phys. [**65**]{}, 851–1112 (1993).
S. Inouye, M. R. Andrews, J. Stenger, H.-J. Miesner, D. M. Stamper-Kurn, and W. Ketterle, Nature (London) [**392**]{}, 151 (1998).
K. Staliunas, S. Longhi, and G. J. de Valcárcel, Phys. Rev. Lett. [**89**]{}, 210406 (2002).
K. Staliunas, S. Longhi, and G. J. de Valcárcel, Phys. Rev. A [**70**]{}, 011601(R) (2004).
Yu. Kagan and L. A. Maksimov, Phys. Rev. A [**64**]{}, 053610 (2001).
D. S. Jin, J. R. Ensher, M. R. Matthews, C. E. Wieman, and E. A. Cornell, Phys. Rev. Lett. [**77**]{}, 420 (1996).
M.-O. Mewes, M. R. Andrews, N. J. van Druten, D. M. Kurn, D. S. Durfee, C. G. Townsend, and W. Ketterle, Phys. Rev. Lett. [**77**]{}, 988 (1996).
F. Chevy, V. Bretin, P. Rosenbusch, K. W. Madison, and J. Dalibard, Phys. Rev. Lett. [**88**]{}, 250402 (2002).
S. Stringari, Phys. Rev. Lett. [**77**]{}, 2360 (1996).
V. M. Pérez-García, H. Michinel, J. I. Cirac, M. Lewenstein, and P. Zoller, Phys. Rev. Lett. [**77**]{}, 5320 (1996).
M. Fliesser, A. Csordás, P. Szépfalusy, and R. Graham, Phys. Rev. A [**56**]{}, R2533 (1997).
S. Stringari, Phys. Rev. A [**58**]{}, 2385 (1998).
Sinusoidally modulating our bias field strength led to a modulation of the transverse confinement $\omega_{xy}/(2\pi)$ between 155 Hz and 166.7 Hz in the case of a 3.6% modulation depth, and between 122 Hz and 303 Hz for our strongest modulation depth of 42.5%. Even with our strongest transverse modulation, the longitudinal confinement was modulated by less than 0.6%.
We integrate the observed density along the tight direction, and determine the standard deviation of the resulting cross section from a Thomas-Fermi shape in the central region. We normalize the result by dividing by the number of atoms in the same region. The Thomas-Fermi shape is obtained by eliminating all but the low frequency Fourier components that correspond to the overall shape of the BEC. This procedure provides a good measure for the excitation of the longitudinal modes, which we have checked also by visual inspection of the data.
E. Zaremba, Phys. Rev. A [**57**]{}, 518 (1998).
J. J. G. Ripoll and V. M. Pérez-García, Phys. Rev. A [**59**]{}, 2220 (1999); J. J. García-Ripoll, V. M. Pérez-García, and P. Torres, Phys. Rev. Lett. [**83**]{}, 1715 (1999).
[^1]: Contribution of the U.S. Government. Not subject to copyright.
| {
"pile_set_name": "ArXiv"
} | 0.017146 | [
{
"begin": 0,
"end": 85,
"score": 0.022945397
},
{
"begin": 85,
"end": 288,
"score": 0.0136749605
},
{
"begin": 288,
"end": 502,
"score": 0.019019997
},
{
"begin": 502,
"end": 612,
"score": 0.0131890485
},
{
"begin": 612,
"end": 767,
"score": 0.0073581007
},
{
"begin": 767,
"end": 775,
"score": 0.014855034
},
{
"begin": 775,
"end": 782,
"score": 0.018187003
},
{
"begin": 782,
"end": 789,
"score": 0.011384231
},
{
"begin": 789,
"end": 795,
"score": 0.005865656
},
{
"begin": 795,
"end": 17758,
"score": 0.033932835
}
] |
A mosaic pattern of INI1/SMARCB1 protein expression distinguishes Schwannomatosis and NF2-associated peripheral schwannomas from solitary peripheral schwannomas and NF2-associated vestibular schwannomas.
The INI1/SMARCB1 gene protein product has been implicated in the direct pathogenesis of schwannomas from patients with one form of schwannomatosis [SWNTS1; MIM # 162091] showing a mosaic pattern of loss of protein expression by immunohistochemistry [93% in familial vs. 55% in sporadic cases]. To verify whether such INI1/SMARCB1 mosaic pattern could be extended to all schwannomas arising in the sporadic and familial schwannomatoses [i.e. to SMARCB1-related (SWNTS1) or LZTR1-related (SWNTS2) schwannomatosis or to SMARCB1/LZTR1-negative schwannomatosis] and whether it could be involved in classical NF2 or solitary peripheral schwannomas METHODS: We blindly analysed schwannoma samples obtained from a total of 22 patients including (a) 2 patients (2 males; aged 38 and 55 years) affected by non-familial SMARCB1-associated schwannomatosis (SWTNS1); (b) 1 patient (1 female; aged 33 years) affected by familial schwannomatosis (SWTNS1/ SMARCB1 germ line mutations); (c) 5 patients (3 males, 2 females; aged 33 to 35 years) affected by non-familial (sporadic) LZTR1-associated schwannomatosis (SWNTS2); (d) 3 patients (3 males; aged 35 to 47 years) affected by familial schwannomatosis (SWTNS2/ LZTR1 germ line mutations); (e) 2 patients (1 male, 1 female; aged 63 and 49 years, respectively) affected by non-familial schwannomatosis (SWTNS, negative for SMARCB1, LZTR1 and NF2 gene mutations); (f) 4 patients (3 males, 1 females; aged 15 to 24 years) affected by classical NF2 (NF2: harbouring NF2 germ line mutations; and (g) 5 patients (3 males, 2 females; aged 33 to 68 years) who had solitary schwannomas. [follow-up = 15-30 years; negative for constitutional/somatic mutation analysis for the SMARCB1, LZTR1 and NF2 genes] were (blindly) analyzed. The INI1/SMARCB1 immunostaining pattern was regarded as (1) diffuse positive nuclear staining [= retained expression] or (2) mosaic pattern [mixed positive/negative nuclei = loss of expression in a subset of tumour cells]. All solitary peripheral schwannomas and NF2-associated vestibular schwannomas showed diffuse nuclear INI1/SMARCB1 staining in 97-100% of neoplastic cells; schwannomas obtained from all cases of non-familial and familial schwannomatosis and NF2-associated non-vestibular schwannomas showed a mosaic pattern ranging from 10 to 70% of INI1/SMARCB1-positive expression. We did not record a complete lack of nuclear staining. The present data suggests that (a) mosaic loss of immunohistochemical INI1/SMARCB1 expression, despite the interlesional variability, is a reliable marker of schwannomatosis regardless of the involved gene and it might help in the differential diagnosis of schwannomatosis vs. solitary schwannomas and (b) INI1/SMARCB1 expression is not useful in the differential with mosaic NF2, since NF2-associated peripheral schwannomas show the same immunohistochemical pattern. | {
"pile_set_name": "PubMed Abstracts"
} | 0.008052 | [
{
"begin": 0,
"end": 204,
"score": 0.016243355
},
{
"begin": 204,
"end": 498,
"score": 0.0023254375
},
{
"begin": 498,
"end": 999,
"score": 0.0028634118
},
{
"begin": 999,
"end": 1508,
"score": 0.004685583
},
{
"begin": 1508,
"end": 1961,
"score": 0.040284947
},
{
"begin": 1961,
"end": 2184,
"score": 0.011870144
},
{
"begin": 2184,
"end": 2550,
"score": 0.026722329
},
{
"begin": 2550,
"end": 2605,
"score": 0.02655065
},
{
"begin": 2605,
"end": 3072,
"score": 0.0053103273
}
] |
1. Field of the Invention
The present invention relates to a semiconductor memory device and a control method thereof, and particularly relates to a semiconductor memory device including a plurality of sense amplifiers that can be connected to any of a plurality of bit lines and a control method thereof.
2. Description of Related Art
Currently, there are various types of semiconductor memory devices, and DRAM (Dynamic Random Access Memory) can be mentioned as a representative thereof. Most of DRAMs are of a synchronous type in which data is inputted and outputted in synchronization with a clock signal, and can be randomly accessed with a cycle of about 7 ns.
However, DRAM is a volatile memory, and therefore there are problems as follows. Stored data is lost once the power supply is disconnected, and thus DRAM is not suitable for storing a program or archival data that should be saved for a long period of time. Further, even when the power supply is being inputted, a periodic refreshing operation needs to be performed to maintain the data, and thus there is a limit to lowering of power consumption and also complicated control by a controller is necessary.
A flash memory is well-known as a large-capacity non-volatile semiconductor memory. However, even in the flash memory, there are disadvantages such that a large current is necessary for writing or deleting data, and also it requires a very long time for writing and erasing data. Therefore, it is not appropriate to use flash memory as an alternative to DRAM as a main memory. In addition, non-volatile memories such as MRAM (Magnetoresistive Random Access Memory) and FRAM (Ferroelectric Random Access Memory) have been proposed; however, these memories have a difficulty in obtaining the memory capacity equivalent to that of DRAM.
Meanwhile, as a semiconductor memory to be an alternative to DRAM, PRAM (Phase Change Random Access Memory) that performs recording using a phase change material has been proposed (see Japanese Patent Application Laid-open Nos. 2006-24355, 2005-158199, 2006-31795, and 2006-294181). In the PRAM, data is stored by a phase state of the phase change material included in a recording layer. That is, in the phase change material, an electric resistance in a crystal phase and that in an amorphous phase differ vastly, and the data can be recorded by utilizing this characteristic.
To change the phase state, the phase change material is heated by a writing current that is applied to the phase change material. On the other hand, to read the data, a resistance value is measured after sending a reading current to the phase change material. The reading current is set to a value that is sufficiently smaller than the writing current so that no phase change occurs. Due to this, unlike DRAM, PRAM can perform a non-destructive reading operation. Further, the phase state of the phase change material does not change unless high heat is applied, and thus, even when the power supply is disconnected, the data is not lost.
DRAM is a semiconductor memory device of a voltage sensing type, and thus a potential difference occurring in a bit line pair is amplified by a sense amplifier to read the data. In contrast thereto, PRAM is a semiconductor memory device of a current sensing type, and thus, to read the data, it is necessary to convert a retained content to a potential difference by sending a reading current to a memory cell, and also to amplify this potential difference.
Therefore, in the sense amplifier of PRAM, the circuit scale is much larger than that of the sense amplifier of DRAM. Accordingly, it is not practical to arrange the sense amplifier for each bit line like DRAM, and this requires sharing the same sense amplifier for a plurality of bit lines.
However, when the same sense amplifier is shared for the plural bit lines, if consecutive read operations are requested, it requires starting a next sensing operation after the completion of the current sensing operation. As a result, a data reading cycle is restricted by an operation speed of the sense amplifier. Hence, it has a problem that the data reading cycle becomes much longer as compared to that of the DRAM, which in turn cannot keep the compatibility with the DRAM.
Such a problem similarly occurs not only in PRAM but also in semiconductor memory devices of other types (for example, RRAM: Resistive Random Access Memory), in which a sensing operation takes a long period of time. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.011801 | [
{
"begin": 0,
"end": 26,
"score": 0.01263372
},
{
"begin": 26,
"end": 306,
"score": 0.009162918
},
{
"begin": 306,
"end": 336,
"score": 0.008711713
},
{
"begin": 336,
"end": 490,
"score": 0.010273575
},
{
"begin": 490,
"end": 667,
"score": 0.022074303
},
{
"begin": 667,
"end": 748,
"score": 0.058130227
},
{
"begin": 748,
"end": 924,
"score": 0.014785618
},
{
"begin": 924,
"end": 1173,
"score": 0.007982845
},
{
"begin": 1173,
"end": 1257,
"score": 0.012703137
},
{
"begin": 1257,
"end": 4469,
"score": 0.0186035
}
] |
#/u/GoldenSights
import praw
import time
import sqlite3
import datetime
'''USER CONFIGURATION'''
APP_ID = ""
APP_SECRET = ""
APP_URI = ""
APP_REFRESH = ""
# https://www.reddit.com/comments/3cm1p8/how_to_make_your_bot_use_oauth2/
USERAGENT = ""
#This is a short description of what the bot does. For example "/u/GoldenSights' Newsletter bot"
SUBREDDIT = "Cinemasins"
#This is the sub or list of subs to scan for new posts. For a single sub, use "sub1". For multiple subreddits, use "sub1+sub2+sub3+..."
PRINTFILE = "userflair.txt"
#The file where the flairs will be shown
MAXPOSTS = 100
#This is how many posts you want to retrieve all at once. PRAW can download 100 at a time.
WAIT = 30
#This is how many seconds you will wait between cycles. The bot is completely inactive during this time.
'''All done!'''
WAITS = str(WAIT)
lastwikiupdate = 0
try:
import bot
USERAGENT = bot.aG
except ImportError:
pass
sql = sqlite3.connect('sql.db')
print('Loaded SQL Database')
cur = sql.cursor()
cur.execute('CREATE TABLE IF NOT EXISTS users(NAME TEXT, FLAIR TEXT)')
print('Loaded Completed table')
sql.commit()
r = praw.Reddit(USERAGENT)
r.set_oauth_app_info(APP_ID, APP_SECRET, APP_URI)
r.refresh_access_information(APP_REFRESH)
def scan():
print('Scanning ' + SUBREDDIT)
subreddit = r.get_subreddit(SUBREDDIT)
posts = []
posts += subreddit.get_new(limit=MAXPOSTS)
posts += subreddit.get_comments(limit=MAXPOSTS)
for post in posts:
try:
pauthor = post.author.name
try:
pflair = post.author_flair_text
if pflair is not None:
cur.execute('SELECT * FROM users WHERE NAME=?', [pauthor])
fetched = cur.fetchone()
if not fetched:
cur.execute('INSERT INTO users VALUES(?, ?)', [pauthor, pflair])
print('New user flair: ' + pauthor + ' : ' + pflair)
else:
oldflair = fetched[1]
if pflair != oldflair:
cur.execute('UPDATE users SET FLAIR=? WHERE NAME=?', [pflair, pauthor])
print('Updating user flair: ' + pauthor + ' : ' + pflair)
sql.commit()
else:
print(post.id, "No flair")
except AttributeError:
print(post.id, "No flair")
except AttributeError:
print(post.id, "Author is deleted")
flairfile = open(PRINTFILE, 'w')
cur.execute('SELECT * FROM users')
fetch = cur.fetchall()
fetch.sort(key=lambda x: x[0])
flaircounts = {}
for item in fetch:
itemflair = item[1]
if itemflair not in flaircounts:
flaircounts[itemflair] = 1
else:
flaircounts[itemflair] += 1
print('FLAIR: NO. OF USERS WITH THAT FLAIR', file=flairfile)
presorted = []
for flairkey in flaircounts:
presorted.append(flairkey + ': ' + str(flaircounts[flairkey]))
presorted.sort()
for flair in presorted:
print(flair, file=flairfile)
print('\n\n', file=flairfile)
print('NAME: USER\'S FLAIR', file=flairfile)
for user in fetch:
print(user[0] + ': ' + user[1], file=flairfile)
flairfile.close()
while True:
try:
scan()
except EOFError:
print("Error:", e)
sql.commit()
print('Running again in ' + str(WAIT) + ' seconds')
time.sleep(WAIT) | {
"pile_set_name": "Github"
} | 0.013328 | [
{
"begin": 0,
"end": 17,
"score": 0.0043211486
},
{
"begin": 17,
"end": 29,
"score": 0.0334178
},
{
"begin": 29,
"end": 41,
"score": 0.018325835
},
{
"begin": 41,
"end": 56,
"score": 0.022945397
},
{
"begin": 56,
"end": 72,
"score": 0.015688026
},
{
"begin": 72,
"end": 98,
"score": 0.009093502
},
{
"begin": 98,
"end": 111,
"score": 0.002793996
},
{
"begin": 111,
"end": 127,
"score": 0.0053797434
},
{
"begin": 127,
"end": 140,
"score": 0.008225801
},
{
"begin": 140,
"end": 3502,
"score": 0.021518974
}
] |
People ask me how I get it all done. They assume I’m extremely organized. In reality I’m pretty ADD. On top of that, I have 3 small children at home and I only work part time. But the truth is I do get a lot done.
Here’s why… I’m no longer addicted to approval but I’m still an addict.
I am addicted to goals.
I love them. I love creating them. I love thinking about them. I love working towards them. I love realizing them.
I will never say to myself, “I have finally arrived!” because I know there will always be another thing for me to strive for.
Because there is so much joy for me in the striving. Goals, to me, are play– creative, daring, adventurous, experimental play.
Like all good play, my goals teach me all kinds of stuff in the process. How to be proud of my accomplishments and my failures, how to persist, to persevere, problem solve, innovate, risk, have a sense of humor to name a few.
Good goals? Or bad goals?
But it didn’t always used to be this way. I used to take my goals very seriously. I used them as a measuring stick, a way to quantify my self worth.
I had a list of things I was supposed to accomplish by the age of 30. I was supposed to speak four languages, graduate with honors from Columbia University, solve the hunger problem, win the Nobel Peace Prize, etc., etc.…
As you can guess I fell short.
So the goals I created back then were really more like intangible torture devises. Each time I came up short, I used the goal to figuratively whack myself on the head …
The anatomy of a good goal
Nine years later, there’s a different energy behind my goals. The stakes are not so high yet, ironically, I’m achieving my goals more often and I’m much happier.
Part of it has to do with permission. I now give myself permission to just be happy. Not happy if… Not happy when. The by product, I have found, is that when I can Just. Be. Happy, I don’t judge what I want as stupid, frivolous or just plain crazy. And my goals get to be for me not about me.
Second, I am way more willing to fail than I used to be. Since my goals are now my source of joy – a gift I give to myself really – and not a measuring stick with which to beat myself over the head, I can afford to be creative, daring and at times downright cray-cray.
Getting high off goals
Human beings are built for goals. We are like bicycles. When we are not in motion, we fall down.
I just read Eat that Frog by Brian Tracy. It’s a book about productivity. He says that task completion actually triggers the release of endorphins and dopamine in the brain.
Yes, you can literally get high off goals. And I’m all about getting high without drugs.
Are your goals working for you?
But if your goals feel bad or you’re just plain stuck, my guess is you’ve got to do a bit of work first to make sure those goals are working for you and not against you.
3 Tips to Clean Up (and get high off) Your Goals:
1. What is your WHY?
A few weeks ago I heard Danielle LaPorte speak at the World Domination Summit. She says, when you feel inspired ask yourself, are you moved on a cellular level or do you just want to be like the person who inspires you?
Put another way, are you in integrity with your goals? Are they a true reflection of Who You Really Are or just another gold star used to elicit ewwws and ahhhs?
2. Reframe failure.
Jeff Olsen author of The Slight Edge, says “successful people are willing to do what unsuccessful people are not willing to do.” It’s as simple as that. Stop believing that failure somehow reflects upon your worth. When you no longer see it this way, roadblocks stop meaning failure and start providing the feedback you need to reach your goals.
3. Go with good enough.
Perfectionism is just a form of procrastination in disguise, I’ve heard it said. Go with good enough. And just do something!
So there you have it. I dare you to post 1 goal in the comments below. Because I LOVE THAT.
Love the article, Amy! Thank you for the insight that my goals are for me, not anyone else. And that my failures and mistakes are not a reflection on who I am, they are feedback…. fabulous! Okay, here goes a personal goal… I choose a richly healthy relationship with food and nourishment like I have never experienced before. I wanna be a woman who knows how to make fabulous smoothies, the best place and time to visit the local farmer’s markets, and how to help my body glow with radiant energy from my food choices. I want to develop a love affair with fresh when it comes to food. I want concepts of ripe, juicy, nourishing and fragrant to fill my culinary experience every day. And I want to share this experience joyfully with family and friends.
Great article, Amy! My goal is to continue to become one with my body – loving, accepting and honoring it – by eating nutritious foods that are right for ME, exercising in a way that is right for ME, and saying kind words to myself that support this journey. (I eat grain/gluten/sugar-free, I have released an extra 20 pounds in four months, I work with an excellent personal trainer, and I don’t sabotage myself by calling myself unkind names.) I do these things for ME, and I love it!
You dare me, do you? Well alright then! MY goal is to actually retire for the day at 9:30 pm to read for a half hour before bed. OK, that may sound sweet & simple but it’s actually scary to proclaim it because I have not succeeded in the past. I will examine why and what I can do differently. Also I plan to add empathy, affection and relaxation to my treatment of myself around goals, rather than the reflexive and debilitating self-pressure that tempts me to avoid them altogether. Consistent bedtime (and reading fun time), I hope, will support all the other goals in my mix, from daily to-do’s to long-term struggles.
Thanks for the inspiration, Amy, I especially loved reading about how we are wired… like bicycles!
Hey Amy. I just wanted to thank you for all you write. You inspire me. There isn’t one time I don’t have a smile on my face when seeing I got an email/update from your blog. I LOVE the “I don’t need your approval” classes. You make me trust my self (or would it be “myself”? Sorry for my bad English – Portuguese, my mother language, sound a lot easier to me, ha!). You make me happy. A big hug your way. | {
"pile_set_name": "Pile-CC"
} | 0.068919 | [
{
"begin": 0,
"end": 37,
"score": 0.018742332
},
{
"begin": 37,
"end": 74,
"score": 0.030327583
},
{
"begin": 74,
"end": 101,
"score": 0.040971663
},
{
"begin": 101,
"end": 176,
"score": 0.016243355
},
{
"begin": 176,
"end": 214,
"score": 0.014855034
},
{
"begin": 214,
"end": 287,
"score": 0.1710401
},
{
"begin": 287,
"end": 312,
"score": 0.12051678
},
{
"begin": 312,
"end": 326,
"score": 0.022074303
},
{
"begin": 326,
"end": 348,
"score": 0.03221605
},
{
"begin": 348,
"end": 6298,
"score": 0.046465382
}
] |
I didn't win the powerball now i have to keep going to college
364 shares | {
"pile_set_name": "OpenWebText2"
} | 0.063325 | [
{
"begin": 0,
"end": 63,
"score": 0.05093802
},
{
"begin": 63,
"end": 74,
"score": 0.056931525
}
] |
// <cstdint> -*- C++ -*-
// Copyright (C) 2007-2014 Free Software Foundation, Inc.
//
// This file is part of the GNU ISO C++ Library. This library is free
// software; you can redistribute it and/or modify it under the
// terms of the GNU General Public License as published by the
// Free Software Foundation; either version 3, or (at your option)
// any later version.
// This library is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// Under Section 7 of GPL version 3, you are granted additional
// permissions described in the GCC Runtime Library Exception, version
// 3.1, as published by the Free Software Foundation.
// You should have received a copy of the GNU General Public License and
// a copy of the GCC Runtime Library Exception along with this program;
// see the files COPYING3 and COPYING.RUNTIME respectively. If not, see
// <http://www.gnu.org/licenses/>.
/** @file include/cstdint
* This is a Standard C++ Library header.
*/
#ifndef _GLIBCXX_CSTDINT
#define _GLIBCXX_CSTDINT 1
#pragma GCC system_header
#if __cplusplus < 201103L
# include <bits/c++0x_warning.h>
#else
#include <bits/c++config.h>
#if _GLIBCXX_HAVE_STDINT_H
# include <stdint.h>
#endif
#ifdef _GLIBCXX_USE_C99_STDINT_TR1
namespace std
{
using ::int8_t;
using ::int16_t;
using ::int32_t;
using ::int64_t;
using ::int_fast8_t;
using ::int_fast16_t;
using ::int_fast32_t;
using ::int_fast64_t;
using ::int_least8_t;
using ::int_least16_t;
using ::int_least32_t;
using ::int_least64_t;
using ::intmax_t;
using ::intptr_t;
using ::uint8_t;
using ::uint16_t;
using ::uint32_t;
using ::uint64_t;
using ::uint_fast8_t;
using ::uint_fast16_t;
using ::uint_fast32_t;
using ::uint_fast64_t;
using ::uint_least8_t;
using ::uint_least16_t;
using ::uint_least32_t;
using ::uint_least64_t;
using ::uintmax_t;
using ::uintptr_t;
} // namespace std
#endif // _GLIBCXX_USE_C99_STDINT_TR1
#endif // C++11
#endif // _GLIBCXX_CSTDINT
| {
"pile_set_name": "Github"
} | 0.024491 | [
{
"begin": 0,
"end": 25,
"score": 0.023460433
},
{
"begin": 25,
"end": 84,
"score": 0.0042864406
},
{
"begin": 84,
"end": 137,
"score": 0.016382186
},
{
"begin": 137,
"end": 158,
"score": 0.014091457
},
{
"begin": 158,
"end": 222,
"score": 0.010412407
},
{
"begin": 222,
"end": 285,
"score": 0.0069416044
},
{
"begin": 285,
"end": 352,
"score": 0.0053797434
},
{
"begin": 352,
"end": 374,
"score": 0.009926494
},
{
"begin": 374,
"end": 442,
"score": 0.014299706
},
{
"begin": 442,
"end": 2167,
"score": 0.033074442
}
] |
Broken Arm
The Broken Arm,[1] also known as the Broken Arm of Dorne,[2] is a region in eastern Dorne where the Dornish peninsula juts into the narrow sea. East of the jagged coastline are the islands of the Stepstones.[3] | {
"pile_set_name": "Pile-CC"
} | 0.026036 | [
{
"begin": 0,
"end": 11,
"score": 0.04543531
},
{
"begin": 11,
"end": 156,
"score": 0.02262963
},
{
"begin": 156,
"end": 222,
"score": 0.027237365
}
] |
370 F.2d 976
UTAH SALT COMPANY, Inc., Appellant,v.Roland V. WISE, District Director of Internal Revenue, Appellee.
No. 8535.
United States Court of Appeals Tenth Circuit.
January 6, 1967.
1
Dale E. Anderson, Salt Lake City, Utah (Fabian & Clendenin, Salt Lake City, Utah, with him on the brief), for appellant.
2
Thomas L. Stapleton, Atty., Dept. of Justice (Mitchell Rogovin, Asst. Atty. Gen., Lee A. Jackson, Melva M. Graney, Attys. Dept. of Justice, and William T. Thurman, U. S. Atty., of counsel, with him on the brief), for appellee.
3
Before MURRAH, Chief Judge, SETH, Circuit Judge, and CHILSON, United States District Judge.
4
CHILSON, District Judge.
5
The appellant taxpayer instituted this action in the lower Court seeking a refund of corporate income taxes paid for the years 1960 and 1961. Appellant claims it is entitled to a deduction for depletion of mineral deposits under § 611 and § 613 of the Internal Revenue Code of 1954, which deduction was not allowed.
6
The appellant appeals from the judgment of the District Court denying its claims for refund.
7
The essential facts are not in dispute. Bonneville, Ltd. was the owner of several thousand acres of land in a low area in the Great Salt Lake Desert in which storm waters containing potash and salt collected. The evaporation of the water deposited the potash and salt on and under the surface of this area. For many years prior to the years in question, Bonneville had been engaged in the extraction of potash from this area by the following processes. Beneath the surface of the area is a brine which contains potash and salt. Bonneville constructed large ditches twenty feet in depth and six to ten feet wide to collect this brine. At the upper end of these ditches, shallow ponds were constructed by the erection of dikes and the brine was pumped from the ditches into the ponds. Seepage from the ponds was prevented by a protective ditch also filled with brine which encircles each pond.
8
During the summer months when the brine is pumped into the ponds, the water in the brine evaporates causing the salt to precipitate on the pond bottom. At a certain point, potash also begins to precipitate out of the brine. At this juncture, the brine is pumped into the Bonneville processing plant and the potash is allowed to precipitate out in what is known as the froth flotation process.
9
The salt which is deposited on the pond bottom creates an annual layer of approximately six inches. During the winter months when the pond lies dormant, this layer adheres to the previous layer and becomes so hard that it forms a concrete like mass and cannot economically be removed. This annual deposit of salt gradually decreases the depth of the evaporation pond to a point where it becomes economically unfeasible to continue to build up the dikes and at that point a new pond must be constructed.
10
In order to avoid this attrition of ponds, Bonneville in 1957 began to experiment with various methods of removing the salt from the ponds, one of which was scraping the pond bottom by a drag prior to the deposit of a new layer of salt. This provided a cleavage line between the new and old layers of salt and the new layer did not adhere to the old and could then be scraped and placed in piles or windrows.
11
One Roberts, who knew of Bonneville's experiments, realized that by using this process, Bonneville would have large quantities of salt for which it would have no use. On April 29, 1958, Roberts and three associates executed an agreement with Bonneville which was thereafter assigned to the appellant, which provided, among other things, that appellant would have the right for five years to extract and process salt from the Bonneville properties; Bonneville to provide sufficient salt to meet the reasonable needs of appellant in piles and windrows on the property; appellant to construct a processing plant on ground provided by Bonneville; appellant to process and sell a minimum number of tons of salt in each year and pay Bonneville a royalty based on the selling price within ninety days after shipment to purchasers; and Bonneville agreed not to sell salt in competition with the appellant.
12
In the spring of 1958, Bonneville scraped the bottom of the evaporating pond to prepare a cleavage line and in the winter of 1959, Bonneville, at its expense, employed a company to bulldoze the new layer of salt into piles and windrows. The same process was repeated the next year. The salt which the appellant processed during the tax years in question came solely from these piles and windrows and was transported by appellant from the piles and windrows to its processing plant by trucks.
13
Prior to appellant's taking the salt from the piles and windrows, it had no control and it did not exercise any supervision over the salt or Bonneville's processes and operations in extracting the salt from the brine or its removal from its place of deposit in the evaporating pond.
14
Section 611 of the Internal Revenue Code provides:
15
"In the case of mines * * * or other natural deposits * * * there shall be allowed as a deduction in computing taxable income a reasonable allowance for depletion * * *",
16
and Section 613 establishes the percentage depletion allowances.
17
The Treasury Regulations on Income Tax (1954 Code) § 1.611-1(b) (1) provides:
18
"Annual depletion deductions are allowed only to the owner of an economic interest in mineral deposits or standing timber. An economic interest is possessed in every case in which the taxpayer has acquired by investment any interest in mineral in place * * * and secures, by any form of legal relationship, income derived from the extraction of the mineral * * * to which he must look for a return of his capital. But a person who has no capital investment in the mineral deposit or standing timber does not possess an economic interest merely because through a contractual relation he possesses a mere economic or pecuniary advantage derived from production." (Emphasis supplied.)
19
Beginning in 1933 with the case of Palmer v. Bender, 287 U.S. 551, 53 S. Ct. 225, 77 L.Ed. 489, the Supreme Court has consistently recognized that one having an "economic interest" in minerals in place is entitled to a depletion deduction. The Court said in Palmer:
20
"The language of the statute (authorizing depletion deduction) is broad enough to provide, at least, for every case in which the taxpayer has acquired, by investment, any interest in the oil in place, and secures, by any form of legal relationship, income derived from the extraction of the oil, to which he must look for a return of his capital." (287 U.S. at 557, 53 S.Ct. at 226.)
21
The Court also said that the deduction is not "dependent upon the particular legal form of the taxpayer's interest in the property to be depleted * * *" (287 U.S. at 557, 53 S.Ct. at 226).
22
Helvering v. Bankline Oil Co., 303 U. S. 362, 58 S.Ct. 616, 82 L.Ed. 897 (1938), reaffirmed the test laid down in Palmer and said:
23
"But the phrase `economic interest' is not to be taken as embracing a mere economic advantage derived from production, through a contractual relation to the owner, by one who has no capital investment in the mineral deposit." (303 U.S. at 367, 58 S.Ct. at 618).
24
In Parsons v. Smith, 359 U.S. 215, 79 S.Ct. 656, 3 L.Ed.2d 747 (1959), the Court pointed out that the principles declared in the Palmer case have been recognized and applied by every subsequent decision of the Court that has treated with the subject and that the first Regulations prescribed under the Internal Revenue Act of 1939 adopted almost literally the language we have quoted from Palmer and Bankline as the test to be administratively applied in determining what interest in mineral deposits are entitled to the depletion allowance. Those regulations are essentially the same as the present applicable regulations § 1.611-1(b) (1), supra.
25
In 1965, the Supreme Court in Paragon Jewel Coal Company, Inc. v. Commissioner of Internal Revenue, 380 U.S. 624, 85 S.Ct. 1207, 14 L.Ed.2d 116, again expressed its approval of the "economic interest" test by stating
26
"This test was first enunciated in Palmer v. Bender, 287 U.S. 551, 557 [53 S.Ct. 225, 226, 77 L.Ed. 489] (1933), and has since become the touchstone of decisions determining the eligibility of a party to share in the depletion allowance." (380 U.S. at 633, 85 S.Ct. at 1211).
27
We conclude, therefore, that if appellant had an "economic interest" in the salt in question, as that term is defined in the foregoing case law and administrative regulations, it should prevail. If not, its claim should be denied. As we have noted, one of the requirements of an "economic interest" is the acquisition by investment of an interest in the mineral in place.
28
From the evidence, it is clear that the appellant had not "acquired by investment" any interest in the salt "in place." Whether we consider the salt as being "in place" in the brine or as being "in place" in the bottom of Bonneville's evaporation pond is immaterial. The appellant "acquired by investment" no interest in the salt in either place.
29
The investment in the salt "in place" was solely Bonneville's investment. It was Bonneville which owned the land and dug the ditches to collect the brine, constructed the evaporation ponds and provided the pumps to convey the brine to the ponds. It was Bonneville which extracted the salt from its place of deposit in the evaporation ponds and piled it where it became available to appellant for processing and sale.
30
Appellant asserts that under the agreement it has the right to perform each of these processes which were performed by Bonneville in extracting the salt from the brine and removing it from the evaporation pond and that this right gives it an economic interest.
31
Whether or not the agreement is subject to appellant's construction is immaterial. The point is that the appellant in or prior to the years in question made no investment in the salt in place. The salt which it processed was obtained by it not by virtue of any ownership or interest in the salt in place but by virtue of a provision of the agreement that Bonneville would extract the salt from its "in place" deposit in the brine and evaporation pond and place it in piles and windrows for the use of the appellant.
32
The appellant's investment was in the plant and equipment to remove the salt from the piles, process and ship it and this investment is recoverable by depreciation not depletion. Parsons v. Smith, supra, 359 U.S. p. 225, 79 S.Ct. 656.
33
We conclude the appellant had no economic interest in the salt in question and is not entitled to a deduction for depletion.
34
The judgment of the District Court is affirmed.
| {
"pile_set_name": "FreeLaw"
} | 0.049899 | [
{
"begin": 0,
"end": 13,
"score": 0.0047897073
},
{
"begin": 13,
"end": 60,
"score": 0.0090240855
},
{
"begin": 60,
"end": 115,
"score": 0.004893831
},
{
"begin": 115,
"end": 125,
"score": 0.00315843
},
{
"begin": 125,
"end": 171,
"score": 0.007913429
},
{
"begin": 171,
"end": 188,
"score": 0.0041476088
},
{
"begin": 188,
"end": 199,
"score": 0.006004488
},
{
"begin": 199,
"end": 312,
"score": 0.0069068964
},
{
"begin": 312,
"end": 326,
"score": 0.0060739038
},
{
"begin": 326,
"end": 10834,
"score": 0.06132676
}
] |
The reason bananas are curved has to do with how they grow. Bananas grow in bunches known as "hands." As the bananas in a hand mature and grow larger, they eventually curve upwards so that instead of pointing towards the ground, they bend up and point towards the sky! The ability to do this is pretty neat, and it's known by the complicated-sounding term "negative geotropism." Most likely, the reason that bananas have evolved to have negative geotropism is that it allows them to reach out towards the sun and get more light! | {
"pile_set_name": "OpenWebText2"
} | 0.060128 | [
{
"begin": 0,
"end": 60,
"score": 0.02517722
},
{
"begin": 60,
"end": 102,
"score": 0.0681194
},
{
"begin": 102,
"end": 269,
"score": 0.03616466
},
{
"begin": 269,
"end": 379,
"score": 0.040284947
},
{
"begin": 379,
"end": 528,
"score": 0.045091953
}
] |
337 F.2d 614
Joaquin Cantera CORDOVA, Appellant,v.UNITED STATES of America, Appellee.
No. 21401.
United States Court of Appeals Fifth Circuit.
October 19, 1964.
Joaquin Cantera Cordova, Atlanta, Ga., pro se.
Robert C. Josefsberg, Asst. U. S. Atty., William A. Meadows, Jr., U. S. Atty., Miami, Fla., for appellee.
Before RIVES and BELL, Circuit Judges and SPEARS, District Judge.
PER CURIAM.
1
Appellant, having been convicted and sentenced to serve ten (10) years imprisonment for violating Section 4744(a), Title 26, United States Code, contends in his "Motion to Correct Illegal Sentence" that his sentence was excessive, relying upon the provisions of Section 7237, Title 26, United States Code, which, before amendment, permitted a maximum sentence for first offenders of five (5) years imprisonment. It appears, however, that Section 7237 was amended prior to the time appellant committed the offenses for which he was convicted and, as amended, authorizes a maximum sentence for first offenders of ten (10) years. The judgment is, therefore, affirmed.
| {
"pile_set_name": "FreeLaw"
} | 0.094948 | [
{
"begin": 0,
"end": 13,
"score": 0.0035228643
},
{
"begin": 13,
"end": 86,
"score": 0.006178028
},
{
"begin": 86,
"end": 97,
"score": 0.0034360941
},
{
"begin": 97,
"end": 143,
"score": 0.007982845
},
{
"begin": 143,
"end": 161,
"score": 0.0069763125
},
{
"begin": 161,
"end": 209,
"score": 0.020685982
},
{
"begin": 209,
"end": 219,
"score": 0.004650875
},
{
"begin": 219,
"end": 237,
"score": 0.22978203
},
{
"begin": 237,
"end": 243,
"score": 0.0681194
},
{
"begin": 243,
"end": 1063,
"score": 0.039598234
}
] |
Carbon nanotube multilayered nanocomposites as multifunctional substrates for actuating neuronal differentiation and functions of neural stem cells.
Carbon nanotubes (CNTs) have shown potential applications in neuroscience as growth substrates owing to their numerous unique properties. However, a key concern in the fabrication of homogeneous composites is the serious aggregation of CNTs during incorporation into the biomaterial matrix. Moreover, the regulation mechanism of CNT-based substrates on neural differentiation remains unclear. Here, a novel strategy was introduced for the construction of CNT nanocomposites via layer-by-layer assembly of negatively charged multi-walled CNTs and positively charged poly(dimethyldiallylammonium chloride). Results demonstrated that the CNT-multilayered nanocomposites provided a potent regulatory signal over neural stem cells (NSCs), including cell adhesion, viability, differentiation, neurite outgrowth, and electrophysiological maturation of NSC-derived neurons. Importantly, the dynamic molecular mechanisms in the NSC differentiation involved the integrin-mediated interactions between NSCs and CNT multilayers, thereby activating focal adhesion kinase, subsequently triggering downstream signaling events to regulate neuronal differentiation and synapse formation. This study provided insights for future applications of CNT-multilayered nanomaterials in neural fields as potent modulators of stem cell behavior. | {
"pile_set_name": "PubMed Abstracts"
} | 0.012495 | [
{
"begin": 0,
"end": 149,
"score": 0.014993866
},
{
"begin": 149,
"end": 287,
"score": 0.010412407
},
{
"begin": 287,
"end": 440,
"score": 0.019158829
},
{
"begin": 440,
"end": 542,
"score": 0.03221605
},
{
"begin": 542,
"end": 754,
"score": 0.0224908
},
{
"begin": 754,
"end": 1015,
"score": 0.008885254
},
{
"begin": 1015,
"end": 1320,
"score": 0.020269485
},
{
"begin": 1320,
"end": 1467,
"score": 0.013119632
}
] |
// ------------------------------------------------------------
// Copyright (c) Microsoft Corporation. All rights reserved.
// Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
// ------------------------------------------------------------
namespace Microsoft.Azure.IIoT.Modules.OpcUa.Twin.v2.Supervisor.StartStop {
using Microsoft.Azure.IIoT.OpcUa.Testing.Fixtures;
using Xunit;
[CollectionDefinition(Name)]
public class WriteCollection : ICollectionFixture<TestServerFixture> {
public const string Name = "Supervisor.StartStop.Write";
}
}
| {
"pile_set_name": "Github"
} | 0.012425 | [
{
"begin": 0,
"end": 64,
"score": 0.05413456
},
{
"begin": 64,
"end": 106,
"score": 0.007670473
},
{
"begin": 106,
"end": 127,
"score": 0.018187003
},
{
"begin": 127,
"end": 169,
"score": 0.014299706
},
{
"begin": 169,
"end": 227,
"score": 0.008642297
},
{
"begin": 227,
"end": 291,
"score": 0.05413456
},
{
"begin": 291,
"end": 345,
"score": 0.019575324
},
{
"begin": 345,
"end": 368,
"score": 0.005275619
},
{
"begin": 368,
"end": 423,
"score": 0.062925026
},
{
"begin": 423,
"end": 623,
"score": 0.0052409116
}
] |
Published: Wednesday, February 13, 2013 at 11:36 a.m.
Last Modified: Wednesday, February 13, 2013 at 11:36 a.m.
House of Flowers staff member Randy Boudreaux, 51, assembles a
Valentine's Day floral arrangement Monday in the Houma shop.
And your friendly neighborhood florists are the people putting in the legwork to help produce that happiness.
Owner of House of Flowers in Houma, Denise Bourg, 53, has known the holiday no other way, she said, since she was born into the floral industry.
“I've been in this business my whole life,” she said. “I was born into this shop.”
Her mom, Sadie Toups, 85, the previous owner of the floral shop, confirms Bourg's claim. Toups has been a florist for about 70 years.
“She's right. She was born here. I accidentally got this place,” Toups said, referring to the way she came into ownership of House of Flowers. “I was just helping out with arrangements for a funeral and did such a good job, the owner was ready to sell and asked me to take it.”
Bourg has taken over handling the bulk of the business, with help from her mom and several other employees. She gets so busy, she said, that celebrating Valentine's Day with her husband of 35 years is out of the question.
“He knows how it is,” she said. “We celebrate it with a phone call where he says ‘how's it going?' ” she said. “And my answer is ‘Oh you know. You know how it's going.' ”
House of Flowers creates 600 to 700 arrangements in the week or so leading up to Valentine's Day, most of which are handmade.
They can make about 200 deliveries a day using from four to five vans and drivers, a maximum they sometimes reach or come close to reaching on Feb. 14.
“People call that day still wanting deliveries,” she said. “By that point we just can't. You have to know your limit. We also do not take weddings on Valentine's Day. Weddings are such a special day, and I can't focus on them, which isn't fair to the bride. The volume is too large on the day of Valentine's to really devote time to a wedding, so you have to know the limit of what you can do and just stop taking orders.”
Each year for Valentine's Day, House of Flowers takes on from five to eight additional staff members due to the volume of orders. The other holiday that comes fairly close to the abundant amount is Mother's Day, Bourg said, adding that the number of orders usually falls just below that of Feb. 14.
When asked if the amount of flower bouquet orders has decreased with the arrival of edible arrangements and similar alternative product deliveries, the long-time florist said flowers are “still as popular as ever.”
“The way people order is a lot different with online and third-party websites,” she said. “For example, we get a lot of orders through 1-800 FLOWERS. Not everyone calls me or comes in. The way they do it has drastically changed.”
And, Bourg said, the use of credit cards was an industry changer.
“Back in the ‘70s, it was all about house accounts,” Bourg said. “But people still appreciate the value of what flowers do to people. Flowers immediately cheer you up.”
One tip Bourg said is important for guys to keep in mind when ordering flowers year round, but especially for Valentine's Day, is to “send a woman flowers where she works so everyone else can see.”
She said the flowers must pass as many women as possible in the woman's office on the way to her desk.
That's why this year, House of Flowers has had a lot of deliveries outside of the 14th of the month, especially for women who work in places closed this week for Mardi Gras.
“We have just as many on the 13th and had quite a few Monday and even last week,” Bourg said. “For example, those guys were sending them to ladies that maybe didn't have work this week, like teachers, and they knew they'd better get those flowers to where she works.”
As for her love life, “My husband definitely does not send me flowers, but he does give me a gift,” she said. “For us now, after being married so long, it's like a card and candy thing. We do not go out. By the time the night of the 14th comes around, I just want to go home, take a bath and rest.”
Staff Writer Kris Johnson can be reached at 857-2207 or [email protected]. Follow her on Twitter @krisLjo.
Reader comments posted to this article may be published in our print edition. All rights reserved. This copyrighted material may not be re-published without permission. Links are encouraged. | {
"pile_set_name": "Pile-CC"
} | 0.044405 | [
{
"begin": 0,
"end": 54,
"score": 0.0021779283
},
{
"begin": 54,
"end": 113,
"score": 0.0066292323
},
{
"begin": 113,
"end": 177,
"score": 0.0065945243
},
{
"begin": 177,
"end": 238,
"score": 0.005275619
},
{
"begin": 238,
"end": 349,
"score": 0.2015616
},
{
"begin": 349,
"end": 495,
"score": 0.0121478075
},
{
"begin": 495,
"end": 550,
"score": 0.018881164
},
{
"begin": 550,
"end": 579,
"score": 0.0224908
},
{
"begin": 579,
"end": 669,
"score": 0.05852979
},
{
"begin": 669,
"end": 4432,
"score": 0.080905534
}
] |
South Australia
Tasmania
Flinders Ranges
Overview
293064633
Head into the arid heart of the Australian Outback and traverse one of the oldest geological landscapes in the world. The 1200km Heysen Trail is rated as one of the world’s premier long distance trails and begins in the stunning Flinders Ranges, the Heysen’s spiritual birthplace. We have selected the best walking in the Northern Flinders, from the trailhead to Black Gap and other not to be missed highlights. This is an unforgettable rust coloured landscape with many hidden secrets, that can only be discovered on foot.
This is a world class experience where you will be supported all of the way. At the end of each day you’ll have the luxury of having a hot shower, a chef prepared dinner and breakfast (see inclusions) and a good night’s sleep in a comfortable bed, rising refreshed and primed for each day’s fabulous pack free walking.
Trip Length
Days
From
$
per person twin/double share
Single Supplement
$795
per person
Single Supplement
Australian hotel accommodations charge the same price per room regardless of whether there is one or two people occupying it.
In order to cover the cost of the accommodation when occupied by one person we need to charge the single supplement fee, a cost that we make no margin on.
DAY 1
Start at Rawnsley Park in the late afternoon where you will be transferred to Angorichina Village.
Walking: Easy walking around Angorichina, including the Blinman Pools walk / 3km or more
Meals: Dinner at Angorichina
Accommodation: Angorichina Village in the Heysen Cabins with an ensuite
DAY 2
This Flinders Ranges walk begins from the Heysen trailhead at Parachilna Gorge with a gentle 19km saunter deep in the valley between the ABC and Heysen Ranges all the way to Aroona Ruins. The day’s walking starts with a very gentle stroll along various creek beds, then onwards over a procession of creek crossings as you slowly make your way uphill. The last 7km you amble very gently back down the same beautiful valley to Aroona Ruins.
Walking: Moderate / 19km / 5–6 hrs
Meals: Cooked breakfast, walkers lunch and a chef prepared a la carte dinner at the Blinman
Accommodation: Angorichina Village in the Heysen Cabins with ensuites
DAY 3
Full of ascents and descents, today’s walk traverses the ABC Range with incredible panoramic views of the mountains. You walk across the Brachina Formation, one of the oldest rock formations on the planet. This walk includes one of the most intact and rich Ediacara fossil sites in the world. These 600-million-year-old rock formations are older and were once higher than the Himalayas, but have been worn down by time. The last section of walking is through an open flat valley typical of the Flinders region with lots of wildlife viewing opportunities along the way.
Walking: Challenging / 25km / 6–7 hrs / shorter 14km option available
Meals: Chef-prepared cooked breakfast, walkers lunch and a chef-prepared a la carte dinner at the Woolshed
Accommodation: Rawnsley Park Station in rooms with ensuites
DAY 4
Today’s walking is characterised by a great variety of landscapes, beautiful forest and gullies, including an exploration of the beginnings of Bunyeroo Gorge. Take in great views of the Heysen Range and St Mary Peak. The Flinders Ranges is also home to more than half of South Australia’s 3100 plant species, and famous for the wildflowers that carpet the plains and foothills during spring.
DAY 5
Today’s climb will take us to rewarding views back over the ABC and Heysen Range and over the pound (a huge natural amphitheatre) are one of a kind. We will stop here for have lunch to take real time to take in the view.
DAY 6
Walking through Wilpena Pound you’ll get to really appreciate even more what this place is all about and the sheer scale of it. Continue your journey across the valley floor totally surrounded by the impressive Wilpena Pound walls. Prior to European settlement, the indigenous people hunted here. The Aboriginal word Wilpena means ‘cupped hand’. Holding tremendous cultural significance and spiritually uplifting, this is an ancient place offering unparalleled sanctuary and tranquillity to disconnect from the world and reconnect with yourself.
Walking: Easy to Moderate / 11km / 4–5 hrs
Meals: Chef-prepared cooked breakfast, Walkers Lunch and a chef-prepared a la carte dinner at the Woolshed
Accommodation: Rawnsley Park Station in rooms with ensuites
DAY 7
This is the last of the Flinders Ranges walks and is a fantastic way to bid farewell to the Flinders Ranges with views looking back inside Wilpena Pound and over to St Mary Peak. Then as you progress to the Bluff, enjoy the views of the expansive plains below and the Chace and Elder Ranges to the south.
Meals: Chef-prepared cooked breakfast, Walkers Lunch and a chef-prepared a la carte dinner at the Woolshed
Accommodation: Rawnsley Park Station in rooms with ensuites
DAY 8
This holiday finishes in Rawnsley after breakfast.
Meals: Chef-prepared cooked breakfast
Walk Grading
The Flinders Ranges walks are mostly easy to negotiate and generally the tracks are well graded. The parts that aren’t are still walk-able but require a little more effort. Full day walks average about 18km. There are opportunities for fit walkers to challenge themselves on rather lengthy walks of up to 25km.
*Walk grading and map are not to scale and indicative only.
Walking Track
All inclusive 8 day pack free walking holiday
7 nights’ accommodation in rooms with ensuites
All meals, including chef-cooked breakfasts, walkers lunches and a la carte two course dinners
Camp fire bbq dinner under the stars on first night
All luggage transport and vehicle transfers
We shift you along the track from accommodation to accommodation to limit time in a vehicle, creating more time to relax and enjoy the region
On this Flinders Ranges tour on foot you’ll stay in the Heysen Cabins in Angorichina, at award winning Rawnsley Park Station and in the luxury glamping tents at Ikara Wilpena. All of these private accommodations are located in inspired locations and provide a welcoming and comfortable base to rest, relax and reflect on the day’s walking. The single supplement of $795.00 is for your own private ensuite on all 7 nights. If you’re happy to share a bathroom (not your room) for 4 nights on the trip then the single supplement can be reduced down to $410.00.
The two course a la carte dinners and cooked breakfasts at Rawsley and Ikara are prepared by their in-house chefs.
Each day whilst you’re walking you’ll be provided with a substantial walkers lunch, more importantly you’ll get to eat it at a fabulous location on the track. A walkers lunch may include a high protein type salad, a roll or a wrap, a muesli bar, cake or muffin and a piece of fruit. Each day is varied. The 2 course a la carte dinners and cooked breakfasts are all prepared by professional chefs.
There is also a focus on regional food and wine. Good wholesome food with kangaroo and emu occasionally on the menu. The region is remote, but world-class South Australian wine and a cold lager are within easy reach. We suggest that if you like wine then bring some for the first night at Angorichina ( or for the whole trip if you want your own pre dinner drinks).
Alcohol or drinks with meals are not included (except tea/coffee and juice with breakfast).
This holiday starts and finishes in Rawnsley Park. Transport information is available on request.
The Flinders Ranges walks are moderate to challenging with some rough tracks, where you’ll cover shorter distances. Full day walks average about 19 km and 5-7.5 hours walking each day. The walking is over mostly flat, well-walked paths and bush tracks with some rocky sections. There are two days with steep sections. This is a great opportunity for fit walkers to challenge themselves, however easier options are available on some days. This is a reasonably long and tough walk and we highly recommend that you incorporate a rest day.
The best time to go is April through to September as it is the best weather for hiking in the Flinders Ranges. The temperature is still very comfortable to walk in but warm clothes are necessary as the temperature drops at night. This holiday is not available over the hot summer months of December to February.
See the Bureau of Meteorology’s information about average temperatures and rainfall at different times of the year.
INSURANCE
We strongly recommend purchasing a travel insurance policy as we charge a cancellation fee if you cancel your Auswalk holiday after we have confirmed it. We offer a 30% discount on travel insurance booked via our website. Get an instant quote and purchase online now.
INFORMATION PACK
For nearly 30 years we have taken pride in providing seamlessly organised walking holidays, but we know, even with that in mind, that you’ll have many more questions. You will receive a very detailed information pack and itinerary approximately 6 weeks out from departure outlining all the fine detail and much more.
CONTACT
If you have any questions about the Flinders Ranges walks., tracks or the Flinders Ranges tour as a whole, feel free to ask one of our destination consultants or to speak with one of our guides. You can get in touch with us via our contact form, email us at [email protected], or call us on +61 3 9597 9767.
REQUEST TO BOOK
Submitting this completed form along with your deposit is a tentative booking only.
Please do not book flights until receiving a confirmation from Auswalk | {
"pile_set_name": "Pile-CC"
} | 0.068919 | [
{
"begin": 0,
"end": 16,
"score": 0.0142302895
},
{
"begin": 16,
"end": 26,
"score": 0.015896274
},
{
"begin": 26,
"end": 43,
"score": 0.039598234
},
{
"begin": 43,
"end": 53,
"score": 0.013883209
},
{
"begin": 53,
"end": 64,
"score": 0.12116077
},
{
"begin": 64,
"end": 183,
"score": 0.020685982
},
{
"begin": 183,
"end": 346,
"score": 0.0100653265
},
{
"begin": 346,
"end": 477,
"score": 0.025692256
},
{
"begin": 477,
"end": 589,
"score": 0.029812546
},
{
"begin": 589,
"end": 9588,
"score": 0.028267438
}
] |
As just about any regular Reg reader knows, the Hitchhikers' Guide to the Galaxy states authoritatively that this planet Earth lies "far out in the uncharted backwaters of the unfashionable end of the western spiral arm of the galaxy". However, it appears that in this case the Guide is probably wrong.
We learn this from new research carried out by astronomers who have been probing the heavens with the aid of the mighty five-thousand-miles-wide Very Long Baseline Array (VLBA) radio-scope.
An announcement from the US National Radio Astronomy Observatory, highlighting the new boffinry, has this to say:
Our Solar System's Milky Way neighborhood just went upscale. We reside between two major spiral arms of our home galaxy, in a structure called the Local Arm. New research using the ultra-sharp radio vision of the National Science Foundation's Very Long Baseline Array (VLBA) indicates that the Local Arm, previously thought to be only a small spur, instead is much more like the adjacent major arms, and is likely a significant branch of one of them.
Far from an unfashionable backwater, then, it would seem that our local stellar neighbourhood is in fact a comparatively desirable and bustling bit of galactic real estate.
"The Local Arm should appear as a prominent feature of the Milky Way," contends enthusiastic galactic estate agent Alberto Sanna, of the Max-Planck Institute for Radio Astronomy.
"The Local Arm is not a spur. It is a major structure, maybe a branch of the Perseus Arm, or possibly an independent arm segment," he adds.
Sanna and his colleagues found this out by using the VLBA to obtain ranges to naturally occurring microwave-laser (maser) energy emissions beaming out of faraway clouds of water and alcohol. Such localities are where hot young stars are to be found, an unfailing indicator of trendiness in galactic neighbourhood terms.
Earth's 'hood, according to Sanna and his fellow astronomers' results as interpreted by the NRAO outreach staff, deserves "more respect" than it has received thus far.
Though perhaps not enough even so to prevent our planet being demolished, ostensibly in order to make way for a hyperspace bypass (but actually in order to safeguard the psychiatric industry by preventing the planet - in fact a vast supercomputer controlled by mice - from finding out the Ultimate Question of the universe, the answer to which is, of course, 42.) ® | {
"pile_set_name": "OpenWebText2"
} | 0.070916 | [
{
"begin": 0,
"end": 236,
"score": 0.07091636
},
{
"begin": 236,
"end": 303,
"score": 0.030155903
},
{
"begin": 303,
"end": 494,
"score": 0.015757442
},
{
"begin": 494,
"end": 609,
"score": 0.043375164
},
{
"begin": 609,
"end": 671,
"score": 0.017909339
},
{
"begin": 671,
"end": 768,
"score": 0.025520578
},
{
"begin": 768,
"end": 1061,
"score": 0.015202113
},
{
"begin": 1061,
"end": 1235,
"score": 0.11021292
},
{
"begin": 1235,
"end": 1415,
"score": 0.013050216
},
{
"begin": 1415,
"end": 2412,
"score": 0.06332459
}
] |
Tag Archives: mini stories
I found some evidence of my 40 days lost dated October 17th when I was in the Royal Inland Hospital which comes in the form of writing. I was not alone in my stay, others were with me as we … Continue reading → | {
"pile_set_name": "Pile-CC"
} | 0.013467 | [
{
"begin": 0,
"end": 27,
"score": 0.010690071
},
{
"begin": 27,
"end": 164,
"score": 0.015826859
},
{
"begin": 164,
"end": 238,
"score": 0.017909339
}
] |
[Development of Animation Projector System and Usefulness in Pediatric Head CT].
The restlessness of young children often causes motion artifacts on CT images. We devised a new animation projector system (CT Theater) that enables a child to view an animation during a pediatric head CT examination. The purpose of this study is to assess the usefulness on a children of a video viewed during a head CT scan. Children of 3-10 years old who underwent head CT (SOMATOM Definition Flash, SOMATOM Force; Siemens) were analyzed for a period from 6 months before, to 6 months after, introduction of the projector system (before: n=46, after: n=29). Mobile projector (MP-CL1; Sony) connected with tablet device (iPad; Apple) was put on the CT table near the child's head. An animation was projected on the child's line of sight inside the gantry. The animation is projected on the line of sight of the child such that the projector moves with the child on the table. The number of requests for use made by children was 28/29 (96.6%). The presence of images without motion artifacts decreased significantly after introduction (before/after introduction: 84.8% vs 100%, p=0.03). The overall examination success rate tended to increase after introduction (84.8% vs 92.9%, p=0.26). The overall examination time was significantly reduced (92.4±42.4 s vs 65.1±47.3 s, p<0.001). We developed an animation projector system that shortened examination time and decreased motion artifacts in pediatric head CT. | {
"pile_set_name": "PubMed Abstracts"
} | 0.010621 | [
{
"begin": 0,
"end": 81,
"score": 0.0001518476
},
{
"begin": 81,
"end": 160,
"score": 0.04268845
},
{
"begin": 160,
"end": 299,
"score": 0.006178028
},
{
"begin": 299,
"end": 408,
"score": 0.022213135
},
{
"begin": 408,
"end": 642,
"score": 0.007149853
},
{
"begin": 642,
"end": 764,
"score": 0.011106567
},
{
"begin": 764,
"end": 839,
"score": 0.017562259
},
{
"begin": 839,
"end": 959,
"score": 0.0121478075
},
{
"begin": 959,
"end": 1026,
"score": 0.009857078
},
{
"begin": 1026,
"end": 1491,
"score": 0.0022039595
}
] |
Q:
Can we have MathJax back?
It's been a couple years since PPCG voted against MathJax. Since then, the vote ratio has changed significantly, and most seem to be in favor of MathJax. However, it is status-completed and no change will be enacted on the current votes.
The issue then was weird-looking search results, odd indentation and broken stack snippets due to $ being used in code. There are solutions to most of these, however. One solution is to escape all instances of $ in code (like it's done with < and >), which sounds fairly tedious but most of the work could automated if TIO were to do it. Not a great solution but some might believe having MathJax outweighs the cons.
We've had a lot of math questions (and answers) since and they would greatly benefit from having actual mathematical expressions that look ridiculously better than if they were done with meek markdown formatting.
I'd like to revisit this issue with another vote as opinions and ideas have changed since then.
Should MathJax be enabled again?
Please vote on the answers with approaches, not on the question based on your opinion on Mathjax.
A:
Yes, bring MathJax back
Advantages of having MathJax on Programming Puzzles & Code Golf:
A lot of math, number and number-theory challenges and answers (and not only those!) would benefit from having it back. This is a lot – At the time of writing, about 12.19 percent of the challenges are mathematics-related, not to mention that math is our third most frequented tag.
Rather than having to type our maths using third-party services, and then uploading pictures which would clutter the entire page, while still not being completely aesthetically pleasant, we would have a built-in way to use these equations that would overall bring a design improvement to the entire site.
Disadvantages of having MathJax (mostly those that were mentioned in the 2015 post that has disabled it) and their possible solutions (but they no longer seem to apply):
Snippets that contain $ would mess up the search query and / or markdown. As pointed out by Doorknob, the fix is easy. Use \$ or other separators instead of $ for starting / ending MathJax passages.
Code snippets containing $$ are a problem – unless the escaping issue has been addressed since 2015, not sure – the separators for non-inline, centred expressions are not site-settable. I am sure we would find a work-around, though, because stack-snippets and the search query are still two very important features of this site. If this would still be a problem, we could simply just use inline math with \$. However, the fix is rather easy as discussed in chat.
Example Answers and Challenges that would take advantage of it
Calculate the number of primes up to N by Dennis.
(-a) × (-a) = a × a by Wheat Wizard.
Absolute Sums of Sidi Polynomial Coefficients by Dennis.
Some answers to One OEIS after another by caird coinheringaahing.
Largest Number Printable by Vereos, and all its answers.
Determinant of an Integer Matrix by Leaky Nun.
How lit is this mountain? by Mr. Xcoder.
Coprimes up to N by Dennis.
Golf a transcendental number by xnor.
Approximate definite integrals using Riemann sums by Mr. Xcoder.
And the list goes on. As you might have seen, challenges and answers from various tags, not only code-golf would have a benefit from re-enabling it. Now, we can’t just exempt this site from having nicely-rendered mathematical insights, purely due to some separators, right?
A:
Add support back, but change the delimiter
I think MathJax would be fine, and see Xcoder's answer for more reasons why. However, the reasons it were disabled still stand:
Messed up regexes, since MathJax can trigger inside code blocks for whatever reason
Odd-looking search results (though in general I think this applies to regexes in search results)
Breaks stack snippets that we have, including the leaderboard one.
But as far as I can tell, all of these would be fixed by changing the delimiter. Something like \$ would work, but I'm open to other suggestions.
A:
Add support back, but make it not trigger in code blocks.
As far as I can see, this is the root of all problems. @200_success on CodeReview Meta says (emphasis mine):
MathJax is currently enabled with $ … $ as delimiters. However, that breaks existing posts that contain two dollar signs within the same paragraph, but where the code is not formatted using backticks or a code block.
...which makes me think that this, IMO proper, fix is easily achievable.
| {
"pile_set_name": "StackExchange"
} | 0.043032 | [
{
"begin": 0,
"end": 30,
"score": 0.015896274
},
{
"begin": 30,
"end": 90,
"score": 0.036508016
},
{
"begin": 90,
"end": 185,
"score": 0.027237365
},
{
"begin": 185,
"end": 270,
"score": 0.010412407
},
{
"begin": 270,
"end": 390,
"score": 0.024318827
},
{
"begin": 390,
"end": 437,
"score": 0.016173938
},
{
"begin": 437,
"end": 608,
"score": 0.027237365
},
{
"begin": 608,
"end": 687,
"score": 0.034791227
},
{
"begin": 687,
"end": 900,
"score": 0.22510603
},
{
"begin": 900,
"end": 4520,
"score": 0.02929751
}
] |
- Większość mieszkańców chce tej figurki. Tylko nielicznym ona przeszkadza, dlatego zbieram podpisy i będę wnioskować o pozostawienie Maryi przed naszym blokiem - mówi Bernadetta Palkij.
Figurę Matki Bożej ustawiła jedna z mieszkanek boku przy ul. Broniewskiego w Rzeszowie. Ma to być miejsce modlitwy. Administrator bloku zażądał usunięcia figury, ponieważ ustawiono ją bez wymaganej zgody.
Niewielka figura Matki Bożej pod blokiem przy ul. Broniewskiego 21 pojawiła się w ostatni piątek. Stanęła niedaleko wejścia do klatki schodowej, w miejscu ogrodzonym i szczególnie wypielęgnowanym. W ogródku są krzewy, kwiaty, niewielka pergola i sporo urokliwych ozdób. Figura Świętej Pani przed drzwiami do klatki O miejsce to dba Bernadetta Palkij, mieszkanka bloku nr 21, która sama postanowiła ustawić figurkę. Zamówiła ją u rzeźbiarza z Jarosławia. - Pomysł chodził mi po głowie od dawna, bo chciałam, żeby Maryja opiekowała się mieszkańcami naszego bloku, żeby starsze osoby, które i tak siadają na ławce obok ogródka i odmawiają różaniec, miały swoje miejsce modlitwy - opowiada. - Chciałam, żeby obecność Matki Bożej w tym miejscu dawała nam siłę. A teraz mamy Rok Miłosierdzia, więc tym bardziej czas jest odpowiedni - dodaje.
I zaznacza, że z prośbą o poświęcenie figurki zwróciła się do proboszcza parafii pw. Podwyższenia Krzyża. Ten zgodził się pobłogosławić to miejsce i wyznaczył nawet termin na sobotę, 1 października. I to właśnie niepokoi niektórych mieszkańców bloku, którzy podzielili się z nami swoją opinią. - Mimo iż jesteśmy osobami wierzącymi, perspektywa modlących się staruszek przy wejściu do klatki schodowej nieco nas przeraża. O zgodę na wspomnianą figurę inicjatorka tego przedsięwzięcia nie pytała nikogo z mieszkańców - zdradziła nam jedna z mieszkanek bloku, prosząc o anonimowość. - W niedzielę rano figurę przyszedł oglądnąć nasz proboszcz, a na mszy zapowiedział, że mieszkańcy bloku poprosili go o poświęcenie figury. My jako część mieszkańców nie zgadzamy się na takie praktyki, zwłaszcza za naszymi plecami - dodaje.
I pyta, czy na terenie bloków, którymi zarządza MZBM Rzeszów, możliwe jest samodzielne decydowanie o ustawianiu małej architektury. Z pytaniem tym zwróciliśmy się do zarządcy bloku. Jak usłyszeliśmy, teren, na którym zorganizowano ogródek i postawiono figurę, należy do miasta. - Bez uzyskania odpowiedniej zgody na takiej działce nie można robić nic na własną rękę. Zresztą, wcześniej ta sama mieszkanka bez naszej zgody utworzyła w tym miejscu oczko wodne, które musiała później zlikwidować - mówi Janusz Szydło, administrator bloku nr 21. - I tym razem wezwaliśmy tę panią do usunięcia figury, ale oświadczyła, że tego nie zrobi. Zaznaczyła, że będzie zbierać podpisy i pisać petycję z prośbą o pozostawienie figury w tym miejscu - dodaje. Pani Bernadetta potwierdza, że podpisy zbiera. Na ten moment z 44 mieszkańców bloku jej pomysł pochwaliło i poparło swoim podpisem ponad 20.
Chcemy tej figury! Jedną z osób popierających jest Maria Łyżka. - Przecież w tym, że figura tu stoi, nie ma nic zdrożnego ani gorszącego. To podobizna Matki Bożej, a nie diabła czy jakichś bożków - dodaje pani Maria. - Również miejsce nie jest niegodne, bo przecież nie stoi przy śmietniku. Ja chętnie będę się tu modlić - dodaje. Pani Bernadetta zaznacza, że nikogo do modlitwy nie zmusza. - Ja nie wiem, komu przeszkadza niewielka zresztą figura. Fakt, może i powinnam zacząć od formalnej strony, czyli zebrać podpisy i poprosić administrację o zgodę, ale pomyślałam, że skoro mam już u siebie figurę, to nic się nie stanie, jeżeli ją ustawię - wyjaśnia Bernadetta Palkij. | {
"pile_set_name": "OpenWebText2"
} | 0.085014 | [
{
"begin": 0,
"end": 42,
"score": 0.021380141
},
{
"begin": 42,
"end": 187,
"score": 0.049212243
},
{
"begin": 187,
"end": 249,
"score": 0.019575324
},
{
"begin": 249,
"end": 276,
"score": 0.00930175
},
{
"begin": 276,
"end": 304,
"score": 0.0038699445
},
{
"begin": 304,
"end": 393,
"score": 0.04406188
},
{
"begin": 393,
"end": 444,
"score": 0.09870692
},
{
"begin": 444,
"end": 492,
"score": 0.0028807658
},
{
"begin": 492,
"end": 591,
"score": 0.00014642447
},
{
"begin": 591,
"end": 3613,
"score": 0.070516795
}
] |
Various types of garage ventilation systems are known in the prior art. However, what is needed is a garage ventilation system including a housing body having a pair of side walls and rear and front mounting plates with louvered vents on the front mounting plates. Support frames vertically disposed on the rear mounting plate have a channel longitudinally disposed therein and a stop body disposed within an outer end thereof. A mount bracket engages each of the channels. Legs disposed on each side of a central pivot member engage the respective channel with termination at the stop body. The mount brackets extend outwardly and away from the rear mounting plate. A fan casing, having a fan disposed therein, is rotatingly mounted to the mount brackets allowing rotation of the fan into an exhaust position and an alternate intake position to direct airflow away from or alternately into a garage. A heater contained within the housing body generates heated airflow directed by the fan. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.023117 | [
{
"begin": 0,
"end": 72,
"score": 0.006559816
},
{
"begin": 72,
"end": 265,
"score": 0.013466713
},
{
"begin": 265,
"end": 428,
"score": 0.06931809
},
{
"begin": 428,
"end": 474,
"score": 0.043375164
},
{
"begin": 474,
"end": 592,
"score": 0.14014533
},
{
"begin": 592,
"end": 667,
"score": 0.038911518
},
{
"begin": 667,
"end": 901,
"score": 0.019575324
},
{
"begin": 901,
"end": 989,
"score": 0.02637897
}
] |
But all these types of porn share things in common. "I think we are all outcasts," Trouble told me when I ask if there's a big difference between queer and mainstream actors. "You have to be pretty courageous and strong to be in the porn industry. I think even Jenna Jameson would admit to being a total weirdo."
"I'D LIKE TO THANK MY ASSHOLE"
The weekend's climax for queer porn did not take place at a podium. Best Alternative Website didn't win its category, which turns out is among the B-list honors that are announced in a quick scrolling of names on a Jumbotron at the AVN ceremony's terminus anyways.
The high point instead, was the red carpet. "That's where I shine the most," Trouble told me. Arms draped around each other's tuxes and sequined mini-dresses, queer porn stalked the lane in front of the flashbulbs and broadcast press with aplomb. It looked like they'd been doing it for years, which speaks to their professional talent — actors James Darling and Charlie Spats were walking as the second and third trans men ever on the AVNs' carpet (Buck Angel, winner of 2007's AVN for Best Transsexual Performer, was the first).
Queer dominatrix Princess Donna of San Francisco's Kink.com walked the gauntlet arm-in-arm with Bobbi Starr, who would later accept the AVN for Best Female Performer. Hartley was there with her husband, and chatted with me about her role in queer porn education. "It helps that I can pass for a normie," she laughed. "The presence of my physical self allows the message to sink in. I believe in this [queer porn] to my core."
In the moment, it seemed that queer porn was truly a force in the industry. The week after the awards, I forwarded Trouble a photo of herself with an arm around a beaming Ron Jeremy on the red carpet. She cropped and lightened it before reposting on her Facebook page with the note "Ron Jeremy, you have made some seriously hot porn. I am a fan!"
But when it came time to watch the awards themselves — a drawn-out, logistically disastrous affair whose 2012 highlight was Best Anal Scene champ (and winner of seven awards in total) Asa Akira's acceptance speech: "I'd like to thank my asshole for putting up with all my shenanigans!" — the core queer porn team was nowhere to be found. Beat from hours on their high heels in front of the cameras, Horn, Trouble, and co-stars went out for a "steak and a Manhattan," rather than settling in with overpriced drinks to watch teleprompter flubs and malfunctioning clip reels.
Once again, the queer porn stars were taking what they wanted from the adult industry and leaving the rest. Explains Horn: "everyone was on their magic phones and on Twitter people were saying how terrible everything was. I was putting marrow on toast and I was like, eh, I don't think I'm going to make it."
But they met up with those who did attend the awards for the after-party. And yes, there was a hot tub involved.
Special thanks to Broke Ass Stuart for supplying the headline of this article. Porn + words = Stuart. | {
"pile_set_name": "Pile-CC"
} | 0.494545 | [
{
"begin": 0,
"end": 52,
"score": 0.317855
},
{
"begin": 52,
"end": 175,
"score": 0.19141254
},
{
"begin": 175,
"end": 248,
"score": 0.38965073
},
{
"begin": 248,
"end": 313,
"score": 0.5535644
},
{
"begin": 313,
"end": 345,
"score": 0.9107452
},
{
"begin": 345,
"end": 414,
"score": 0.44820568
},
{
"begin": 414,
"end": 611,
"score": 0.019158829
},
{
"begin": 611,
"end": 656,
"score": 0.04543531
},
{
"begin": 656,
"end": 706,
"score": 0.039254878
},
{
"begin": 706,
"end": 3018,
"score": 0.4254099
}
] |
Blennerhassett Hotel
Blennerhassett Hotel is a historic hotel located at Parkersburg, Wood County, West Virginia. It opened in 1889 and is in the Queen Anne style. The hotel was listed on the National Register of Historic Places in 1982. A full restoration took place in 1986. The Blennerhassett Hotel is also a member of Historic Hotels of America, the official program of the National Trust for Historic Preservation. (The hotel website states that the property is "registered as a national historic landmark". This is undoubtedly a mistake for it being placed on the National Register of Historic Places. Only about three percent of Register listings are NHLs.)
In the late 1800s, money from the oil and natural gas industries flooded into Parkersburg, West Virginia, and the town quickly became a vivacious city that welcomed businessmen and visitors from all over the country. Designed and built by William Chancellor, a prominent Parkersburg businessman, Blennerhassett opened in 1889 and quickly became a grand showplace for what would later be known as the Gaslight Era. The original hotel had approximately 50 guest rooms around a central staircase. Restrooms were common places on each of the four guest floors and the kitchen was located on the fifth floor. What is now the hotel's game room originally housed the First National Bank of Parkersburg and had the luxury of electricity.
The property was named after Harman and Margaret Blennerhassett, who settled on an island in the Ohio River in 1798 and built a Palladian mansion on their European-style estate (the island now called Blennerhassett Island). Their property was the envy of all locals, but they didn't rise to national fame until they allowed former Vice President Aaron Burr to use the island as the base of operations for his controversial military exhibition. Labeled as a conspiracy by some, the Blennerhassetts fled down the Ohio River to escape when militia invaded the island.
See also
List of Historic Hotels of America
References
External links
Blennerhassett Hotel website
Category:Hotel buildings on the National Register of Historic Places in West Virginia
Category:Queen Anne architecture in West Virginia
Category:Buildings and structures in Parkersburg, West Virginia
Category:National Register of Historic Places in Wood County, West Virginia | {
"pile_set_name": "Wikipedia (en)"
} | 0.018048 | [
{
"begin": 0,
"end": 21,
"score": 0.03616466
},
{
"begin": 21,
"end": 116,
"score": 0.015826859
},
{
"begin": 116,
"end": 166,
"score": 0.012078391
},
{
"begin": 166,
"end": 240,
"score": 0.006004488
},
{
"begin": 240,
"end": 279,
"score": 0.008711713
},
{
"begin": 279,
"end": 422,
"score": 0.010204159
},
{
"begin": 422,
"end": 515,
"score": 0.0067333565
},
{
"begin": 515,
"end": 610,
"score": 0.02193547
},
{
"begin": 610,
"end": 667,
"score": 0.009232334
},
{
"begin": 667,
"end": 2344,
"score": 0.123736724
}
] |
The detection of microscopic disease in breast cancer has been evaluated in lymph nodes, bone marrow (primary breast cancer), and peripheral blood (metastatic disease) \[[@B1],[@B2]\]. Most of these studies demonstrated that the detection of microscopic disease in breast cancer patients contributes prognostic information and, in selected cases, can predict the efficacy of treatments \[[@B1],[@B2]\]. In primary breast cancer, the detection of microscopic disease in lymph nodes and bone marrow has led to a better understanding of the role of minimal residual disease (MRD). In metastatic breast cancer (MBC) reliable detection of circulating tumor cells (CTCs) had been obtained by using immuno-magnetic separation and subsequent analysis by the CellSpotter™ analyzer (Veridex LLC, a Johnson & Johnson company, Warren, NJ, USA). This technology is becoming a standard tool for the \'real-time\' assessment of prognosis and response to treatment. This is particularly important in the context of advanced disease management, considering the incurable status of the disease and the increasing therapeutic options available that could at least contribute to improve palliation and impact on overall survival.
In fact, despite years of clinical research, the odds of achieving complete response, and hence major survival benefit, for patients with MBC remain extremely low. Only a few patients who achieve a complete response after chemotherapy remain in this state for prolonged periods of time, with some remaining in remission beyond 20 years. There are presently no reliable biological markers that can predict prognosis and monitor therapy effects in MBC.
The detection of CTCs in patients with MBC about to start a new line of treatment has been shown to predict progression-free survival (PFS) and overall survival (OS). This prognostic value was independent of the line of therapy (e.g. first-line versus second-line or more) \[[@B2],[@B3]\]. Moreover, in multivariate analysis CTCs demonstrated superior value compared with site of metastasis (e.g. visceral versus soft tissue/bone), type of therapy, and length of time to recurrence after definitive primary surgery. In recent analysis, detection of CTCs has also been found to be prognostic in patients with bone-only disease (not measurable disease). CTCs have been shown to be superior to standard tumor markers (e.g. Ca27-29) in predicting prognosis. Furthermore, the efficacy or benefit to systemic therapy could be predicted by the level of CTCs as early as 3--4 weeks after initiation of therapy. Patients with persistent of ≥ 5 CTCs demonstrated lack of response or progressive disease at the time of restaging by standard imaging modalities. Conversely, patients with \< 5CTCs showed objective remission. These data clearly suggest that CTCs can be used as an early predictor of treatment efficacy and be extremely useful in sparing patients from futile therapy early in the course of their treatment.
Prospective clinical trials are presently being conducted in MBC to validate further the prognostic value of CTCs, possibly to use this diagnostic tool to better stratify patients with metastatic disease, eventually modifying the current staging system (International Stage IV Stratification Study \[ISSS\]). Patients with metastatic disease could be divided into the subcategories IV~A~and IV~B~, depending on the presence or absence of CTCs. Additional studies are presently assessing the survival benefit of early change in treatment based on the persistence of CTCs and the possibility of collecting the cells, after sorting for evaluation of biomarkers (RT-PCR, gene profiling). Exploratory studies in PBC are also being conducted.
This technology could be integrated with other new investigation tools to develop blood-based integrated platforms that will facilitate screening, diagnosis, prognosis and target discovery. A recent acquisition is represented by the use of glycan arrays \[[@B4]\].
Malignant transformation and tumor progression are associated with the specific changes in the complex surface carbohydrates known as tumor-associated carbohydrate antigens (TACAs). Production of autoantibodies against these abnormal carbohydrates during cancer progression is expected. A robust printed glycan array was recently fabricated that employs a library of over 200 well defined structures comprising carbohydrate sequences of *N*-glycans, *O*-glycans, glycolipids, and glycoproteins. This printed glycan array was used to simultaneously detect multiple specific antiglycan autoantibodies in sera from breast cancer patients.
| {
"pile_set_name": "PubMed Central"
} | 0.072914 | [
{
"begin": 0,
"end": 185,
"score": 0.029125832
},
{
"begin": 185,
"end": 403,
"score": 0.007982845
},
{
"begin": 403,
"end": 578,
"score": 0.033246122
},
{
"begin": 578,
"end": 833,
"score": 0.008191093
},
{
"begin": 833,
"end": 950,
"score": 0.01193956
},
{
"begin": 950,
"end": 1210,
"score": 0.007427517
},
{
"begin": 1210,
"end": 1375,
"score": 0.019158829
},
{
"begin": 1375,
"end": 1548,
"score": 0.013258465
},
{
"begin": 1548,
"end": 1662,
"score": 0.014716201
},
{
"begin": 1662,
"end": 4614,
"score": 0.017631676
}
] |
Joy comes in many different shapes and sizes, and that is exactly what you will be able to show with our Square Joy Holiday Cards. Don’t let someone else’s images tell your story. Every time you send out one of these family photo cards, you are sending a story of the past year and the joy your family has experienced. There are plenty of photo spots on the front side of these photo holiday cards as squares are placed in a grid pattern. The word ‘JOY’ is written across the grid. The back layout is a solid color background with your family’s holiday message centered on it. Alternate back designs may be available. All cards printed on recycled paper. | {
"pile_set_name": "Pile-CC"
} | 0.037538 | [
{
"begin": 0,
"end": 131,
"score": 0.017423427
},
{
"begin": 131,
"end": 180,
"score": 0.01631277
},
{
"begin": 180,
"end": 319,
"score": 0.011592479
},
{
"begin": 319,
"end": 439,
"score": 0.013883209
},
{
"begin": 439,
"end": 482,
"score": 0.026894007
},
{
"begin": 482,
"end": 577,
"score": 0.012494888
},
{
"begin": 577,
"end": 618,
"score": 0.013397297
},
{
"begin": 618,
"end": 654,
"score": 0.016798683
}
] |
Monotonous tales and incoherent thoughts of a seething brain…Read at your peril
Our Elders Have Failed Us!
“We have a powerful potential in our youth, and we must have the courage to change old ideas and practices so that we may direct their power towards good ends.”Mary McLeod Bethune
When we were young, we were taught to respect our elders. We looked upon them with exalted admiration and appreciation. Whoever they were, wherever they came from or whatever clan they hailed from, we were expected to treat them with utmost respect. We were admonished for calling them by their own name. By Lord; we received rigorous reprimands for not emptying our seats for them when they arrived. We were expected to display a decent decorum at all times.
Could these elders whom we’ve grown to fear and, at the same time, admire so much be the cause of our destruction, one would ask. But these elders, still remarkably agile despite senility and strenuous predicaments, are versed in poetry and recite it with extreme vitality, enriched with cunning dexterity and clever choice of words. And they are scandalmongers; their days spent on frivolous jokes and heated feuds between clans, by the tip of their tongue! With their enticing and scintillating poems, they infest the minds of susceptible and oblivious adolescents. Through this sham poetry and witty repartee, they earn a name only one could yearn; held in high veneration, whilst heaps of praises are hurled their way. There is, however, pathos in their false pretence and sham poetry as they narrate melancholic tales of yesteryear to stir up emotions and provoke the psyche of the unsuspecting folks. What a Travesty! What a travesty!
The rest of the elders, not involved in the political disarray, live beyond care for today. They dread the day that follows, and after years of endurance and fortitude, their dismal faces radiate no more. They lay down in the dumps, desolate, any trace of anticipation they had had evaporated. Days they spend wandering aimlessly with one thing on their mind – Qat – and a bottle of water to quench their thirst. The same routine is exercised cyclically without cessation.
Thanks to the benevolent Somali women. The once social nonentities are now the pride and joy. Their homes, full of waifs and strays, serve as sanctuaries for the poor and dispossessed. Relentlessly they support young and old, rationing the supplies if need be. Thanks to their unremittingly labours, many now survive. From the break of dawn they work diligently supporting entire lineages by the sweat of their brows; selling with much dexterity anything they could find. By night they take a breather, and demurely await their husband’s arrival just to get hauled over the coals for the slightest inaccuracy. Oh! How magnanimous they are to put up with their ne’er-do-well husbands!
It’s quite disheartening how the Qabiil Syndrome has got us by the short and curlies and with majority of the population in Somalia being illiterate, there is little to expect of them. So, we have the Somalis in Diaspora who, regrettably, have no nostalgic sentiments. “Somalia can never be” they proclaim wistfully and leave her to lament her sorry states alone! They expect their seniors back home to amend the state of affairs and resolve their issues. With the waning distance, they lose touch with every intrinsic quality, faith and culture they had while the Nomads in Somalia turn a sympathetic eye towards the ones in Western countries “Qurbaha” and plead for them to save them from the self-destruction. Their youth spent on selfish desires, deludes them from reality and cocoons them from unpleasant imagery. There they dwell despondently with the notion that a better future lies ahead of them. They laze and lounge, graze (Qat) and grouch constantly. Their families lost amidst all this upheaval and perplexity, and then they wonder why even their partners often abscond from them!
What our elders have yet to learn is that wars have no happy endings; always cruel and catastrophic. Whether a winner or a loser, expect no glad tidings, no immortal kisses, no heaps of welcomes await you! Ileen Odayaashu waxaysan garaneyn, Dagaal wiil kuma dhashee, wiil baa ku dhinta!
As for the warlords, despair not, Somaliyeey, despair not! Tyrants and murderers always fall; and so they will!
Insha-Allah Xamdi – All we can do at this moment is pray that this coming Generation – the ones back home adn the ones in Diaspora – can outwit their fathers and grandfathers and mend the situation for the better! | {
"pile_set_name": "Pile-CC"
} | 0.17035 | [
{
"begin": 0,
"end": 80,
"score": 0.3983115
},
{
"begin": 80,
"end": 108,
"score": 0.2885035
},
{
"begin": 108,
"end": 269,
"score": 0.015340946
},
{
"begin": 269,
"end": 289,
"score": 0.00930175
},
{
"begin": 289,
"end": 348,
"score": 0.015132698
},
{
"begin": 348,
"end": 410,
"score": 0.012564304
},
{
"begin": 410,
"end": 540,
"score": 0.038224805
},
{
"begin": 540,
"end": 595,
"score": 0.025863936
},
{
"begin": 595,
"end": 691,
"score": 0.04680874
},
{
"begin": 691,
"end": 4561,
"score": 0.22987647
}
] |
Q:
Spring webflux and reading from database
Spring 5 introduces the reactive programming style for rest APIs with webflux. I'm fairly new to it myself and was wondering wether wrapping synchronous calls to a database into Flux or Mono makes sense preformence-wise? If yes, is this the way to do it:
@RestController
public class HomeController {
private MeasurementRepository repository;
public HomeController(MeasurementRepository repository){
this.repository = repository;
}
@GetMapping(value = "/v1/measurements")
public Flux<Measurement> getMeasurements() {
return Flux.fromIterable(repository.findByFromDateGreaterThanEqual(new Date(1486980000L)));
}
}
Is there something like an asynchronous CrudRepository? I couldn't find it.
A:
One option would be to use alternative SQL clients that are fully non-blocking. Some examples include:
https://github.com/mauricio/postgresql-async or https://github.com/finagle/roc. Of course, none of these drivers is officially supported by database vendors yet. Also, functionality is way much less attractive comparing to mature JDBC-based abstractions such as Hibernate or jOOQ.
The alternative idea came to me from Scala world. The idea is to dispatch blocking calls into isolated ThreadPool not to mix blocking and non-blocking calls together. This will allow us to control the overall number of threads and will let the CPU serve non-blocking tasks in the main execution context with some potential optimizations.
Assuming that we have JDBC based implementation such as Spring Data JPA which is indeed blocking, we can make it’s execution asynchronous and dispatch on the dedicated thread pool.
@RestController
public class HomeController {
private final MeasurementRepository repository;
private final Scheduler scheduler;
public HomeController(MeasurementRepository repository, @Qualifier("jdbcScheduler") Scheduler scheduler) {
this.repository = repository;
this.scheduler = scheduler;
}
@GetMapping(value = "/v1/measurements")
public Flux<Measurement> getMeasurements() {
return Mono.fromCallable(() -> repository.findByFromDateGreaterThanEqual(new Date(1486980000L))).publishOn(scheduler);
}
}
Our Scheduler for JDBC should be configured by using dedicated Thread Pool with size count equal to the number of connections.
@Configuration
public class SchedulerConfiguration {
private final Integer connectionPoolSize;
public SchedulerConfiguration(@Value("${spring.datasource.maximum-pool-size}") Integer connectionPoolSize) {
this.connectionPoolSize = connectionPoolSize;
}
@Bean
public Scheduler jdbcScheduler() {
return Schedulers.fromExecutor(Executors.newFixedThreadPool(connectionPoolSize));
}
}
However, there are difficulties with this approach. The main one is transaction management. In JDBC, transactions are possible only within a single java.sql.Connection. To make several operations in one transaction, they have to share a connection. If we want to make some calculations in between them, we have to keep the connection. This is not very effective, as we keep a limited number of connections idle while doing calculations in between.
This idea of an asynchronous JDBC wrapper is not new and is already implemented in Scala library Slick 3. Finally, non-blocking JDBC may come along on the Java roadmap. As it was announced at JavaOne in September 2016, and it is possible that we will see it in Java 10.
A:
Based on this blog you should rewrite your snippet in following way
@GetMapping(value = "/v1/measurements")
public Flux<Measurement> getMeasurements() {
return Flux.defer(() -> Flux.fromIterable(repository.findByFromDateGreaterThanEqual(new Date(1486980000L))))
.subscribeOn(Schedulers.elastic());
}
A:
Spring data support reactive repository interface for Mongo and Cassandra.
Spring data MongoDb Reactive Interface
Spring Data MongoDB provides reactive repository support with Project Reactor and RxJava 1 reactive types. The reactive API supports reactive type conversion between reactive types.
public interface ReactivePersonRepository extends ReactiveCrudRepository<Person, String> {
Flux<Person> findByLastname(String lastname);
@Query("{ 'firstname': ?0, 'lastname': ?1}")
Mono<Person> findByFirstnameAndLastname(String firstname, String lastname);
// Accept parameter inside a reactive type for deferred execution
Flux<Person> findByLastname(Mono<String> lastname);
Mono<Person> findByFirstnameAndLastname(Mono<String> firstname, String lastname);
@InfiniteStream // Use a tailable cursor
Flux<Person> findWithTailableCursorBy();
}
public interface RxJava1PersonRepository extends RxJava1CrudRepository<Person, String> {
Observable<Person> findByLastname(String lastname);
@Query("{ 'firstname': ?0, 'lastname': ?1}")
Single<Person> findByFirstnameAndLastname(String firstname, String lastname);
// Accept parameter inside a reactive type for deferred execution
Observable<Person> findByLastname(Single<String> lastname);
Single<Person> findByFirstnameAndLastname(Single<String> firstname, String lastname);
@InfiniteStream // Use a tailable cursor
Observable<Person> findWithTailableCursorBy();
}
| {
"pile_set_name": "StackExchange"
} | 0.019853 | [
{
"begin": 0,
"end": 45,
"score": 0.008954669
},
{
"begin": 45,
"end": 125,
"score": 0.0136749605
},
{
"begin": 125,
"end": 267,
"score": 0.020408317
},
{
"begin": 267,
"end": 302,
"score": 0.019158829
},
{
"begin": 302,
"end": 318,
"score": 0.007982845
},
{
"begin": 318,
"end": 348,
"score": 0.010690071
},
{
"begin": 348,
"end": 395,
"score": 0.008260509
},
{
"begin": 395,
"end": 457,
"score": 0.008815838
},
{
"begin": 457,
"end": 495,
"score": 0.017562259
},
{
"begin": 495,
"end": 5324,
"score": 0.02929751
}
] |
Saudi Arabia's energy minister said Sunday he's positive OPEC and partnered nations will meet their production cut commitments to balance oil markets in 2019, despite what he described as a slower than anticipated pace by some.
"We've already done it, we've done enough," Saudi Energy Minister Khalid al-Falih told CNBC on Sunday in Abu Dhabi, when asked what OPEC's largest producer would do to balance markets this year. "Not only the kingdom but other countries, we've heard from the Emirates, I've talked repeatedly to my colleagues in Iraq, they've already taken action," he told CNBC's Hadley Gamble.
He then mentioned the performance of the largest non-OPEC producer that's partnered with the cartel on cuts: "Russia has started, slower than I'd like, but they've started, and I am sure as they did as in 2017 they'll catch up and be a positive contributor to re-balancing the market."
OPEC members, along with several other countries, in December agreed on output cuts totaling 1.2 million barrels per day in order to stem a sinking market and support their own export-dependent economies. "OPEC plus" refers to the group's cooperation with the non-OPEC producers like Russia and other former Soviet states, as well as Mexico. Russia was more reluctant to cut its output, as its growth is heavily dependent on robust crude exports.
Russia has initially let the Saudis shoulder the bulk of output cuts. The top OPEC ally, which in late 2016 began a cooperation agreement with Riyadh to stabilize oil prices, has often said that $60 per barrel is enough to meet its economic needs. Moscow in December said it would cut production by 50,000 to 60,000 barrels a day in January, while Saudi pledged a cut of 900,000 barrels. | {
"pile_set_name": "OpenWebText2"
} | 0.070916 | [
{
"begin": 0,
"end": 228,
"score": 0.008468757
},
{
"begin": 228,
"end": 424,
"score": 0.023117077
},
{
"begin": 424,
"end": 608,
"score": 0.014091457
},
{
"begin": 608,
"end": 895,
"score": 0.019297661
},
{
"begin": 895,
"end": 1101,
"score": 0.017076347
},
{
"begin": 1101,
"end": 1238,
"score": 0.029984225
},
{
"begin": 1238,
"end": 1343,
"score": 0.13924801
},
{
"begin": 1343,
"end": 1414,
"score": 0.040284947
},
{
"begin": 1414,
"end": 1592,
"score": 0.013605545
},
{
"begin": 1592,
"end": 1731,
"score": 0.016173938
}
] |
Quantitative evaluation of tricuspid regurgitation by digital simulation of cardiac time-activity curves.
To estimate tricuspid regurgitation (TR) quantitatively, a curve fitting method by computer has been employed. Transport in the right cardiac chambers after intravenous bolus injection of macro-aggregated albumin labeled with technetium 99m (99mTc-MAA) was recorded in anterior view by a gammacamera system. Disturbance of the dilution curves from the left heart can be avoided by using 99mTc-MAA injection. To know the radioisotope activity during the transport, time-activity curves are recorded for the superior vena cava, right atrium, and right ventricle. Parametric differential equations, obtained from compartmental analysis, interpret these curves mathematically. The rate of regurgitation is determined by comparison, using an iterative process, between the original and simulated curves. The whole process is performed automatically by computer. The calculated regurgitation value correlated well with the value from the analog simulation. The method clearly separated those with TR from those without TR. This digital simulation for estimating parameters using a compartmental model is a feasible tool in detecting and quantifying TR. | {
"pile_set_name": "PubMed Abstracts"
} | 0.012911 | [
{
"begin": 0,
"end": 106,
"score": 0.19535941
},
{
"begin": 106,
"end": 217,
"score": 0.05093802
},
{
"begin": 217,
"end": 414,
"score": 0.017701091
},
{
"begin": 414,
"end": 514,
"score": 0.049212243
},
{
"begin": 514,
"end": 667,
"score": 0.011037151
},
{
"begin": 667,
"end": 779,
"score": 0.012008976
},
{
"begin": 779,
"end": 905,
"score": 0.02193547
},
{
"begin": 905,
"end": 963,
"score": 0.011661896
},
{
"begin": 963,
"end": 1057,
"score": 0.022213135
},
{
"begin": 1057,
"end": 1252,
"score": 0.014438537
}
] |
So I have no revolvers at the moment. I really like Ruger firearms. I would like to buy a Ruger .357 Magnum revolver but need some help deciding what to get.
If I had to pic from current offerings, it would be a KSP-341X SP101. Just wondering if there are past models that would be considered a classic .357 Mag Ruger revolver that I should also consider that would be comparable to or even better than the KSP-341X SP101. | {
"pile_set_name": "Pile-CC"
} | 0.028267 | [
{
"begin": 0,
"end": 38,
"score": 0.048525527
},
{
"begin": 38,
"end": 68,
"score": 0.050585672
},
{
"begin": 68,
"end": 158,
"score": 0.10699297
},
{
"begin": 158,
"end": 229,
"score": 0.015063282
},
{
"begin": 229,
"end": 423,
"score": 0.036336336
}
] |
The Internet and the World Wide Web (“Web”) have changed the landscape of information delivery and affected numerous aspects of life. One benefit of this technological development is the ability to conduct business transactions globally via the Internet. As the volume of commerce conducted over the network continues to increase, collections of business units or organizations are working together to pool resources and expertise in order to achieve a common business objective. Organizations are sharing services and resources across enterprise boundaries in order to undertake collaborative projects that could not be undertaken individually or to offer composed services that could not be provided by individual organizations.
A growing array of workflow automation technologies has emerged to help organizations in a collaborative environment manage activities in the workflow process. In particular, workflow management applications are designed to electronically route the right information to the right participant at the right time. It enables the flow of work between participants within the same organization or different organizations to be defined and tracked.
However, workflow management with multi-participants can be very complex. Consequently, the integrity and security of the process can be compromised. For example, a workflow management may fail to define policies to ensure proper assignment of access privileges. This problem is further aggravated with new participants constantly joining the collaborative environment. Indeed, it can become difficult to verify the identity and access privileges of the participant. In some cases, a participant may trigger the execution activity, unintended or with malicious intentions. In addition, a privileged participant may activate an activity which is already executed or is not supposed to be activated. Consequently, the integrity of the workflow process may be greatly compromised.
As established above, there is an increasing need to manage workflow processes in such collaborative environments involving multi-participants. A secured cross-organizational workflow environment enables identification of privileged participants and enforces the control over the execution of activities. | {
"pile_set_name": "USPTO Backgrounds"
} | 0.018187 | [
{
"begin": 0,
"end": 134,
"score": 0.012008976
},
{
"begin": 134,
"end": 255,
"score": 0.0121478075
},
{
"begin": 255,
"end": 480,
"score": 0.008399341
},
{
"begin": 480,
"end": 731,
"score": 0.0057615316
},
{
"begin": 731,
"end": 891,
"score": 0.0090240855
},
{
"begin": 891,
"end": 1042,
"score": 0.010412407
},
{
"begin": 1042,
"end": 1174,
"score": 0.007635765
},
{
"begin": 1174,
"end": 1248,
"score": 0.0112454
},
{
"begin": 1248,
"end": 1324,
"score": 0.009440582
},
{
"begin": 1324,
"end": 2256,
"score": 0.0471521
}
] |
Loxostege virescalis
Loxostege virescalis is a species of moth of the family Crambidae described by Achille Guenée in 1854. It is found in parts of Europe, including France, Germany, Switzerland, Austria, Croatia, Bulgaria and Hungary.
External links
European distribution
Category:Pyraustinae
Category:Moths of Europe | {
"pile_set_name": "Wikipedia (en)"
} | 0.014786 | [
{
"begin": 0,
"end": 21,
"score": 0.15568043
},
{
"begin": 21,
"end": 125,
"score": 0.020963646
},
{
"begin": 125,
"end": 237,
"score": 0.013813793
},
{
"begin": 237,
"end": 253,
"score": 0.009787662
},
{
"begin": 253,
"end": 276,
"score": 0.016729267
},
{
"begin": 276,
"end": 298,
"score": 0.0067680646
},
{
"begin": 298,
"end": 322,
"score": 0.0070110206
}
] |
Arthrostylidium judziewiczii
Arthrostylidium judziewiczii is a species of Arthrostylidium bamboo in the grass family. The species is native to Central America, the West Indies, northern South America, and southern Mexico.
References
judziewiczii | {
"pile_set_name": "Wikipedia (en)"
} | 0.030328 | [
{
"begin": 0,
"end": 29,
"score": 0.22981352
},
{
"begin": 29,
"end": 119,
"score": 0.0789077
},
{
"begin": 119,
"end": 223,
"score": 0.023632111
},
{
"begin": 223,
"end": 236,
"score": 0.007844013
},
{
"begin": 236,
"end": 249,
"score": 0.28923595
}
] |
Q:
Determine the probability that all first 3 balls are black, knowing that at least one of them is black.
A box has 10 balls, 6 of which are black and 4 are white. Three balls are removed randomly from the box. Determine the probability that all first 3 balls are black, knowing that at least one of them is black.
Attempt:
So we need to calculate $P($obtain $3$ black balls$|$ at least $1$ is black$)$. We can separate this probability into three different probabilities:
$$ P(\text{Obtain 3 black balls}|\text{At least 1 is black}) = P(\text{Obtain 3 black balls}|\text{1 is black}) + P(\text{Obtain 3 black balls}|\text{2 are black}) + P(\text{Obtain 3 black balls}|\text{3 are black}) $$
The last probability, I suppose, is equal to $(6/10) \times (5/9) \times (4/8) $. The first two I'm unsure how to calculate.
A:
By definition
$$
P(\text{ $3$ black balls }| \text{ at least $1$ black ball })= \frac{ P(\text{ $3$ black balls and at least $1$ black ball )}}{P(\text{ at least $1$ black ball })}\ .
$$
Now $\ P(\text{ $3$ black balls and at least $1$ black ball })=$$P(\text{ $3$ black balls }) $, so what is $\ P(\text{ $3$ black balls }) $, and what is $\ P(\text{ at least $1$ black ball })\ $?
A:
The easy way to solve it is to observe that the solution can be represented as
$$\frac{\mathbb{P}[BBB]}{1-\mathbb{P}[WWW]}=\frac{\frac{\binom{6}{3}}{\binom{10}{3}}}{1-\frac{\binom{4}{3}}{\binom{10}{3}}}=\frac{\binom{6}{3}}{\binom{10}{3}-\binom{4}{3}}=\frac{6\times5\times4}{10\times9\times8-4\times3\times2}=\frac{5}{30-1}=\frac{5}{29}$$
A:
The RHS in your effort is the (unconditional) probability to obtain 3 black balls (so is not the same as the LHS).
Let $B$ denote the number of black balls and let $W$ the number of white balls.
Then:
$$P(B=3\mid B\geq1)=P(B=3,B\geq1)/P(B\geq1)=P(B=3)/(1-P(W=3))$$
Here $P(B)=\frac6{10}\frac59\frac48$ and $P(W=3)=\frac4{10}\frac39\frac28$.
| {
"pile_set_name": "StackExchange"
} | 0.177598 | [
{
"begin": 0,
"end": 108,
"score": 0.39230084
},
{
"begin": 108,
"end": 167,
"score": 0.2298686
},
{
"begin": 167,
"end": 214,
"score": 0.32304016
},
{
"begin": 214,
"end": 318,
"score": 0.39206567
},
{
"begin": 318,
"end": 328,
"score": 0.022074303
},
{
"begin": 328,
"end": 408,
"score": 0.33341047
},
{
"begin": 408,
"end": 477,
"score": 0.013813793
},
{
"begin": 477,
"end": 696,
"score": 0.20742953
},
{
"begin": 696,
"end": 778,
"score": 0.009371166
},
{
"begin": 778,
"end": 1900,
"score": 0.15743166
}
] |
Q:
JavaScript: toggle links active/deactive
How do I toggle HTML links from being active / deactive using JavaScript?
Within my HTML, I have 2 hyper links that call a JavaScript function to sort a table:
<a href="javascript:sort('asc');">ASC</a> | <a href="javascript:sort('desc');">DESC</a>
What I would like to do is when someone clicks the "ASC" link, it then deactives the "ASC" hyperlink (no longer a link) so that only now the "DESC" link is active.
Then, if the person presses the "DESC" link, it then disables the "DESC" link and re-enables the "ASC" link.
Essentially, I want to toggle between which link is active, either: "ASC" or "DESC"
I assume you can do this with JavaScript but am not sure how?
Any ideas?
A:
Doesn't strictly "remove" the A tag, but removes the "linkness" (by removing the href) from the tag.
Edit: slightly better version (now tested):
<script type="text/javascript" >
function mySort( sortorder) {
// enable the other link
otherOrder = (sortorder == 'asc') ? 'desc' : 'asc';
document.getElementById(otherOrder).setAttribute("href", "#");
document.getElementById(otherOrder).onclick = function() {mySort(this.id)};
//disable this link
document.getElementById(sortorder).removeAttribute("href");
document.getElementById(sortorder).onclick = "";
//perform the sort
doSort(sortorder);
}
</script>
<a id="asc" href="#" onclick="mySort(this.id)" >ASC</a> | <a id="desc" href="#" onclick="mySort(this.id)" >DESC</a>
| {
"pile_set_name": "StackExchange"
} | 0.021519 | [
{
"begin": 0,
"end": 45,
"score": 0.0038352364
},
{
"begin": 45,
"end": 120,
"score": 0.016521018
},
{
"begin": 120,
"end": 206,
"score": 0.0071151447
},
{
"begin": 206,
"end": 294,
"score": 0.0042864406
},
{
"begin": 294,
"end": 459,
"score": 0.017770508
},
{
"begin": 459,
"end": 568,
"score": 0.00999591
},
{
"begin": 568,
"end": 652,
"score": 0.006004488
},
{
"begin": 652,
"end": 714,
"score": 0.009440582
},
{
"begin": 714,
"end": 725,
"score": 0.0034360941
},
{
"begin": 725,
"end": 1513,
"score": 0.013466713
}
] |
Q:
An algorithm to generate subsets of a set satisfying certian conditions
Suppose I am given a sorted list of elements and I want to generate all subsets satisfying some condition, so that if a given set does not satisfy the condition, then a larger subset will also not satisfy it, and all sets of one element do satisfy it.
For example, given a list of all positive integers smaller than 100, determine subsets whose sum is smaller than 130: (100,29) (0,1,40), (0), etc...
How can I do that (preferably in Python)?
Thanks! :)
A:
You can generate all the subsets using a Branch-and-bound technique: you can generate all the subsets in an incremental fashion (generating superset of subsets already determined), using as a prune condition "does not explore this branch of the tree if the root does not satify the constraint".
If you want to be generic regarding the constraint, I think this is the best strategy.
Be sure to write in a correct manner the code that generates the subsets, otherwise you generate many time the same subsets: in order to avoid memoization, which can be time-consuming due to map lookups and introduce memory overhead, you can generate the subsets in that manner:
GetAllSubsets(List objects) {
List generated = {};
GetAllSubsets(generated, [], objects);
return generated;
}
GetAllSubsets(List subsetGenerated, List objectFixed, List objectsToFix) {
GetAllSubsets(subsetGenerated, objectFixed, objectsToFix.sublist(1, objectsToFix.length());
if (satisfy(toCheck = objectsFixed.add(objectsToFix.get(0)))) {
subsetGenerated.add(toCheck);
GetAllSubsets(subsetGenerated, toCheck, objectsToFix.sublist(1, objectsToFix.length());
}
}
In fact, the subsets added by the first invocation of GetAllSubsets doesn't have the first element of objectsToFix, where the subsets added by the second call (if the pruning condition isn't violated) have that element, so the intersection of the two sets of subsets generated is empty.
| {
"pile_set_name": "StackExchange"
} | 0.022352 | [
{
"begin": 0,
"end": 76,
"score": 0.012841969
},
{
"begin": 76,
"end": 329,
"score": 0.01999182
},
{
"begin": 329,
"end": 478,
"score": 0.0057268236
},
{
"begin": 478,
"end": 520,
"score": 0.0168681
},
{
"begin": 520,
"end": 531,
"score": 0.00596978
},
{
"begin": 531,
"end": 536,
"score": 0.019297661
},
{
"begin": 536,
"end": 831,
"score": 0.012425472
},
{
"begin": 831,
"end": 918,
"score": 0.016243355
},
{
"begin": 918,
"end": 1197,
"score": 0.014785618
},
{
"begin": 1197,
"end": 1990,
"score": 0.016590435
}
] |
Monitoring asthma in childhood.
The goal of asthma treatment is to obtain clinical control and reduce future risks to the patient. However, to date there is limited evidence on how to monitor patients with asthma. Childhood asthma introduces specific challenges in terms of deciding what, when, how often, by whom and in whom different assessments of asthma should be performed. The age of the child, the fluctuating course of asthma severity, variability in clinical presentation, exacerbations, comorbidities, socioeconomic and psychosocial factors, and environmental exposures may all influence disease activity and, hence, monitoring strategies. These factors will be addressed in herein. We identified large knowledge gaps in the effects of different monitoring strategies in children with asthma. Studies into monitoring strategies are urgently needed, preferably in collaborative paediatric studies across countries and healthcare systems. | {
"pile_set_name": "PubMed Abstracts"
} | 0.016729 | [
{
"begin": 0,
"end": 32,
"score": 0.021657806
},
{
"begin": 32,
"end": 131,
"score": 0.011106567
},
{
"begin": 131,
"end": 214,
"score": 0.025863936
},
{
"begin": 214,
"end": 379,
"score": 0.015479778
},
{
"begin": 379,
"end": 650,
"score": 0.021102477
},
{
"begin": 650,
"end": 693,
"score": 0.04165838
},
{
"begin": 693,
"end": 803,
"score": 0.017006932
},
{
"begin": 803,
"end": 946,
"score": 0.0050326632
}
] |
Dash-Oh the conqueror: ...Death shouldn't be rushed, one should saver it like fine wine and enjoy it's aroma. But if in consideration of your impatience I must kill you now, then so be it..Applejack: *Charging* Enough talk! Defend yourself Dash! HRAAAAAHHHHG!!!*Cut away to Twilight slowly walking looking super serious* | {
"pile_set_name": "OpenWebText2"
} | 0.502631 | [
{
"begin": 0,
"end": 26,
"score": 0.050242316
},
{
"begin": 26,
"end": 110,
"score": 0.15918289
},
{
"begin": 110,
"end": 189,
"score": 0.8202001
},
{
"begin": 189,
"end": 224,
"score": 0.022773718
},
{
"begin": 224,
"end": 246,
"score": 0.16620636
},
{
"begin": 246,
"end": 261,
"score": 0.1024659
},
{
"begin": 261,
"end": 320,
"score": 0.06771983
}
] |
// -*- Mode: C++; c-basic-offset: 2; indent-tabs-mode: nil -*-
// Copyright (c) 2007, Google Inc.
// All rights reserved.
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are
// met:
//
// * Redistributions of source code must retain the above copyright
// notice, this list of conditions and the following disclaimer.
// * Redistributions in binary form must reproduce the above
// copyright notice, this list of conditions and the following disclaimer
// in the documentation and/or other materials provided with the
// distribution.
// * Neither the name of Google Inc. nor the names of its
// contributors may be used to endorse or promote products derived from
// this software without specific prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
//
// ---
// Author: Mike Belshe
//
// To link tcmalloc into a EXE or DLL statically without using the patching
// facility, we can take a stock libcmt and remove all the allocator functions.
// When we relink the EXE/DLL with the modified libcmt and tcmalloc, a few
// functions are missing. This file contains the additional overrides which
// are required in the VS2005 libcmt in order to link the modified libcmt.
//
// See also
// http://groups.google.com/group/google-perftools/browse_thread/thread/41cd3710af85e57b
#include <config.h>
#ifndef _WIN32
# error You should only be including this file in a windows environment!
#endif
#ifndef WIN32_OVERRIDE_ALLOCATORS
# error This file is intended for use when overriding allocators
#endif
#include "tcmalloc.cc"
extern "C" {
void* _malloc_base(size_t size) {
return malloc(size);
}
void _free_base(void* p) {
free(p);
}
void* _calloc_base(size_t n, size_t size) {
return calloc(n, size);
}
void* _recalloc(void* p, size_t n, size_t size) {
void* result = realloc(p, n * size);
memset(result, 0, n * size);
return result;
}
void* _calloc_impl(size_t n, size_t size) {
return calloc(n, size);
}
size_t _msize(void* p) {
return MallocExtension::instance()->GetAllocatedSize(p);
}
HANDLE __acrt_heap = nullptr;
bool __acrt_initialize_heap() {
new TCMallocGuard();
return true;
}
bool __acrt_uninitialize_heap(bool) {
return true;
}
intptr_t _get_heap_handle() {
return 0;
}
HANDLE __acrt_getheap() {
return __acrt_heap;
}
// The CRT heap initialization stub.
int _heap_init() {
// We intentionally leak this object. It lasts for the process
// lifetime. Trying to teardown at _heap_term() is so late that
// you can't do anything useful anyway.
new TCMallocGuard();
return 1;
}
// The CRT heap cleanup stub.
void _heap_term() {
}
// We set this to 1 because part of the CRT uses a check of _crtheap != 0
// to test whether the CRT has been initialized. Once we've ripped out
// the allocators from libcmt, we need to provide this definition so that
// the rest of the CRT is still usable.
void* _crtheap = reinterpret_cast<void*>(1);
int _set_new_mode(int flag) {
return tc_set_new_mode(flag);
}
int _query_new_mode() {
return tc_query_new_mode();
}
} // extern "C"
#ifndef NDEBUG
#undef malloc
#undef free
#undef calloc
int _CrtDbgReport(int, const char*, int, const char*, const char*, ...) {
return 0;
}
int _CrtDbgReportW(int, const wchar_t*, int, const wchar_t*, const wchar_t*, ...) {
return 0;
}
int _CrtSetReportMode(int, int) {
return 0;
}
extern "C" void* _malloc_dbg(size_t size, int , const char*, int) {
return malloc(size);
}
extern "C" void _free_dbg(void* ptr, int) {
free(ptr);
}
extern "C" void* _calloc_dbg(size_t n, size_t size, int, const char*, int) {
return calloc(n, size);
}
#endif // NDEBUG
| {
"pile_set_name": "Github"
} | 0.007358 | [
{
"begin": 0,
"end": 63,
"score": 0.005587992
},
{
"begin": 63,
"end": 98,
"score": 0.0039914227
},
{
"begin": 98,
"end": 122,
"score": 0.012425472
},
{
"begin": 122,
"end": 196,
"score": 0.005935072
},
{
"begin": 196,
"end": 270,
"score": 0.00999591
},
{
"begin": 270,
"end": 278,
"score": 0.004407919
},
{
"begin": 278,
"end": 354,
"score": 0.00596978
},
{
"begin": 354,
"end": 419,
"score": 0.011175984
},
{
"begin": 419,
"end": 484,
"score": 0.008642297
},
{
"begin": 484,
"end": 4480,
"score": 0.02809576
}
] |
Bug#320384: What Can You Do To Livve 14 Extra Yeaars? - Debian
This is a discussion on Bug#320384: What Can You Do To Livve 14 Extra Yeaars? - Debian ; Stuff? I should think so. We've practice enough was as if
that in the white dust which lifted could not help it, mother,
said kitty. Help it! Oh i'm sure he didn't. Mr. Fortescue?
feed pigeons? There a lot when ...
Bug#320384: What Can You Do To Livve 14 Extra Yeaars?
Stuff? I should think so. We've practice enough was as if
that in the white dust which lifted could not help it, mother,
said kitty. Help it! Oh i'm sure he didn't. Mr. Fortescue?
feed pigeons? There a lot when mr frettlby lived there,'
he. | {
"pile_set_name": "Pile-CC"
} | 0.099244 | [
{
"begin": 0,
"end": 63,
"score": 0.017284594
},
{
"begin": 63,
"end": 160,
"score": 0.04680874
},
{
"begin": 160,
"end": 179,
"score": 0.015202113
},
{
"begin": 179,
"end": 211,
"score": 0.026035614
},
{
"begin": 211,
"end": 274,
"score": 0.07091636
},
{
"begin": 274,
"end": 286,
"score": 0.021657806
},
{
"begin": 286,
"end": 295,
"score": 0.020685982
},
{
"begin": 295,
"end": 318,
"score": 0.01631277
},
{
"begin": 318,
"end": 333,
"score": 0.0044773347
},
{
"begin": 333,
"end": 664,
"score": 0.0801064
}
] |
Q:
android: button incorporated with GestureListener: onScroll
I have a button (a boy), of which I wish that, when the boy is touched, it can scroll left or right according to the gesture of the user's finger.
So I have implemented as follows:
Declaration:
GestureDetector myGesture;
myGesture = new GestureDetector(getContext(), new MyOnGestureListener());
Register:
image_boy.setOnTouchListener(new OnTouchListener()
{
@Override
public boolean onTouch(View v, MotionEvent event)
{
return myGesture.onTouchEvent(event);
}
});
image_boy.setClickable(true);
Class:
class MyOnGestureListener implements OnGestureListener{
@Override
public boolean onDown(MotionEvent arg0)
{
// TODO Auto-generated method stub
return false;
}
@Override
public boolean onFling(MotionEvent e1, MotionEvent e2, float velocityX, float velocityY)
{
return false;
}
@Override
public void onLongPress(MotionEvent e)
{
// TODO Auto-generated method stub
}
@Override
public boolean onScroll(MotionEvent e1, MotionEvent e2, float distanceX, float distanceY)
{
boy_x = ((int) e2.getX());
if (boy_x > (viewWidth - BOY_WIDTH))
{
boy_x = viewWidth - BOY_WIDTH - 10;
}
if (boy_x <0)
{
boy_x = 0 + 10;
}
image_boy.setX(boy_x);
image_boy.setY(viewHeight - BOY_HEIGHT);
return true;
}
@Override
public void onShowPress(MotionEvent e) {
// TODO Auto-generated method stub
}
@Override
public boolean onSingleTapUp(MotionEvent e) {
// TODO Auto-generated method stub
return false;
}};
}
Question:
The boy, once touched / pressed, can scroll left and right, but it looks obviously weird, as
once touched and scrolled, the boy will scroll to the correct direction, but switching / shaking with 2 boy images, left and right interchanging during its journey
when the finger movement is stopped (still touching), the boy will go back to either the original position or new position (very unstable)
How could this be solved?
A:
I have managed to implement using another way using onTouch's ACTION_MOVE:
button_test= (Button) findViewById(R.id.button_test);
button_test.setOnTouchListener(new OnTouchListener()
{
private float x, y;
private int mx, my;
public boolean onTouch(View v, MotionEvent event)
{
switch(event.getAction())
{
case MotionEvent.ACTION_DOWN:
x = event.getX();
y = event.getY();
case MotionEvent.ACTION_MOVE:
mx = (int)(event.getRawX() - x);
my = (int)(event.getRawY() - 50 - y);
button_test.setX(mx);
button_test.setY(my);
break;
}
return true;
}});
| {
"pile_set_name": "StackExchange"
} | 0.026722 | [
{
"begin": 0,
"end": 64,
"score": 0.0066292323
},
{
"begin": 64,
"end": 212,
"score": 0.12631269
},
{
"begin": 212,
"end": 246,
"score": 0.010134743
},
{
"begin": 246,
"end": 259,
"score": 0.008191093
},
{
"begin": 259,
"end": 286,
"score": 0.0024295617
},
{
"begin": 286,
"end": 360,
"score": 0.0043905647
},
{
"begin": 360,
"end": 371,
"score": 0.01263372
},
{
"begin": 371,
"end": 432,
"score": 0.011870144
},
{
"begin": 432,
"end": 444,
"score": 0.02193547
},
{
"begin": 444,
"end": 3188,
"score": 0.029125832
}
] |
ANIMAL activists are combing a forest in eastern China for more than 1000 kittens rescued from a meat supplier only to be let loose by local authorities, an organiser said Monday.
Animal protection volunteers and local police intercepted a truck "filled with cats'' destined for dinner plates last week, said an activist surnamed Ni from the Wuxi Small Animal Protection Association in eastern Jiangsu province.
But local government officials released the felines - some as young as four months old - into a nearby mountain forest to fend for themselves, Mr Ni said.
"They were being sent to Guangzhou to be eaten by people,'' said.
"We didn't want to release them, our volunteers had places to keep them. It's definitely irresponsible.''
Volunteers are now scouring the hillsides with cages in an attempt to capture the cats, and hope to put those found up for adoption, Mr Ni said, adding that more than 50 have been retrieved in the last week.
"Some of the cats are hungry, and haven't eaten, while others have been run over by cars,'' he said.
The state-run Beijing Youth Daily said Sunday that authorities seized the cats because the lorry owner did not have the correct documents, but decided to release the animals into the wild as there was no source of funds to have them put down.
China's small but growing ranks of animal activists have staged a number of rescues in recent years.
Cats are not commonly eaten in most parts of China but some restaurants, particularly in the south, continue to serve them as food.
Around 600 cats stuffed into wooden crates and on their way to such a fate were rescued after a truck crash in January.
A convoy of trucks carrying some 500 dogs to be sold as meat was stopped by volunteers on a highway in Beijing in 2011 and the animals retrieved.
China does not have any laws to protect non-endangered animals.
Originally published as Search for 1000 kittens in forest | {
"pile_set_name": "OpenWebText2"
} | 0.100855 | [
{
"begin": 0,
"end": 180,
"score": 0.06612156
},
{
"begin": 180,
"end": 413,
"score": 0.038911518
},
{
"begin": 413,
"end": 569,
"score": 0.046465382
},
{
"begin": 569,
"end": 636,
"score": 0.038053125
},
{
"begin": 636,
"end": 710,
"score": 0.049898956
},
{
"begin": 710,
"end": 743,
"score": 0.08581903
},
{
"begin": 743,
"end": 952,
"score": 0.032731086
},
{
"begin": 952,
"end": 1054,
"score": 0.10031791
},
{
"begin": 1054,
"end": 1298,
"score": 0.03994159
},
{
"begin": 1298,
"end": 1924,
"score": 0.06971766
}
] |
[Desktop Entry]
Name=puppetry
Comment=App to build end-to-end automation tests without a line of code
Exec=AppRun
Terminal=false
Type=Application
Icon=puppetry
StartupWMClass=puppetry
X-AppImage-Version=1.0.0
Categories=Development;
X-AppImage-BuildId=1DCjekL5UEmzbHmHi68XMZoc58u
[AppImageHub]
# Dear upstream developer, please include update information in your AppImage
# (e.g., with appimagetool -u) so that users can easily update the AppImage
X-AppImage-Signature=no valid OpenPGP data found. the signature could not be verified. Please remember that the signature file (.sig or .asc) should be the first file given on the command line.
X-AppImage-Type=2
X-AppImage-Architecture=x86_64
| {
"pile_set_name": "Github"
} | 0.064923 | [
{
"begin": 0,
"end": 16,
"score": 0.011523063
},
{
"begin": 16,
"end": 30,
"score": 0.119228795
},
{
"begin": 30,
"end": 102,
"score": 0.006108612
},
{
"begin": 102,
"end": 114,
"score": 0.023460433
},
{
"begin": 114,
"end": 129,
"score": 0.039254878
},
{
"begin": 129,
"end": 146,
"score": 0.0055532837
},
{
"begin": 146,
"end": 160,
"score": 0.07850813
},
{
"begin": 160,
"end": 184,
"score": 0.2936093
},
{
"begin": 184,
"end": 209,
"score": 0.0038178824
},
{
"begin": 209,
"end": 693,
"score": 0.0073581007
}
] |
Let me ask again in a different way ;-) Specifically about LCD style
antialiasing.
What about a context attribute "antialiasRenderingQualityHint" for now with
2 settings "default" and "displayDependent"
context.antialiasRenderingQualityHint = "displayDependent"
I'm thinking of it like this. The canvas spec does not say how antialiasing
works or even that it exists so right now a UA is free to antialias in
anyway it sees fit. It can do no antialiasing. It can do LCD antialiasing.
It can do alpha antialiasing. It can use different algorithms. In fact, the
software rasterizers between Firefox and Chrome already antialias different
as do different GPUs.
All we're looking for is some way to hint that we'd prefer LCD antialiasing
if the UA thinks it's best for a given situation. We already can't count on
a certain quality or algorithm
context.antialiasRenderingQualityHint = "displayDependent"
The advantage to this hint is that
(a) a UA is free it ignore it and rendering will not be any worse/better
than it is now
and
(b) as the world moves to HD-DPI everywhere UAs will pick alpha-AA and
things just magically work.
As for rotating, scaling, blending a cavnas it's up to the app to opt into
this hint and it's up to the UA when to honor it.
I'm not seeing the downside here. You're not breaking anything because the
app already has no idea what kind of AA a UA is using. The hint is forward
compatible as well.
The only place I see an issue is UA zooming. But if the app really cares
and if we really care we can provide an API to figure out the zoom level.
Then an app that cares can change the size of their canvas's backingstore
so its 1:1 device pixels for a given zoom level and re-render. Lots of apps
would like to do that with or without the proposed "hint" as it would let
them zoom in a way that matches the text and svg on the page.
Everybody wins! :-)
1) not ant alias
2) antialias in any way it sees fit
could happily implement LCD style AA and still be spec complien | {
"pile_set_name": "Pile-CC"
} | 0.042688 | [
{
"begin": 0,
"end": 69,
"score": 0.018881164
},
{
"begin": 69,
"end": 83,
"score": 0.05613239
},
{
"begin": 83,
"end": 159,
"score": 0.01527153
},
{
"begin": 159,
"end": 203,
"score": 0.0069416044
},
{
"begin": 203,
"end": 262,
"score": 0.0034708022
},
{
"begin": 262,
"end": 292,
"score": 0.02193547
},
{
"begin": 292,
"end": 338,
"score": 0.024318827
},
{
"begin": 338,
"end": 409,
"score": 0.04406188
},
{
"begin": 409,
"end": 429,
"score": 0.016382186
},
{
"begin": 429,
"end": 1990,
"score": 0.06851897
}
] |
Elżbietów, Sochaczew County
Elżbietów is a village in the administrative district of Gmina Teresin, within Sochaczew County, Masovian Voivodeship, in east-central Poland.
References
Category:Villages in Sochaczew County | {
"pile_set_name": "Wikipedia (en)"
} | 0.008746 | [
{
"begin": 0,
"end": 28,
"score": 0.00072452996
},
{
"begin": 28,
"end": 173,
"score": 0.011870144
},
{
"begin": 173,
"end": 185,
"score": 0.008711713
},
{
"begin": 185,
"end": 223,
"score": 0.006525108
}
] |
Q:
What are the best translations of Descartes books?
I'm planning on reading some of Descartes' books like Meditations on First Philosophy and Discourse on Method.
I was wondering what are the best translations of these books and if there are any free downloadable ebooks of them?
A:
For Descartes' major philosophical works the current Cambridge tr., 'The Philosophical Writings of Descartes', is probably the best both in terms of the Latin and French scholarship that has gone into it and in terms of philosophical finesse by which it is informed. Other translations, Hackett's or Penguin's, are pretty good but are not so complete (include fewer texts) than the Cambridge edition.
There are downloadable versions of both texts and of other Cartesian works. The trouble is this : the versions that are downloadable are usually old and copyright-expired, hence seldom any longer the best translations; and the best translations are not usually (freely) downloadable. However, you sites listed below offer good translations.
__________________________________________________________________________
The Philosophical Writings of Descartes: Volume 1
Descartes, Rene/ Stoothoff, Robert/ Murdoch, Dugald/ Cottingham, John.
ISBN 10: 052128807X / ISBN 13: 9780521288071
Published by Cambridge Univ Pr, 1985.
The Philosophical Writi-iu9ngs of Descartes: Volume 2
Descartes, Rene/ Stoothoff, Robert/ Murdoch, Dugald (Translator)/ Cottingham, John. ISBN 10: 0521288088 / ISBN 13: 9780521288088
Published by Cambridge Univ Pr, 1985.
The Philosophical Writings of Descartes: Volume 3 The Correspondence
Descartes, Rene/ Stoothoff, Robert/ Murdoch, Dugald/ Kenny, Anthony/ Cottingham, John. ISBN 10: 0521423503 / ISBN 13: 9780521423502
Published by Cambridge Univ Pr, 1991.
ONLINE :
Discourse : https://www.earlymoderntexts.com/assets/pdfs/descartes1637.pdf
Meditations : https://www.earlymoderntexts.com/assets/pdfs/descartes1641.pdf
| {
"pile_set_name": "StackExchange"
} | 0.016105 | [
{
"begin": 0,
"end": 55,
"score": 0.0051020794
},
{
"begin": 55,
"end": 167,
"score": 0.009857078
},
{
"begin": 167,
"end": 284,
"score": 0.015688026
},
{
"begin": 284,
"end": 289,
"score": 0.019297661
},
{
"begin": 289,
"end": 556,
"score": 0.011175984
},
{
"begin": 556,
"end": 690,
"score": 0.019575324
},
{
"begin": 690,
"end": 766,
"score": 0.009926494
},
{
"begin": 766,
"end": 974,
"score": 0.020824814
},
{
"begin": 974,
"end": 1033,
"score": 0.012078391
},
{
"begin": 1033,
"end": 1936,
"score": 0.0033319702
}
] |
// Copyright 2014 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package ipv4
import (
"net"
"syscall"
"unsafe"
"golang.org/x/net/internal/iana"
"golang.org/x/net/internal/socket"
)
var (
ctlOpts = [ctlMax]ctlOpt{
ctlTTL: {sysIP_TTL, 1, marshalTTL, parseTTL},
ctlPacketInfo: {sysIP_PKTINFO, sizeofInetPktinfo, marshalPacketInfo, parsePacketInfo},
}
sockOpts = map[int]*sockOpt{
ssoTOS: {Option: socket.Option{Level: iana.ProtocolIP, Name: sysIP_TOS, Len: 4}},
ssoTTL: {Option: socket.Option{Level: iana.ProtocolIP, Name: sysIP_TTL, Len: 4}},
ssoMulticastTTL: {Option: socket.Option{Level: iana.ProtocolIP, Name: sysIP_MULTICAST_TTL, Len: 4}},
ssoMulticastInterface: {Option: socket.Option{Level: iana.ProtocolIP, Name: sysIP_MULTICAST_IF, Len: sizeofIPMreqn}, typ: ssoTypeIPMreqn},
ssoMulticastLoopback: {Option: socket.Option{Level: iana.ProtocolIP, Name: sysIP_MULTICAST_LOOP, Len: 4}},
ssoReceiveTTL: {Option: socket.Option{Level: iana.ProtocolIP, Name: sysIP_RECVTTL, Len: 4}},
ssoPacketInfo: {Option: socket.Option{Level: iana.ProtocolIP, Name: sysIP_PKTINFO, Len: 4}},
ssoHeaderPrepend: {Option: socket.Option{Level: iana.ProtocolIP, Name: sysIP_HDRINCL, Len: 4}},
ssoICMPFilter: {Option: socket.Option{Level: iana.ProtocolReserved, Name: sysICMP_FILTER, Len: sizeofICMPFilter}},
ssoJoinGroup: {Option: socket.Option{Level: iana.ProtocolIP, Name: sysMCAST_JOIN_GROUP, Len: sizeofGroupReq}, typ: ssoTypeGroupReq},
ssoLeaveGroup: {Option: socket.Option{Level: iana.ProtocolIP, Name: sysMCAST_LEAVE_GROUP, Len: sizeofGroupReq}, typ: ssoTypeGroupReq},
ssoJoinSourceGroup: {Option: socket.Option{Level: iana.ProtocolIP, Name: sysMCAST_JOIN_SOURCE_GROUP, Len: sizeofGroupSourceReq}, typ: ssoTypeGroupSourceReq},
ssoLeaveSourceGroup: {Option: socket.Option{Level: iana.ProtocolIP, Name: sysMCAST_LEAVE_SOURCE_GROUP, Len: sizeofGroupSourceReq}, typ: ssoTypeGroupSourceReq},
ssoBlockSourceGroup: {Option: socket.Option{Level: iana.ProtocolIP, Name: sysMCAST_BLOCK_SOURCE, Len: sizeofGroupSourceReq}, typ: ssoTypeGroupSourceReq},
ssoUnblockSourceGroup: {Option: socket.Option{Level: iana.ProtocolIP, Name: sysMCAST_UNBLOCK_SOURCE, Len: sizeofGroupSourceReq}, typ: ssoTypeGroupSourceReq},
ssoAttachFilter: {Option: socket.Option{Level: sysSOL_SOCKET, Name: sysSO_ATTACH_FILTER, Len: sizeofSockFprog}},
}
)
func (pi *inetPktinfo) setIfindex(i int) {
pi.Ifindex = int32(i)
}
func (gr *groupReq) setGroup(grp net.IP) {
sa := (*sockaddrInet)(unsafe.Pointer(&gr.Group))
sa.Family = syscall.AF_INET
copy(sa.Addr[:], grp)
}
func (gsr *groupSourceReq) setSourceGroup(grp, src net.IP) {
sa := (*sockaddrInet)(unsafe.Pointer(&gsr.Group))
sa.Family = syscall.AF_INET
copy(sa.Addr[:], grp)
sa = (*sockaddrInet)(unsafe.Pointer(&gsr.Source))
sa.Family = syscall.AF_INET
copy(sa.Addr[:], src)
}
| {
"pile_set_name": "Github"
} | 0.018604 | [
{
"begin": 0,
"end": 34,
"score": 0.007392809
},
{
"begin": 34,
"end": 55,
"score": 0.018187003
},
{
"begin": 55,
"end": 109,
"score": 0.040628307
},
{
"begin": 109,
"end": 159,
"score": 0.010481823
},
{
"begin": 159,
"end": 173,
"score": 0.020685982
},
{
"begin": 173,
"end": 183,
"score": 0.01999182
},
{
"begin": 183,
"end": 190,
"score": 0.010481823
},
{
"begin": 190,
"end": 201,
"score": 0.013050216
},
{
"begin": 201,
"end": 211,
"score": 0.044405237
},
{
"begin": 211,
"end": 3035,
"score": 0.022351967
}
] |
using System;
namespace ViennaNET.ArcSight.Exceptions
{
/// <summary>
/// Исключение, возникающее при наличии ошибки в
/// значениях полей передаваемого сообщения. <see cref="CefMessage"/>
/// </summary>
public class CefMessageValidationException : Exception
{
public CefMessageValidationException(string message) : base (message)
{
}
}
} | {
"pile_set_name": "Github"
} | 0.000501 | [
{
"begin": 0,
"end": 15,
"score": 0.0043558567
},
{
"begin": 15,
"end": 56,
"score": 0.010620655
},
{
"begin": 56,
"end": 74,
"score": 0.009648831
},
{
"begin": 74,
"end": 125,
"score": 0.00013557822
},
{
"begin": 125,
"end": 197,
"score": 0.00006128135
},
{
"begin": 197,
"end": 214,
"score": 0.010481823
},
{
"begin": 214,
"end": 271,
"score": 0.023632111
},
{
"begin": 271,
"end": 349,
"score": 0.008746422
},
{
"begin": 349,
"end": 355,
"score": 0.016243355
},
{
"begin": 355,
"end": 366,
"score": 0.02517722
}
] |
The Senate passed legislation on Thursday breaking with President Trump Donald John TrumpBubba Wallace to be driver of Michael Jordan, Denny Hamlin NASCAR team Graham: GOP will confirm Trump's Supreme Court nominee before the election Southwest Airlines, unions call for six-month extension of government aid MORE’s Syria policy.
Senators voted 77-23 to send the legislation to the House that includes a provision warning Trump against a “precipitous” withdrawal of troops from Syria and Afghanistan.
ADVERTISEMENT
It also asks the administration to certify that certain conditions have been met "for the enduring defeat of al Qaeda and ISIS before initiating any significant withdrawal of United States forces from Syria or Afghanistan."
The bill was approved after it overcame a filibuster earlier this week.
“I keep reading where the national media writes that the United States Senate rebuked — they used the word 'rebuked' — President Trump. Nothing could be further from the truth,” Risch, the chairman of the Foreign Relations Committee, said.
In addition to the Syria amendment, the bill also included sanctions against the Syrian government, increased support for Israel and Jordan and a provision that would let states penalize businesses that take part in boycotts or divestments of Israel.
Both the Syria amendment and the anti-BDS provisions sparked division among Democrats.
Sen. Chris Murphy Christopher (Chris) Scott MurphyDemocratic senator calls for 'more flexible' medical supply chain to counter pandemics The Hill's 12:30 Report - Presented by Facebook - Don't expect a government check anytime soon GOP chairman to release interim report on Biden probe 'in about a week' MORE (D-Conn.) warned that the Syria proposal, offered by Senate Majority Leader Mitch McConnell Addison (Mitch) Mitchell McConnellGraham: GOP will confirm Trump's Supreme Court nominee before the election Trump puts Supreme Court fight at center of Ohio rally The Memo: Dems face balancing act on SCOTUS fight MORE (R-Ky.), is “the absolute wrong way to address President Trump’s backwards foreign policy in the Middle East.”
In response to concerns from Democrats, the Senate easily cleared a tweak to McConnell's amendment that would clarify that the resolution should not be "constructed as a declaration of war or an authorization of the use of military force."
Trump's decision to withdraw troops from Syria, which precipitated the resignation of former Defense Secretary James Mattis James Norman MattisBiden courts veterans amid fallout from Trump military controversies Trump says he wanted to take out Syria's Assad but Mattis opposed it Gary Cohn: 'I haven't made up my mind' on vote for president in November MORE, sparked fierce backlash on Capitol Hill.
Two officials told The New York Times last year that the administration had ordered the U.S. military to start withdrawing troops in Afghanistan, but Trump, who has long railed against the war there, has not made an official announcement.
The Washington Post reported last week that the United States and the Taliban were moving closer to a deal that could result in the removal of U.S. troops from the country.
Meanwhile, Democrats had raised First Amendment concerns about the anti-BDS provision, which splintered most of the party’s 2020 contenders and caucus leadership.
“While I do not support the BDS movement, we must defend every American’s constitutional right to engage in political activity. It is clear to me that this bill would violate Americans’ First Amendment rights,” Sen. Bernie Sanders Bernie SandersJacobin editor: Primarying Schumer would force him to fight Trump's SCOTUS nominee Trump campaign plays up Biden's skills ahead of Cleveland debate: 'He's actually quite good' Young voters backing Biden by 2:1 margin: poll MORE (I-Vt.) said in a statement last week. | {
"pile_set_name": "OpenWebText2"
} | 0.17104 | [
{
"begin": 0,
"end": 330,
"score": 0.02792408
},
{
"begin": 330,
"end": 502,
"score": 0.033074442
},
{
"begin": 502,
"end": 517,
"score": 0.004026131
},
{
"begin": 517,
"end": 742,
"score": 0.038911518
},
{
"begin": 742,
"end": 815,
"score": 0.059328925
},
{
"begin": 815,
"end": 952,
"score": 0.06252546
},
{
"begin": 952,
"end": 1056,
"score": 0.0060391957
},
{
"begin": 1056,
"end": 1308,
"score": 0.04165838
},
{
"begin": 1308,
"end": 1396,
"score": 0.04234509
},
{
"begin": 1396,
"end": 3861,
"score": 0.1539292
}
] |
The popularity of cloud computing has fuelled a dramatic growth in the number and size of data centers worldwide. In such environments, existing networking software and hardware designed for the Internet have shown their limitations. A plethora of new design proposals have seen the light recently to address some of the network congestion problems that are intrinsic to data center networks. In this spirit we have designed several algorithms and systems and tested them via simulation and/or software deployment in a small scale Data center. The goal of this project is to implement some of these mechanisms in the network interface card using the DPDK framework and test them in a small testbed.
Course type:
UROP1100
Applicant's Roles:
The applicant(s) will work with the advisor and graduate students and will be in charge of:
- studying our proposed algorithms and translating them to the DPDK framework.
- Deploying and testing the deployed systems inside our small data center.
To achieve this, the applicant must be a senior CSE or CPEG student with a good knowledge of Computer Networks and Linux Kernel programming
Applicant's Learning Objectives:
- Be able to appreciate the difference between the Internet and data centre networks
- Be able to appreciate the congestion problems that may arise in data center networks and understand their root causes
- Be able to appreciate the development cycle of communication protocols
- Be able to appreciate and code within the DPDK framework
- Be able to put to practice knowledge learned in Networking, and Linux kernel programming classes | {
"pile_set_name": "Pile-CC"
} | 0.030671 | [
{
"begin": 0,
"end": 114,
"score": 0.021102477
},
{
"begin": 114,
"end": 234,
"score": 0.01561861
},
{
"begin": 234,
"end": 393,
"score": 0.014022041
},
{
"begin": 393,
"end": 544,
"score": 0.00930175
},
{
"begin": 544,
"end": 699,
"score": 0.009926494
},
{
"begin": 699,
"end": 713,
"score": 0.011453647
},
{
"begin": 713,
"end": 723,
"score": 0.004373211
},
{
"begin": 723,
"end": 743,
"score": 0.013952625
},
{
"begin": 743,
"end": 836,
"score": 0.007982845
},
{
"begin": 836,
"end": 1600,
"score": 0.007496933
}
] |
By Lauren Hittinger
AOA is taking things a little easy this week for summer break. So we thought it'd be a good time to catch up with some local businesses we've covered during the last year (or so) and find out how things are going.
Next we're revisiting Collar City Hard Pressed (CCHP). When we first interviewed owner Jessica Garrity, now Jessica Quijano, she was running her business solely at the Saturday Troy farmers' market. Since then, she has moved to working full-time for her juice and smoothie business, taking up residence on Broadway in downtown Troy.
A snippet from March 2014:
"I found myself basically obsessed with fresh juice and smoothies and was suddenly annoyed that there wasn't a place in my neighborhood where I could get any. I kind of hate leaving my neighborhood on the weekend so just thought it was only fair that we had a juice place here downtown. I also recognized that juicing was a pretty trendy business and thought downtown Troy would be a great place to get to work."
I caught up with Quijano to see what it's like to be running a small business on her own, and to get the scoop on the different reactions to a juice bar in downtown Troy.
What has happened over the last year?
A lot has happened! I opened in here last August -- so, going on a year. That was a major deal. It was really great to open when I did, because it was still kind of busy in the fall. Winter was definitely a slower season, I think for everyone around here. But it's been nice because then I was able to really ramp up for spring and summer. I've seen so many new customers and so much new business. Having the winter be the time when I was learning everything the hard way was kind of good timing.
And a lot is new -- I have really ramped up social media and I have a website now. People can order online through Yelp. I have three people who work in here.
What's different since you were just at the farmers' market?
I have a lot more relationships with farmers and suppliers in general -- local people. It's been a tough year, since stuff is coming up later based on weather. Seasonally I try to go right to the farmer to get stuff. Of course, not for things like pineapples and bananas. So I'll never be 100 percent organic or local, just because for some ingredients it just really doesn't make sense.
And I've done stuff with Sage and RPI to get in front of students, and their faculty and staff have been down here a lot. Collar City Candle works with me to make candles based upon all of the different drinks. I have a phone line in here and people can text in their orders ahead of time. I have a good relationship with Empire Zero, the composting company. All of our juice pulp either goes directly to a farm and is used for animal feed or it is composted through Empire Zero. It's never thrown away.
What have you learned since opening the physical shop?
Oh my god. (laughs) Well, I've had professional jobs. But I've never done anything on the back end of business. Most of my work experience was in writing, or marketing, or sales. And that's all beneficial, but that's not the meat of what you're really doing. I've learned a lot. Everything as far as managing all my own books, and I've hired three employees this year. I just had never done any of that, so I basically learned it all as I went.
The other thing about being in here is Troy is it's such an interesting place. I'm in contact with a lot of other local businesses, and the flow of business can be really unpredictable. It's such a walkable neighborhood and if for some reason people aren't walking around, because of weather, or something's blocking streets, it can affect you.
The positive thing about having my store right here is all of the businesses are so collaborative and everyone really does support each other. So it was a very warm welcome. For me opening in here it was probably easier than it would be for other people because of the farmers' market and Vic [Christopher] and Heather [LaVine], my landlords, have been so great.
What has surprised you?
The timing is a surprise to me. I'm open 8 to 4, but the majority of people come here between 10 and 2, no matter what. I thought there was more of an early morning type of thing.
The other thing that has surprised me is how many customers will come every single day. I am getting a lot of new customers, and I can see that coming from Instagram, Facebook, and Yelp. But a lot of people come several times a week. I didn't think I'd see the same people getting the same things all the time. It's nice, though.
The other thing that really surprises me are the people that come in that are afraid of food. For example, there have been times at the farmers' market where people ask me, 'Do you put pills in the juice? How do you get it that color?' This is the color that your food should be. This is real food. It's nice to be able to show people in a positive way that literally just eating carrots, beets, and apples can be really delicious and it looks beautiful, and there's not anything added. At least once a week someone is surprised I'm not doctoring the juice up. It's been nice to see people try new things and then really really like it and then start adding other more adventurous things like bee pollen. It's nice to see people expand.
What has frustrated you?
Well, that same thing. Everything that I just said. There are days when you're like, 'Really? You really think I'm putting dye in here?'
Everything in my store is repurposed, and I compost and work with farms and I'm trying to do all of these right things, and I think that you care as a customer. But you're telling me you would be drinking this if there were red dye in it?
It's frustrating when someone walks in, looks at the menu, and tells me they don't like any fruit or vegetables. I don't know what to do in that case. I really work to get the person to try something that would just taste delicious, but sometimes it's just not for everyone, I guess. All that aside, if I get the person to try something, they usually like it.
What's something that's felt like a win?
I've seen so many new customers and seen such a difference in the amount of people that know the name of my place and recognize the brand. I never did a lot of promotion or press, so it was a little bit slower in the beginning with people knowing the place and recognizing CCHP. Now if someone asks me where I work and they say that they know the place or love it here, that's awesome to me, especially when you're not in this neighborhood.
What's next?
Well, there are a couple top secret things in the works. The main thing is continuing to try to make as local connections and source the best product that I can. I would also like to be open more often. And I'm collaborating with some of my neighbors here on some cool stuff.
And pretty soon I'll be thinking about delicious fall and winter concoctions, like the pumpkin pie smoothie.
This interview has been lightly edited and condensed.
____
Lauren Hittinger writes about shopping, crafting, and living well on a small budget at The Thrifty Ginger.
More follow-ups from this week:
+ Bread and Honey | {
"pile_set_name": "OpenWebText2"
} | 0.026551 | [
{
"begin": 0,
"end": 20,
"score": 0.013258465
},
{
"begin": 20,
"end": 84,
"score": 0.016451603
},
{
"begin": 84,
"end": 235,
"score": 0.0112454
},
{
"begin": 235,
"end": 291,
"score": 0.020130653
},
{
"begin": 291,
"end": 435,
"score": 0.010204159
},
{
"begin": 435,
"end": 569,
"score": 0.014716201
},
{
"begin": 569,
"end": 597,
"score": 0.03187269
},
{
"begin": 597,
"end": 602,
"score": 0.038224805
},
{
"begin": 602,
"end": 761,
"score": 0.07730943
},
{
"begin": 761,
"end": 7197,
"score": 0.112144895
}
] |
{% extends 'callisto_core/delivery/form.html' %}
{% block message %}
<p>We've sent you an email containing a password reset link. If you don't receive it within a few minutes, please check your spam folder.</p>
{% endblock %}
| {
"pile_set_name": "Github"
} | 0.011176 | [
{
"begin": 0,
"end": 49,
"score": 0.0021605743
},
{
"begin": 49,
"end": 70,
"score": 0.016729267
},
{
"begin": 70,
"end": 131,
"score": 0.019575324
},
{
"begin": 131,
"end": 212,
"score": 0.04543531
},
{
"begin": 212,
"end": 227,
"score": 0.007427517
}
] |
<?xml version="1.0" ?>
<annotation>
<folder>widerface</folder>
<filename>56--Voter_56_Voter_peoplevoting_56_25.jpg</filename>
<source>
<database>wider face Database</database>
<annotation>PASCAL VOC2007</annotation>
<image>flickr</image>
<flickrid>-1</flickrid>
</source>
<owner>
<flickrid>yanyu</flickrid>
<name>yanyu</name>
</owner>
<size>
<width>1024</width>
<height>609</height>
<depth>3</depth>
</size>
<segmented>0</segmented>
<object>
<name>face</name>
<pose>Unspecified</pose>
<truncated>1</truncated>
<difficult>0</difficult>
<bndbox>
<xmin>300</xmin>
<ymin>26</ymin>
<xmax>318</xmax>
<ymax>48</ymax>
</bndbox>
<lm>
<x1>303.795</x1>
<y1>38.438</y1>
<x2>310.853</x2>
<y2>38.161</y2>
<x3>307.116</x3>
<y3>43.558</y3>
<x4>307.808</x4>
<y4>45.496</y4>
<x5>311.406</x5>
<y5>45.357</y5>
<visible>1</visible>
<blur>0.32</blur>
</lm>
<has_lm>1</has_lm>
</object>
<object>
<name>face</name>
<pose>Unspecified</pose>
<truncated>1</truncated>
<difficult>0</difficult>
<bndbox>
<xmin>474</xmin>
<ymin>31</ymin>
<xmax>488</xmax>
<ymax>50</ymax>
</bndbox>
<has_lm>0</has_lm>
</object>
<object>
<name>face</name>
<pose>Unspecified</pose>
<truncated>1</truncated>
<difficult>0</difficult>
<bndbox>
<xmin>531</xmin>
<ymin>22</ymin>
<xmax>543</xmax>
<ymax>38</ymax>
</bndbox>
<has_lm>0</has_lm>
</object>
<object>
<name>face</name>
<pose>Unspecified</pose>
<truncated>1</truncated>
<difficult>0</difficult>
<bndbox>
<xmin>792</xmin>
<ymin>50</ymin>
<xmax>809</xmax>
<ymax>69</ymax>
</bndbox>
<lm>
<x1>799.277</x1>
<y1>59.5</y1>
<x2>806.388</x2>
<y2>62.393</y2>
<x3>801.205</x3>
<y3>64.804</y3>
<x4>797.951</x4>
<y4>67.455</y4>
<x5>801.808</x5>
<y5>69.022</y5>
<visible>1</visible>
<blur>0.34</blur>
</lm>
<has_lm>1</has_lm>
</object>
<object>
<name>face</name>
<pose>Unspecified</pose>
<truncated>1</truncated>
<difficult>0</difficult>
<bndbox>
<xmin>851</xmin>
<ymin>138</ymin>
<xmax>866</xmax>
<ymax>155</ymax>
</bndbox>
<has_lm>0</has_lm>
</object>
<object>
<name>face</name>
<pose>Unspecified</pose>
<truncated>1</truncated>
<difficult>0</difficult>
<bndbox>
<xmin>889</xmin>
<ymin>207</ymin>
<xmax>904</xmax>
<ymax>223</ymax>
</bndbox>
<has_lm>0</has_lm>
</object>
<object>
<name>face</name>
<pose>Unspecified</pose>
<truncated>1</truncated>
<difficult>0</difficult>
<bndbox>
<xmin>129</xmin>
<ymin>94</ymin>
<xmax>139</xmax>
<ymax>106</ymax>
</bndbox>
<has_lm>0</has_lm>
</object>
<object>
<name>face</name>
<pose>Unspecified</pose>
<truncated>1</truncated>
<difficult>0</difficult>
<bndbox>
<xmin>20</xmin>
<ymin>59</ymin>
<xmax>35</xmax>
<ymax>82</ymax>
</bndbox>
<has_lm>0</has_lm>
</object>
<object>
<name>face</name>
<pose>Unspecified</pose>
<truncated>1</truncated>
<difficult>0</difficult>
<bndbox>
<xmin>185</xmin>
<ymin>69</ymin>
<xmax>196</xmax>
<ymax>87</ymax>
</bndbox>
<lm>
<x1>188.312</x1>
<y1>76.174</y1>
<x2>193.857</x2>
<y2>74.246</y2>
<x3>193.134</x3>
<y3>79.188</y3>
<x4>192.17</x4>
<y4>82.924</y4>
<x5>196.027</x5>
<y5>81.357</y5>
<visible>1</visible>
<blur>0.23</blur>
</lm>
<has_lm>1</has_lm>
</object>
<object>
<name>face</name>
<pose>Unspecified</pose>
<truncated>1</truncated>
<difficult>0</difficult>
<bndbox>
<xmin>257</xmin>
<ymin>90</ymin>
<xmax>269</xmax>
<ymax>106</ymax>
</bndbox>
<has_lm>0</has_lm>
</object>
</annotation>
| {
"pile_set_name": "Github"
} | 0.008781 | [
{
"begin": 0,
"end": 21,
"score": 0.003089014
},
{
"begin": 21,
"end": 36,
"score": 0.011731312
},
{
"begin": 36,
"end": 63,
"score": 0.017909339
},
{
"begin": 63,
"end": 126,
"score": 0.0035402183
},
{
"begin": 126,
"end": 135,
"score": 0.010828903
},
{
"begin": 135,
"end": 176,
"score": 0.004616167
},
{
"begin": 176,
"end": 216,
"score": 0.0025163316
},
{
"begin": 216,
"end": 238,
"score": 0.01561861
},
{
"begin": 238,
"end": 262,
"score": 0.030842619
},
{
"begin": 262,
"end": 3253,
"score": 0.021796638
}
] |
75000*sqrt(17)
Simplify ((-2*(sqrt(99) + 2*sqrt(99)) + (sqrt(99)*-2*5 - sqrt(99) - sqrt(99)))*-4)/(1*1*sqrt(1089) + sqrt(1089)*-1*5).
-18*sqrt(11)/11
Simplify 1*((sqrt(170)*1 - sqrt(170) - sqrt(170))*-5 + -3*1*sqrt(170))/(sqrt(250) + (6*2*sqrt(250) - sqrt(250)) - sqrt(250)).
2*sqrt(17)/55
Simplify ((3 + (sqrt(39)/(sqrt(3) - sqrt(3)*2) - sqrt(39)/sqrt(3)*2))**2 - 6*((sqrt(104) - (sqrt(104) + (sqrt(104) + 2*sqrt(104) - sqrt(104))))*-5)/sqrt(8))*2.
-156*sqrt(13) + 252
Simplify ((-2*-4*sqrt(152)*2)/(4*sqrt(128)*-2))**2.
19/4
Simplify (-3*-5*(sqrt(70) + 4*sqrt(70)*-3))/(((1*sqrt(80))/sqrt(8) - (sqrt(640) - (1*sqrt(640) - sqrt(640))))*-2).
-165*sqrt(7)/14
Simplify (-1*(-1*-1*sqrt(10) + sqrt(10)))/(-5*5*sqrt(20)).
sqrt(2)/25
Simplify ((-2*2*sqrt(77) + (sqrt(77) - (sqrt(77) - sqrt(77)*-2)*1))*-1)/(sqrt(11) - (1*sqrt(121))/sqrt(11) - (sqrt(11) + sqrt(132)/(sqrt(36)/sqrt(3)))).
-3*sqrt(7)
Simplify (sqrt(1088) + 5 + -3*sqrt(1088) - (sqrt(1088) + 3)*-3 - (sqrt(1088)*-3*-1 - (-2 + sqrt(1088))*-4))**2.
-2112*sqrt(17) + 39652
Simplify ((-1*(1*sqrt(154) + sqrt(154)))/(sqrt(11) + 6*sqrt(44)))/((sqrt(10)*-2*3)/(sqrt(720)*1)).
4*sqrt(7)/13
Simplify -5 + ((4*(sqrt(72) + (-1 + sqrt(72) + sqrt(72))*1 + -4) + 5)*-5)**2*4.
-216000*sqrt(2) + 1059295
Simplify -4*1*(((-2*sqrt(3)*1 - 2*2*sqrt(3))**2 - (sqrt(216) + (sqrt(216)*2 - sqrt(216) - sqrt(216)))/sqrt(8)) + 0).
-432 + 12*sqrt(3)
Simplify (sqrt(1800) - -4*(sqrt(1800)*1 + sqrt(1800)) - (sqrt(1800) - -5*(-1*sqrt(1800) - sqrt(1800))))/((sqrt(10) + sqrt(10)*4)*4 - 4*-3*sqrt(10)).
27*sqrt(5)/8
Simplify 2 + (0 + sqrt(125)*-1 + 0 + sqrt(125) + 1)**2 + (4 + (sqrt(125) + -2 + sqrt(125))*4)**2.
-320*sqrt(5) + 8019
Simplify (-1 + (sqrt(1331) - (sqrt(1331) + 2)))*4 + 2 - (-6*(0 + sqrt(176)) + sqrt(176) + ((1*sqrt(330))/sqrt(6))/sqrt(5))**2.
-3981
Simplify ((sqrt(76) + 1 + -5)**2 - (1 + sqrt(76) + (-3 + sqrt(76))**2)) + 4 + -2*1*(1*sqrt(76))**2 + 3.
-139 - 6*sqrt(19)
Simplify (2 + (sqrt(1620) + 3 - (-5 + (sqrt(5) - sqrt(125)*-1))))**2 + -1.
240*sqrt(5) + 819
Simplify ((-2 + 5*sqrt(288))*-2*-1 + -2)**2.
-1440*sqrt(2) + 28836
Simplify (0 + -1 + sqrt(180) + 0)**2 - 5*sqrt(40)/(sqrt(1200)/sqrt(6) - sqrt(8)).
-53*sqrt(5)/4 + 181
Simplify (3*(sqrt(504) + sqrt(504)*-1*-5))/((sqrt(144)/(3*sqrt(9)))/sqrt(2)).
162*sqrt(7)
Simplify ((-3*sqrt(120))/sqrt(10) - sqrt(432)/sqrt(4))/(1*1*sqrt(144)*-2).
sqrt(3)/2
Simplify 0 + (((-2*sqrt(126)/sqrt(3))/sqrt(6))**2 - (sqrt(252) - ((sqrt(252) + 3 + sqrt(252) - sqrt(252))**2 + sqrt(252) + -5))) + 2.
36*sqrt(7) + 286
Simplify ((sqrt(112) - 5*sqrt(112)) + 3 + -1 - -6*-4*(sqrt(112) + 0))**2*-1*5.
-439060 + 2240*sqrt(7)
Simplify (-2*((sqrt(2057) - -3*sqrt(2057)*3) + (sqrt(2057) + 3 + -2 + sqrt(2057) - sqrt(2057)) + 0)*-1*-3)**2.
8712*sqrt(17) + 8960328
Simplify (sqrt(189)/(sqrt(144)*-4)*3)/(2*sqrt(108)/(sqrt(18)/sqrt(2))).
-3*sqrt(7)/64
Simplify 0 + ((5*2*sqrt(432))**2 - ((sqrt(432) - sqrt(432)*-1) + -2 + sqrt(432)) - (-2*-5*(sqrt(432) + 4))**2).
-9636*sqrt(3) - 1598
Simplify (-2 + -2*6*(sqrt(1152) + sqrt(1152) + 3 + -1 + sqrt(1152) - (sqrt(1152) + -2)*-6))**2.
-611712*sqrt(2) + 13450852
Simplify ((-2*sqrt(84))/sqrt(2) + sqrt(504)/(sqrt(48)/sqrt(4)))/(3*sqrt(18)/sqrt(3) - sqrt(6) - sqrt(600)*3).
sqrt(7)/28
Simplify (sqrt(91) + 4*(sqrt(91) + sqrt(91) + (sqrt(91)*3 - sqrt(91) - sqrt(91)) - sqrt(91) - sqrt(91)) - sqrt(91))/(-1*sqrt(7)*3) + 3 + 2*4*(sqrt(1872) + -1).
-5 + 284*sqrt(13)/3
Simplify ((sqrt(35) + sqrt(175)/sqrt(5))*6 + (-3*sqrt(2835) + sqrt(2835) + sqrt(2835) - sqrt(2835)))/(sqrt(7) - sqrt(84)/(sqrt(48)/sqrt(4)) - 2*3*sqrt(7)) + 3.
sqrt(5) + 3
Simplify (((sqrt(90)/sqrt(3) + sqrt(30))/sqrt(10) - (-3 + sqrt(12)/sqrt(4)))*-4 - 5*(-5 + sqrt(432))*5)**2.
-68704*sqrt(3) + 290017
Simplify (-5*(sqrt(182)/(sqrt(252)*-1))/(sqrt(288) + 2*sqrt(288) + sqrt(20)/(sqrt(10)*2)))**2.
325/47961
Simplify sqrt(63)/sqrt(9) + 2 - 4*(sqrt(700) - sqrt(7)) - (-5 + (-3*sqrt(504)/sqrt(8) - sqrt(63))**2).
-1001 - 35*sqrt(7)
Simplify ((sqrt(343) + sqrt(343) + -3*sqrt(343) + 5)*-4)**2*5 + (1 + (5*(3 + sqrt(343)))**2)*-2.
-7700*sqrt(7) + 11838
Simplify (-4*2*(sqrt(847) + -1) + (sqrt(448) + -2)*1*-6)**2.
-5440*sqrt(7) + 129872
Simplify 2 + (-4 + (1 + sqrt(931))**2)*-5 + (sqrt(931) + (sqrt(931) - (sqrt(931) - (sqrt(931) - sqrt(931)*-1))) + 4 + -2)**2 + -2 + 2.
14*sqrt(19) + 3745
Simplify (-2*(2*sqrt(1700)*2)**2*5 + -3)*1.
-272003
Simplify (((sqrt(120) + -1*sqrt(120) + sqrt(120))/sqrt(6))/sqrt(10))**2 + -5 - (sqrt(2) + sqrt(10)/sqrt(5) + -2 + sqrt(2) + sqrt(392)/sqrt(4))**2.
-207 + 40*sqrt(2)
Simplify -5*-4*(1*(-3*-1*sqrt(112) + sqrt(112)) - -2*sqrt(112)*-2*3)**2.
143360
Simplify (sqrt(78) + -6*sqrt(78)*-2 - -3*sqrt(78)*-4)/(((-1*sqrt(96))/sqrt(8))/(sqrt(32)/sqrt(4))).
-2*sqrt(13)
Simplify (1 + (6*sqrt(40))/(-6*(-2*sqrt(5) + sqrt(5)) + sqrt(5) - sqrt(5))*-3 + 3)*-2 + 3.
-5 + 12*sqrt(2)
Simplify (-1*(sqrt(224)*3*-1 + sqrt(224) + sqrt(224)))/(-3*sqrt(200) + -1*sqrt(128)).
-2*sqrt(7)/19
Simplify -1*(sqrt(22)/(-1*sqrt(2))*-3 + 3 + -5 + ((2*sqrt(99) + sqrt(99))/sqrt(9) - (sqrt(1584) + (-2*sqrt(1584))**2 - sqrt(1584) - sqrt(11)))).
-7*sqrt(11) + 6338
Simplify 1*(-2 + sqrt(1216)*-2*-5*5 + -5) + 1.
-6 + 400*sqrt(19)
Simplify (sqrt(70)/(sqrt(20)/sqrt(2)) - (sqrt(7) + -1)*6)**2 + -3 + (sqrt(7) + sqrt(175) - sqrt(7)) + 3*(sqrt(175) + sqrt(7)).
-37*sqrt(7) + 208
Simplify -2*(2 + (sqrt(1053) + sqrt(1053) + 1 + 5)**2 + sqrt(1053)) + ((6*sqrt(65)*1 - sqrt(65))/(1*sqrt(25)/sqrt(5) + sqrt(5)))**2.
-33675/4 - 450*sqrt(13)
Simplify 4 + 6*-4*(-4 + (sqrt(325)*-3 + -5)**2 + 0).
-70700 - 3600*sqrt(13)
Simplify sqrt(325)*3 + -1 + sqrt(325) + -2*sqrt(13)*-4 + (sqrt(13) + sqrt(26)/(-4*sqrt(2)))**2.
101/16 + 28*sqrt(13)
Simplify -2*(-3*(sqrt(108) + -1)**2*1 - (sqrt(48) + -2 - sqrt(1200))).
-104*sqrt(3) + 650
Simplify 2*((sqrt(125) - (2*sqrt(125)*-4 + sqrt(125))) + sqrt(125)*3*-1 + sqrt(125))**2 + -1.
8999
Simplify -2*(4 + (2 + sqrt(33)/sqrt(3) + -1 - 3*(sqrt(44) + sqrt(88)/sqrt(2))/sqrt(4))*-5)**2.
-13752 + 100*sqrt(11)
Simplify -5 + 5 + (sqrt(300) + -3)*-3 + ((sqrt(243)*1 + sqrt(243))**2 - ((sqrt(36)/sqrt(3))/sqrt(4) - sqrt(3))).
-30*sqrt(3) + 981
Simplify ((sqrt(12)/(sqrt(36)/sqrt(9)) - sqrt(3) - (-3 + (sqrt(9)/sqrt(3) - sqrt(3)))) + (sqrt(135)/sqrt(5))/sqrt(9) + sqrt(12) + 2)**2.
30*sqrt(3) + 52
Simplify -2 + (2*(-1 + sqrt(28)))**2 - (sqrt(5103) - 1*sqrt(5103))/(2*sqrt(1296) + sqrt(1296) + sqrt(1296) - sqrt(1296)).
-16*sqrt(7) + 114
Simplify (-2 + (sqrt(125)*1 + sqrt(125) + -4)**2 - ((-5*sqrt(5)*1)**2 - 4*(sqrt(5) + 2)))*2.
-152*sqrt(5) + 794
Simplify ((5*sqrt(108)*2)/sqrt(4))/(3*sqrt(1296) + sqrt(720)/sqrt(5)).
sqrt(3)/4
Simplify (-4 + ((-1 + (sqrt(1008) - sqrt(1008)*1))*5)**2*2)*1.
46
Simplify -1 + (sqrt(224)/(sqrt(4)*1))/(sqrt(847)*1) + 1 + 5.
2*sqrt(2)/11 + 5
Simplify (sqrt(21) + sqrt(42)/(sqrt(12)/sqrt(6)))/(sqrt(12)/sqrt(4)*-6) - ((-6*sqrt(693)*-2)/(sqrt(121)/(2*sqrt(11))))**2.
-36288 - sqrt(7)/3
Simplify -6*((1 + sqrt(128) + sqrt(128))**2*-1 + 3 + (sqrt(2) - (sqrt(14)/sqrt(7) + -4 + sqrt(2))**2)).
90*sqrt(2) + 3204
Simplify 2 + (sqrt(2)*1 + -4 - (sqrt(200)*-3 + sqrt(200))**2) + (-4*sqrt(288)*4)**2.
sqrt(2) + 72926
Simplify 3 + 4*((sqrt(108) + -2)*4 + 4 - 2*((sqrt(6) - sqrt(72)/(sqrt(60)/sqrt(5))) + sqrt(6))/sqrt(2)).
-13 + 88*sqrt(3)
Simplify ((sqrt(14)/((sqrt(84)*-4 - sqrt(84))/sqrt(12)) - (2 + sqrt(350)/sqrt(7)))*-1)**2.
104*sqrt(2)/5 + 1452/25
Simplify (2*(-3*(-3*sqrt(513) - sqrt(513)) - sqrt(513) - sqrt(513)))/(3*sqrt(192)*3*-6).
-5*sqrt(19)/36
Simplify (1 + -1*3*3*(-2 + sqrt(1331) + 2 + sqrt(1331) + -1 + -3 + sqrt(1331)))**2.
-21978*sqrt(11) + 971668
Simplify (sqrt(121)*-2*5)/(sqrt(396) + 2*sqrt(396)) - (6*sqrt(121)*-1)/((sqrt(1584) + sqrt(1584)*-3 + sqrt(1584) - sqrt(1584)) + sqrt(1584)).
-19*sqrt(11)/18
Simplify -1*((3*(-1 + sqrt(128)) + 0)**2 + (-1*2*sqrt(128) + sqrt(128) - (sqrt(128) + 2 - sqrt(128))*1)**2).
-1293 + 112*sqrt(2)
Simplify 5 + 2*((-1 + sqrt(500) + -3 - (sqrt(500) + 1 + sqrt(500) + -3))**2 + (2 + sqrt(500) + sqrt(500)*-1 + (sqrt(500)*1 + 2 - sqrt(500)))**2).
80*sqrt(5) + 1045
Simplify 1*(0 + 1 + (sqrt(13) + ((sqrt(117) - sqrt(117)*-1)/sqrt(9))**2 + 1 + sqrt(52) - -2*-2*sqrt(637)))*-2.
-108 + 50*sqrt(13)
Simplify (sqrt(448)*-4 + sqrt(448) + sqrt(448) + 1)*2 + ((-2*-2*sqrt(84))/((sqrt(432) - (sqrt(432) + sqrt(432)*-1 + sqrt | {
"pile_set_name": "DM Mathematics"
} | 0.003957 | [
{
"begin": 0,
"end": 15,
"score": 0.0056227
},
{
"begin": 15,
"end": 134,
"score": 0.0018655562
},
{
"begin": 134,
"end": 150,
"score": 0.008086969
},
{
"begin": 150,
"end": 276,
"score": 0.0019696802
},
{
"begin": 276,
"end": 290,
"score": 0.012772553
},
{
"begin": 290,
"end": 450,
"score": 0.0022907294
},
{
"begin": 450,
"end": 470,
"score": 0.0021432203
},
{
"begin": 470,
"end": 522,
"score": 0.0030195978
},
{
"begin": 522,
"end": 527,
"score": 0.015757442
},
{
"begin": 527,
"end": 8194,
"score": 0.0050326632
}
] |
Catheter-induced ablation of the atrioventricular junction to control refractory supraventricular arrhythmias.
Five patients with recurrent bouts of supraventricular tachycardia proved resistant or became intolerant of both conventional and experimental drugs. These patients were subjected to a new procedure involving delivery of DC shocks to an electrode catheter positioned adjacent to the His bundle. Complete atrioventricular (AV) block was produced in all, one patient died suddenly six weeks after shock therapy, and the remainder had complete AV block with follow-up intervals ranging from four to 12 months. Shock therapy was associated with mild elevations of creatine phosphokinase MB (31 +/- 18 units), but there was no hemodynamic evidence of tricuspid insufficiency. If this new technique proves safe and effective, it should supplant the need for open heart surgical procedures for His-bundle ablation. | {
"pile_set_name": "PubMed Abstracts"
} | 0.029813 | [
{
"begin": 0,
"end": 111,
"score": 0.015479778
},
{
"begin": 111,
"end": 261,
"score": 0.032902762
},
{
"begin": 261,
"end": 406,
"score": 0.019436494
},
{
"begin": 406,
"end": 618,
"score": 0.011037151
},
{
"begin": 618,
"end": 782,
"score": 0.045778666
},
{
"begin": 782,
"end": 918,
"score": 0.09816993
}
] |
Ask HN: Are we all OK with short DNS TTLs now? - mfincham
Conventional wisdom has long had it that short DNS TTLs are bad because they increase query loads and any faults in DNS will cause availability problems more quickly.<p>It seems popular now though for large sites (e.g. twitter.com, github.com, ycombinator.com, stackoverflow.com just to name a few) to use relatively short DNS TTLs, between 1 and 5 minutes, presumably to make failover easier.<p>Has popular opinion around short TTLs being "OK" changed? Are these sites doing something special to make this viable?
======
wahern
Very large site operators use anycast routing[1] which is particularly well
suited to UDP DNS; they can easily spread load and minimize latency. If you
can leverage anycast directly or indirectly through DNS hosting services then
low TTLs are not a problem.
Otherwise, it depends. Even with one DNS query per HTTP request, DNS will only
represent a fraction of your network load. It's difficult to make any DNS
server break a sweat. More likely the network link will saturate beforehand,
causing lots of dropped packets. But it's trivial to advertise and use
multiple DNS servers; much more trivial than a web application stack. DNS was
built for high availability almost since day 1. This is also why you shouldn't
worry too much about low TTLs exacerbating network faults--there's no excuse
for not using geographically dispersed authoritative name servers.
For example, depending on the site I'll often host the domain on my own
primary name server so I can control records without fscking with a web GUI or
REST API, but the advertised authoritative name servers are EasyDNS servers
which behave as secondaries mirroring my primary.
The real issue isn't load but latency. That's a more complex problem. If
you're not using anycast then your site is probably not big enough or
important enough for a few millisecond latency upfront for intermittent page
loads to matter. Also, many caching resolvers these days will preemptively
refresh records upon TTL expiration subject to usage patterns, which means if
you're seeing moderate, repeat traffic then users may not experience any
additional latency at all. (Similarly, caching resolvers will often remember
failing servers and try them last, regardless of ordering in a response.)
As for how painful are erroneous DNS changes, low and high TTLs cut both ways.
If it really matters you should be monitoring this stuff 24/7 (e.g. Pingdom),
which means record errors should be quickly identified and reported. If you're
setup to respond quickly (which you should be for a serious commercial
operation), that augurs in favor of low TTLs.
[1]
[https://en.wikipedia.org/wiki/Anycast](https://en.wikipedia.org/wiki/Anycast)
------
bigiain
AWS Route53 defaults to 300 seconds (which is probably why so many articles
see that as the median ttl), and I've never encountered problems leaving that
at the default. I suspect the performance problems are real if you're running
your own dns servers - but if you're piggybacking on something like AWS I
seriously doubt you'll see issues (apart from monthly bills, if you suddenly
go viral to the moon...)
"Back in the day", Internet Explorer was a problem with TTLs, from memory IE6
was when they stopped caching all dns lookups for 24hrs no matter what the til
was, and IE6 still coached for 4hrs. (This was a drama for me back in the
early 2000's when I was trying to do dns based load balancing...)
My opinion these days is don't try to go much below 1 minute if you want other
peoples resolvers or software to honour your ttls, but I do see people using 1
sec ttls occasionally, so presumably if your application doesn't mind too much
if not everybody h9onours your ttl - it's still worth doing for some people...
------
mfincham
Also in the mix: is there any point in having multiple A records for a busy
site now?
| {
"pile_set_name": "HackerNews"
} | 0.078109 | [
{
"begin": 0,
"end": 59,
"score": 0.028439116
},
{
"begin": 59,
"end": 523,
"score": 0.078108564
},
{
"begin": 523,
"end": 584,
"score": 0.03358948
},
{
"begin": 584,
"end": 591,
"score": 0.024147147
},
{
"begin": 591,
"end": 598,
"score": 0.06332459
},
{
"begin": 598,
"end": 674,
"score": 0.0186035
},
{
"begin": 674,
"end": 743,
"score": 0.018881164
},
{
"begin": 743,
"end": 750,
"score": 0.016382186
},
{
"begin": 750,
"end": 828,
"score": 0.014091457
},
{
"begin": 828,
"end": 3916,
"score": 0.056931525
}
] |
Happy Sunday Everyone; I say this with a fair amount of sarcasm, as the weekend comes to a close. This happens to mean little to me as I work pretty much 24 hours a day 7 days a week; it just goes with my job, I just fill the voids with the things in life that I enjoy.
Today I used a new straight razor I bought and received yesterday, a Ralf Aust 6/8 Spanish point in Olive wood scales. Beautiful razor by every account, and came from Straight Razor Design in the fast and professional way in which I am starting to measure everything else by. dammit Amazon Prime; FASTER ! I really like the feel of the 6/8 blade opposed to the 5/8 mainly due to the weight added; I like the 5/8 just fine, but it is good to know that there are options now for me ranging from 4/8-7/8 in my den.
Being my last day of the week shave and it also being a “S” day I decided to end it for the Lord with St. James from Taylor of old Bond street (TOBS). This is a great youthful and light scent that really says spring is on its way and is by no means a winter or fall scent. Perfect for an oddly hot 80 degree April day in the northeast. I used my Plisson synthetic which works amazingly well at lathering creams enough said there. I have not tried many synthetic brushes but where this brush lacks is in backbone where it excels is in softness easily being the softest brush I have ever used bar none; hence why it works as a bowl latherer with creams so well.
I ended the shave with the standard cold water rinse, and alum block, and Thayer’s unscented witch hazel. I used the matching St. James after shave splash and Aveeno scent free balm. Almost zero feed back from the alum block and my face is getting nearer to BBS smooth with every straight shave. – Aaron | {
"pile_set_name": "OpenWebText2"
} | 0.194373 | [
{
"begin": 0,
"end": 98,
"score": 0.13565879
},
{
"begin": 98,
"end": 270,
"score": 0.017145762
},
{
"begin": 270,
"end": 390,
"score": 0.06652113
},
{
"begin": 390,
"end": 577,
"score": 0.5026305
},
{
"begin": 577,
"end": 783,
"score": 0.028267438
},
{
"begin": 783,
"end": 890,
"score": 0.034104515
},
{
"begin": 890,
"end": 935,
"score": 0.03599298
},
{
"begin": 935,
"end": 1057,
"score": 0.027580723
},
{
"begin": 1057,
"end": 1120,
"score": 0.015063282
},
{
"begin": 1120,
"end": 1748,
"score": 0.0495556
}
] |
Q:
Sending data using Ajax to PHP
I am trying to send a string via ajax using the GET method but whenever that string contains some punctuation characters those characters do not appear when I use the echo in php.
For example if I send a string "sub + 12" the php will echo "sub 12"
If I send "&()*", php will echo an empty string.
Why does this happen?
Are there any special characters that the string cannot contain?
A:
you encodeURIComponent(). this is demo code which you can check
something like this encodeURIComponent(yourtext)
first this html code . in text filed enter your text and check this output, this is onkeyup so enter text and check result
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>PHP, jQuery search demo</title>
<link rel="stylesheet" type="text/css" href="my.css">
<script src="https://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js"></script>
<script type="text/javascript">
$(document).ready(function () {
$("input").keyup(function () {
$('#results').html('');
var searchString = $("#search_box").val();
var data = 'search_text=' + encodeURIComponent(searchString);
if (searchString) {
$.ajax({
type: "GET",
url: 'edit.php',
data: data,
dataType: 'text',
async: false,
cache: false,
success: function (result) {
$('#results').html(result);
//window.location.reload();
}
});
}
});
});
</script>
</head>
<body>
<div id="container">
<div style="margin:20px auto; text-align: center;">
<form method="post" action="do_search.php">
<input type="text" name="search" id="search_box" class='search_box'/>
<input type="submit" value="Search" class="search_button"/><br/>
</form>
</div>
<div>
<div id="searchresults">Search results :</div>
<ul id="results" class="update">
</ul>
</div>
</div>
</body>
</html>
then create edit.php file
<?php
$searchquery = $_GET['search_text'];
echo $searchquery;
?>
then check result . which is working
Output is
Search results :
&()*
| {
"pile_set_name": "StackExchange"
} | 0.039255 | [
{
"begin": 0,
"end": 35,
"score": 0.0068027726
},
{
"begin": 35,
"end": 216,
"score": 0.012356056
},
{
"begin": 216,
"end": 285,
"score": 0.0095794145
},
{
"begin": 285,
"end": 334,
"score": 0.06612156
},
{
"begin": 334,
"end": 356,
"score": 0.02124131
},
{
"begin": 356,
"end": 421,
"score": 0.021657806
},
{
"begin": 421,
"end": 426,
"score": 0.019297661
},
{
"begin": 426,
"end": 490,
"score": 0.0076010567
},
{
"begin": 490,
"end": 539,
"score": 0.0186035
},
{
"begin": 539,
"end": 2207,
"score": 0.0054144515
}
] |
This proposal investigates novel signaling mechanisms of protein kinase D (PKD) and its relevance to the pathogenesis of prostate cancer. The family of PKD serine/threonine kinases is a novel target of the key second messenger diacylglycerol (DAG) and its pharmacological analogs, phorbol esters. DAG and phorbol esters directly bind PKD at its C1 domain and activate PKD through phosphorylation via protein kinase C (PKC). Aberrant DAG signaling is closely couples to the etiology of many cancers including the prostate cancer. PKD as a novel DAG target has significant prognostic and therapeutic values for these diseases. Substantial evidence from our studies supports a novel role of PKD3, a new member of the PKD family, in prostate carcinogenesis. We have demonstrated progressive nuclear accumulation of PKD3 as well as elevated expression in human prostate tumors, revealing a potential mechanism whereby PKD contributes to the development of prostate cancer. PKD3 promotes prostate cancer cell growth, survival, and migration/invasion, and knockdown of PKD3 inhibits the growth of prostate tumor xenografts in mice. PKD3 signals downstream of PKC5, an oncogenic protein in prostate cancer, and modulates crucial cell growth/survival regulatory pathways including Akt and EKR1/2 in prostate cancer cells. These findings support the crucial role of a constitutively active PKC5/PKD3 pathway in prostate oncogenesis. The proposed studies will further dissect the signaling mechanisms of PKD3 and define its functional impact in the pathogenesis of prostate cancer. If successful, these studies will reveal the potential value of PKD3 as a novel biomarker and therapeutic target for prostate cancer. Ultimately, new strategies may be designed for targeting PKD3 as therapy for prostate cancer as well as other diseases with deregulated DAG signaling. Three specific aims will be tested in this proposal: Specific Aim 1. Determine the role of PKD3 in the pathogenesis of prostate cancer in vivo. Specific Aim 2. Test the hypothesis that the nuclear accumulation of PKD3 as a consequence of constitutively active PKC5/PKD3 is essential for growth, survival, migration/invasion of prostate cancer cells. Specific Aim 3. Determine relevance of PKD3 in acquired phorbol 12-myristate 13-acetate (PMA) resistance and cell proliferation in prostate cancer cells. | {
"pile_set_name": "NIH ExPorter"
} | 0.025864 | [
{
"begin": 0,
"end": 138,
"score": 0.01492445
},
{
"begin": 138,
"end": 297,
"score": 0.020269485
},
{
"begin": 297,
"end": 424,
"score": 0.01193956
},
{
"begin": 424,
"end": 529,
"score": 0.17661177
},
{
"begin": 529,
"end": 625,
"score": 0.024147147
},
{
"begin": 625,
"end": 754,
"score": 0.03753809
},
{
"begin": 754,
"end": 968,
"score": 0.08635602
},
{
"begin": 968,
"end": 1125,
"score": 0.08330294
},
{
"begin": 1125,
"end": 1313,
"score": 0.0057268236
},
{
"begin": 1313,
"end": 2359,
"score": 0.019297661
}
] |
James Forrest celebrates scoring the winner for Celtic against Rangers
Celtic winger James Forrest has been named the PFA Scotland Premiership Player of the Year.
Forrest beat team-mate Callum McGregor and Rangers pair Ryan Kent and Alfredo Morelos to claim the main prize of the night at the PFA Scotland annual awards.
Forrest scored 11 goals and added nine assists as Celtic won their eighth consecutive Scottish Premiership title.
Kilmarnock's Steve Clarke won manager of the year
Kilmarnock's Steve Clarke was named GMB Scotland Manager of the Year award after the Ayrshire team broke their top-flight points record for a second season running.
Clarke saw off competition from Ross County co-managers Stuart Kettlewell and Steven Ferguson, Alloa boss Jim Goodwin and Arbroath's Dick Campbell.
"It feels great, it's always nice to be nominated and extra nice when you actually get your hands on the trophy," Clarke told Sky Sports News.
"I was nominated last year but didn't win the award so to get it this year is great, but it also tells you how good the team has been over the last 18 months."
2:17 On-loan Liverpool winger Ryan Kent says returning to Rangers next season is a 'possibility' for him. On-loan Liverpool winger Ryan Kent says returning to Rangers next season is a 'possibility' for him.
Rangers winger Kent won the Young Player of the Year award.
Kent, 22, is on loan from Liverpool and he is grateful to Rangers manager Steven Gerrard for giving him the opportunity to shine at Ibrox this season.
"I have been able to showcase my ability not only on a domestic level but also on a European platform and I have Steven Gerard to thank for that," Kent told Sky Sports News.
"I am really grateful for the opportunities that I have been given this season."
Kent is due to return to Liverpool after the season but he says returning to Rangers is something he will consider.
"It is an option, it is a possibility," Kent said. "Since I have walked in the door on day one the fans have been magnificent to me. All the coaching staff and all the players have really made me feel welcome.
"I feel that has got the best out of me. This club has done a lot for me so it would be nice to do a lot for them in the future as well."
Celtic's Scott Brown and Callum McGregor were both named in the team of the year
Kent was one of four Rangers players named of the PFA Scotland's Premiership Team of the Year. He was joined by team-mates Allan McGregor, James Tavernier and Alfredo Morelos.
Champions Celtic contributed five players with Kristoffer Ajer, Dedryck Boyata, Callum McGregor and Scott Brown named alongside Forrest.
Livingston's Craig Halkett and Aberdeen's Graeme Shinnie were the two other players included.
PFA Scotland's Premiership Team of the Year:
Allan McGregor (Rangers); James Tavernier (Rangers), Kristoffer Ajer (Celtic), Dedryck Boyata (Celtic), Craig Halkett (Livingston); Callum McGregor (Celtic), Scott Brown (Celtic), Graeme Shinnie (Aberdeen); James Forrest (Celtic), Alfredo Morelos (Rangers), Ryan Kent (Rangers). | {
"pile_set_name": "OpenWebText2"
} | 0.033933 | [
{
"begin": 0,
"end": 71,
"score": 0.030842619
},
{
"begin": 71,
"end": 164,
"score": 0.017562259
},
{
"begin": 164,
"end": 323,
"score": 0.012217224
},
{
"begin": 323,
"end": 438,
"score": 0.017631676
},
{
"begin": 438,
"end": 489,
"score": 0.010967735
},
{
"begin": 489,
"end": 655,
"score": 0.0095794145
},
{
"begin": 655,
"end": 804,
"score": 0.038911518
},
{
"begin": 804,
"end": 948,
"score": 0.014716201
},
{
"begin": 948,
"end": 1109,
"score": 0.019575324
},
{
"begin": 1109,
"end": 3071,
"score": 0.05133759
}
] |
BRAF V600E mutant oligodendroglioma-like tumors with chromosomal instability in adolescents and young adults.
We performed genome-wide methylation analysis on 136 pediatric low-grade gliomas, identifying a unique cluster consisting of three tumors with oligodendroglioma-like histology, BRAF p.V600E mutations and recurrent whole chromosome gains of 7 and loss of 10. Morphologically, all showed similar features, including a diffusely infiltrative glioma composed of round nuclei with perinuclear halos, a chicken-wire pattern of branching capillaries and microcalcification. None showed astrocytic features or characteristics suggestive of high-grade tumors including necrosis or mitotic figures. All tumors harbored multiple chromosomal copy number abnormalities (>10 chromosomes altered), but none showed 1p/19q co-deletion or IDH1 p.R132H mutation. Hierarchical clustering and t-stochastic neighbor embedding analyses from DNA methylation data cluster them more closely to previously described pediatric-type low-grade gliomas and separate from adult gliomas. These tumors exhibit distinct clinical features; they are temporal lobe lesions occurring in adolescents and young adults with a prolonged history of seizures and all are alive with no recurrence (follow-up 3.2 to 13.2 years). We encountered another young adult case with quite similar pathological appearance and molecular status except for TERT promoter mutation. Although the series is small, these may represent a new category of IDH wild-type low-grade gliomas which may be confused with "molecular GBM." Further, they highlight the heterogeneity of IDH wild-type gliomas and the relatively indolent behavior of "pediatric-type" gliomas. | {
"pile_set_name": "PubMed Abstracts"
} | 0.050586 | [
{
"begin": 0,
"end": 110,
"score": 0.09924392
},
{
"begin": 110,
"end": 368,
"score": 0.0063862763
},
{
"begin": 368,
"end": 577,
"score": 0.06971766
},
{
"begin": 577,
"end": 699,
"score": 0.01999182
},
{
"begin": 699,
"end": 854,
"score": 0.05373499
},
{
"begin": 854,
"end": 1065,
"score": 0.05133759
},
{
"begin": 1065,
"end": 1292,
"score": 0.02054715
},
{
"begin": 1292,
"end": 1431,
"score": 0.089041
},
{
"begin": 1431,
"end": 1575,
"score": 0.029812546
},
{
"begin": 1575,
"end": 1707,
"score": 0.020408317
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.