text
stringlengths
173
4.38k
subset
stringclasses
13 values
The oxidation of 6-methyltetrahydropterin and tetrahydrobiopterin coupled to the formation of tyrosine by phenylalanine hydroxylase generates a precursor species to the quinonoid product that is tentatively identified as a 4a-hydroxy adduct based on its spectral similarity to the 4a-hydroxy-6-methyl-5-deazatetrahydropterin. The rate of appearance of this intermediate and that of tyrosine are equal and hydroxylase catalyzed in accord with the completion
pubmed_abstracts
CD28 is required for the thymic generation and peripheral maintenance of a functional Treg population. CD4+ Foxp3+ Tregs are key negative regulators of T cell-mediated immunity and are required for the control of spontaneous responses to self through several mechanisms ([@B59], [@B60]). Contact-mediated suppression relies on CTLA-4 interactions with its ligands and is discussed in detail below. Bystander suppression is mediated by suppressive cytokines, mainly IL-10 ([@B61]) and TGF-β ([@B62]) produced by activated Tregs, and by induction of cytokine starvation in target cells by IL-2 clearance ([@B63]). B7 ligand recognition plays an important role in Treg development and function, summarized in Table [1](#T1){ref-type="table"}. In CD28-deficient NOD mice, the percentage of peripheral Tregs is strongly reduced ([@B64]). Similar reductions are observed in NOD mice lacking both CD80 and CD86, leading to the conclusion that the B7--CD28 interaction is required for the formation of the full Treg repertoire. The reduction in the percentage of Tregs in NOD mice treated with B7-blocking CTLA-4-Ig correlates with a higher incidence of spontaneous autoimmune diabetes ([@B64]). Subsequent analysis revealed that Treg deficiency in CD28^−/−^ mice can be traced back to thymic development. The percentage of Treg precursors among thymic CD4 single-positive cells is significantly reduced in CD28^−/−^ mice as well as in NOD mice injected with anti-CD80 and CD86 antibodies ([@B65]), and in B7 double knockout mice ([@B66]). Peripheral homeostatic expansion of Tregs -- but not effector T cells -- in normal syngeneic hosts is also strongly suppressed by anti-CD80 and CD86 antibodies ([@B66]). A mechanistic explanation for the thymic requirement for CD28 was proposed by Tai et al. ([@B67]) who examined the consequences of CD28 deletion in a TCR-transgenic model. Mice expressing the AND TCR and its agonist ligand, a pigeon cytochrome *c* peptide, were found to effectively induce thymic Tregs only in the presence of CD28. This means that while a strong selection signal through TCR is indeed required ([@B68]), it is not sufficient for the full initiation of the agonist selection program leading to the generation of Tregs, and that a co-stimulatory signal from mTEC-expressed B7 molecules through CD28 is also required. It is noteworthy that a
pubmed_central
created directly from the f10g file, just as a test. The temporary test colors are /* --- colorkey --- */ int colorkey[99] = { 0*256 + 4, /* sea surface and below is 4=blue */ 100*256 + 11, /* up to 100m is 11=green */ 250*256 + 5, /* up to 250m is yellow */ 500*256 + 10, /* 500 maroon */ 1000*256 + 2, /* 1000 red */ 2500*256 + 8, /* 2500 gray */ 10000*256 + 9, /* rest silver */ -1 }; The eventual goal, which really isn't that much more complicated, is to generate a gif animation, where each successive frame shows what happens when sea level rises, say, another foot. In any case, a quick glance at the gif suggests that my naive interpretation of the data's lat,lon grid is, in all likelihood, generally more-or-less correct. And I probably don't need anything more accurate/precise for the intended purpose. But it would be nice (and I'd still like) to have more thorough documentation than what's cited above. Anybody have that info, or just a link to it would be great. Thanks.     E d i t # 2 ------------------ Just to illustrate the intended use, below's an animation, focusing on the Florida region of the f10g tile. Each successive frame raises sea level (actually, lowers the elevation of each land pixel, leaving ocean unchanged) by one meter. The first frame is raw data, and there are 30 frames in all, and then repeat. Of course, one meter times 30 is kind of extreme, but the NOAA data's in meters, so I don't immediately have any finer vertical resolution available. And it's just a prototype illustration (but I know where I'm buying my retirement home:). The colortable/colorkey is also different than the first gif above, with light_green-->dark_green for the first twelve meters, and then yellow up to 100 meters, as follows int colorkey2[99] = { 0*256 + 0, /* sea surface and below is 0=blue */ 1*256 +
stackexchange
ROM is a type of solid state memory. Each ROM cell is fabricated with a desired logic state. In other words, a bit of binary data is permanently stored in a ROM cell either in a logic state of “0” or “1” depending on whether there is a conductive path between a bit line and a VSS line. In accordance with a definition of a ROM cell's logic, when a logic state of “1” is stored in a ROM cell, there is a connected path from a bit line to a VSS line. On the other hand, when a logic state of “0” is stored in a ROM cell, there is no connected path from the bit line to the VSS line. The definition of “0” and “1” described above can be swapped depending on different applications. As technologies evolve, semiconductor process nodes have been scaled down for high density ROM integrated circuits. As a result, the form factor of ROM integrated circuit has been improved from shrinking the semiconductor process node (e.g., shrink the process node towards the sub-20 nm node). As semiconductor devices are scaled down, new techniques are needed to maintain the electronic components' performance from one generation to the next. For example, low leakage current transistors are desirable for high density and high speed ROM integrated circuits. Fin field-effect transistors (FinFETs) have emerged as an effective alternative to further reduce leakage current in semiconductor devices. In contrast to the prior planar MOS transistor, which has a channel formed at the surface of a semiconductor substrate, a FinFET has a three dimensional channel region. In a FinFET, an active region including the drain, the channel region and the source protrudes up from the surface of the semiconductor substrate upon which the FinFET is located. The active region of the FinFET, like a fin, is rectangular in shape from a cross section view. In addition, the gate structure of the FinFET wraps the active region around three sides like an upside-down U. As a result, the gate structure's control of the channel has become stronger. The short channel leakage effect of conventional planar transistors has been reduced. As such, when the FinFET is turned off, the gate structure can better control the channel so as to reduce leakage current. The three-dimensional shape of the FinFET channel region allows for an increased gate width without increased silicon area even as the overall scale of the devices is reduced with semiconductor process scaling, and in conjunction with a reduced gate length, providing a reasonable channel width characteristic
uspto_backgrounds
Lynae Larson is an American former marathon runner, who won the 1978 Chicago Marathon. She failed to qualify for the 1976 Summer Olympics. Personal life and early career Larson was born in 1953 and studied at Dickinson State College, where she began running. In her sophomore year, Larson set four meeting records at the North Dakota Association for Intercollegiate Athletics for Women event. She set records in the 440-yard run, long jump, 200-meter low hurdles, and the 880-yard run. In 1975, Larson won the long jump, 50 metres hurdles, 880-yard run and 1-mile run events at the same competition, and set a meeting record in the mile run. From 1976 to 1977, Larson was the coach of the Dickinson State girl's track and field team. The following year, Larson was a high school gym teacher in Brookings, South Dakota. In 2002, Larson worked as a schoolteacher in Saint Paul, Minnesota. She also worked as Women's Athletics Director at Dickinson State College. Career Larson failed to qualify for the marathon event at the 1976 Summer Olympics, after withdrawing into the qualification event due to an injury. Larson won the 1978 Chicago Marathon, in a time of 2:59:25. She received no prize money, as the event only began awarding prize money in 1982. After the race, other runners were complaining about the 10:30 start, which had most runners finishing in heat, but Larson instead was concerned that the delayed start time affected her travel home, as she had to drive six hours back to Brookings, South Dakota, to work the next day. A race sponsor said the start time had been chosen to accommodate all entrants who lived outside the city. Larson competed at the 1979 Chicago Marathon, and was leading until around from the finish line, when she was overtaken by 15-year-old Laura Michalek. Larson eventually finished around a minute behind Michalek. In the same year, Larson won the second ever Lincoln Marathon, taking 31 minutes off the winning time from the previous year. In 1984, Larson won the Kaypro Super Run in Las Vegas. The event was only for amateur athletes, one from each of the 50 states of the US. Larson qualified as amateur as she had not competed at the Olympics. The promised prize money was $500,000, awarded as $10,000 per
wikipedia_en
Next, we need to generalize Eckart dissipative thermodynamics to the case when also chemical diffusion, (lepton diffusion in this case) is present. Therefore, we need to consider the lepton conservation equation (n Y\_eu\^+ n Y\_(u\^+n\^))\_[;]{}=0, where $n^{\alpha}$ is the neutrino four–velocity with respect to the frame comoving with matter (see [@Thorne], [@IS]), with $n^{\mu}u_{\mu}=0$ and $n^{\mu}n_{\mu}=1$. Defining the neutrino flux as $f^{\alpha}=n Y_{\nu}n^{\alpha}$, that satisfies $u_{\alpha}f^{\alpha}=0\,$, and using the continuity equation (\[cont\]) we obtain the equation of lepton conservation $n u^{\alpha} (Y_L)_{,\alpha}=-f^{\beta}_{\,\,;\beta}$. This latter equation is particularized for lepton diffusion, which is relevant for nascent neutron stars, but it is a general conservation equation for massless particles. Therefore, the set of equations we have is the following: - Continuity equation: (nu\^)\_[;]{}=0. - Energy conservation equation (stress-energy tensor projected onto $u$): u\^\_[,]{}+u\^\_[ ;]{}(+p)+q\^\_[ ;]{} +q\^u\^u\_[;]{}=0. - First law of thermodynamics: d=dn+nTds+n\_ dY\_L.\[newfirst\] - Lepton conservation: nu\^Y\_[L,]{}=-f\^\_[ ;]{}.\[Ydot\] Together they give: nTu\^s\_[,]{}=-q\^\_[ ;]{}+\_ f\^\_[ ;]{} -q\^u\^u\_[;]{} .\[sdot\] Let us now define the entropy flux as in [@Israel], S\^=snu\^+-\_. Notice that when degenerate neutrinos dominate the transport of energy and particles, $q_\alpha=\mu_{\nu} f_\alpha$ and there is no entropy flux. By taking the divergence of the entropy flux, we have TS\^\_[ ;]{}= -(D\_T+Tu\^u\_[;]{}) -f\^TD\_ , where we have defined $\eta\equiv\frac{\mu_{\nu}}{T}$. The second law of thermodynamics, $
arxiv
import org.apache.log4j.Logger; import com.trilead.ssh2.Connection; import com.trilead.ssh2.Session; public class SshTest { public static final Logger s_logger = Logger.getLogger(SshTest.class.getName()); public static String host = ""; public static String password = "password"; public static String url = "http://google.com"; public static void main (String[] args) { // Parameters List<String> argsList = Arrays.asList(args); Iterator<String> iter = argsList.iterator(); while (iter.hasNext()) { String arg = iter.next(); if (arg.equals("-h")) { host = iter.next(); } if (arg.equals("-p")) { password = iter.next(); } if (arg.equals("-u")) { url = iter.next(); } } if (host == null || host.equals("")) { s_logger.info("Did not receive a host back from test, ignoring ssh test"); System.exit(2); } if (password == null){ s_logger.info("Did not receive a password back from test, ignoring ssh test"); System.exit(2); } try { s_logger.info("Attempting to SSH into host " + host); Connection conn = new Connection(host); conn.connect(null, 60000, 60000); s_logger.info("User + ssHed successfully into host " + host); boolean isAuthenticated = conn.authenticateWithPassword("root", password); if (isAuthenticated == false) { s_logger.info("Authentication failed for root with password" + password); System.exit(2); } String linuxCommand = "wget " + url; Session sess = conn.openSession(); sess.execCommand(linuxCommand); sess.close(); conn.close();
github
After the standard introduction atop a balcony with Congress as a backdrop, the D.C. Top Chef puts the popular mise en place Quickfire challenge front and center. Had everyone been asked to cook, we’d have gotten the usual mélange of dishes, with some overachievers underachieving and vice versa, and no real sense of who the contenders are this season. Granted, no challenge will tell us everything about how the season is going to shape up, but it stands to reason that those with refined knife skills are very likely to be refined in other areas. And lo, a pair of tough-talking, “alpha-male” types emerge as the persons to beat: Kenny, who zips through three of the four stages in first place (including breaking down four whole chickens at a rate of 10 seconds per), and Angelo, who ultimately wins the Quickfire (and $20,000) with his roasted wing & thigh, curry onion jam, and potato noodles. Playing the role of hubristic culinary hotshot to the hilt, Angelo also emerges as the early villain of Season Seven, announcing his absurd ambition “to be the first contestant to win every single challenge” and likening his cooking to “an orchestra with flavors.” Still, I prefer brash, overconfident chefs who can cook to the brash, overconfident chefs who don’t know what they’re doing, and there’s the expected abundance of the latter early on. The Elimination challenge asks the chefs to divide into four groups and create individual dishes that most strongly represent where they’re from—all for the 300 or so partygoers (including The Bachelor from The Bachelor!) celebrating cherry blossom season. With the best and worst from each group up for victory and elimination, respectively, the two top Quickfire competitors, Angelo and Kenny, are given the advantage of choosing someone weak to square off against. Tactically, it’s only a minor edge, since nobody knows for sure how good or bad anyone else is yet; on a more personal level, it’s likely to cause friction between the Quickfire champs and the chefs they assume suck the most. Surprise, surprise, the chefs who make head-slappingly stupid decisions are punished for it later. You had to know Jacqueline was in trouble when she talked about her desire to prove that self-taught cooks who cater can win Top Chef. Then
pile-cc
Is 86763601 a prime number? True Is 1649737 a composite number? False Is 15465215 prime? False Is 236042971 composite? True Is 221721739 composite? False Is 4082901 a composite number? True Is 146359733 a prime number? False Is 140019169 composite? False Is 30093443 a composite number? False Is 2101439 prime? True Is 1754063 prime? True Is 26148103 a prime number? True Is 1004515 prime? False Is 8093299 a composite number? True Is 1566995 composite? True Is 385171 composite? False Is 186923563 a composite number? False Is 3416267 a composite number? False Is 1203773 a prime number? True Is 51688783 prime? False Is 219073879 a prime number? False Is 66141707 a prime number? True Is 259904639 a composite number? False Is 23849311 a prime number? False Is 1450685 a prime number? False Is 1338133 a prime number? False Is 6541363 a composite number? False Is 577957769 a composite number? True Is 18302 a composite number? True Is 156684551 prime? True Is 3492359 prime? False Is 20591257 prime? False Is 245668123 composite? True Is 15117133 composite? False Is 3922967 a composite number? False Is 16561033 composite? False Is 1291071 prime? False Is 1646303 a prime number? True Is 8434141 prime? True Is 2582311 a prime number? True Is 3072647 composite? True Is 127165307 a composite number? False Is 871861 prime? False Is 9513877 prime? True Is 35322589 a composite number? True Is 1416799 composite? False Is 2950279 prime? False Is 3184553 prime? False Is 7393687 a prime number? False Is 14998219 a
dm_mathematics
The deal was done between Mark and Janice at SRP. I heard him make the call. Also, do you have any more avenues with PAC tranny like a supervisor or something. I am not really in a position to negotiate with anyone. They all claim that they can't change the Oasis system. -----Original Message----- From: Purcell, Mike Sent: Monday, October 08, 2001 12:06 PM To:
enron_emails
NO. SCPW-11-0000741 IN THE SUPREME COURT OF THE STATE OF HAWAI'I MICHAEL J. MATSUKAWA, Petitioner, vs. STATE OF HAWAI'I 2011 REAPPORTIONMENT COMMISSION; and SCOTT NAGO, CHIEF ELECTION OFFICER, STATE OF HAWAI'I, Respondents. ORIGINAL PROCEEDING ORDER (By: Recktenwald, C.J., Nakayama, Acoba, Duffy, and McKenna, JJ.) Upon consideration of respondents 2011 Reapportionment Commission and Chief Election Officer's motion for reconsideration and/or clarification of the January 4, 2012 order and the January 6, 2012 opinion granting the petition for a writ of mandamus, the papers in support and the record, it appears that the lack of complete information about the non-permanent status and location of Hawaii's non-residents is no basis for disregarding the express mandate of the Hawai'i Constitution, article IV, section 4, that only permanent residents be counted in the population base for the purpose of reapportionment of the state legislature. It further appears that the January 6, 2012 opinion discussed and disposed of the sole issue presented in petitioner's petition as to whether the inclusion of non­ permanent residents in the population base for the 2011 Final Reapportionment Plan constituted an error in the Reapportionment Plan. How the Commission identifies the non-permanent resident population for apportionment under article IV, section 4 and whether the Commission must follow the procedures set forth in HRS § 25-2 in preparing and filing a new reapportionment plan were not issues in petitioner's mandamus proceeding. It finally appears that the January 6, 2012 opinion advises the Commission that apportionment under article IV, section 6 requires the Commission to "make an honest and good faith effort to construct districts as nearly of equal population as is practicable. . . . [M]athematical exactness or precision [is not a
freelaw
While Solr's API is pretty easy to work with directly, there's definitely something to be said for using a quality client for your platform. ------ akozak At Creative Commons we use Lucene/Nutch for our educational search prototype DiscoverEd: <http://wiki.creativecommons.org/DiscoverEd> It was easy enough to add in our special sauce like a triple-store for consuming and displaying semantic data (I guess I can say easy since I didn't do it myself). ~~~ sdesol I would say it's pretty easy if you are technically inclined. When I implemented the first iteration of my text search engine using Lucene, I didn't even know Java but I was able to write my own custom tokenizer and get it to index and retrieve results from the index in about 6 hours. I highly recommend you get the book "Lucene in action" as it gives solid examples that you can build upon. ------ nkurz I'm a fan and contributor to Lucy, which is mentioned briefly in the header: <http://incubator.apache.org/lucy/> While Lucy did start out as a C port of Lucene (hence the name), it's since broken any attempts at Lucene compatibility. Instead, it's aiming to be a fast and flexible standalone C core with bindings to higher level languages. Since it's growing out of Kinosearch, it's best developed bindings are in Perl, but support for all the usual suspects (Python, Ruby, etc.) is planned. Technically, the main difference from Lucene is that it gets cozier with the machine: the OS is our VM. It's mostly mmap() IO, and we're very conscious of paging and cache issues. While we're trying to maintain 32-bit back compatibility, we take full advantage of 64-bit solutions when they offer themselves. The scripted bindings are also very cool --- you can do things like make callbacks to scoring methods in your script language to truly customize your results. If for some reason you're not finding what you need in Lucene and Solr, check it out. We just became a full Apache incubator project, and are eager to get more developers involved. You'll find clean C code, decent documentation, and
hackernews
Existing mRNA quantification methods As it is becoming increasingly apparent that gene expression in individuai cells deviates substantially from the average behavior of cell populations (Raj and van Oudenaarden, 2008), new methods that provide accurate integer counts of mRNA copy numbers in individual cells are needed. Ideally, such methods should also reveal the intracellular locations of the mRNAs, as mRNA localization is often used by cells to spatially restrict the activity of RNA binding proteins (St Johnston, 2005). One of the methods sensitive
nih_exporter
Analysis of environmental stress response on the proteome level. Thousands of man-made chemicals are annually released into the environment by agriculture, transport, industries, and other human activities. In general, chemical analysis of environmental samples used to assess the pollution status of a specific ecosystem is complicated by the complexity of the mixture, and in some cases by the very low toxicity thresholds of chemicals present. In that sense, a proteomics approach, capable of detecting subtle changes in the level and structure of individual proteins
pubmed_abstracts
RPS3 induces maturation and activation of mouse BMDCs, THP-1 cells, and human DCs {#Sec15} --------------------------------------------------------------------------------- To confirm the effects of RPS3 which binds to TLR4, we used recombinant RPS3 from E.coli in all experiments due to productivity and convenience. Firstly, we determined the effects of RPS3 on mouse BMDCs by characterizing the expression of pro-inflammatory cytokines and IFN-β. The levels of TNF-α, IL-1β, IL-6, IL-10, IL-12p70, and IFN-β were all significantly increased in a dose-dependent manner in DCs treated with RPS3 compared to untreated DCs (Fig. [2](#Fig2){ref-type="fig"}A). In addition, the expression levels of co-stimulatory molecules CD40, CD80, CD86, and MHC class I were also increased in DCs treated with RPS3 compared to untreated DCs (Fig. [2](#Fig2){ref-type="fig"}B). To evaluate the activation of signaling pathways, mouse BMDCs were treated with RPS3 in a time course over an hour. The levels of p-ERK, p-P38, and p-JNK and p-AKT were all found to be elevated (Fig. [2](#Fig2){ref-type="fig"}C). To assess NF-κB activation, we measured the degradation of the inhibitory IκB-α protein (Fig. [2](#Fig2){ref-type="fig"}C). The activation of DCS by RPS3 was carried out using protein purified from *E. coli* in such a way that endotoxins were removed from the preparation. As a negative control, GFP prepared in an identical manner was used; LPS was used as a positive control since it is a known TLR4 ligand. We assessed LPS contamination of the RPS3 protein preparation used to treat DCs and showed that it was not as a result of endotoxin contamination from *E. coli*. Treatment with polymyxin B (PMB) decreased the effects of LPS in DCs, whereas the effects of RPS3 in DCs were not affected but instead were decreased by proteinase K treatment (Additional File [2](#MOESM2){ref-type="media"}: Figure S4). These results indicate that RPS3 can induce the secretion of pro-inflammatory cytokines, increase the expression of co-stimulatory molecules, and activate signaling pathways in mouse BMD
pubmed_central
// Bail if there are no dependencies for some reason. if ( empty( $dependency_object->deps ) ) { return; } // Do the handle removal. foreach ( $dependency_object->deps as $dep_key => $handle ) { if ( in_array( $handle, $handles_to_remove ) ) { unset( $dependency_object->deps[ $dep_key ] ); $dependency_object->deps = array_values( $dependency_object->deps ); // "reindex" array $handles_updated = true; } } } } // If we have updated the handles, dequeue the relevant dependencies which // were enqueued separately Elementor\Frontend. if ( $handles_updated ) { wp_dequeue_script( 'elementor-dialog' ); wp_deregister_script( 'elementor-dialog' ); } } By modifying elementor-frontend before dequeueing elementor-dialog, we will not unintentionally dequeue elementor-frontend when we dequeue elementor-dialog. When testing this code, I inspected the $wp_scripts global (via wp_scripts()) to ensure that the desired results took effect. E.g. $scripts = wp_scripts(); print_r( $scripts ); Relevant part of $scripts before modification: ... [elementor-dialog] => _WP_Dependency Object ( [handle] => elementor-dialog [src] => http://example.com/wp-content/plugins/elementor/assets/lib/dialog/dialog.js [deps] => Array ( [0] => jquery-ui-position ) [ver] => 4.1.0 [args] => [extra] => Array ( [group] => 1 ) ) [elementor-frontend] => _WP_Dependency Object ( [handle] => elementor-frontend [src] => http://example.com/wp-content/plugins/elementor/assets/js/frontend
stackexchange
As described above, a laser control apparatus which can obtain a bias power corresponding to a bias power current value previously, and can set the bias power freely, can be provided. According to Claim 6 of the present invention, there is provided a laser control apparatus which controls a power of a semiconductor laser in an optical recording/reproducing apparatus for performing recording/reproduction into/from an optical disk by a semiconductor laser, comprising: a photodiode for detecting a light of the semiconductor laser; a current/voltage conversion circuit for converting a current of the photodiode into a voltage, and outputting the voltage; a reference voltage source for deciding a reproduction power of the semiconductor laser; an error amplifier for amplifying a difference between the output voltage of the current/voltage conversion circuit and the reference voltage; a current source for passing a current through the semiconductor laser; a reproduction power control system for connecting an output of the error amplifier to the current source, and controlling the reproduction power; a D/A conversion circuit for deciding a current to be passed through the semiconductor laser; a switch means for selectively switching between the output of the error amplifier and an output of the D/A conversion circuit, to make a control signal of the current source; an A/D conversion circuit for subjecting the output of the error amplifier to digital conversion; and an operation circuit for, in a period during which recording is not performed, outputting a digital signal to the D/A conversion circuit, reading changes in an output signal of the A/D conversion circuit, obtaining a change amount in power in respect to a change amount in the current of the semiconductor laser, and at the recording, outputting a digital signal value obtained in the period during which the recording is not performed, to the D/A conversion circuit. According to Claim 6 of the present invention, the laser control apparatus takes a correction between an A/D converter detecting a current control voltage at the reproduction and a D/A converter controlling a bias current at the recording, and even when full scales are different or offsets are present between the A/D converter and the D/A converter, the bias power can be set highly precisely. As described above, a laser control apparatus which, by taking a correction between an A/D converter detecting a current control voltage at the reproduction and a D/A converter controlling a bias current at the recording, can set a bias power highly precisely even when full scales are different or offset are present between the A/D converter and the D/
uspto_backgrounds
Drug use is a serious problem at HMP Chelmsford according to HM Inspectorate of Prisons (42.6% of prisoners failed drug tests) and organised gangs supply prohibited items. Inspectors describe, "significant concerns about safety" and excessive levels of violence, much of the violence is due to supply and use of prohibited substances. Overcrowding and under-resourcing are blamed. Peter Clarke said the rising violence, suicides, accessibility of drugs and bad living conditions made him consider using the Urgent Notification protocol, which would make the Justice Secretary take action. In one month, prison authorities seized £15,000 worth of illegal goods. There were 17 suicides at Chelmsford during the 8 years to 2018 and 5 of them were since the inspection in 2016. For examples of suicides, see Notable former inmates. Deborah Coles of Inquest said the prison was, "incredibly unsafe [the rate of suicides] suggests that the plethora of recommendations following previous self-inflicted deaths have not been implemented. Inquests repeatedly identify the same systemic failings with dismal regularity. Recent inquests into deaths at Chelmsford prison have highlighted failures around the management of self-harm procedures, a lack of staff training in mental health awareness, inadequate risk assessments and failures in responding to bullying. The failure to implement existing guidelines on the care of those at risk indicates a lack of care, neglect and inhuman treatment from punitive and often inflexible prison regimes." Coles urged the setting up of a national group to supervise how lessons from inquests and reports are carried out, the group to be accountable to Parliament. Problems inspectors drew attention to included that 40% of prisoners who did not take part in activities were locked in their cells for up to 22 hours a day and items including mattresses and pillows were in short supply. The Howard League for Penal Reform maintain Chelmsford was designed to hold 521 men but the prison actually held 700 men when it was inspected. Notable former inmates Ian Wright, former footballer Alfred George Hinds Warren Sampson, hanged himself in Chelmsford Prison on 4 September 2015. Sampson's mother contacted the prison hours before his death because she was worried about messages he had sent her but the prison failed to safeguard Sampson. The prison ombudsman said suicide and self-harm procedures, "did not operate fully effectively"
wikipedia_en
Finally, we turn to the apparent variations in the planet’s phase curve. From Figure \[fig:planet-phase-curve-var\_Analysis\_of\_Kepler76b\], variations in $A_{\rm cos}$ and $A_{\rm sin}$ amount to variations of about 40% in $A_{\rm planet}$ around a median value of $50.5 \pm 1.3$ ppm. Meanwhile, $\delta$ has a median value of $-9^\circ \pm 1.3^\circ$ (an offset east of the sub-stellar point) and swings between about $-40^\circ$ (an eastward offset) and $+20^\circ$ (a westward offset). Figure \[fig:Aplanet-delta-var\_Analysis\_of\_Kepler76b\] shows the range of $A_{\rm planet}$- and $\delta$-values, along with a linear fit which incorporated the per-point uncertainties in $A_{\rm planet}$ and $\delta$ [@boggs1990orthogonal]. The Kepler-76 system closely resembles the HAT-P-7 system – both have hot ($>$ 6,000 K) stars hosting large ($>$ 1 ${\rm M_{Jup}}$) short-period planets with observed [[*Kepler*]{}]{} secondary eclipses indicating dayside brightness temperatures $>$ 2,700 K. As discussed in Section \[sec:Introduction\], @2016NatAs...1E...4A applied a model similar to ours, searching for changes in the planet’s phase curve, finding statistically significant fluctuations in $\delta$ between about $6^\circ$ eastward and $9^\circ$ westward of the substellar point over timescales of tens to hundreds of days. That study then applied a model involving atmospheric transport of aerosols and found good qualitative agreement between the model and their observational results. Our results are qualitatively similar, although with much larger apparent swings in $\delta$. In addition, we were able to detect statistically significant variations in the planet’s phase curve amplitude, while @2016NatAs...1E...4A did not. Discussion and Conclusions {#sec:Discussion} ========================== As discussed in @2016ApJ...828...22P, the phase curve offset for an eclipsing planet arises, in part, from the competition between thermal emission from the hottest regions and reflection from highly refractive cloud regions on the dayside. Although the daysides of hot Jupiters like Kepler
arxiv
// 4 template<class Rt2, class R, class T, class B1, class B2, class B3, class B4, class A1, class A2, class A3, class A4, class A5> _bi::bind_t<Rt2, _mfi::BOOST_BIND_MF_NAME(mf4)<R, T, B1, B2, B3, B4>, typename _bi::list_av_5<A1, A2, A3, A4, A5>::type> BOOST_BIND(boost::type<Rt2>, R (BOOST_BIND_MF_CC T::*f) (B1, B2, B3, B4), A1 a1, A2 a2, A3 a3, A4 a4, A5 a5) { typedef _mfi::BOOST_BIND_MF_NAME(mf4)<R, T, B1, B2, B3, B4> F; typedef typename _bi::list_av_5<A1, A2, A3, A4, A5>::type list_type; return _bi::bind_t<Rt2, F, list_type>(F(f), list_type(a1, a2, a3, a4, a5)); } template<class Rt2, class R, class T, class B1, class B2, class B3, class B4, class A1, class A2, class A3, class A4, class A5> _bi::bind_t<Rt2, _mfi::BOOST_BIND_MF_NAME(cmf4)<R, T, B1, B2, B3, B4>, typename _bi::list_av_5<A1, A2, A3, A4, A5>::type> BOOST_BIND(boost::type<Rt2>, R (BOOST_BIND_MF_CC T::*f) (B1, B2, B3, B4) const, A1 a1, A2 a2, A3 a3, A4 a4, A5 a5)
github
The workers had been on strike since walking off their jobs last August. Late last month a judge ruled that the company had violated labor law and ordered the workers reinstated with back pay to May 6. The workers returned to their jobs last week, but on the same day, Stella D’oro announced it was shutting the factory in three months because the union had failed to make any meaningful concessions that would stop the company from losing money. The union is also seeking to reopen negotiations over both the expired collective bargaining agreement and Stella Doro officials’ decision to close the plant and relocate production. “The company cannot simply ignore the decision of a federal administrative law judge and it cannot punish the workers at Stella D’oro for exercising their rights under law,” said Joyce Alston, president of Bakery, Confectionery, Tobacco Workers and Grain Millers Local 50. Calls to Stella D’oro, Brynwood and their attorney, Mark Jacoby, were not returned. The company released a statement last week charging union leadership with failing to grasp that “any business that cannot operate profitably must seek changes that will enable it to do so.” Elbert Tellem, the assistant regional director of the NLRB, confirmed the union’s filings, but would not otherwise comment. Labor lawyer Michael Weber, a senior partner at Littler Mendelson, said the workers’ attempt to link the closing to union activity was not surprising. “They could argue it, but if the company can show legitimate business reasons for their actions, they have every right to go where they can operate profitably,” he said. The former regional director of the NLRB, Dan Sullivan, said that because Stella D’oro indicated that it was not going out of business completely and would continue to produce products after the shutdown, the union may have a case. “They have to prove the reason for closing was union activity and not, as the employer says, economic motivation,” he said. He said the union would likely point to the timing of the plant closing announcement, which occurred soon after the judge’s decision, and that the company would continue to stand by the position that it was losing money. A spokesman for Mayor Michael Bloomberg said the mayor appointed a mediator in April, but that the two sides were unable to resolve their differences. He said the tax abatements Stella D’oro received are available to any business that builds
pile-cc
Let s = 423/8 + -117/2. Let l = 734 + -2231/3. What is the common denominator of s and l? 24 Let l = 66 - 56. What is the least common multiple of 14 and l? 70 Let w = -16 + 32. What is the common denominator of -61/5 and (3/w)/((-6)/100)? 40 Let o(b) = -12*b + 1. Let u be o(-7). Suppose 5*v - u = 85. What is the lowest common multiple of v and 6? 102 Let f be (-1 - 33) + (0 - -1). What is the common denominator of (-2)/(-3) - (-64)/f and -31/8? 88 Let z = 1277 + -7693/6. Calculate the common denominator of z and 19/22. 66 What is the lowest common multiple of 45 and (100/(-30))/(1/(-18))? 180 Let h be 6987 + (-4)/(-2) + -1. Let q = -42061/6 + h. Calculate the common denominator of q and (-3)/(-12) - 82/24. 6 Let d be ((8/2)/(-4))/1667. Let u = d + -38323/30006. What is the common denominator of u and (-1)/(-4) - 54/16? 72 Let k be 2/(-4) - 196/(-8). Let f = -14 + k. Let i = f - 5. What is the least common multiple of 9 and i? 45 Calculate the least common multiple of 8 and (-1 + 2)/((-4)/(-44)). 88 Let h(m) = m**3 + 11*m**2 + 8*m + 7. What is the lowest common multiple of h(-10) and 2? 54 Let r(s) = -2*s - 6. What is the smallest common multiple of 20 and r(-10)? 140 Let q be 6/27 - (-248)/18. Calculate the smallest common multiple of ((-2)/4)/(6/(-264)) and q/(-35)*-7*5. 154 Let g = -690769/44 - -15697. What is the common denominator of -23/48 and g? 528 Let w(
dm_mathematics
Mark, The guaranty you are providing to Engage Energy Canada should cover both ECC and ENA although should only reference the Master Firm Contract between ECC and Engage Canada. Dan has been working on a separate guaranty that will reference the Master Contract between ENA and Engage US that is currently being drafted. The reason ENA is included on the guaranty for Engage Canada is because of business done at Dawn
enron_emails
Robert A. Butterworth, Atty. Gen., and Jorge Espinosa, Asst. Atty. Gen., for appellee. Before HUBBART, NESBITT and JORGENSON, JJ. PER CURIAM. The defendant, Miguel Angel Fernandez, appeals from a final judgment of conviction and sentence of life imprisonment for burglary of a structure with an assault or battery with a firearm, robbery with a firearm, and kidnapping with a firearm. We affirm the judgment of conviction. However, because the trial court erred in applying the sentencing guidelines, we remand for resentencing within the guidelines range. First, we hold that the trial court did not err in excluding as hearsay two out-of-court statements relating to defendant's alibi defense. No offer of proof was made to indicate what the excluded evidence would have revealed. The Florida Evidence Code, Section 90.104(1)(b), Florida Statutes, provides: (1) A court may predicate error, set aside or reverse a judgment, or grant a new trial on the basis of admitted or excluded evidence when a substantial right of the party is adversely affected and: * * * * * * (b) When the ruling is one excluding evidence, the substance of the evidence was made known to the court by offer of proof or was apparent from the context within which the questions were asked. "It is axiomatic that failure to proffer what the excluded evidence would have revealed precludes appellate consideration of the alleged error." A.McD. v. State, 422 So.2d 336, 337 Fla. 3d DCA 1982) (citations omitted). Although we assume that the testimony would have been favorable to the defendant, we cannot speculate as to what that testimony would have been. See A.McD., 422 So.2d at 336. ("The bare question, `Have you ever been subject to any disciplinary investigations?' provides no insight as to its relevancy."); Woodson *439 v. State, 483 So.2d 858, 859 (Fla. 5th DCA 1986) ("The witness' response was not `apparent' from the context of the question.") The absence of proffer in the present case precludes our review of the alleged error. Because Fernandez does not contend that the answers sought from Officer Vermillion were also inherent in the questions asked, the absence of proffer precludes our review of that alleged error as well. Second, no error occurred when John Kastrenakas, the
freelaw
Even though larger sensors will be beneficial, at some point the small sensor will be good enoug for 99% of consumers, though professionals will still prefer the larger sensor. >Will smartphones be able to include much larger sensors in the future? Perhaps, like Nokia pureview did - however that phone is slightly larger than the average smartphone. >Is there some new physics that obviates the need for a large sensor? No, but technology will advance so that small sensors will be sufficiently good to 99% of consumers. There's progress in sensor technology ever year. There's also progress on the processor side, which has been/is apparently a bottleneck, as new processors in DSLR cameras enable better image quality (take for example DIGIC processors). ------ pkteison I'm really impressed by the timeline on the article. Appears to be implemented with <https://github.com/athletics/infostory> ; anybody know if this was this custom made just for Forbes, or even just for this article? Seems like a ton of effort for a small detail, but it really enhanced the article for me. Edit: Better googling yields this article which talks a little bit about the timeline, so definitely not just for the article: [http://www.forbes.com/sites/lewisdvorkin/2012/09/13/inside-f...](http://www.forbes.com/sites/lewisdvorkin/2012/09/13/inside- forbes-our-journey-from-website-to-platform-a-2-year-interactive-timeline/) ~~~ jellisnyc Hi, I'm one of the partners at Athletics. We originally developed the timeline custom for Forbes and have wanted to push this a bit further at some point, hence the repo. Really glad you liked it. Where credit's due: The Forbes team developed the GoPro feature using our toolkit as a starting point. (We did the timeline in Lewis D'Vorkin's post that you referenced.) ------ morefranco Awesome post - really interesting to see the evolution and how it was all started without the help of sites like Kickstarter (seems like that's where they would have started if the GoPro was
hackernews
Temporal and spatial expression of laminin (LN) isoforms is critical to glomerular development and contributes to altered cell function in diabetic nephropathy and other progressive renal diseases. Yet, little is known about the mechanisms that regulate LN isoform expression. We propose that insulin-like growth factor binding protein-5 (IGFBP-5) leads to formation of a filamin-based nuclear shuttle that binds transcription factors (e.g. sox9, GKLF, Sp1, Smad) and
nih_exporter
Morphogenesis of the "immature symmetric embryonic aortic arches" into the "mature and asymmetric aortic arches" involves a delicate sequence of cell and tissue migration, proliferation, and remodeling within an active biomechanical environment. Both patient-derived and experimental animal model data support a significant role for biomechanical forces during arch development. The objective of the present study is to quantify changes in geometry, blood flow, and shear stress patterns (WSS) during a period of normal arch morphogenesis. Composite
pubmed_abstracts
Literature review provided no references of human amniotic membrane used as a biologic dressing to aid reconstruction of the nose. Evidence demonstrating efficacy in epithelialization and pain reduction along with anti-inflammatory and anti-scarring properties pointed to human amniotic membrane as an ideal option for nasal reconstruction \[[@rjw174C6]--[@rjw174C8]\]. This case report presents a patient in which dehydrated human amniotic membrane (EpiFix; MiMedex Group, Inc., Kennesaw, GA) was used to facilitate healing of the lower third of the nose. Case Presentation {#rjw174s2} ================= A 56-year-old male presented status post assault with human bites to the tip of his nose, left ala, right ear and first digit of his left hand. He denied nasal obstruction and no facial fractures were associated. He denied of consciousness and reported no other trauma. Past medical history was significant for hypertension controlled with Lisinopril, diet and exercise. Patient denied tobacco and illicit drug use but reported occasional alcohol use. Physical exam revealed a well-developed, well-nourished adult Caucasian male in no acute distress. There was a 22 × 18 mm full thickness skin and subcutaneous tissue defect present on the nasal tip. The columella and left ala were similarly involved. The perichondrium and nasal cartilage remained intact and undamaged. Nasopharyngoscopy with a zero degree nasopharyngoscope revealed a slight right septal deviation without evidence of intranasal trauma, discharge or mucosal bleeding. Involvement of the patient\'s right auricular pinna was very superficial and treatment was deferred. No facial lacerations, bony abnormalities or palpatory tenderness was appreciated. Facial weakness and neurologic deficits were also no appreciated. Bilateral involvement of the hands and upper extremities also appeared very superficial and treatment was deferred. Debridement of the nasal tip and adjacent structures was performed using standard sterile technique and local anesthesia. The defect measured 25 × 20 mm following debridement and the perichondrium and nasal cartilage was confirmed intact and without evidence of disease or injury. Dehydrated human amniotic membrane was fashioned to the dimensions of the defect and affixed to the wound. The allograft did not overly the native integument. Suture fixation was deferred. Sterile wet to dry dressing was applied and the patient was instructed to avoid recurrent trauma to, and washing of,
pubmed_central
First, a simple UDP receiver class. public class BaseUdpReceiver { private UdpClient _udpClient; public BaseUdpReceiver() { } public void Start() { _udpClient = new UdpClient() { ExclusiveAddressUse = false, EnableBroadcast = true }; _udpClient.Client.SetSocketOption(SocketOptionLevel.Socket, SocketOptionName.ReuseAddress, true); _udpClient.Client.Bind(new IPEndPoint(IPAddress.Any, Constants.Network.SOME_CONSTANT_PORT_INTEGER)); _udpClient.BeginReceive(OnUdpDataReceived, _udpClient); Debug.WriteLine($">>> started receiving"); } private static void OnUdpDataReceived(IAsyncResult result) { Debug.WriteLine($">>> in receive"); var udpClient = result.AsyncState as UdpClient; if (udpClient == null) return; IPEndPoint remoteAddr = null; var recvBuffer = udpClient.EndReceive(result, ref remoteAddr); Debug.WriteLine($"MESSAGE FROM: {remoteAddr.Address}:{remoteAddr.Port}, MESSAGE SIZE: {recvBuffer?.Length ?? 0}"); udpClient.BeginReceive(OnUdpDataReceived, udpClient); } } Then, the code in App.xaml.cs which uses this class. public partial class App : Application { private BaseUdpReceiver _udpReceiver; public App() { InitializeComponent(); DependencyService.Register<MockDataStore>(); MainPage = new MainPage(); _udpReceiver = new BaseUdpReceiver(); _udpReceiver.Start(); } protected override void OnStart() { } protected override void OnSleep() { } protected override void OnResume() { } } version info Visual Studio 2019 Enterprise v16.4.5 Xamarin 16.4.000.322 (d
stackexchange
The preamble of the IEEE 802.11 data packet is used by the receiver to initiate spreading code synchronization is always transmitted as the DBPSK wave form. This permits all receivers to identify the transmitted waveform and, if the receiver is capable, switch to a higher rate mode of operation for interaction a particular WLAN device. The header of an IEEE 802.11 data packet which includes a cyclic redundancy check code, a packet payload transmission rate indicator, and payload length signal may be transmitted as either a DBPSK or DQPSK waveform. To achieve higher data rates, the IEEE 802.11b revision adopts Complementary Code Keying (CCK) to replace the 11-chip Barker sequence for modulating data packet payloads. Complementary codes or binary, complementary sequences are polyphase codes comprising a pair of equal finite length sequences having the property that the number of pairs of like elements with any given separation in one series is equal to the number of pairs of unlike elements with the same separation in the second series. As a set, these code sequences have unique mathematical properties that facilitate distinguishing between code words at the receiver even in the presence of substantial noise and multipath interference. For an 11 Mbits/s data rate the information data stream is divided into eight bit segments. The values of six of the data bits are used to generate one of 64 unique subcodes. The values of the two remaining data bits are used to select one of the DQPSK phases for rotating the selected subcode producing 256 possible codewords for transmission. Systems operating in the 5.5 Mbits/s mode use two data bits to generate one of four subcodes and two bits are used to select one of the four DQPSK phases. With a symbol rate of 1.375 Msymbols/s, an eight chip spreading code, and a chipping rate of 11 MHz the high data rate waveform occupies approximately the same bandwidth as that of the 2 Mbits/s DQPSK waveform of the lower rate systems. As a result, the ISM band is sufficiently wide for three non-overlapping higher data rate channels promoting interoperability of the lower and higher data rate systems. In a receiver, the “as received” analog signal is converted to a digital signal and correlation is used to strip the PN or spreading code from the digital signal. In the CCK modes utilized by the higher data rate systems, a bank of correlators followed by a largest correlation value detector is used to detect the modulation. The CCK codewords
uspto_backgrounds
JavaOS is an operating system with a Java virtual machine as a fundamental component, originally developed by Sun Microsystems. Unlike Windows, Mac OS, Unix, or Unix-like systems which are primarily written in the C programming language, JavaOS is primarily written in Java. It is now considered a legacy system. History The Java programming language was introduced by Sun in May 1995. Across the following six months, the Java platform and its ideas propagated through the world. Jim Mitchell and Peter Madany at JavaSoft designed a new operating system, codenamed Kona, written completely in Java. In March 1996, Tom Saulpaugh joined the now seven person Kona team to design an I/O architecture, having come from Apple as Mac OS engineer since June 1985 and co-architect of Copland. JavaOS was first evangelized in a Byte article. In 1996, JavaSoft's official product announcement described the compact OS designed to run "in anything from net computers to pagers". In early 1997, JavaSoft transferred JavaOS to SunSoft. In late 1997, Bob Rodriguez led the team to collaborate with IBM who then marketed the platform, accelerated development, and made significant key architectural contributions to the next release of JavaOS, eventually renamed JavaOS for Business. IBM indicated its focus was more on network computer thin clients, specifically to replace traditional "green screen" and UNIX terminals, and to implement single application clients. The Chorus distributed real-time operating system was purchased for its microkernel technology. JavaSoft has granted licenses to more than 25 manufacturers, including Oracle Corp, Acer Inc., Xerox, Toshiba Corp, and Nokia. IBM and Sun announced the cooperation for JavaOS for Business at the end of March 1998. In 1999, Sun and IBM announced the discontinuation of the JavaOS product. As early as 2003, Sun materials referred to JavaOS as a "legacy technology", recommending migration to Java ME, leaving the choice of specific OS and Java environment to the implementer. Overview JavaOS is based on a hardware architecture native microkernel, running on platforms including ARM, PowerPC, SPARC, StrongARM, and IA-32 (x86). The Java virtual machine runs on top of the microkernel. All device drivers are written in Java and executed by the virtual machine. A graphics and windowing system implementing the AWT API is also written in Java. JavaOS was designed to run on embedded
wikipedia_en
Limit theorem {#sec:limit_th} ============= In this section, we present a limit theorem of the QW as $t\to\infty$ by using the Fourier analysis which is one of the standard methods to derive limit theorems of the QWs [@Konno2010; @Machida2011; @InuiKonnoSegawa2005; @InuiKonno2005; @SegawaKonno2008; @KonnoMachida2010; @ChisakiKonnoSegawaShikano2011; @GrimmettJansonScudo2004]. The long-time limit theorem plays an essential role to draw asymptotic behavior of the QW after many steps. The time evolution of the QW provides the Fourier transform $\ket{\hat{\Psi}_{t}(k)}=\sum_{x\in\mathbb{Z}} e^{-ikx}\ket{\psi_t(x)}\,(k\in\left[-\pi,\pi\right))$, the relation $\ket{\hat{\Psi}_{t+1}(k)}= \hat U(k)\ket{\hat{\Psi}_{t}(k)}=\hat U(k)^t \ket{\hat\Psi_{0}(k)}$ , where $\hat U(k)=(e^{ik}\ket{0}\bra{0}+e^{-ik}\ket{1}\bra{1})U$. After straightforward calculation by the Fourier analysis, for $r=0,1,2,\ldots$, we get $$\begin{aligned} \lim_{t\to\infty}\mathbb{E}\biggl[\biggl(\frac{X_t}{t}\biggr)^r\biggr]=&\int_{0}^{\pi} \frac{dk}{2\pi} h(k)^r\,\biggl[\biggl\{\left|\braket{v(k)|\hat\Psi_0(k)}\right|^2+\left|\braket{v(-k)|\hat\Psi_0(-k)}\right|^2\biggr\}\nonumber\\ &+(-1)^r\biggl\{\left|\braket{\overline{v(\pi-k)}|\hat\Psi_0(k)}\right|^2+\left|\braket{\overline{v(\pi+k)}|\hat\Psi_0(-k)}\right|^2\biggr\}\biggr],\end{aligned}$$ where $$\begin{aligned} h(k)=&\frac{c\cos k}{\sqrt{
arxiv
function inString(stream, state) { var escaped = false, next; while (next = stream.next()) { if (next == '"' && !escaped) { state.tokenize = base; break; } escaped = !escaped && next == "\\"; } return "string"; } function inComment(stream, state) { var next, last; while (next = stream.next()) { if (next == "#" && last == "|") { state.tokenize = base; break; } last = next; } type = "ws"; return "comment"; } return { startState: function () { return {ctx: {prev: null, start: 0, indentTo: 0}, tokenize: base}; }, token: function (stream, state) { if (stream.sol() && typeof state.ctx.indentTo != "number") state.ctx.indentTo = state.ctx.start + 1; type = null; var style = state.tokenize(stream, state); if (type != "ws") { if (state.ctx.indentTo == null) { if (type == "symbol" && assumeBody.test(stream.current())) state.ctx.indentTo = state.ctx.start + config.indentUnit; else state.ctx.indentTo = "next"; } else if (state.ctx.indentTo == "next") { state.ctx.indentTo = stream.column(); } } if (type == "open") state.ctx = {prev: state.ctx, start: stream.column(), indentTo: null}; else if (type == "close") state.ctx = state.ctx.prev || state.ctx; return style; }, indent: function (state, _textAfter) { var i = state.ctx.indentTo; return typeof i == "number" ? i : state.ctx.start + 1; }, lineComment: ";;", blockCommentStart: "#|", blockComment
github
NU said it expects that 40 of its affected IT employees will be rehired by the outsourcers "and will still work at NU facilities." In response to their lobbying efforts, several Connecticut legislators in 2003 introduced a series of bills to limit H-1B visa use, arguing that it was being used to transfer jobs overseas. The efforts were unsuccessful and eventually the Connecticut organization that fought visa use disbanded. Utility jobs had been considered among the more stable in Connecticut, at least until NU merged last year with Boston-based utility NStar. Company officials at the time told regulators and lawmakers that the merger would lead to savings. Once word leaked out last month that NU was considering offshore outsourcing in its IT department, state lawmakers responded. "Shipping these good-paying jobs away will not just hurt Connecticut's economy, but it could also pose a serious security threat," said State Rep. Joe Aresimowicz, a Democrat and House majority leader, in a statement last week. Connecticut's unemployment rate is at 8.1%, the 35th highest in the nation, and the state's labor pool has seen a slight decline in size this year. In a statement today, NU said: "We spent a great deal of time over the last year studying our combined, post-merger IT department and determined we had two very distinct business models - neither of which was best practice when compared with current IT models. In order to meet customer expectations and deliver the latest IT solutions, we have designed one integrated, forward-looking, technology-savvy organization." NU said the transition will begin in November and will last through June of 2014. The utility is offering employees a voluntary separation package. John Miano, a programmer and attorney who founded the Programmers Guild, said that when he started following IT offshoring in mid-1990s, "most of the (news) coverage was over incidents like this (NU's move) and there was shock." Now, most of the H-1B news coverage is about how bringing in more H-1B workers will create jobs, said Miano. "The sad thing is these companies don't save any money doing this," said Miano. "The problem is there is no management consulting dollars for telling people the risks and why nots of offshoring." Patrick Thibodeau covers SaaS and enterprise applications,
pile-cc
Let u = 216 + 27. Let q be u/36 + -6 + 13/4. Solve -q = -6*c - 34 for c. -5 Let g = -54 + 76. Suppose -4*x - 14 = -g. Suppose 5 = 3*r - 4, 0 = 4*m - x*r - 2. Solve i = -i + m for i. 1 Let u(s) = -2*s**2 - 7*s - 3. Let j be u(-7). Let x = -59 - j. Let v = 19 + x. Solve -v = 4*i - i for i. -4 Let v(u) = -u**2 - 11*u + 22. Suppose 0 = -4*p - p - 65. Let o be v(p). Let z = o + 10. Solve t = -3 + z for t. 3 Let c = -2 + 4. Suppose -3*b + c + 4 = 0. Let u = 1560 + -1555. Solve b*t = u*t for t. 0 Let t(v) = v**2 - v - 5. Let u be t(-3). Suppose -3 = -5*z - 5*w + u, z - 4 = w. Suppose -7*f + 8 = -z*f + 3*r, -2*f - r + 6 = 0. Solve -10 = -0*p - f*p for p. 2 Let f(g) = -78*g + 4. Let c be f(0). Solve -4*x + c = -3*x for x. 4 Suppose -7*a + 41 = 20. Suppose -c = 2*z - 11, 6*c + 39 = 10*c + a*z. Solve -c*i - 10 = -11*i for i. 5 Suppose -w + 2 + 12 = 4*f, f - w - 1 = 0. Suppose 0 = -p - 5*n + 3*n - f, -2*n = -3*p + 15. Solve 0 = p*r - 9 - 6 for r. 5 Suppose -34*g + 41*g = 35. Suppose g*j = -4*w +
dm_mathematics
"Shankster JL (Luther)" <[email protected]> on 01/02/2001 08:47:36 AM To: "'[email protected]'" <[email protected]> cc: "'Lamphier, Gary'" <[email protected]> Subject: RE: January Nominations at Shell Deer Park Mary, We have a
enron_emails
RIDGE, District Judge. On reconsideration of a Division No. 5 order favorable to petitioners' application for a certificate of convenience and necessity as a contract motor carrier, the Interstate Commerce Commission (two members dissenting and one member not participating) found "that applicants (petitioners) * * * have failed to show that the proposed operation will be consistent with the public interest and the national transportation policy, and that the application should be denied." Petitioners brought the instant review action to annul, set aside and enjoin said order. We have jurisdiction in the premises by virtue of Sections 1336, 1398, 2284, and 2321-2325, Title 28, U.S.C.A. In their complaint, petitioners allege that the report and order of the I.C.C. so entered is unjust, arbitrary, unreasonable and without any basis in fact or law, in that the I.C.C. erroneously (a) considered a certificate of convenience and necessity of Frozen Food Express, a protesting motor carrier in the proceeding, which was issued subsequent to the date of filing of petitioners' *818 application with the Commission; (b) considered the operating authority of Frozen Food Express and Refrigerated Transport, Inc., when said carriers did not petition for reconsideration of the Division No. 5 order; (c) considered the operating authority of Refrigerated Transport a protesting motor carrier which was not placed in the record; (d) and the operations of Refrigerated Transport thereunder when that motor carrier submitted no evidence as to its fitness, operations and equipment, to reasonably provide the supporting shipper with adequate motor carrier service; (e) considered a trip-lease arrangement of Frozen Food and Refrigerated Transport when the agreement relating thereto was not in the record before the Commission; (f) and was in fact shown to be an illegal operation by said motor carriers; (g) in incorrectly interpreting and construing the scope of operating authority of Frozen Food as a common carrier; (h) and failed to consider petitioners' challenge of the Examiner's qualifications that heard and granted the application of Frozen Food for such authority; (i and j) considered rail service as being direct and adequate to meet the particular needs of the supporting shipper when no evidence was offered by rail protestants and connecting rail carriers in respect to their willingness and ability to meet the particular needs of such shipper; and (k) in not finding as matter of law that the supporting shipper
freelaw
1) How often are changes made to these CSS files? It seems to me that caching would be far more crucial than any marginal benefit of this practice. Also, what of allowing multiple CSS files to download in parallel via multiple <link> tags? [nitpicking from here out] 2) Why does his minify code remove all whitespace and then remove whitespace before '{' and after ':'? They're already gone. 3) Removing all whitespace makes the assumption that no whitespace is necessary. This will completely break, among other things, font-family: "Some Embedded Font"; ~~~ legierski 1) CSS on dev setup changes very often. Limiting number of <link>'s was one of the goals. 2) It does not. The ' ' is actually a double space. 3) Point 2) ~~~ stinky613 Ahh double space, that makes much more sense. Sorry for not looking more closely before posting. ------ true_religion I've done this before and its far from the best way. Pre-compilation is better and is CDN safe out-of-the-box. ------ Nikkau So on the fly you open tons of text files to glue them? Seems i/o intensive. Why not do the same thing on deploy? ~~~ speg _We’ll introduce server-side caching in the future, but a goal of this script was to provide users with the latest CSS/JS at all times..._ ~~~ inportb Surely, it would be acceptable to microcache for a few seconds? It's rather easy, with nginx in front. ------ brittohalloran Rails 3 asset management / precompiling FTW ------ pie Better than what? This doesn't mention any of the other asset management tools out there. ~~~ legierski Better than using only one file with all css inside ------ prisonguard out of topic but couldn't help noticing shorthand php tags <?= ?> these make me cringe ~~~ aasarava Why? If your server is running PHP and you're not worried about confusion with some other language processor, then why not
hackernews
The proposed study, the Mexican Health and Aging Study-II (MHAS-II), aims to design and field the 3rd and 4th waves of survey data collection in Mexico. The two waves will be fielded in 2012 and 2014, eleven years after the two previous waves funded by NIA/NIH were fielded in 2001 and 2003. Funds are sought also to archive, document, and disseminate for public use the 3rd and 4th rounds as well as the resulting integrated
nih_exporter
Intrauterine levonorgestrel delivered by a frameless system, combined with systemic estrogen: acceptability and endometrial safety after 3 years of use in peri- and postmenopausal women. To evaluate the acceptability and endometrial safety of a novel intrauterine drug delivery system, FibroPlant-levonorgestrel (LNG), combined with estrogen therapy (ET) in 150 peri- and postmenopausal women, followed-up for at least 3 years. This was a
pubmed_abstracts
![Carinityla punctulata Sheng & Sun, sp. n. **1--6**: Female. **1** Body, lateral view **2** Face **3** Vertex **4** Pronotum laterally **5** Mesopleuron **6** Propodeum. **7--9**: male. **7** Body, lateral view **8** Median portion of flagellomeres and tyloids **9** Propodeum.](ZooKeys-073-061-g001){#F1} #### Description. Female. Body length 9.3 to 9.7 mm. Fore wing length 7.2 to 7.8 mm. Ovipositor length about 2.8 mm. Head and mesosoma with dense punctures and long yellowish brown hairs. #### Head. Face ([Figure 2](#F1){ref-type="fig"}) convex, approximately 2.2 times as wide as long, with dense, irregular punctures, median portion with short longitudinal wrinkles. Clypeal suture vestigial between clypeal foveae. Clypeus slightly convex, basal portion with punctures sparser than on face, subapically with shallow transverse concavity; apical portion smooth and impunctate, distinctly raised medially. Subbasal portion of mandible with short longitudinal wrinkles, apical portion with sparse shallow punctures; upper tooth distinctly longer than lower tooth. Cheek and gena with dense punctures, distance between punctures 0.2 to 0.5 times diameter of puncture. Subocular sulcus distinct. Malar space 0.4 to 0.5 times as long as basal width of mandible. Gena slightly convergent backward, in dorsal view 0.7 to 0.8 times as long as width of eye. Vertex ([Figure 3](#F1){ref-type="fig"}) with dense punctures. Postero-ocellar line about 0.44 times as long as ocular-ocellar line. Frons approximately flat, with even and dense punctures, distance between punctures 0.2 to 0.5 times diameter of puncture. Antenna distinctly shorter than body length, with 27 flagellomeres, ratio of length of flagellomere 1:2:3:4:5 is 3.7:4.1:4.0:4.0:3.9. Flagellomeres 10 to 11 (12) of male
pubmed_central
They've been going out a week; I mean, that's not (a) serious (relationship). I wondered if she was speaking correctly, which is presumable, since she was a native American English speaker. But more often I here the for when people talk about duration. So is it also possible to leave out for? Maybe only in the informal register? EDIT: There was a heavy stress on the word week. Does it play a role in this matter? EDIT#2: ... OK. It's more suitable as an answer. A: Short answer: I would say that for can be omitted, but everyone may not agree with me. Its felicity may depend on context. My answer focuses on the question you overheard, but my comments apply also to the question in your title ('I've been doing this (for) a week'). As a native speaker (AmE), I tend to think that whether for is necessary depends on the construction, context, and current usage, as well of course on the speaker's dialect or idiolect. I certainly would rarely say [Can you] wait for a second/a minute, I need to tie my shoe. I would omit for in the sentence above. This is true whether I express it as an imperative (not using can you) or a question. Ngrams seems to back me up on this: A search using second in both phrases returns a flat line (comparatively zero results) for the expression with for. Another construction where the omission of for seems well suited is I'm gone ten minutes/two days and (come back) and this is what happens? Again, a short(er) period of time seems to work better here. Thus They've been going out a week and this is what happens? seems fine. As for the original sentence They've been going out a week; I mean, that's not (a) serious (relationship), in general, it might sound better with some qualifier such as only or now: They've been going out a week now; I mean, that's not (a) serious (relationship). You know, a lot depends on delivery (how it is said). If it is said with no stress on any word or meaningful pauses in delivery, it seems a
stackexchange
As illustrated in the timing chart shown in FIG. 1, for example, in shading correction performed during the non-stop DF operation in accordance with the known technique described above, an instruction to perform a carriage operation is issued after the setting of a carriage driving operation and the setting of a reading operation for shading correction are performed after a time point t1 at which the reading operation of a previous document is completed. That is, the image reading device receives a reading preparation request from a controller (D1), sends a memory request to the controller (D2), and receives a memory access permission notification from the controller (D3). Thereafter, at the time point t1 at which the reading operation of the previous document is completed, the image reading device starts a pre-reading DF shading correction. Then, at a time point t2 at which the pre-reading DF shading correction is completed, the image reading device starts the reading operation of the next document. Further, at a time point t3 at which the next document is moved outside an image effective range, the image reading device completes the reading operation. According to the timing illustrated in FIG. 1, the sheet feeding operation of the next document starts after the completion of the reading operation of the previous document and before the completion of the sheet feeding operation of the previous document in the DF reading operation. Further, the DF document feeding operation is completed when the sheet feeding operation of the next document is completed. According to the above-described timing, the time TD between the previous document and the next document in the non-stop successive sheet feeding operation corresponds to the sum of a processing time Ts of the DF shading correction and a preparation time Tp for the DF shading correction, and represents a pre-reading DF shading correction time. The time TD is represented as the following equation:TD=Tp+Ts  (1)The time TD is also represented as the following equation:TD=t2−t1  (2) It is to be noted that productivity is determined by the processing time, that is, the shorter the processing time the greater the productivity. However, the way in which known apparatuses including that described above operate makes it difficult to reduce the processing time and improve the productivity, for reasons which are discussed in greater detail below. FIG. 2 is a detailed timing chart illustrating the above-described time TD. As can be observed from the drawing, the preparation time Tp for the DF shading correction corresponds to the sum
uspto_backgrounds
History and impact People Water builds wells and provides clean water for people in countries such as Nicaragua, India, Ghana, and Haiti. The company's first project was based in Nicaragua in a village called Taquezal where they repaired and built wells. After the success of their first mission, the company went onto multiple cities and villages in the other countries listed above. There were two projects completed across the country of Ghana, Africa that affected 750 people. The Haiti well project, finished on September 20, 2012, directly affected 7,150 people. In April 2012 People Water named Ken Bretschneider, an entrepreneur and business executive, the new CEO in hope to bring in stronger leadership and expand the company. More recently People Water has done fundraising in attempt to provide typhoon victims in the Philippines with clean water. The bottle People Water emphasizes the structure and design of their bottles. What they call "The Anatomy of the Bottle" has nine main components. The first and second components can be found at the very top of the bottle. First, is the screw on cap and the second is the thumbprint that is placed on the top of the cap. People Water says that the thumbprint is there to represent humanity and show each person as an individual. Components three through seven can all be found on the body of the bottle. The third of these is the “Drop for Drop” slogan printed around the top of each bottle. Fourth, is replacing the “O” in the word bottle with recycling logo reminding drinkers to recycle their bottle. The fifth component is a QR Code that the customer can scan with a smart phone. Upon scanning the customer can see which project they are helping to fund. Sixth is making a bottle that is eco-friendly and seventh is simply putting the company name “People” on the bottle. The last two components actually have to do with the water itself. Eighth, People Water states that they only use 100% natural spring water. The final component is that the water remains Bisphenol A (BPA) free. The bottles come in two different sizes, and a . Marketing Much of the marketing includes the use of social media. People Water can be found on Facebook, Twitter, and Instagram. Many videos have been taken of various projects and placed on the People Water website for viewing. Also, People Water was voted and chosen to be the official bottled water for the 2014 People's Choice Awards. Products Water
wikipedia_en
Stellar clusters are known as good ‘laboratories’ for studying member stars. By fitting isochrones, one can obtain distance, age and sometimes get information on metallicity of a cluster. Our project is focused on finding open clusters rich in pulsating B-type stars and subsequent seismic modeling of their members by means of ensemble asteroseismology (hereafter EnsA). EnsA takes advantage of the common parameters of the members of a cluster (e.g. age and metallicity) to put additional constraints on seismic models of member stars. It is applicable to open clusters rich in massive pulsating stars. The most promising are $\beta$ Cep stars for which many interesting results were already obtained by means of seismic modeling [e.g. @Aerts2003; @Pam2004; @Dup2004; @Dasz2010]. One of the best candidates for application of EnsA is NGC6910 [@Kol2004], for which pulsation parameters were obtained as a result of the international observational campaign [@Pig2008; @Sae2010]. In the era of nano-satellites, new possibilities of seismic studies of stars belonging to bright, nearby star clusters occured. An example is $\alpha$ Per open cluster. ![Variable stars in the color-magnitude diagram of IC4996.[]{data-label="VarCMD"}](fig1-VarCMD){width="9cm"} New observations and results ============================ The results of the observations of NGC457 and preliminary results of the search for variable stars in IC1805 were published by [@Moz2014] and [@Moz2012], respectively. Recently, we performed also search for variable stars in another young open cluster, IC4996. Observations of IC4996 were made between 2007 and 2014 in Bia[ł]{}ków Observatory (Poland) during 50 observing nights. The observations were carried out with a 60-cm reflecting telescope with the attached CCD camera covering $13^\prime\times12^\prime$ field of view. About 7500 CCD frames were acquired through the $B$, $V$, $R$, $I_{\rm C}$ and narrow-band H$\alpha$ filters. We detected 81 variable stars (Fig. \[VarCMD\]), of which 71 are new. One new $\beta$ Cep star was found. In total, in three open clusters (NGC457, IC1805, and IC4996) we have detected 231 variables. Among the most
arxiv
/* Header describing `ar' archive file format. Copyright (C) 1996 Free Software Foundation, Inc. This file is part of the GNU C Library. The GNU C Library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. The GNU C Library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with the GNU C Library; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. */ #ifndef _AR_H #define _AR_H 1 #include <sys/cdefs.h> /* Archive files start with the ARMAG identifying string. Then follows a `struct ar_hdr', and as many bytes of member file data as its `ar_size' member indicates, for each member file. */ #define ARMAG "!<arch>\n" /* String that begins an archive file. */ #define SARMAG 8 /* Size of that string. */ #define ARFMAG "`\n" /* String in ar_fmag at end of each header. */ __BEGIN_DECLS struct ar_hdr { char ar_name[16]; /* Member file name, sometimes / terminated. */ char ar_date[12]; /* File date, decimal seconds since Epoch. */ char ar_uid[6], ar_gid[6]; /* User and group IDs, in ASCII decimal. */ char ar_mode[8]; /* File mode, in ASCII octal. */ char ar_size[10]; /* File size, in ASCII decimal. */ char ar_fmag[2]; /* Always contains
github
There certainly seemed to be Wednesday as students from the hosting Piñon Unified School District swept six of the 10 positions at the Chinle Agency Spelling Bee to qualify for the Navajo Nation Spelling Bee on March 13. Eighth-grade champion Catherine Lopez and runner-up Raquel Tom were from Piñon Middle School and Piñon Accelerated Middle School, respectively; seventh-grade champ Nykesha Nez was from Piñon Middle; and both the fifth- and fourth-grade champions, Chenoa Begaye and Latisha Mike, hailed from Piñon Elementary as did fourth-grade runner up Nigel James. Only the sixth-grade match, won by Cameron Fuller (home-schooled) with Cina Curley (Canyon de Chelly Elementary) as the runner-up, did not include a top finisher from Piñon. Chinle Elementary claimed the fifth-grade runner-up, Casey Jones, while the seventh-grade runner-up, Mikail Morgan, was from Chinle Junior High School. Even Piñon's elementary school sponsor, library technician Presilita Bia, was hard-pressed to explain her team's success. "It's only my second year as a sponsor, and these kids have only had a week and a half to study," she said, explaining that she was out sick most of December. "I gave some of them a word list, but they lost it." advertisements She did say the kids had good luck with words — a lot of the words used in Wednesday's bee had come up at the school's spelling bee as well. The bee also featured Chinle Agency's first home-schooled winner, Fuller, who was a force to be reckoned with last year, when she represented Mesa View Elementary and won the lower-grades round of the Navajo Nation bee. It was fortunate her parents, Greg and Regina Fuller, had pulled her out to home-school her this year, or she wouldn't have been able to compete; Mesa View didn't field a team this year. Greg Fuller said he and his wife, a nurse at Chinle's IHS hospital, were somewhat at a loss helping their precocious daughter study for the bee. "We couldn't find anyone who had entered a home-schooled child in the spelling bee," said Greg Fuller, a stay-at
pile-cc
What is the nearest to -2 in 4, -0.5, 0.3, 5, 277/6? -0.5 Which is the nearest to -0.1? (a) 0.1 (b) -207 (c) 12 (d) 0.3 (e) -10 a What is the closest to 1 in -5, -1, -1/13, -1/32, -4? -1/32 What is the closest to 1 in -1, -3, -79069, -0.3? -0.3 Which is the closest to -1? (a) -4 (b) 1/6 (c) -1 c Which is the closest to 1? (a) 819 (b) 4 (c) -1/3 c Which is the closest to -4? (a) 22 (b) -0.4 (c) 0.1 (d) 2/7 b Which is the closest to -233/6? (a) -12/5 (b) -2 (c) -0.2 a What is the closest to -8 in -1/2, -5/3, -1/11? -5/3 Which is the nearest to -2? (a) 3 (b) 2/13 (c) -193.6 (d) -3/2 d Which is the closest to 1? (a) -2/241 (b) 0 (c) 3 (d) -2/51 b What is the nearest to 10 in -3, 65, -0.5, -0.1? -0.1 Which is the nearest to 0.2? (a) 0.5 (b) 2 (c) 767 a What is the closest to -285/4 in -1, -1/6, 48/7? -1 Which is the closest to 41? (a) -1 (b) 2 (c) 227 b Which is the nearest to -2/9? (a) -2/9 (b) -0.004 (c) -
dm_mathematics
Anthony Campos Mary Solmonson Connie Sutton Linda S. Bryan Sylvia Campos Stacey Richardson Cyndie Balfour-Flanagan Marlene Hilliard Faye Ellis Bridgette Anderson Chris Mendoza Karen Lambert Thank You, Anthony ---------------------- Forwarded by Anthony Campos/HOU/ECT on 06/02/2000 07:37 AM --------------------------- From
enron_emails
UNITED STATES OF AMERICA, Plaintiff-Appellee, versus MERARDO ALCARAZ-DIAZ, Defendant-Appellant. -------------------- Appeal from the United States District Court for the Western District of Texas USDC No. EP-02-CR-1690-ALL -------------------- Before DeMOSS, DENNIS, and PRADO, Circuit Judges. PER CURIAM:* Merardo Alcaraz-Diaz appeals the sentence imposed following his guilty plea conviction of being found in the United States after deportation/removal in violation of 8 U.S.C. § 1326. Alcaraz contends that 8 U.S.C. § 1326(a) and 8 U.S.C. § 1326(b) define separate offenses. He argues that the prior conviction that resulted in his increased sentence is an element of a separate offense under 8 U.S.C. § 1326(b) that should have been alleged in his indictment. Alcaraz maintains that he pleaded * Pursuant to 5TH CIR. R. 47.5, the court has determined that this opinion should not be published and is not precedent except under the limited circumstances set forth in 5TH CIR. R. 47.5.4. No. 03-50103 -2- guilty to an indictment which charged only simple reentry under 8 U.S.C. § 1326(a). He argues that his sentence exceeds the two-year maximum term of imprisonment which may be imposed for that offense. In Almendarez-Torres v. United States, 523 U.S. 224, 235 (1998), the Supreme Court held that the enhanced penalties in 8 U.S.C. § 1326(b) are sentencing provisions, not elements of separate offenses. The Court further held that the sentencing provisions do not violate the Due Process Clause. Id. at 239-47. Alcaraz acknowledges that his argument is foreclosed by Almendarez-Torres, but asserts that the decision has been cast into doubt by Apprendi v. New Jersey, 530 U
freelaw
Bank of America is looking for Ethereum developers - nestlequ1k http://careers.bankofamerica.com/job-detail/17051863/united-states/us/java-developer-card-and-payments-technology ====== j0e1 I can't in any way see how this ad means they are looking for 'Ethereum developers' other than it being a desired skill. Please refrain from posting misleading titles to articles. ~~~ Torai You have to understand that a lot of people is expecting to get rich with cryptos, so they need to create a lot of hype, even if that means fabricating false news from a job posting. ------ russdpale I don't give a damn how much they would pay, no way I'm working for Bank of America. They can suck it. ------ davidgerard > Ethereum - Frontier/Solidity and IBM Hyperledger/Fabric translation: IBM talked them into a pilot program using Hyperledger Fabric, which IIRC uses the smart contracts functionality from Ethereum. ------ Torai No, it's not. It's just a desired skill, not a required one. ------ brawny I wonder if this coincided with them joining the Ethereum Alliance? ~~~ davidgerard BofA's been messing around with talk of various blockchainy projects for a while now, though little visible result beyond overexcited articles in the Bitcoin blogs. ~~~ MichaelBurge The COBOL that's been running their systems for the last 50 years doesn't even have blog articles. ------ coldcode Lovely work on high tech new technology at an old fashioned Bank. Having worked at a financial institution with a bank, talk about generation gap... ------ logfromblammo So... they want to figure out how to cheat at smart contracts like they do with paper ones? ------ Clee681 What's a midrange developer ~~~ Sir_Cmpwn A senior dev who's getting ripped off. ------ osmode 5 years of Ethereum development experience is longer than Ethereum has been around. These boilerplate Wanted ads won't attract developers with bleeding- edge skills.
hackernews
I propose to investigate the role of calcium and cyclic nucleotides in the physiology of the vertebrate rod photoreceptor. It is well established that these substances are involved in generating the rod's electrical response to light. However, the difficulty of observing the light regulation of calcium and cyclic GMP in the intact rod has precluded a clear understanding of their functional roles. I will address this problem by measuring light evoked changes in extracellular calcium concentration in the space surrounding the rod outer segments, utilizing a planar calcium-sensitive membrane electrode
nih_exporter
Many short-strawed wheats, including the Norin-10-based semidwarfs now grown in many countries, are characterized by their relative "insensitivity" to gibberellic acid. The nature of this insensitivity, its genetic control, and the relationships between the Gai genes and the Rht genes, which control height reductiion in Norin-10 and Tom Thumb wheats, are described. The role and potential of these genes in agriculture and their
pubmed_abstracts
So far, we have analysed the *co-occurrence* of financial institutions in the set of the 25 best ranked institutions, weighted by their ranks. These ranks were based on their activities, i.e., *total derivatives*. As a result, we could reconstruct the weighted network of counterparty risk which also reflects the importance of the nodes. This network was reconstructed (a) on a time resolution of one quarter year, to show the dynamics of the network (Fig D in [S1 Appendix](#pone.0136638.s001){ref-type="supplementary-material"}), and (b) on the time aggregated level ([Fig 8](#pone.0136638.g008){ref-type="fig"}). To further analyse the mutual dependence between the best ranked institutions, we now calculate different correlations. The network of counterparty risk has revealed how the co-occurrence changes over time. But will the OTC derivatives of institution *i* increase, or decrease, if the same measure of institution *j* increases? Answering this question allows some more refined conclusions about the dependence between these institutions. The simplest measure is the *Pearson correlation coefficient* *ρ*, which points to a *linear* dependence between two variables. As explained above, for each institution *i* we have a dataset **a** ~*i*~ = {*a* ~*i*~(1), *a* ~*i*~(2), ..., *a* ~*i*~(*T*)} available which contains up to *T* entries about its quarterly activity *a* ~*i*~(*t*) measured by means of its total derivatives. We recall that some of these entries are zero whenever institution *i* was not listed among the best 25 ranked. Let us define the mean value and the standard deviation of each of these samples as: $${\overline{a}}_{i} = \frac{1}{T}\sum\limits_{t = 1}^{T}a_{i}\left( t \right)\;; s_{i}^{a} = \sqrt{\frac{1}{T - 1}\sum_{t = 1}^{T}\left\lbrack a_{i}\left( t \right) - {\overline{a}}_{i} \right\rbrack^{2}}.$$ The Pearson correlation coefficient with respect to the variable *a* is then defined as $$\rho_{ij}^{a} = \frac{1}{T - 1}\sum\limits_{t = 1}^{T}\mspace{180
pubmed_central
According to this question, we can modify the source and it's not called interference: you can modify the stream elements themselves and it should not be called as "interference". According to this question, the code List<String> list = new ArrayList<>(); list.add("test"); list.forEach(x -> list.add(x)); will throw ConcurrentModificationException. But my code, Employee[] arrayOfEmps = { new Employee(1, "Jeff Bezos"), new Employee(2, "Bill Gates"), new Employee(3, "hendry cavilg"), new Employee(4, "mark cuban"), new Employee(5, "zoe"), new Employee(6, "billl clinton"), new Employee(7, "ariana") , new Employee(8, "cathre"), new Employee(9, "hostile"), new Employee(10, "verner"), }; Employee el=new Employee(1, "Jeff Bezos"); List<Employee> li=Arrays.asList(arrayOfEmps); li.stream().map(s->{s.setName("newname");return s;}).forEach(System.out::print); doesn't throw ConcurrentModificationException, even though it in fact changes the source. And this code, Employee[] arrayOfEmps = { new Employee(1, "Jeff Bezos"), new Employee(2, "Bill Gates"), new Employee(3, "hendry cavilg"), new Employee(4, "mark cuban"), new Employee(5, "zoe"), new Employee(6, "billl clinton"), new Employee(7, "ariana") , new Employee(8, "cathre"), new Employee(9, "hostile"), new Employee(10, "verner"), }; Employee el=new Employee(1, "Jeff Bezos"); List<Employee> li=Arrays.asList(arrayOfEmps); li.stream().map(s->{s.setName("newname");li.add(s);return s;}).limit(
stackexchange
Amlodipine fumarates and particularly amlodipine hemifumarate may exist in a solvent-free form or it may be isolated as a hydrate or a solvate. The hydrates and solvates of amlodipine fumarate, especially hydrates or solvates of amlodipine hemifumarate, form another aspect of the invention. Amlodipine fumarate may be characterised by a variety of ordinary methods such as IR spectrum, m.p., DSC curve, etc. The structure and amlodipine/fumaric acid ratio may be proven by measuring 1H-NMR spectrum and/or by titration methods. Amlodipine fumarate is converted to amlodipine free base in vivo and thus it basically shares the pharmaceutical activity of amlodipine. Accordingly, the compound may be used as a suitable form of amlodipine for administration of amlodipine into a patient in need thereof. Particularly, due to its limited solubility in body fluids, amlodipine hemifumarate is the advantageous salt form of amlodipine, especially for manufacturing slow or modified release final forms, but the use thereof is not limited thereto. Amlodipine fumarate is a useful calcium channel blocker and thus can be used to treat any cardiac condition that would be benefited by administration of a calcium channel blocker. In particular, the amlodipine fumarate can be used to treat or prevent hypertension or angina by administering an effective amount to a patient in need thereof. The specific form of angina is not particularly limited and specifically includes chronic stable angina pectoris and vasospastic angina (Prinzmetal""s angina). The compound can be administered by any suitable route including orally or parenterally. The xe2x80x9cpatientsxe2x80x9d intended to be treated include human and non-human animals especially humans and non-human mammals. The compound is usually administered as part of a pharmaceutical composition. Accordingly, a further aspect of the invention is a pharmaceutical composition for treating or preventing hypertension or angina that comprises an effective amount of amlodipine fumarate and a pharmaceutically acceptable excipient. Excipients include any inert or non-active material used in making a pharmaceutical dosage form. For example, tablet excipients include, but are not limited to, calcium phosphate, cellulose, starch or
uspto_backgrounds
Chinchpada is a panchayat village located in Nashik division of the Kandesh region of Maharashtra state in India. The village used to be called Bodhgaon. Administratively, Chinchpada is under Navapur Taluka, Nandurbar District, Maharashtra. There is only the single village of Chinchpada in the Chinchpada gram panchayat. It is located on National Highway 6, running from Hazira (near Surat) in Gujarat to Kolkota, West Bengal. It is about 100 km from Dhule and about 120 km from Surat. Infrastructure Chinchpada is a pleasant place lined by hills on one side. Chinchpada is famous for the Chinchpada Christian Hospital, which is governed by the Emmanuel Hospital Association (EHA), New Delhi. The Hospital was established in 1942 as a small clinic, and later it was upgraded to a 15-bed hospital that continues to provide healthcare services to the predominantly tribal population in the surrounding villages. It was incorporated into EHA in 1974. The hospital, known for its low cost quality health care, currently has 50 beds and attracts a lot of patients referred there for surgeries, medicine, cancer treatment, palliative care, and maternity services. The hospital has a 4-bed fully equipped ICU and 24/7 quality nursing care under trained and experienced doctors. Chinchpada is also well known for its railway station, which was constructed by the British government during the colonial era. The rail lines connect Surat to Bhusawal, two of India's big railway junctions. Culture The majority of the village's population is engaged in the educational services sector. 'Unity in Diversity' can seen in this town, as Marathi, Marwari, Gujarati, Adivasi, and Sikh communities live here with love and peace. Educational Facility Four high-schools and one Junior College provide educational facilities to the community. Namely: Pachim Khandesah Bhill Seva Mandal Sanchalit Vanvasi Vidyalaya' (High-school, Marathi Medium) S.C.Chavan Junior College. (College of Science and Arts) Emmanuel Public School. (High-school, English Medium, Maharashtra State Board) D.G.
wikipedia_en
A direct experimental determination of the phase-space density $d= \langle n \rangle/(2R\Delta)^3$ in high energy collisions is not easy. The sources created in such collisions feature strong collective expansion [@Pratt95; @He96], and therefore only small fractions of the total collision region (so-called regions of homogeneity) contribute effectively to the two-particle correlator [@He96]. This means that in the parametrization (\[21\]) we should use $R^2 = R_{\rm hom}^2 + 1/(4\Delta^2)$ where $R_{\rm hom}$ is the (pair momentum dependent) homogeneity radius which, in the absence of strong multi-pion effects, is equal to the HBT radius parameter $R_{\rm HBT}$. Without more detailed model studies it is then, however, unclear what fraction of the total observed multiplicity $\langle n \rangle$ comes from a single such homogeneity region. On the other hand Fig. 3 suggests that, within our model class of event ensembles, the ratio ${\langle n\rangle^2 \over \langle n(n-1)\rangle}$ is a useful indicator for the average phase-space density $d$ in the source and thereby also for the expected multi-pion symmetrization effects on the 1- and 2-particle spectra which need to be taken into account in an extraction of the source size from HBT measurements. In the experiment one usually fits the two-particle correlator with the functional form $$C^{\rm exp}(\bbox{p}_1,\bbox{p}_2) = C^{\rm exp}(\bbox{q,K}) = {\cal N} \left( 1{+}\lambda |f(\bbox{q,K})|^2\right) ,$$ where the function $f$ vanishes as $\bbox{q}\to \infty$. Obviously, ${\cal N}$ depends on the chosen definition of the correlation function: For the definition (\[I\]) the normalization is always ${\cal N}^{I}=1$ (see Eq. (\[17\])), while for the definition (\[II\]) it is ${\cal N}^{II} = {\langle n\rangle^2 \over \langle n(n-1)\rangle}$ (see Eq. (\[18\])). But in both cases ${\cal N}$ is well-defined and thus should not be treated as a free
arxiv
UPDATE quest_template_addon SET RequiredSkillID = 2557, RequiredSkillPoints = 100 WHERE (ID = 52227); UPDATE quest_template_addon SET RequiredSkillID = 2557, RequiredSkillPoints = 150 WHERE (ID = 52226); UPDATE quest_template_addon SET RequiredSkillID = 2557, RequiredSkillPoints = 150 WHERE (ID = 52228); UPDATE quest_template_addon SET RequiredSkillID = 2565, RequiredSkillPoints = 50 WHERE (ID = 48752); UPDATE quest_template_addon SET RequiredSkillID = 2565, RequiredSkillPoints = 50 WHERE (ID = 48764); UPDATE quest_template_addon SET RequiredSkillID = 2565, RequiredSkillPoints = 150 WHERE (ID = 48767); UPDATE quest_template_addon SET RequiredSkillID = 2565, RequiredSkillPoints = 150 WHERE (ID = 48770); UPDATE quest_template_addon SET RequiredSkillID = 2565, RequiredSkillPoints = 50 WHERE (ID = 48752); UPDATE quest_template_addon SET RequiredSkillID = 2565, RequiredSkillPoints = 150 WHERE (ID = 48761); UPDATE quest_template_addon SET RequiredSkillID = 2565, RequiredSkillPoints = 50 WHERE (ID = 51568); UPDATE quest_template_addon SET RequiredSkillID = 2565, RequiredSkillPoints = 150 WHERE (ID = 48768); UPDATE quest_template_addon SET RequiredSkillID = 2565, RequiredSkillPoints = 150 WHERE (ID = 52044); UPDATE quest_template_addon SET RequiredSkillID = 2565, RequiredSkillPoints = 150 WHERE (ID = 52049); UPDATE quest_template_addon SET RequiredSkillID = 2565, RequiredSkillPoints = 150 WHERE (ID = 52050); UPDATE quest_template_addon SET RequiredSkillID = 2565, RequiredSkillPoints = 150 WHERE (ID = 51380); UPDATE quest_template_addon SET RequiredSkillID = 2549, RequiredSkillPoints = 50 WHERE (ID = 52050); UPDATE quest_template_addon SET RequiredSkillID = 2549, RequiredSkillPoints = 150 WHERE (ID = 48754); UPDATE quest
github
The ability to print/copy/paste and/or download may be restricted by the participating publisher or User who submitted the Scribd Commercial Content In addition to the foregoing, if You have obtained access to Scribd Commercial Content by purchasing a Membership, except for any limited time promotions, Your access to the Membership is conditioned upon timely payment and maintenance of Your Membership account; and You will not have access to Scribd Commercial Content if Your Membership is cancelled, allowed to lapse, or terminated for non-payment. Your subscription entitles you to access an unlimited number of books and audiobooks in the Scribd library during the subscription period. For a small percentage of Scribd users who consume an unusual volume of materials, not every book or audiobook in the library will be immediately available. Scribd reserves and shall have the right in its sole discretion to add, modify, withdraw or delay at any time any particular Scribd Commercial Content from access by you for any reason including, without limitation, based on the costs generated to Scribd by such content or the nature of your use of the Scribd.com website. Scribd makes no guarantee as to the availability of specific titles or the timing of their availability. Payments and Billing For Direct Purchases and Memberships, the current fee amounts and any materially different terms from those described to you in this Agreement will be disclosed to you at sign-up or in other communications made available to you. When You purchase a Membership or a Direct Purchase (such purchase, a “Transaction”), we may ask You to supply additional information relevant to Your Transaction, including, without limitation, Your credit card number, the expiration date of Your credit card and Your billing address (such information, “Payment Information”). You represent and warrant that You have the legal right to use all payment method(s) represented by any such Payment Information. When You initiate a Transaction, You authorize us to provide Your Payment Information to third parties so we can complete Your Transaction and to charge Your payment method for the type of Transaction You have selected; You may need to provide additional information to verify Your identity before completing Your Transaction (such information is included within the definition of Payment Information). If You elect to purchase an annual or monthly Membership, You will be charged the annual or monthly Membership fee (“Membership Fee”) at the beginning of the paying portion of Your Membership and each year or month
pile-cc
26/57 Three letters picked without replacement from {d: 1, w: 5, f: 14}. Give prob of picking 3 f. 91/285 Four letters picked without replacement from lvkvkvzutktu. What is prob of picking 4 u? 0 What is prob of picking 2 b when two letters picked without replacement from {b: 3, n: 6, a: 8}? 3/136 Calculate prob of picking 1 d, 1 q, and 1 r when three letters picked without replacement from dccqqccrl. 1/42 Three letters picked without replacement from vxgvmm. Give prob of picking 1 x and 2 m. 1/20 Calculate prob of picking 2 w, 1 s, and 1 m when four letters picked without replacement from {k: 1, w: 5, s: 2, f: 1, n: 3, m: 1}. 4/143 Three letters picked without replacement from {l: 3, r: 5, d: 1, w: 1, n: 3}. What is prob of picking 1 l, 1 d, and 1 w? 3/286 What is prob of picking 2 s, 1 x, and 1 o when four letters picked without replacement from {x: 7, o: 2, s: 2}? 7/165 Calculate prob of picking 2 t when two letters picked without replacement from hthhthh. 1/21 Calculate prob of picking 1 g and 2 x when three letters picked without replacement from bmxxwbgbwbbwxxbgw. 3/170 Calculate prob of picking 3 a and 1 k when four letters picked without replacement from apaaaaaakakkaaaaaaaa. 112/323 Calculate prob of picking 1 x and 2 k when three letters picked without replacement from kxkxxkkxkxkkxkkxkxxx. 15/38 What is prob of picking 2 d when two letters picked without replacement from {x: 4, n: 3, d: 2}? 1/36 Calculate prob of picking 2 i, 1 m, and 1 g when four letters picked without replacement from gnfnnmcccimmmimim. 9/1190 Three letters picked without replacement from vvjvjjjjvv. Give prob of picking 3 j. 1/12 Four letters picked without replacement from zzzzsz
dm_mathematics
There are two deals for Avista the are marked not to be confirmed. Can you check into these, and if they are not to be confirmed, put a little note as to why or who said not to confirm them, so 6 months from now when someone says "Why didn't you confirm this deal!" I'll have something to jog my memory. (Because I will have slept between now and then!) Deal Numbers #
enron_emails
Appeal from the United States District Court for the Eastern District of ArkansasBefore LOKEN, FAGG, and HANSEN, Circuit Judges. PER CURIAM. 1 Four Arkansas inmates appeal the district court's dismissal without prejudice of their 42 U.S.C. 1983 action filed against various prison officials challenging various conditions of their confinement. The district court1 dismissed the suit under 42 U.S.C. 1997e(a) for failure to exhaust available prison administrative remedies. In their pro se brief on appeal, plaintiffs admit "that they made a mistake in prematurely filing their lawsuit," but argue that the district court abused its discretion in dismissing the suit without prejudice because their prison grievances were in process when the suit was filed, and some grievances were administratively denied before the district court ruled. 2 Section 1997e(a) provides that "[n]o action shall be brought with respect to prison conditions under [ 1983] by a prisoner confined in any jail, prison, or other correctional facility until such administrative remedies as are available are exhausted." When multiple prison condition claims have been joined, as in this case, the plain language of 1997e(a) requires that all available prison grievance remedies must be exhausted as to all of the claims. Here, it is apparent that at least some of the plaintiffs' many claims were not fully exhausted at the time the district court dismissed the action without prejudice. 3 Defendants filed a motion requesting an initial hearing en banc to consider whether our decision in Williams v. Norris, 176 F.3d 1089, 1090 (8th Cir. 1999) -- that it is improper to dismiss without prejudice when available prison administrative remedies are exhausted "at the time the [district] court ruled" -- is contrary to the plain language of 1997e(a) ("no action shall be brought"), as construed by a number of our sister circuits. See, e.g., Perez v. Wisconsin Dept. of Corrections, 182 F.3d 532, 534- 35 (7th Cir. 1999); Brown v. Toombs, 139 F.3d 1102, 1104 (6th Cir.), cert. denied, 525 U.S. 833 (1998); cf. Underwood v. Wilson, 151 F.3d 292, 296 (5th Cir. 1998), cert. denied, 526 U.S. 1133 (1999). We need not address that issue because it is clear from the record
freelaw
<https://en.wikipedia.org/wiki/Grid_energy_storage> ~~~ igravious Why mothball nuke plants when they are not in danger from tsunamis seeing as how they are miles inland in Southern Germany? Was there a public outcry after Fukushima? Seems like keeping the nuke plants running locally would obviate the need for this high euro spend on HVDC as cool and all as the tech sounds. ~~~ claudius > Was there a public outcry after Fukushima? Yes. Originally, the social-democrat/green government of 1998-2005 planned to shut down all nuke plants until 2020 or so, but the conservative/liberal democrats government that took over in 2009 stopped that, mostly against the will of the public. After Fukushima, there was such a huge backslash that our dear chancellor decided it might help her popularity more if she changed her mind. And while tsunamis are rather rare in Stuttgart, the upper rhine rift is an active earthquake zone, and since we unfortunately are not allowed to just sell the waste to Russia to dump in Siberia, we also have to dispose of it somewhere in Germany. If you look at a population-density map, you will find few places with few enough people to accept highly radioactive nuclear waste. You are right, however, that it is economically somewhat senseless to shut down the nuke plants basically shortly after the subsidies/initial costs paid off, but, well. ~~~ eurleif >You are right, however, that it is economically somewhat senseless to shut down the nuke plants basically shortly after the subsidies/initial costs paid off, but, well. How is it more senseless than shutting them down any other time before the end of their useful life? Sunk costs are sunk. ~~~ InclinedPlane You answer your own question. The amount of useful life they have left that goes unused is an opportunity cost. The earlier they are shut-down the larger that cost (which necessarily must be taken up in providing power through some other means). ------ junto Germany has a problem. It has a desire to increase renewables (mostly from wind), which is found in the north. The primary consumers of the
hackernews
The primary aim of this study is to further examine the effects of hypokalemia and hypernatremia on the blood perfused working heart of the dog. In some animals the changes will be produced locally by interposing a blood dialyzer in the left common coronary artery. Experiments already completed indicate that local hypokalemia initially increases both myocardial contractile force and coronary vascular resistance and that local hypokalemia enhances the increased force seen with local hypernatremia. In an attempt to shed
nih_exporter
The cerebellum, while once considered a brain region principally involved in motor control and coordination, is increasingly becoming associated with a range of neuropsychological and neuropsychiatric presentations. This paper reviews the dominant neuropsychological domains and neuropsychiatric conditions for which cerebellar involvement has been demonstrated, including visuospatial functioning, learning and memory, language, executive functioning, attention-deficit/hyperactivity disorder, autism spectrum disorders, and schizophrenia. The paper concludes with a discussion of a potential neuropsychological localization model within the cerebellum
pubmed_abstracts
Case report =========== Early on October 2014, a 45-year-old woman was presented at our outpatient gynecology clinic with sudden lower pelvic discomfort and vaginal bleeding symptoms. The patient had a history of hysterectomy 13 months ago due to symptomatic multiple leiomyomas and adenomyosis. The previous surgery was conducted as a single-port approach laparoscopic-assisted vaginal hysterectomy in July 2013. Surgical findings showed an enlarged uterus of about a 14 weeks gestational age size. Both adnexa were grossly normal in appearance and the peritoneum was clear with no signs of endometriosis. The vaginal vault was sutured vaginally using a 1-0 vicryl. No complications were observed during the postoperative period and the patient was discharged as scheduled. The histology of the uterus was confirmed as adenomyosis with leiomyoma with a secretory phase endometrium. Follow up examinations at 3 and 6 months showed no complications and thus no additional follow-ups were required afterwards. However on October 2014, after more than a year from her last check up, the patient appeared at our clinic complaining of sudden pelvic discomfort and vaginal bleeding symptoms. Pelvic examinations showed no signs of active bleeding. Yet, a dark wine colored papule suggestive of a small hematoma or ulcerative lesion was observed upon the previous operative vaginal vault site ([Fig. 1.](#F1){ref-type="fig"}). Her vitals were stable and she showed no signs of fever. The pain was tolerable during manipulation of the vault site. The ulcerative lesion was suspected as an old hematoma or granulation formation of the previous hysterectomy vault or possibly due to an unknown malignancy or cancerous change. For further investigation, a quick excision biopsy using sharp scissors was performed under local anesthesia at the outpatient operation room. Bleeding control was done with sutures and tampon gauzes were inserted intravaginally. Nevertheless, the patient returned to the clinic within a few hours with excessive bleeding. Upon re-examination, active bleeding was visible at the vault site, and additional maneuvers including sutures were performed for hemostasis. The pathology reports showed normal vaginal tissue with non-specific loss of surface epithelium and subepithelial hemorrhage. The diagnosis was uncertain but any kind of malignancy could be ruled out. Ten days later, the patient revisited our clinic with another incidence of massive vaginal bleeding with large clots. She looked pale and anemic in general with vital signs showing an increased pulse with a decreased blood
pubmed_central
// Connect export default connect( mapStateToProps, mapDispatchToProps )(SignUp); Dumb component const SignUp = ({ inputChange }) => ( <input type="password" placeholder="Password" onChange={inputChange('password')} /> ); Maybe some parts of this code seems a little strange because I removed some of my types to not add extra pointless code. Anyway the error come from the mapDispatchToProps, it seems like it's ok with a single fat arrow but when I start to chain them I get this error (even if they return an object). A: As the error mentioned actions must be plain objects but when you chain the functions, you are actually passing a function (the next one on the chain) and not an object. The problem here for you is that you want to pass an extra argument in addition to the actual DOM event, like the name of the input, i.e: "password", "user" etc... Then why not just give the input a name and grab it in the action creator function (same as you do with the value attribute). Your form can look something like this: const Form = ({ inputChange, form }) => ( <div> <input name="user" onChange={inputChange} type="text" value={form.user} /> <input name="password" onChange={inputChange} type="password" value={form.password} /> </div> ); const mapState = state => ({ form: state }); const mapDispatch = { inputChange }; const ConnectedForm = connect( mapState, mapDispatch )(Form); And inside your action creator: const inputChange = ({ target }) => ({ type: INPUT_CHANGE, payload: { value: target.value, inputName: target.name } }); and your reducer can handle it, something like this: const reducer = (state = {user: '', password: ''}, action) => { switch (action.type) { case INPUT_CHANGE: { const { inputName, value } = action.payload; return {
stackexchange
The invention further relates to an optical receiver, clock recovery means and a non-linear optical element. Such a transmission system is known from the article xe2x80x9c10 Gbit/s all-optical regeneratorxe2x80x9d by W. A. Pender et. al. in Electronics Letters 31st August 1995, Vol. 31, No. 18. pp. 1587-1588. The transmission rate of optical transmission systems is increasing rapidly, due to improvements of optical components such as lasers, modulators, multiplexers and demultiplexers. The transmission rate approaches the limit of capabilities of the used electrical components such as photo detectors and modulators. To overcome this limitations there is a trend to use time division multiplex in which a plurality of optical signals with a bitrate of e.g. 10 Gbit/s are multiplexed into an optical signal with a higher bitrate e.g. 40 Gbit/s. This multiplexing can completely be performed by optical means. In the receiver the received optical signal has to be demultiplexed by optical means because using electrical components for handling such a high bitrate signal is very difficult. Such optical demultiplexing requires the availability of an optical clock signal. Because this clock signal has to be synchronized to the received input signal, the receiver comprises clock recovery means to extract the required optical clock signal from the received signal. In the optical transmission system according to the above mentioned article, clock recovery means using only optical components are used. The clock recovery system according to the above mentioned article is based on mode locking of a ring-laser in which the received optical signal is injected. A ring laser comprises an optical amplifying device having its output coupled to its input by means of a feedback loop. Mode locking is a phenomenon that results in the generation of optical pulses having a repetition rate which is a multiple of the reciprocal of the round trip delay of the combination of amplifier and feedback loop. The phenomenon is caused by non-linear amplitude and phase transfer in the feedback loop. To obtain said non-linear amplitude and phase transfer a non-linear element is present in the feedback loop. In the transmission system according to the above mentioned article the non-linear element comprises 1 km dispersion shifted fiber followed by a polarizer. A first non-linear effect comprises a change of the polarization state in dependence of the amplitude of the optical signal in the 1 km dispersion shifted fiber. A second non-linear effect is a phase shift
uspto_backgrounds
Rosie Vanier Rosie Vanier is a British singer and keyboard player from Cornwall. She was a founding member and the front woman of Rosie and the Goldbug; following the break-up of the band in 2009, she embarked on a solo career, and went on to form the trio Lightknife in 2014. Life and career Vanier grew up in Bodmin Moor "on a plot of land with no electricity, no heat, no TV, just a piano". Her mother and part-Native American father used to go on cycle tours in Europe, playing folk ballads along the way to entertain passers-by. She studied music at Roehampton University, and then returned home to Cornwall to form Rosie and the Goldbug in 2007, with bass player Lee "Pixie" Matthews and drummer Sarah "Plums" Morgan. Rosie and the Goldbug soon built up a reputation as a live band in Cornwall and started to attract wider attention. They toured Europe with Cyndi Lauper for most of 2008. The band released an eponymous album on their manager's label, Lover Records, produced by Jim Eliot of electropop duo Kish Mauve; Vanier entered into writing partnerships with Marcella Detroit and Glaswegian band El Presidente for several songs on the record. In August 2009, Vanier announced via the band's MySpace site that "Rosie and the Goldbug are over". Vanier then embarked on a solo career, under the management of Fachtna O'Ceallaigh, who has worked with Sinéad O'Connor, U2 and the Boomtown Rats; she completed her debut solo EP, Ep1, in November 2010. Since going solo, she has collaborated with Adam and the Ants guitarist and songwriter Marco Pirroni, who was introduced to her by O'Ceallaigh, writing and recording new tracks together. She released a second EP, Black Cats and Black Stars, in October 2011, with a third, Neon Nightmare, following in early 2012, supported by a solo UK tour; the EP's title track was featured on a Music Week cover-mounted compilation CD in early February. In early 2013, after some time out recording material in New York City, she was touring again with a band comprising Goldbugs bass player Matthews and drummer Bubs Taylor. Summer 2014 saw the release of the Bad in Love EP, under the band name Lightknife. Summer 2015 saw
wikipedia_en
![Locally correct matching produced by Algorithm \[alg:findmatching\]. Free space diagram drawn at $\varepsilon = \delta_\text{F}(P,Q)$.[]{data-label="fig:examplematching"}](examplematching) #### Realizing set By computing the [Fréchet distance]{} using the modified Alt and Godau algorithm, we obtain an ordered, potentially non-minimal realizing set $\mathcal{E} = \{ e_1, \ldots, e_l \}$. The algorithm must find an event that is contained in a realizing set. Let $E_{k}$ denote the first $k$ events of $\mathcal{E}$. For now we assume that the events in $\mathcal{E}$ end at different cell boundaries. We use a binary search on $\mathcal{E}$ to find the $r$ such that $E_r$ contains a realizing set, but $E_{r-1}$ does not. This implies that event $e_r$ is contained in a realizing set and can be used to split the curves. Note that $r$ is unique due to monotonicity. For correctness, the order of events in $\mathcal{E}$ must be consistent in different iterations, for example, by using a lexicographic order. Set $E_r$ contains only realizing sets that use $e_r$. Hence, $E_{r-1}$ contains a realizing set to connect cell $(1,1)$ to $e_r$ and $e_r$ to cell $(m,n)$. Thus any event found in subsequent iterations is part of $E_{r-1}$ and of a realizing set with $e_r$. To determine whether some $E_{k}$ contains a realizing set, we check whether cells $(1,1)$ and $(m,n)$ are connected without “using” the events of $\mathcal{E} \backslash E_{k}$. To do this efficiently, we further modify the Alt and Godau algorithm. We require only a method to prevent events in $\mathcal{E} \backslash E_{k}$ from being used. After $L^R_{i,j}$ is computed, we check whether the event $e$ (if any) that ends at the left boundary of cell $(i,j)$ is part of $\mathcal{E} \backslash E_{k}$ and necessary to obtain $L^R_{i,j}$. If this is the case, we replace $
arxiv
template <typename T, precision P, template <typename, precision> class vecType> GLM_FUNC_QUALIFIER typename vecType<T, P>::bool_type greaterThan ( vecType<T, P> const & x, vecType<T, P> const & y ) { GLM_STATIC_ASSERT(std::numeric_limits<T>::is_iec559 || std::numeric_limits<T>::is_integer, "Invalid template instantiation of 'greaterThan', GLM vector types required floating-point or integer value types vectors"); assert(x.length() == y.length()); typename vecType<bool, P>::bool_type Result(vecType<bool, P>::_null); for(int i = 0; i < x.length(); ++i) Result[i] = x[i] > y[i]; return Result; } template <typename T, precision P, template <typename, precision> class vecType> GLM_FUNC_QUALIFIER typename vecType<T, P>::bool_type greaterThanEqual ( vecType<T, P> const & x, vecType<T, P> const & y ) { GLM_STATIC_ASSERT(std::numeric_limits<T>::is_iec559 || std::numeric_limits<T>::is_integer, "Invalid template instantiation of 'greaterThanEqual', GLM vector types required floating-point or integer value types vectors"); assert(x.length() == y.length()); typename vecType<bool, P>::bool_type Result(vecType<bool, P>::_null); for(int i = 0; i < x.length(); ++i) Result[i] = x[i] >= y[i]; return Result; } template <typename T, precision P, template <typename, precision> class vecType> GLM_FUNC_QUALIFIER typename vecType<T, P>::bool_type equal ( vecType<T, P> const & x, vecType<T, P> const & y )
github
Delta Dental We are proud to be America’s largest, most experienced dental benefits carrier. Made up of independent, affiliated member companies, Delta Dental Plans Association is a not-for-profit organization with some for-profit affiliates. We offer a nationwide package of dental health benefits for a wide range of employers both large and small. Delta Dental member companies administer programs and reporting systems that provide employees with quality, cost-effective dental benefits programs and services. PeopleStrategy® provides a single source for SMB companies to build an effective, competitive people strategy through a strategic combination of hire-to-retire HR technology, employee benefits and administrative services. PeopleStrategy's single platform features a simple user experience that... Read More The world of benefits, payroll and 401(k) are constantly changing. Our goal is to make HR Administration simpler, more efficient, and more personalized. Our consumer-focused tools and services help your employees choose and utilize their benefits. That means more ways for them to have healthy... Read More As group health brokers and HR specialists we understand that times are rapidly changing and so are the ways that businesses use and implement HR services. Our goal to always be ahead of those changes and in sync with benchmarking, custom plan design, HR technology, ACA requirements, and... Thanks for submitting your review of Delta Dental. We'll email you as soon as it's published, (typically within 48 hours). We really value your contributions, and so does our community of business professionals. They count on honest reviews like yours. Thanks for submitting your review of Delta Dental. We'll email you as soon as it's published, (typically within 48 hours). We really value your contributions, and so does our community of business professionals. They count on honest reviews like yours. Thanks for submitting your review of PeopleStrategy, Inc.. We'll email you as soon as it's published, (typically within 48 hours). We really value your contributions, and so does our community of business professionals. They count on honest reviews like yours. Thanks for submitting your review of PeopleStrategy, Inc.. We'll email you as soon as it's published, (typically within 48 hours). We really value your contributions, and so does our community of business professionals. They count on honest reviews like yours. Thanks for submitting your review of Benefits Square. We'll email you as soon as it's published, (typically within 48 hours). We really value
pile-cc
31 Let j be 24*(0 - -76)*150/30. Calculate the greatest common divisor of j and 95. 95 Let w(p) = 2*p**2 + 6*p - 8. Suppose 0 = -4*x - 2*i + 54, -1 = -i + 2. Let z = x + -17. Let y be w(z). Calculate the highest common divisor of 60 and y. 12 Let h(a) = -a**2 + 41*a - 133. Let x be h(14). Calculate the greatest common divisor of 455 and x. 35 Let n = 7036 - 7012. Calculate the greatest common factor of 132 and n. 12 Let d(v) = -3*v**3 + 4*v**2 + 3*v + 4. Let c(x) = x + 14. Let l be c(-17). Let f be d(l). Let y = f + -27. Calculate the highest common divisor of 17 and y. 17 Let t = -113 + 113. Suppose t = -2*y + 3*v + 83, 0 = -y - 13*v + 11*v + 24. What is the highest common divisor of 2 and y? 2 Let y = 60 - -230. Let m = -101 - -111. What is the highest common divisor of y and m? 10 Let m(n) = -n**3 + 25*n**2 - 144*n + 24. Let g be m(15). Let d be (14/4)/(g/39672). What is the greatest common divisor of d and 42? 42 Let k be (1 + 1)/((-8)/(-17901)) + 217/(-868). What is the highest common divisor of 75 and k? 25 Let l = 821 - 820. Let y = -22 - -38. What is the greatest common divisor of y and l? 1 Let l = -47 - -54. Let c be (1 + -8)*-2*100/8. Calculate the highest common factor of l and c. 7 Suppose -4*f + 1812 = -4*t, -12*f + 2*t = -14*f + 914. Let a = f - 453. Calculate the greatest common divisor of a and
dm_mathematics
The key points are: 1. Any FX business conducted from London must in most cases be done by or through a specifically authorised SFA-regulated entity. None of the MG London entities is authorised to conduct this type of business. The choices therefore are: - Set up a new SFA-regulated entity specifically authorised to carry on this type of business (up to 6 months to implement) - Change
enron_emails
No. 10-6347 LEON EUGENE GRAYSON, Petitioner - Appellant, v. A.J. PADULA, Warden of Lee Correctional Institution, Respondent - Appellee. Appeal from the United States District Court for the District of South Carolina, at Florence. Henry M. Herlong, Jr., Senior District Judge. (4:09-cv-00089-HMH) Submitted: February 10, 2011 Decided: February 17, 2011 Before WILKINSON and DAVIS, Circuit Judges, and HAMILTON, Senior Circuit Judge. Dismissed by unpublished per curiam opinion. Leon Eugene Grayson, Appellant Pro Se. William Edgar Salter, III, Assistant Attorney General, Donald John Zelenka, Deputy Assistant Attorney General, Columbia, South Carolina, for Appellee. Unpublished opinions are not binding precedent in this circuit. PER CURIAM: Leon Eugene Grayson seeks to appeal the district court’s order accepting the recommendation of the magistrate judge and denying relief on his 28 U.S.C. § 2254 (2006) petition. The order is not appealable unless a circuit justice or judge issues a certificate of appealability. 28 U.S.C. § 2253(c)(1) (2006). A certificate of appealability will not issue absent “a substantial showing of the denial of a constitutional right.” 28 U.S.C. § 2253(c)(2) (2006). When the district court denies relief on the merits, a prisoner satisfies this standard by demonstrating that reasonable jurists would find that the district court’s assessment of the constitutional claims is debatable or wrong. Slack v. McDaniel, 529 U.S. 473, 484 (2000); see Miller-El v. Cockrell, 537 U.S
freelaw
~~~ dxbydt >There's a hatred of mathematics in mainstream American culture that runs very, very deep Completely agreed. As an immigrant, I can say it is very much a US thing. Haven't seen this much math-hate, but more importantly, math-utilitarianism, as in the US. In Asian countries & in Europe ( UK, France especially), people don't constantly fixate on stupid questions like "what is it good for ? ", which is ultimately a proxy for "how do I make money with this thing ?". But when I taught math here in the US as a graduate student TA, the majority of questions focussed on this single metric - usefulness. So math texts here are forced to invent bogus problems like "You want to house pigs with 500 feet of fencing. What dimensions of your rectangular pen will house the most hogs ?". Then the American kid says, Ah! Now I see the point of all this! Let l be the length of my pen and b its breadth. You want me to maximize the area of my pen l _b subject to 2l+2b=500 so I can house the most pigs! Ok so I see that b = 250-l, so l_ b is 250l - l^2, so I take its derivative & equate to zero & l=125, b=125, and that's the biggest pen that can house the most pigs. Very nice! In other countries, you simple wouldn't come up with all these sort of bogus utilitarian problems in animal husbandry. Students here learn exponentials & Taylor expansion as part of "how do I compute compound interest on my bank account", because that's supposedly the only legitimate use of e^x ! I honestly found teaching pre-calc, calc-1 & calc-2 a complete travesty, because the theorems & the entire courseware was essentially perverted - it was all in service of how to make use of the math for some bogus application, rather than learn it for its own good. The worst was when I had to teach how the horizontal range of parabolic trajectories varied - the textbook had examples of the US bombing Japan, & the students went to work computing the best possible angle for firing the missile, so that it would fly across in
hackernews
Abdominal Aortic Aneurysm (AAA) is a common and devastating disease which is increasing in incidence. Although easy and inexpensive to detect by ultrasound, most aneurysms are small when detected and there is currently no medical regimen which will inhibit their growth. There is an increasing body of evidence implicating a family of matrix degrading enzymes, the matrix metalloproteinases (MMPs) in AAA. Although both MMP-9 and MMP-12 may have a role in AAA, we have identified
nih_exporter
Fibroblast growth factors (FGFs) signal through FGF receptors (FGFRs) mediating a broad range of cellular functions during embryonic development, as well as disease and regeneration during adulthood. Thus, it is important to understand the underlying molecular mechanisms that modulate this system. Here, we show that FGFR-1 can interact with the TNF receptor superfamily member fibroblast growth factor-inducible molecule 14 (Fn14) resulting in cardiomyocyte cell cycle reentry. FGF1-induced
pubmed_abstracts
Genomic DNA was isolated from a fresh culture biomass of Achromobacter sp. B7 grown on tryptic soy agar (TSA) and lysed in EDTA-saline buffer (0.15 M NaCl, 0.01 M EDTA, pH 8.0) with 10 mg ml^−1^ lysozyme for 2 h at 37°C. Genomic DNA was isolated with the Promega Wizard kit and a modified Marmur procedure ([@B5]). DNA was sequenced on an Illumina HiSeq 4000 system (GATC Biotech, Germany), generating 10,102,770 pair-end reads of 150 bp each and yielding a total of 1,525.5 Mb. Standard genomic library preparation was performed with an optimized protocol, and standard Illumina adapter sequences were used. Sequence reads were trimmed, using Sickle (version 1.33) ([@B6]), with a Phred quality score threshold of 30. A subset of 6,666,666 high-quality paired-end reads with a total of 904,208,607 bp was obtained. Additionally, DNA was sequenced with an Oxford Nanopore Technologies (ONT) MinION instrument. A library was prepared with the ONT rapid barcoding kit (SQK-RBK004). Albacore version 2.1.10 was used for base calling, which yielded a total of 2,260 Mb distributed in 217,643 reads. The subsets of Illumina paired-end reads (904 Mb) and base-called Nanopore reads (2,260 Mb) were used to perform a hybrid assembly, using hybridSPAdes from SPAdes version 3.11.1 ([@B7], [@B8]). The hybrid assembly resulted in a final closed and complete chromosome sequence of 6,236,552 bp with a G+C content of 64.8%. The B7 genome was annotated with the NCBI Prokaryotic Genome Annotation Pipeline (PGAP) version 4.6 ([@B9]), which identified 5,578 coding sequences and 57 tRNAs. After 16S rRNA gene sequence analyses, A. spanius DSM 23806 was the most closely related species (100% identity). Analysis by average nucleotide identity based on BLAST (ANIb) ([@B10]), using JSpeciesWS version 3.0.20 ([@B11]), with A. piechaudii NBRC 102461^T^, A. spanius DSM 23806 ^T^, and
pubmed_central
$id = $_GET["id"]; //ID OF THE CURRENT CONTACT $user = $_GET["user"]; //ID OF THE CURRENT USERS $query = mysql_query("SELECT name FROM contacts WHERE contact_id='". mysql_real_escape_string( $id ) ."' and user_id='1';"); $retval = mysql_fetch_object($query)->name; $retval = trim($retval); echo $retval; ?> A: This is much easier isn't it? $sql_insert = "INSERT INTO customers ( `name`, `address`, `email`, `phone` ) VALUES ( '$name', '$address', '$email', '$phone' )"; A: Is it this you're looking for? Even your question in German isn't that clear to me : $field = 'name'; $query = mysql_query("SELECT $field FROM contacts WHERE contact_id='". mysql_real_escape_string( $id ) ."' and user_id='1';"); $retval = mysql_fetch_object($query)->$field; A: You can usi it something like this. Currently i assume you get only one row back and want to use only one field. <?php require_once 'config.php'; $id = $_GET["id"]; //ID DES DERZEITIGEN KONTAKTES $user = $_GET["user"]; //ID DES DERZEITIGEN USERS //Use variable inside closures `` and just in case escape it, depends how you get variable $query = mysql_query("SELECT `".mysql_real_escape_string($variable)."` FROM contacts WHERE contact_id='". mysql_real_escape_string( $id ) ."' and user_id='1';"); if (!$query) { echo 'Could not run query: ' . mysql_error(); exit; } $row = mysql_fetch_row($query); //Retriev first row, with multiple rows use mysql_fetch_assoc $retval = $row['0']; //Retriev first field $retval = trim($retval); echo $retval; ?>
stackexchange
The present relates to a method and a system of switching-over from a regular communication control processor (hereinafter abbreviated to "CCP") connected to a plurality of host computers to a backup CCP, and particularly relates to a method and a system of automatically switching-over from a regular CCP to a backup CCP in case of failure of the regular CCP. A system having regular and backup CCPs connected to a plurality of host computers has been disclosed in HITAC manual "Program Product VOS3 Communication Management XNF, Introduction and Practical Use", 8090-3-172, 63-7 (1988), Hitachi, Ltd. One program is stored in both the regular and backup CCPs before a link state is established between the regular CCP and the respective host computers. In case of failure of the regular CCP in the system, all the communication lines connected to the regular CCP are manually switched over to the backup CCP through a line switch. Then, an operator command is issued from the respective host computers to release the link state established between the regular CCP and the respective host computers and establish a new link state between the backup CCP and the respective host computers to thereby perform switching-over for the regular CCP to the backup CCP (Prior Art 1). On the other hand, a communication system in which dual-system CCPs are connected to each other through health check lines has been disclosed as "Load Distributed Communication Control Processor" in JP-A-6354846. In the system, one CCP monitors the state of the other CCP so that, in case of failure of one CCP, the communication line connected to the failure CCP is connected to the other CCP (Prior Art 2). Now consider the case where the Prior Art 1 is applied to a communication system having a plurality of host computers operated on the basis of one program and separated into one master host computer and slave host computers, two CCPs of the same hardware construction separated into a regular CCP connected to the respective host computers to be operated on the basis of the program and a backup CCP, and a line switch for collectively switching lines between the two CCPs. In case of failure of the regular CCP, a long time is required for recovery from the failure because operator commands must be issued from all of the host computers connected to the new regular CCP which is changed from a backup CCP into a regular CCP (that is, human thought and operation must be used).
uspto_backgrounds
According to the Campaign Legal Center, Bopp filed 21 of the 31 lawsuits it associated with challenging campaign finance regulations. All told, Bopp has spent 30 years fighting limits on campaign spending and is credited with changing the political landscape of the 2012 election. According to the Center for Responsive Politics. "It's safe to say that groups on the left and right have Jim Bopp to thank for their new-found freedom." In an interview with PBS' Frontline in 2012, Bopp said he was defending a "basically absolute" interpretation of the right to political free speech under the First Amendment. He said he is working to eliminate or loosen campaign spending limits, and to eliminate donor-name-reporting requirements. A study conducted in 2014 showed that Bopp was one of a comparatively small number of lawyers most likely to have their cases heard by the Supreme Court. Bopp represented a group of plaintiffs, including Senator Rand Paul (R-KY), Republicans Overseas, and current and former U.S. citizens living in foreign countries, in a legal challenge to the Foreign Account Tax Compliance Act (FATCA) filed in 2015. The plaintiffs in the lawsuit, Crawford v. U.S. Department of Treasury, alleged that a number of provisions of the act unconstitutionally violate privacy rights of U.S. citizens, while burdening both private individuals and the financial institutions that they patronize. In April 2016, U.S. District Judge Thomas M. Rose of the U.S. District Court for the Southern District of Ohio dismissed the suit for lack of standing. Republican Party membership and activism Bopp is known for his staunch social conservatism, and his past and present clients are "a who's who of social conservatism," including the Traditional Values Coalition, the Home School Legal Defense Association, Concerned Women for America, and the Federation for American Immigration Reform. Bopp is particularly known for his opposition to all forms of limits on money in politics and his role as counsel for groups seeking, often successfully, to strike down campaign-finance limitations. He became Indiana's Republican National Committeeman on the Republican National Committee in 2006, and became the RNC's Vice Chairman in 2008. His tenure on the RNC ended in 2012 when he was defeated for another term by John Hammond at the state Republican convention. Bopp said after the convention that he was defeated because he supported Richard Mourdock over incumbent Richard Lugar for the
wikipedia_en
Orbital dynamics of double pulsars in SME {#sec:model} ========================================= When the pure-gravity sector of the minimal SME is considered, it will cause secular evolutions of the orbits of double pulsars. Since timing observations of double pulsars could obtain its value very precisely, the periastron advance plays a much more important role in constraining $\bar{s}^{\mu\nu}$ and, with widely used notations in celestial mechanics, it reads [@Bailey2006] $$\begin{aligned} \label{domegadtsme} \bigg<\frac{d\omega}{dt}\bigg>\bigg|_{\mathrm{SME}} & = & -\frac{n}{\tan i (1-e^2)^{1/2}}\bigg[\frac{\varepsilon}{e^2}\bar{s}_{kP}\sin\omega+\frac{(e^2-\varepsilon)}{e^2}\bar{s}_{kQ}\cos\omega-\frac{\delta m}{M}\frac{2na\varepsilon}{e}\bar{s}_k\cos\omega\bigg]\nonumber\\ & & -n\bigg[\frac{(e^2-2\varepsilon)}{2e^4}(\bar{s}_{PP}-\bar{s}_{QQ})+\frac{\delta m}{M}\frac{2na(e^2-\varepsilon)}{e^3(1-e^2)^{1/2}}\bar{s}_Q\bigg],\end{aligned}$$ where $M = m_1+m_2$, $\delta m = m_2-m_1$ ($m_2>m_1$) and $\varepsilon = 1-(1-e^2)^{1/2}$. In this expression, the coefficients $\bar{s}_{\cdot}$ and $\bar{s}_{\cdot\cdot}$ for Lorentz violation with subscripts $P$, $Q$ and $k$ are projections of $\bar{s}^{\mu\nu}$ along the unit vectors $\bm{P}$, $\bm{Q}$ and $\bm{k}$. The unit vector $\bm{k}$ is perpendicular to the orbital plane of the binary pulsars, $\bm{P}$ points from the focus to the periastron, and $\bm{Q}=\bm{k}\times\bm{P}$. By definitions [@Bailey2006], $\bar{s}_k\equiv \bar{s}^{0
arxiv
v_explicit = sp ( "vers" ( "ekre" / "ek" / abbrev? ) ) ![a-z] sp { return {"type": "v_explicit"} } cv_sep = sp (":"+ / "." !(sp "." sp ".") ) sp cv_sep_weak = sp ["'] sp / space /* The opening regexp is overwritten during post-processing to allow flexibility on including the comma. */ sequence_sep = ([,;/:&\-\u2013\u2014~] / "." !(sp "." sp ".") / [ée]i "s" / "v" [öo]i / "vagy" / space)+ { return "" } range_sep = sp ([\-\u2013\u2014] sp / "k" [öo]i "v" sp )+ title = (cv_sep / sequence_sep)? val:"c" [íi]i "m" { return {type:"title", value: [val], "indices": [peg$savedPos, peg$currPos - 1]} } in_book_of = sp ("from" / "of" / "in") sp ("the" sp "book" sp "of" sp)? abbrev = sp "." !(sp "." sp ".") /* EU-style separators, where "," is a cv separator and "." is a sequence separator. The sequence is post-processed into the grammar rather than specified here. */ eu_cv_sep = sp "," sp /* Translations */ // Prevents a reference entirely enclosed in parentheses from incorrectly grabbing the closing parenthesis of the reference rather than just the closing parenthesis of the translation. translation_sequence_enclosed = sp [\(\[] sp val:(translation (sequence_sep translation)*) sp [\)\]] { return {"type": "translation_sequence", "value": val, "indices": [peg$savedPos, peg$currPos - 1]} } translation_sequence = sp ("," sp)? val:(translation (sequence_sep translation)*) { return {"type": "translation_sequence", "value": val, "indices": [peg$savedPos,
github
Magic Meatballs are designed to playfully familiarize children with lab-grown meat. Young people are more prone to overconsumption of proteins and fats, and are more sensitive to the hormones and antibiotics used in conventional meat production. Luckily, lab-grown Magic Meatballs can be tailored precisely to a child’s individual needs. The basic meat consists solely of animal protein, and the combination of fats, omega-3s and vitamins is completely customizable. Colors and flavors can also be added to the neutral base to make the meat change color or crackle in your mouth. Magic Meatballs actively involve kids with the meat they eat, so that future generations will more readily accept protein grown in labs. Tags Share As the planet’s population speeds towards 9 billion, it’s becomes impossible to continue consuming meat like we do today. Will we all be eating rice and beans? Grasshoppers perhaps? Scientists hope to keep us eating vertebrate protein with in vitro meat. Grown in bioreactors from animal cells, in vitro meat could be a sustainable and humane alternative to raising a whole animal from birth to slaughter. The first lab-grown hamburger is expected within the next few months. But why should lab-grown meat look like the meat we consume today? Growing protein in bioreactors could lead to entirely new forms of meat with radically different aesthetics, materials and eating rituals. While these new products might seem unfamiliar and artificial, much of the meat we already consume is divorced from the animal’s natural form: Ground beef, smoked sausages, and chicken nuggets. A selection of these future in-vitro meat scenarios is currently shown at the highly recommended Food Culture: Eating by Design exhibition at the Design Huis in Eindhoven (NL). As you might not happen to be in the neighborhood, we will also publish them online over the next few weeks. The projects were coached by Menno Stoffelsen, Koert van Mensvoort, Cor van der Weele, Daisy van der Schaft and Ronald van Tienhoven. Illustration by K. Cheng. Do you want to know more about the future of meat? We are writing a speculative cookbook of in-vitro meat dishes, join us on www.bistro-invitro.com. Tags Share Unsure whether this tank escaped from an 8-bit videogame or the general that ordered the
pile-cc
Calculate the lowest common multiple of 304 and 4. 304 Calculate the common denominator of -13/24 and 7/153. 1224 What is the common denominator of -43/552 and 143/2832? 65136 Calculate the common denominator of 52/33 and -20/33. 33 Calculate the least common multiple of 104 and 332. 8632 Calculate the common denominator of 27/40 and 12/55. 440 Calculate the least common multiple of 12 and 4780. 14340 Calculate the common denominator of 11/2 and -103/344. 344 Calculate the smallest common multiple of 884 and 32. 7072 Find the common denominator of -47/88 and 47/88. 88 Calculate the common denominator of 121/120 and -31/108. 1080 What is the common denominator of 121/40 and -71/150? 600 What is the common denominator of 44/75 and 7/30? 150 Find the common denominator of -163/7140 and -47/680. 14280 What is the common denominator of 99/100 and -43/40? 200 Find the common denominator of -109/6 and 127/462. 462 Calculate the smallest common multiple of 162 and 612. 5508 What is the least common multiple of 198 and 1584? 1584 What is the least common multiple of 420 and 462? 4620 Calculate the lowest common multiple of 40 and 32. 160 What is the least common multiple of 30 and 215? 1290 Calculate the least common multiple of 3186 and 738. 130626 Calculate the lowest common multiple of 6 and 260. 780 What is the common denominator of 15/14 and 69/206? 1442 Calculate the lowest common multiple of 180 and 60. 180 Calculate the least common multiple of 1050 and 700. 2100 Find the common denominator of -69/50 and 69/3170. 15850 Calculate the least common multiple of 18 and 10890. 10890 Calculate the lowest common multiple of 114 and 836. 2508 Find the common denominator of 40/141 and 151/288. 13536 What is the common denominator of 95/4 and 33/934? 1868 Find the common denominator of 63/832 and 39
dm_mathematics
For Power Delivered on Friday, December 21, 2001
enron_emails
Sheriff Brice called Martinez and asked him to meet with Springer at the courthouse for an interview. Martinez was not informed of hisMiranda rights or his rights under the Texas Code of Criminal Procedure prior to this interview. During the interview, Martinez told Springer of three instances of sexual conduct withthe complainant. Thefirst instance Martinez reported occurred at Martinez's shop. Martinez said the complainant performed oral sex on him. After this admission, Martinez reported a second instance that occurred when Martinez's family and the complainant's family were vacationing together. Martinez said the complainant beganto performoral sex on him but Martinez interrupted and stopped it. Martinez also reported a third instancethat occurred at the complainant's house. Martinez said the complainant again performed oral sex on him, and Martinez then penetrated the complainant's anus with his penis. At the end of the interview, Springer gave Martinez the Miranda and Texas statutory warnings and then asked Martinez to reduce his oral statements to writing. Martinez did so, and Springer arrested him. Martinez was charged with two counts of sexual assault against a child. See TEX. Penal Code Ann. § 22.011(a)(2) (West 2011). One count alleged Martinez intentionally or knowingly caused the penetration of the complainant's mouth with Martinez's sexual organ. See id. -2- 04-12-00739-CR § 22.011(a)(2)(B). The other count alleged Martinez intentionally or knowingly caused the penetration ofthe complainant's anus with Martinez's sexual organ. See id. §22.011(a)(2)(A). The jury convicted Martinez and assessed his punishment at five years' imprisonment for the first count, and ten years' imprisonment for the second count. The trial court ordered Martinezto serve his sentences consecutively. Motion to Suppress Martinez contends the trial court erred by denying his motion to suppress all oral and written statements stemming from the interview with Springer. He argues the oral statements should be suppressed because they were the product of a custodial interrogation and he was not giventhe warningsrequired by Miranda v. Arizona and article 38.22 ofthe Texas Code ofCriminal Procedure prior to the interview. Martinez also argues his written statements should have
freelaw
I suppose when I think about work, I think of my parents, and despite being technologically capable, 1) this site would get blacklisted where they work and 2) I can't see them sitting in front of a computer at home gossiping, although they do talk about work quite a bit ~~~ nostrademons I figure it's made for the younger FaceBook generation who're just now entering the workplace and want a place to gripe about FaceBook being blocked at work. ~~~ myoung8 I can certainly see this being more appealing to them (us) as a generation, but I still think the fear of getting caught will outweigh the desire to post one's thoughts online in many cases, especially when it isn't all that hard (and is actually more useful for one's social life) to talk to someone at the office, be it at the water cooler, in the hallway, in your own office with the door closed, or at lunch or dinner. ------ tx Are you serious? This _is_ the idea? That you had 10 slides or whatever to present it to investors? Wholy cow. The end is near... Soon dressed up "hello world" implementations will pass by as "startup ideas". Why bother going to college and paying for CS degree if after 10 days with a RoR book you can start your company! ~~~ nostrademons "Why bother going to college and paying for CS degree if after 10 days with a RoR book you can start your company!" I think that's kinda the point of YCombinator... ------ neilk YC folks: I sure hope you told this crew about password hashing. ------ Tichy I don't think people are paranoid enough to use this. ~~~ randallsquared That depends strongly on the company, doesn't it? A list of companies represented here after they get some usage would read like a "don't apply to" list. ~~~ danielha That shouldn't be a problem. You have to already have a company email to view that company's comments. ~~~ nostrademons But you can view the fact that people are commenting on a company. If a whole bunch of one liners suddenly appear as soon as
hackernews
Dopaminergic neurons control aspects of mood, cognition and movement, and are involved in the pathogenesis of a variety of brain disorders including drug addiction. A central regulator of dopaminergic neurotransmission is the dopamine (DA) transporter (DAT) that is expressed exclusively in dopaminergic neurons and is responsible for clearance of extracellular DA. Psychostimulants such as amphetamines and cocaine elicit dramatic behavioral phenotypes primarily by targeting DAT directly and increasing extracellular DA concentration. DA neurons are functionally heterogeneous and morphologically complex, with
nih_exporter
Hyaluronic acid and Arg-Gly-Asp peptide modified Graphene oxide with dual receptor-targeting function for cancer therapy. Graphene oxide (GO) modified with hyaluronic acid (HA) and Arg-gly-asp peptide (RGD) was designed as a dual-receptor targeting drug delivery system to enhance the specificity and efficiency of anticancer drug delivery. Firstly, GO-HA-RGD conjugate was characterized to reveal its structure and morphology. Whereafter,
pubmed_abstracts
Three-fourths of the population came from Afghanistan, while the remaining came from Somalia and Iran ([table 1](#T1){ref-type="table"}). There were no significant differences between the countries of origin and the variables included in this article. A minority (36%) were able to read in their own language. Mean number of serious lifetime events experienced was 6.1 (SD 2.3), range 1--11. Most of the participants (96%) had experienced at least one of the serious life events listed. The most frequently reported experiences were life-threatening events (82%), physical abuse (78%) and loss of a close relative (78%). The official age assessment found a mean age of 18.4 years (SD 2.4), range 15--28, which meant that 72 (56%) participants were considered to be adults. Of this 'adult' group, 36 participants were allowed to stay at the care centres for adolescents, while the rest had to move to centres for adults. None of the participants received psychiatric treatment during the study. Overall, there were no significant changes in the level of symptoms within the study period (p≥0.084), neither for HSCL ([table 2](#T2){ref-type="table"}) nor for PTSS. ###### Baseline characteristics of male unaccompanied refugee minors at arrival in Norway N=138 -------------------------------------- --------------- Age, self-reported (n=130)  Mean years (SD)  16.22 (0.84)  Range  14--20 Age, assessed by authorities (n=132)  Mean years (SD)  18.22 (2.27)  Range  15--27 Nationality  Afghan 102 (73.9)  Somalian  32 (23.2)  Iranian   3 (2.2)  Algerian   1 (0.7) Literacy, self-reported (n=136)  50 (36.8)  No loss of parent  30 (21.7)  Loss of father  60 (43.5)  Loss of mother   4 (2.9)  Loss of both parents  25
pubmed_central
} #region// Setup BasicEffect /// <summary> /// Setsup basic effect parameters /// </summary> private void SetupEffect() { //basicEffect.VertexColorEnabled = true; //basicEffect.TextureEnabled = true; basicEffect.EnableDefaultLighting(); basicEffect.DirectionalLight0.Direction = new Vector3(1, -1, 1); basicEffect.DirectionalLight0.Enabled = true; //basicEffect.AmbientLightColor = new Vector3(0.3f, 0.3f, 0.3f); //basicEffect.DirectionalLight1.Enabled = false; //basicEffect.DirectionalLight2.Enabled = false; //basicEffect.SpecularColor = new Vector3(0, 0, 0); } #endregion public override void Draw() { // Look for a camera in the service container Camera camera = Engine.Services.GetService<Camera>(); // Throw an exception if one isn't present if (camera == null) { throw new Exception("Camera not found in engine's" + "service container, cannot draw"); } // Set effect values basicEffect.World = MathUtil.CreateWorldMatrix(position, rotation, scale); basicEffect.View = camera.View; basicEffect.Projection = camera.Projection; // For each pass.. foreach (EffectPass pass in basicEffect.CurrentTechnique.Passes) { pass.Apply(); // Draw the terrain vertices and indices Engine.GraphicsDevice.SetVertexBuffer(vbuffer); Engine.GraphicsDevice.Indices = ibuffer; Engine.GraphicsDevice.DrawUserIndexedPrimitives(PrimitiveType.TriangleList, vertices, 0, nvertices, indices, 0, indices.Length / 3, VertexPositionColorNormal.VertexDeclaration); } } #region //CreateIndices() /// <summary> /// Creates Sphere Indices /// </summary> private void CreateIndices() { indices = new short[nindices]; int i
stackexchange
1. Field of the Invention This invention relates generally to methods, systems and apparatus for managing digital communications systems. More specifically, this invention relates to identifying types of modems or other communication devices, such as by manufacturer, model number, and software version, used in a communication system such as an ADSL system. 2. Description of Related Art Digital subscriber line (DSL) technologies provide potentially large bandwidth for digital communication over existing telephone subscriber lines (referred to as loops and/or the copper plant). Telephone subscriber lines can provide this bandwidth despite their original design for only voice-band analog communication. In particular, asymmetric DSL (ADSL) can adjust to the characteristics of the subscriber line by using a discrete multitone (DMT) line code that assigns a number of bits to each tone (or sub-carrier), which can be adjusted to channel conditions as determined during training and initialization of the modems (typically transceivers that function as both transmitters and receivers) at each end of the subscriber line. In recent years, various DSL modems from a variety of manufacturers and vendors have been deployed to customers in a variety of DSL and other communication networks. While some customers are using the latest and/or popular types of modems, other customers may be using very old and/or less common types of modems. Very little effort is made to track the implementation, use and changes to modem type used by customers, meaning that operators and/or other parties have little information about what those customers are using on their respective networks. Generally, an “operator” is a telecom or other service provider who operates the network and provides the service itself. Standardized mechanisms within the existing deployed base of modems that supposedly allow the modems to identify their vendor ID, version ID, and serial number have not been implemented, or have been implemented incorrectly, and are thus ineffective for identification of modems. Current techniques for acquiring such customer/modem type information are costly and generally ineffective. They may include making a special effort to contact customers directly to collect such information, which is time consuming, highly inefficient and very costly. Operators and others also may collect information whenever there is a “truck roll” (that is, a service call to the customer's premises for repair and/or maintenance work). However, operators and the like attempt to keep the number of truck rolls to a minimum and this is a very inefficient way to collect information about customers and the types of modems they are using. System
uspto_backgrounds
On 26 August 1944, Evans sailed from Eniwetok to screen the fueling and aircraft replacement group for the assault and occupation of the Palau Islands, and arriving at Ulithi on 30 October, served on patrol and escort duty there through 11 January 1945. After a special assignment to hunt submarines near Yap and to bombard that island, from 11 to 13 January, Evans sailed to Saipan, from which she screened transports to the landings on Iwo Jima on 19 February. She conducted shore bombardment and supported the troops ashore with harassing fire on Japanese positions, then screened escort carriers until 8 March, when she sailed to Ulithi. Evans cleared Ulithi on 21 March 1945 to screen escort carriers in pre-invasion air strikes on Okinawa and served with them through the 1 April assault on the island, and until 2 May, when she put into Kerama Retto. Eight days later, she got underway with for a radar picket station northwest of Okinawa. During the first night on station, 10–11 May, enemy planes were constantly in evidence; more than a hundred attacked the two destroyers and the two LCSs with them. Evans fought determinedly against this overwhelming assault, shooting down many of them, but in quick succession, four kamikazes struck her. After engineering spaces flooded, and she lost power, Evans crew strove to save her, using portable fire extinguishers and bucket brigades. They succeeded, though 32 were killed and 27 wounded, and the ship was towed into Kerama Retto on 14 May for repairs. She was awarded the Presidential Unit Citation for high gallantry and achievement. After emergency repairs at Kerama Retto, Evans was towed to San Francisco, where she was decommissioned on 7 November, and stricken from the Naval Vessel Register on 28 November 1945. She was sold for scrap on 11 February 1947. Honors In addition to the Presidential Unit Citation, Evans received five battle stars for her World War II service. References External links navsource.org: USS Evans hazegray.org: USS Evans NHC Photos, USS Evans (DD-552) Category:World War II destroyers of the United States Category:Ships built in Chickasaw, Alabama Category:1942 ships Category:Fletcher-class destroyers of the United States Navy
wikipedia_en
Analysis of Possible Mechanisms ------------------------------- As we have shown earlier [@Khar98], such uncorrelated behavior of $R_s(H_{r\!f})$ and $X_s(H_{r\!f})$, as we observed for our samples (Fig. \[fig1\]), cannot be explained by any of the known theoretical models, including Josephson vortices [@Halb97] (where $r_{JF}<1$, $\Delta R_s$,$\Delta X_s\sim H_{r\!f}^n$, $0.5<n<2$), heating of weak links [@Golos95] ($r_{HE}<1$, $\Delta R_s,\Delta X_s\sim H^2$) and the RSJ model [@Halb97] ($r_{RSJ}<1$, $\Delta R_s$ increasing in a stepwise manner and $\Delta X_s$ oscillating with $H_{r\!f}$), intrinsic pair breaking or uniform heating [@Golos95] (for both mechanisms $r<10^{-2}$, and $\Delta R_s,\Delta X_s\sim H^2$). We can also rule out the mechanism of the superconductivity stimulation by microwave radiation [@Eliash], recently claimed by us [@Khar98] and Choudhury et al. [@Choudh97]. In this mechanism, the dc magnetic field decreases the order parameter, increasing both $R_s$ and $X_s$, which we do not observe for any of our samples. Moreover, we see that even in the low-power regime $H_{dc}$ can cause reduction of both $\Delta R_s$ and $\Delta X_s$, which is not explained by the above model at all. The most plausible mechanism responsible for the decrease in $R_s$ and $X_s$ with both $H_{r\!f}$ and $H_{dc}$ fields seems to be field-induced alignment of the spins of magnetic impurities, which are likely to be present in most HTS (particularly in YBaCuO) [@Kres1]. This mechanism was recently claimed by Hein et al. [@Hein97] to explain their results on non-monotonic behavior of $R_s$ and $X_s$ in $H_{dc}$ and $H_{r\!f}$ for YBaCuO thin films.
arxiv
// 1st Pass // step through the input string and convert it into // a logical sequence of steps, key, and charcodes to apply to the inputs var codes = parseCodes(value, settings.keyCodes[settings.keyBoard]); // 2nd Pass // Run the translated codes against each input through a realistic // and cancelable series of key down/press/up events return this.each(function(){ triggerCodesOnField(codes, $(this), settings.delay, settings.global); }); }; $.fn.autotype.defaults = { version: '0.5.0', keyBoard: 'enUs', delay: 0, global: window, keyCodes: { enUs: { 'back':8,'ins':45,'del':46,'enter':13,'shift':16,'ctrl':17,'meta':224, 'alt':18,'pause':19,'caps':20,'esc':27,'pgup':33,'pgdn':34, 'end':35,'home':36,'left':37,'up':38,'right':39,'down':40, 'printscr':44,'num0':96,'num1':97,'num2':98,'num3':99,'num4':100, 'num5':101,'num6':102,'num7':103,'num8':104,'num9':105, 'multiply':106,'add':107,'subtract':109,'decimal':110, 'divide':111,'f1':112,'f2':113,'f3':114,'f4':115,'f5':116, 'f6':117,'f7':118,'f8':119,'f9':120,'f10':121,'f11':122, 'f12':123,'numlock':144,'scrolllock':145,' ':9,' ':32, 'tab':9,'space':32,'0':48,'1':49,'2':50,'3':51,'4':52, '5':53,'6':54,'7':55,'8':56,'9':57,')':48,'!':49,'@':50, '
github
Published 8:00 pm EDT, Wednesday, May 11, 2011 Inquiry: I am having trouble finding a job as a bank teller. It may be because I am way overweight. Although I could do the job, I would need some accommodation from the employer...but no one has offered a job. Do I have any legal rights? -- Sally, Norwalk Response: Your legal rights will largely depend on whether your obesity condition will be considered to be a "disability" or not. There are state laws and federal laws (ADA) that prohibit disability discrimination. The letters "ADA" stand for a federal law: Americans with Disabilities Act. This law took effect on July 26, 1992. It applies to employers with at least fifteen employees. Connecticut state law also prohibits disability discrimination by employers with at least three employees. Its law is similar to the ADA. Prohibited As with the other employment discrimination statutes which prohibit age, race, sex, religious and national origin discrimination, the ADA and the state disability laws outlaw discrimination against the handicapped in all employment practices ---- including recruiting, hiring, placement, training, promotion, transfer, benefits and discharge (among others). Who Is Protected? The ADA protects applicants or employees who are "qualified individuals with disabilities." Note the word "qualified" ---- just having a disability doesn't mean you are protected by the law. One has a disability under the ADA if he/she is: 1. a person who has a physical or mental impairment that substantially limits one or more major life activities, or 2. a person who has a record of such impairment, or 3. a person who is regarded as having such an impairment. Individuals with substantial, chronic (on-going) impairments that limit major life activities such as speaking, walking, talking, hearing, seeing, breathing, etc. are individuals with a disability. Various medical conditions such as the following would usually be considered to be a disability: diabetes, epilepsy, AIDS, paralysis, mental retardation, M.S., substantial loss of hearing or vision, etc. Even individuals who are currently healthy but who have a history of a disabling condition would be considered to be covered by the ADA. An example would be an employee who is currently in remission after having had cancer. Those employees who are regarded as having a disability by their employer -- but aren't actually disabled -- are also considered to be
pile-cc
Let f = 3/2 - 19/10. Let v = 18979 - 18981. Which is the closest to v? (a) 3 (b) 0 (c) f (d) 4 c Let h = -4269 + 4269. Which is the closest to -0.03? (a) 2/5 (b) h (c) -1 b Let l(s) = -s**3 + 3*s**2 + 4*s - 8. Let h be l(4). Let p be ((-30)/h)/5 - 2/24. Let m = -12 - -47/4. Which is the nearest to m? (a) p (b) 0.4 (c) -1/3 c Let r(l) = l - 9. Let f(k) = k. Let h(o) = 4*f(o) + r(o). Let g be h(-4). Let d = g - -201/7. Which is the nearest to -2/7? (a) 0 (b) 0.06 (c) d c Let v = 3 + -3. Let o = 0.024 - -0.176. Let i be 2/5 + 612/(-630). Which is the closest to 5? (a) o (b) v (c) i a Let t = 0.2 + -1.2. Let i(b) = -19*b - 60. Let k be i(-3). What is the nearest to t in 5, 3/2, k? k Let r = -6 + 6.01. Let q = 52.55 - 49.55. Which is the nearest to r? (a) 3/4 (b) 0.5 (c) q b Suppose 5*o + 736 = -179*o. Which is the closest to 422? (a) -0.1 (b) 0.1 (c) o (d) -5 b Let n(t) = 2*t**2 - 11*t - 16. Let q be n(7). Let j = 1427.4 - 1427. Which is the nearest to -0.3? (a
dm_mathematics