text
stringlengths
173
4.38k
subset
stringclasses
13 values
~~~ whatshisface You _can_ get every conclusion you want out of QM without any wavefunction collapses, so there's no need to discuss it (depending on your purpose) and if you're an MW-er you'd argue that, further, there's no reason to believe that it even happens. Since there are several self-consistent "piles of words" that all talk about the same math but contradict each other, (Does the wavefunction collapse? Does 1600s literature simulate the simulacrum?) not talking about it seems completely justified. ~~~ mathgenius > You can get every conclusion you want out of QM without any wavefunction > collapses I don't think so. > "piles of words" I definitely agree about the piles. Maybe ordinary language is just to feeble for this stuff. ------ gtrubetskoy Would it be fair to say that the second law of thermodynamics is only "a law" given our human perspective of the direction of time? If time has no "arrow", but a memory is only possible in non-decreasing entropy which is our perspective, there can be another perspective in which the big bang is the future and our future is the past, only we cannot comprehend it because a memory is not possible in decreasing entropy? ~~~ danharaj The second law of thermodynamics is about entropy, which is an observer dependent quantity. It is the discrepancy between what one knows about a system (e.g. its temperature) and its state (e.g. the position and momentum of every particle in a classical gas). A being that knows the exact state of a system does not observe entropy increasing or decreasing. At least classically. I don't understand the rest of your question. ~~~ SomeHacker44 Digging deep into my memory of classical mechanics, I think this is along the right lines. However, I believe (seem to recall) entropy is an actual measure of the number of ways a system can be ordered in its details and still produce the same generalized outcome. A crystalline solid has relatively low entropy because you can be reasonably sure where each nucleus is, as they are highly ordered. A gas or plasma can have the nuclei distributed nearly randomly. Both systems can be
hackernews
Treatment of schizophrenia (SZ) patients with monoaminergic antagonist drugs (typical or atypical neuroleptics) has an antipsychotic effect, but negative symptoms and cognition are not significantly improved. Hence, there is an urgent need to find new molecular targets for the development of pharmacological agents active on cognitive deficits and negative symptoms. In this regard, nicotine receptor agonists are some of the most promising treatment options currently under investigation (Freedman et al, 2008). Postmortem examination of the brain of SZ
nih_exporter
In ruminants, interferon tau (IFNT) is synthesized and secreted by the mononuclear trophectoderm cells of the conceptus and maintains the corpus luteum and its secretion of progesterone for successful implantation and maintenance of pregnancy. In this study, we examined regulation of the expression of N-myc interactor (NMI) gene by IFNT in the ovine uterus based on results of microarray data from a study that compared gene expression by human 2fTGH and U3A (
pubmed_abstracts
2. Study patients ----------------- During the study period, 212 sputum samples from newly diagnosed pulmonary TB patients were subjected to culture. The mean age of the patients was 39±16.4 yr, and 128 (60.4%) were males. After excluding 21 contaminated or unculturable samples, 191 *M. tuberculosis* isolates comprising 142 (74.3%) from the Yangon region and 49 (25.7%) from the Mandalay region were subjected to phenotypic and genotypic DST. 3. Isolation of *M. tuberculosis* and phenotypic DST ---------------------------------------------------- Isolation of *M. tuberculosis* from sputum samples and DST with conventional culture was performed at the National TB Reference Laboratory (NTRL; Yangon, Myanmar) and Upper Myanmar TB Laboratory (Mandalay, Myanmar). *M. tuberculosis* was isolated from sputum samples according to the WHO method \[[@B5]\]. Sputum samples were decontaminated with N-acetyl-L-cysteine sodium hydroxide. After centrifugation at a speed of 3,000-3,500g for 15 min, the pellet was suspended in 1 mL 1×phosphate-buffered saline, inoculated on two Lowenstein-Jensen (L-J) media slants, and incubated at 37℃ for 6-8 weeks depending on the time required for the organisms to become evident. Mycobacterial growth was monitored every week. The *M. tuberculosis* isolates were identified according to growth rate and colony morphology. The Capilia TB test (Tauns, Numazu, Japan), an immunochromatographic assay that uses a monoclonal antibody to detect MPB64 antigen, was used to differentiate *M. tuberculosis* complex from non-tuberculous mycobacteria. Phenotypic DST was carried out on confirmed *M. tuberculosis* isolates. The test was performed on L-J media containing INH (0.2 µg/mL), RIF (40 µg/mL), SM (4 µg/mL), and EMB (2 µg/mL) according to the WHO-recommended proportional method for all primary isolates \[[@B6]\]. Inocula were cultured in a 37℃ incubator for 6 weeks, and the results were interpreted as susceptible or resistant. The standard criterion of the proportion method for classifying a strain as resistant was the ratio of the number of colonies obtained on drug-containing medium to the number of colonies obtained on drug-free medium (growth of ≥ 1% of
pubmed_central
I want to create wavy underlines using TextDecoration (in a control similar to RichTextBox). I did the following thing: private static Pen CreateErrorPen() { var geometry = new StreamGeometry(); using (var context = geometry.Open()) { context.BeginFigure(new Point(0.0, 0.0), false, false); context.PolyLineTo(new[] { new Point(0.75, 0.75), new Point(1.5, 0.0), new Point(2.25, 0.75), new Point(3.0, 0.0) }, true, true); } var brushPattern = new GeometryDrawing { Pen = new Pen(Brushes.Red, 0.2), Geometry = geometry }; var brush = new DrawingBrush(brushPattern) { TileMode = TileMode.Tile, Viewport = new Rect(0.0, 1.5, 9.0, 3.0), ViewportUnits = BrushMappingMode.Absolute }; var pen = new Pen(brush, 3.0); pen.Freeze(); return pen; } This almost works, but depending on the underlined word position in text, underlines often show up as a pattern of several superimposed waves. Also the underlines are a bit blurry even when they are correct (wpf problem with drawing between pixels, I suppose). My solution was kind of a trial-and-error, so I might have gone a wrong way, especially with Viewport/ViewportUnits. What am I doing wrong and is there a way to get crisp underlines? Thanks in advance. A: bstoney had a solution to this problem here. The key seems to be setting the Viewbox as well as the Viewport such that the waves are seperated vertically, so you only get 1 in the underline. There are some breaks in the wave that can be eliminated by extending it to the right and changing the Viewbox from so it starts from X=1 instead of 0: <VisualBrush x:Key="WavyBrush" TileMode="Tile" Viewbox="1,0,3,3" ViewboxUnits="Absolute
stackexchange
This invention relates generally to laser-based bar code symbol reading systems, and more particularly to an automatic bar code symbol reading system having a compact, lightweight, laser scanning engine arrangable for mounting on the body of the user for hands-free scanning applications. 2. Brief Description of the Prior Art Various types of laser scanning devices are in use and have been disclosed in the patent literature. Many of these scanners read bar codes, such as the Uniform Product Code (UPC), which are imprinted on products, labels affixed to products, or packaging for products. One type of scanner is referred to as a slot scanner. Typically slot scanners are mounted beneath or at the checkout counter of a retail establishment, such as a supermarket. Another type of scanner is a hand-held scanner. This type of scanner typically includes a grip portion held in one's hand to enable the scanner to be directed onto a bar code so that the scan pattern produced by the scanner traverses the bar code symbol in order to read it. In the last few years there has been increased development toward making hand-held scanners extremely small and lightweight. One such scanner is disclosed in my U.S. Pat. No. 4,930,848, whose disclosure is incorporated by reference, and which is assigned to the same Assignee as this invention. That scanner comprises a hand grip portion and a body portion. Within the body portion of the scanner is a "laser scanning engine" having all of the necessary optical, mechanical and electrical components required to produce a laser beam scanning pattern for reading bar codes and for receiving light reflected therefrom to produce an electrical signal indicative thereof. Other hand-held laser scanners are disclosed in the patent literature, including U.S. Pat. Nos. 4,387,297 (Swartz, et al.), 4,409,470 (Swartz, et al.), 4,460,120 (Swartz, et al.), 4,607,156 (Koppenall, et al.), 4,706,248 (Swartz, et al.), and 4,575,625 (Knowles). Although prior art hand-held scanners are capable of reading bar code symbols, they all typically must be held in the hand of the user so that the laser beam scanning pattern can be aimed at the bar code symbol. In the course of checking out customers' purchases at a checkout counter, a clerk is thus required to continually pick up the scanner, direct its laser beam onto the symbols to
uspto_backgrounds
Brian Boyer Brian Boyer (born October 24, 1969) is an American college basketball coach and the current head coach of the women's basketball team at Arkansas State University. Boyer has been the head coach at A-State for 20 years and has compiled an overall record of 333-287 and has won more games than any coach (men's or women's) in the school's history. Early life and education Boyer was born in Memphis, Missouri, a small farming community in the Northern part of the state. He attended Missouri Western where he earned a bachelor's degree in Physical Education in 1993. Coaching career Missouri Western Upon arriving at Missouri Western as a student, Boyer began working as assistant with the men's program in 1989 and moved to assistant with the men's program in 1993. During his time at Missouri Western, the Griffons made five NCAA Division II appearances (1990, 1991, 1992, 1994 and 1995) and captured two conference championships and advanced to the Sweet 16 in 1990 while with the men's program. After moving into his role with the women's program, Missouri Western and Boyer continued their joint success as the program made two NCAA Tournament appearances, including a trip to the Elite Eight in 1994 and a Final Four berth in 1995. Arkansas State In 1995, Boyer arrived at Arkansas State as an assistant under Jeff Mittie, who is the current head coach of the Kansas State Wildcats. Upon Mittie's departure in August 1999 to become the head coach at TCU, Boyer was promoted to the position of head coach. In his first season as head coach in 1999–2000, Boyer guided A-State to an 18-12 overall record and a second straight trip to the Women's National Invitation Tournament. His teams returned to the postseason in 2003–04 and 2004–05, both of which resulted in appearances in the WNIT. During the 2005 tournament, A-State hosted Arkansas at the Convocation Center in front of the largest crowd in arena history at 10,892. A-State won the game 98-84 and advanced to quarterfinals where the squad fell to Iowa. In 2013–14 Boyer's teams began a run of three consecutive WNIT berths that also included two regular season Sun Belt Conference championships. During the run the Red Wolves played in the Sun Belt Conference championship game twice and compiled 75 wins during the span.
wikipedia_en
### Disc global eccentricity As shown by [@Pearce2014; @Pearce2015doublering], a planet on an eccentric orbit can force an eccentricity in a disc of planetesimals through secular interactions. Here we aim to assess if HD 107146’s debris disc could have a global eccentricity and pericentre, using the same parametrization as in [@Marino2017etacorvi], i.e. taking into account the expected apocentre glow [@Pan2016]. We find that the disc is consistent with being axisymmetric, with a 2$\sigma$ upper limit of 0.03 for the forced eccentricity. We find though that the marginalised distribution of ${e_\mathrm{d}}$ peaks at 0.02 with a pericentre that is opposite to the residual inner clump. This peak is likely produced as the residuals are lower when the disc is eccentric and with an apocentre oriented towards the clump’s position angle due to apocentre glow. We therefore conclude that the fit is biased by the inner clump and that the disc is probably not truly eccentric. ### Inner component {#sec:modelin} In order to constrain the geometry or distribution of the inner emission found in the residuals, we add an extra inner component by introducing five additional parameters to our reference parametric model (3-power law surface density with a Gaussian gap). We parametrise its surface density as a 2D Gaussian in polar coordinates, with a total dust mass ${M_\mathrm{c}}$ and centered at a radius ${r_\mathrm{c}}$ and azimuthal angle ${\omega_\mathrm{c}}$ (measured in the plane of the disc from the disc PA and increasing in an anti-clockwise direction). The width of this Gaussian is parametrized with a radial FWHM ${\Delta r_\mathrm{c}}$ and an azimuthal standard deviation ${\sigma_{\phi}}$. Best fit values are presented in Table \[tab:mcmc\]. We find that this inner component is extended both radially and azimuthally, but concentrated around $19\pm3$ au and orthogonal to the disc PA (${\omega_\mathrm{c}}\sim90\degr$), as we found in the residuals of our axisymmetric model. In the right panel of Figure \[fig:res\] we present the model image of the best fit model and its residuals, which are below $3\sigma$ in both band 6 and 7 within the disc inner edge. We also find that the total
arxiv
<h2>Примеры</h2> <pre class="prettyprint">POST /api/hostgroups/636252244/puppetclass_ids { &quot;puppetclass_id&quot;: 281110143, &quot;hostgroup_class&quot;: { &quot;puppetclass_id&quot;: 281110143 } } 200 { &quot;hostgroup_id&quot;: 636252244, &quot;puppetclass_id&quot;: 281110143 }</pre> <h2>Параметры</h2> <table class='table'> <thead> <tr> <th>Имя параметра</th> <th>Описание</th> </tr> </thead> <tbody> <tr style='background-color:rgb(255,255,255);'> <td> <strong>location_id </strong><br> <small> необязательно </small> </td> <td> <p>Ограничить местоположением</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a Integer</p> </li> </ul> </td> </tr> <tr style='background-color:rgb(255,255,255);'> <td> <strong>organization_id </strong><br> <small> необязательно </small> </td> <td> <p>Ограничить организацией</p> <p><strong>Validations:</strong></p> <ul> <li> <p>Must be a Integer</p> </li> </ul> </td> </tr
github
As for the meat of his question-and-answer session, the Alabama coach was asked if he should now be compared to Bear Bryant considering that the Tide has won consecutive national titles and three of last four BCS championships. Saban said absolutely not. The highlights: – Saban also needled the media in regards to predictions. In the last 21 seasons, according to Saban, the media has picked the SEC champ just four times. “If as a coach I had a 4-17 record, I’d be back in West Virginia pumping gas,” Saban said. – Saban said that “it’s a challenge every year to re-invent your team.” – Alabama does open with Virginia Tech — “which has been a 10-team win team almost every year,” Saban said — then a road game at Texas A&M, the one team that beat last year’s Alabama team. – Saban was asked about the no-huddle offense and his previously voiced concerns about player’s safety. Saban didn’t really go back into his appeal and said he didn’t think the rules would change in that regard. He’s not a fan of the uptempo attacks. “Should we allow football to be a continous game? Is that the way the game was designed to play?” he said is one issue. The other is the “increased number of plays that players play in the game are there any safety issues in that.” – As for the Bryant comparisons, Saban said there was no comparison because Bryant did it over a longer period of time in so many different ways. And also Bryant should be measured not by titles but the affect he had on his players. “Bear Bryant is probably the greatest coach ever in college football,” Saban said. “The biggest thing is his impact (on) many players (in) positive ways. They all come back and say how he affected their life” And this: “There’s no way that we’ve done anything close to what he’s done his consistency over time.” – Saban was asked if he understood Les Miles’ scheduling concerns. LSU plays Florida and Georgia this year from the SEC East, while Alabama plays Kentucky and Tennessee. Miles wants an “equal path” to the championship. “There can never e an equal path to the championship,” Saban said. “Unless
pile-cc
Let z = 611.6 - 611.4. Let k = -9 + 6. Suppose 4*d = u + 21, -d = 3*u - 3 + 1. What is the closest to k in 2, u, z? u Let u = -35.8 + -338.2. Let h = 369 + u. Which is the closest to -2/5? (a) 2/5 (b) h (c) 0 c Suppose -47*r = 33*r + 54*r + 536. What is the closest to -0.1 in -8/3, r, -21, 1/2? 1/2 Let q = -115.99 + 113.99. Which is the nearest to 6? (a) q (b) 18/17 (c) 1 b Let v = -5311 + 5316. What is the nearest to -1 in v, -0.3, -20? -0.3 Let b be (3/2)/(51/442). Let t = 10 - b. Let y = 29 + -31. What is the nearest to -2/5 in y, t, -1? -1 Let p = -833/2020 - -5/404. What is the nearest to -3/4 in -1/2, p, 11, 2? -1/2 Let k be (6 + ((-561)/(-6))/(-17))*-4. What is the nearest to k in -1/4, -8/11, 1, 5? -8/11 Let y = 10567 - 10555. Which is the nearest to -2/5? (a) -4 (b) y (c) 3 c Suppose -6*l - 25 = -55. Let h = 979 - 978.6. What is the closest to -1/3 in h, l, 1/2, 2/17? 2/17 Let f be (-16)/(-6)*(11 + -5). Let z be (-9)/45*(-20)/f. Let v be 6/(-4)*(-4)/(-24). What is the nearest to -1/41 in v, z, 3? v Let g = 79.98 - 80.01. Which is the nearest to 0.
dm_mathematics
trading. It concluded we would not be able to have our execution personnel located in Japan and retain our desired flexibility to have margin-funded trading. My understanding is that John Greene is investigating other options -- I have been told to await further word on this -- Bob Robert E. Bruce Senior Counsel Enron Wholesale Services T (713) 345-7780 F (713) 646-3393 ro
enron_emails
United States Court of Appeals FOR THE EIGHTH CIRCUIT ___________ No. 97-2704 ___________ Glenn R. Waite, M.D., * * Appellant, * * Appeal from the United States v. * District Court for the * District of Nebraska. Judge Richard D. Sievers; Judge D. * Nick Caporale; Lanet S. Asmussen, * [UNPUBLISHED] * Appellees. * ___________ Submitted: December 5, 1997 Filed: December 23, 1997 ___________ Before McMILLIAN, BEAM, and MORRIS SHEPPARD ARNOLD, Circuit Judges. ___________ PER CURIAM. Glenn R. Waite, brought an action seeking damages under 42 U.S.C. §§ 1983 and 1985(3) against two Nebraska judges and a Nebraska court clerk. Waite claimed the defendants individually, and in conspiracy, denied him access to the courts and equal protection by refusing to file his pleading seeking to reopen an appeal in which the mandate had issued nearly three years earlier, and by concealing the judicial determination that such post-mandate pleadings would not be filed. Waite also sought declaratory relief. The district court1 granted summary judgment to defendants based on absolute judicial and quasi-judicial immunity, and denied declaratory relief. Waite appeals. We conclude summary judgment was proper. The evidence showed the defendant judges acted within their judicial capacity and jurisdiction regarding the post- mandate document and notification to Waite of the procedure being followed. See Mireles v. Waco, 502 U.S. 9, 11-12 (1991) (per curiam) (discussing parameters of judicial immunity). The evidence also established the defendant clerk acted at the judges& direction. See Rogers v. Bruntrager, 841 F.2d 853, 856 (8th Cir. 1988) (clerks absolutely immune from actions for damages arising from acts that “they are specifically required to do under court order or at judge&s direction”). Furthermore, any conspiracy claim against defendants cannot overcome the bar of absolute immunity
freelaw
====== exhilaration How does this compare to dotPeek from JetBrains? [https://www.jetbrains.com/decompiler/](https://www.jetbrains.com/decompiler/) ~~~ felickz2 Much better for newer features... for async/await dotpeek would show state machine ( which was actually cool to see), but JustDecompile would actually show me async await in decompiled code. ALSO, coolest feature is decompile to csproj ... very nice ;) ~~~ ttrashh I had the opposite experience. DotPeek created much better code. using statements were decompiled as usings, JustDecompile produced try/finally blocks. ------ taco_emoji [http://ilspy.net/](http://ilspy.net/) is what I generally use. Functionally modeled after .NET Reflector. ------ userbinator A .NET decompiler written in .NET: I bet "let's try it on itself!" was not an uncommon thought among its users already. It wasn't this one, but years ago I remember using a decompiler to look through things like the system libraries and the (relatively few) apps written in it at the time, and it was quite interesting how much metadata was available (if it hadn't been obfuscated). I think it's fun and enlightening to take things apart, see how they work, and modify them, so that aspect of .NET really appealed to me, but I still prefer native code for its efficiency and succinctness... ~~~ frik Before Minecraft, there was "Infiniminer" \- a decompiler was involved: Zachtronics discontinued development of the game less than a month after its first release as the result of its source code leak. As Barth had not obfuscated the C# .NET source code of the game, it was decompiled and extracted from the binaries. Hackers modified the code to make mods, but also started making clients that would target vulnerabilities in the game as well as build incompatible game forks that fragmented its user base. Barth, who was making the game for free, then lost interest and dropped the project, as development of the game had
hackernews
A method was developed to determine rates of incorporation of palmitic acid into different brain regions in the awake rat. The regional cerebral metabolic rate for palmitate, rCMRpalm, was determined. rCMRpalm ranged from 2 x 10-5 mol/g-sec at the internal capsule to 9.3 x 10-5 mol/g-sec at the median eminence, and was proportional to the regional cerebral metabolic rate for glucose. rCMRpalm is
nih_exporter
The aim of the present investigation was to evaluate the influence of liposome formulation on the ability of vesicles to penetrate a pathological mucus model obtained from COPD affected patients in order to assess the potential of such vesicles for the treatment of chronic respiratory diseases by inhalation. Therefore, Small Unilamellar Liposomes (PLAIN-LIPOSOMEs), Pluronic® F127-surface modified liposomes (PF-LIPOSOMEs) and PEG 2000PE-surface modified liposomes (PEG-L
pubmed_abstracts
Tumor reactivity of WT and PD-1^KO^ T cell clones on PD-L1 expressing cell lines {#s3-5} -------------------------------------------------------------------------------- We compared the reactivity of PD-1-edited and WT T cell clones on the Tap-deficient T2 cell line (stably expressing or not PD-L1) loaded with the Melan-A~A27L~ antigenic peptide, or on a HLA-A2 melanoma cell line expressing or not PD-L1. As the T2 cell line and cultured human melanoma cell lines do not express spontaneously PD-L1, we previously established these PD-L1 expressing cell lines through stable transfection of a PD-L1 expression plasmid.[@R36] The reactivity of T cell clones was tested on the PD-L1-positive cell lines and their non-transfected counterparts by IFN-γ and IL-2 specific ELISA tests after a 12 hours activation period ([figure 5A, B](#F5){ref-type="fig"}). Logically, IFN-γ production was decreased on activation of WT4 T cell clone by PD-L1 expressing T2 cell line loaded with the Melan-A~A27L~ peptide ([figure 5A](#F5){ref-type="fig"}, left panel, dotted line), compared with the PD-L1 negative T2 cell line (solid line). In contrast, the reactivity of the PD-1^KO^ T cell clone was not affected by PD-L1 expression on peptide-loaded T2 cells ([figure 5A](#F5){ref-type="fig"}, right panel). As expected, we obtained similar results with the wild-type and the PD-L1 expressing melanoma cell lines ([figure 5B](#F5){ref-type="fig"}), namely that IFN-γ and IL-2 production were decreased on activation of WT4 T cell clone by PD-L1 expressing melanoma cells (left panel, dotted lines), compared with non-expressing ones (solid lines), whereas the expression of PD-L1 by melanoma cells did not alter IFN-γ and IL-2 production by KO6 T cell clone ([figure 5B](#F5){ref-type="fig"}, right panel). Of note, we also observed that although not affected by PD-1/PD-L1 signaling, the KO6 T cell clone globally produced lower levels of IFN-γ and IL-2 than the WT4 T cell clone especially in response to melanoma cell lines,
pubmed_central
Q: Bootstrap dropdown submenu closing upstream submenu I have a two-level dropdown that's working great, but when I add another level, the JS seems to be removing the open class from the previous submenu, which means that the desired third-level menu can't be seen, even though it does get the open class added. I've tracked it down to this JS: $(function() { $('li.dropdown-submenu').on('click', function(event) { event.stopPropagation(); if ($(this).hasClass('open')){ $(this).removeClass('open'); } else { $('li.dropdown-submenu').removeClass('open'); $(this).addClass('open'); } }); }); This is, I think, doing the undesired closing of the previous submenu. The HTML is very similar to this example. Using an adaptation of the JS from that example, I get the third level, but then any given open submenu doesn't automatically close when clicking another submenu. $(document).ready(function(){ $('.dropdown-submenu a').on("click", function(e){ $(this).next('ul').toggle(); e.stopPropagation(); e.preventDefault(); }); }); Need the best of both here! A: I think you almost had it, you just needed to look for the different clicks. The approach I took below was to handle all a clicks but then check to see if it had a class of test which then followed your code verbatim or else, if it didn't have a class of test it then hides all the submenus and goes to it's default href. <script> $(document).ready(function(){ $('.dropdown-submenu a').on("click", function(e){ if ($(this).hasClass('test')) { $(this).next('ul').toggle(); e.stopPropagation(); e.preventDefault(); } else { $('.dropdown-submenu ul').hide(); } }); }); </script> Your updated working example: https://www.w3schools.com/code/tryit.asp
stackexchange
The present invention relates to the non-invasive magnetic imaging of anatomic tissue structures in isolation from surrounding tissues, and, in particular, to the non-invasive magnetic imaging of nerve tissues. The present invention more specifically relates to the non-invasive quantitative measurement of damage to nerve tissue, such as the damage that occurs upon compression. Clinically it is possible to estimate which neural pathway is involved in trauma by determining the end result loss of motor function and either abberant sensory function or complete loss of it. It is very difficult to determine where the lesion is and to what extent it has caused deterioration of the nerves involved. Peripheral nerves are compound structures. Each nerve trunk consists of a very large number of nerve “fibers” (neurites) that are protoplasmic extensions of neuronal cell bodies located in the dorsal root ganglia (sensory neurons) and ventral horn of the spinal cord (motor neurons). All nerve fibers (except fine pain fibers) are surrounded by a fatty sheath of myelin which serves to enhance nerve impulse conduction (neural flow). The nerve fibers are grouped into fasciculi, bundles of fibers bound together by a fine connective tissue membrane (epineureum). The bundles of fasciculi comprising the nerve trunk are bound by a thicker membrane, the perineureum. The nerve trunk may be surrounded by other layers of protective connective tissue or fat. Neuropathy in peripheral nerves may occur through the agency of traumatic distortion, including compression, stretch and breakage, and/or associated ischemia. The trauma may be acute, especially when the surrounding tissues are injured, or it may be chronic, and due to pathologic mechanical relations between the nerve and surrounding tissues: regional compression is considered to be the principal etiology in entrapment syndromes. There is rapid recovery from transient compression, but prolonged compression extends the recovery period because the nerve fibers are damaged. Remyelination and re-establishment of conduction must take place. Chronic and repetitive compression prevents recovery and results in severe neurologic impairment. In chronic and repetitive compressions, which are more common than acute compressions, the damage is more extensive. Nerve trunks become thinned at the site of the compression, but may swell proximally. Characteristically conduction is slowed and conduction blocks occur as long segments of myelin are damaged. Depending on the severity of the chronic compression, the nerve trunk proximally will contain a full complement of myelinated fibers within its fasciculi; but at the level of compression and distally the number of myel
uspto_backgrounds
Demos (U.S. think tank) Demos is a liberal think tank based in the United States. The group, which was founded in 2000, has a stated mission to "power the movement for a just, inclusive, multiracial democracy." History In the late 1990s, Demos was conceptualized by Charles Halpern, President of the Nathan Cummings Foundation (1989–2000). Halpern wanted to create a counter-argument to the growing influence of the many right-wing think tanks and establish a multi-issue organization that would focus on progressive policy development and advocacy. David Callahan, a Fellow at the Century Foundation, and Stephen B. Heintz, Vice-President of the EastWest Institute, joined Halpern in helping to found Demos. Founding board members included Arnie Miller, of Isaacson Miller, an executive search firm; David Skaggs, a Colorado Congressman; and Barack Obama, then an Illinois State Senator. In March 2000, Demos opened its first office in New York with Heintz as President. In this first year, Demos' work focused on solving economic inequities and increasing civic participation by developing a more inclusive democracy. These two areas continue to be a large part of Demos' core work. In 2001, Heintz stepped down and was replaced by Miles Rapoport, Connecticut legislator (1985–94) and Secretary of State (1995–98). In March 2014, Rapoport left Demos to become the President of Common Cause. Heather McGhee, formerly the Vice President of Policy and Outreach, became President of Demos. McGhee is now a Distinguished Senior Fellow at Demos. In 2018, Demos named Sabeel Rahman as the new president. Voting rights Demos was part of a settlement in a lawsuit, filed in 2005, alleging Ohio Secretary of State Ken Blackwell, Governor Bob Taft, and their predecessors failed to protect the fundamental rights of eligible Ohio voters to cast a meaningful ballot, as required by the Equal Protection and Due Process Clauses of the Fourteenth Amendment to the United States Constitution. The settlement was binding and required the state to provide for uniformity and consistency in Ohio election procedures so that the opportunity to vote can be enjoyed equally by all Ohio citizens. See also Democratic deficit References External links Category:Civil rights organizations in the United States Category:Non-
wikipedia_en
We then have the following result: \[th:L1\] We assume here that the system is positive and that $w\in L_1$. Then, the following statements are equivalent: (a) The system with is stochastically stable in the $L_1$-sense and the $L_1$-gain of the transfer $w\mapsto z$ is equal to $\gamma^*>0$. (b) The $L_1$-gain $\gamma^*>0$ of the system is the optimal value of the linear program $$\gamma^*=\inf_{\gamma>0,\lambda_1>0,\ldots,\lambda_N>0}\gamma$$ such that $\lambda_i\in\mathbb{R}_{>0}^n$, $i=1,\ldots,N$, and $$\label{eq:L1cond1} \begin{array}{rcl} \hspace{-10mm}A_i^T\lambda_i+\sum_{j=1}^N\left(\pi_{ij}I_n+p_{ij}(h)A_{h,j}^T\right)\lambda_j\\ \qquad \quad+\sum_{j=1}^N\left(p_{ij}(h)C_{h,j}^T+C_i^T\right) \mathds{1}_{n_z}&<&0\\ E_i^T\lambda_i-\gamma \mathds{1}_{n_w}+F_i^T\mathds{1}_{n_z}&<&0 \end{array}$$ for all $i=1,\ldots,N$. (c) The $L_1$-gain $\gamma^*>0$ of the system verifies the expression $ \gamma^*=||\bar G(0)||_1$. [$\vartriangle$]{} Stochastic $L_\infty$ performance of positive Markov jump linear systems ------------------------------------------------------------------------ Let us consider now the computation of the $L_\infty$-gain which is given by: The stochastic $L_\infty$-gain of the system is defined as the smallest $\xi>0$ such that $$\sup_{t\ge0}\{||\operatorname{ \mathbb{E}}[z(t)]||_\infty\}]\le\xi\sup_{t\ge0}\{||\operatorname{ \mathbb{E
arxiv
"chat.message-history": "訊息紀錄", "chat.message-deleted": "訊息已刪除", "chat.options": "聊天設定", "chat.pop-out": "彈出聊天視窗", "chat.minimize": "最小化", "chat.maximize": "最大化", "chat.seven_days": "7天", "chat.thirty_days": "30天", "chat.three_months": "3個月", "chat.delete_message_confirm": "您確定刪除此訊息嗎?", "chat.retrieving-users": "搜尋使用者", "chat.manage-room": "管理聊天室", "chat.add-user-help": "在這裡搜尋更多使用者。選中之後加入到聊天中,新使用者在加入聊天之前看不到聊天訊息。只有聊天室所有者(<i class=\"fa fa-star text-warning\"></i>)可以從聊天室中移除使用者。", "chat.confirm-chat-with-dnd-user": "該使用者已將其狀態設置為 DnD(請勿打擾)。 您仍希望與其聊天嗎?", "chat.rename-room": "重新命名房間", "chat.rename-placeholder": "在這裡輸入房間名字", "chat.rename-help": "這裡設定的房間名字能夠被房間內所有人都看到。", "chat.leave": "離開聊天室", "chat.leave-prompt": "您確定要離開聊天室?",
github
Wireless Technology Around 100% of consumers in Beemer (Cuming County), NE have access to mobile broadband service. Average upload speed For residents in Beemer, NE, the county-wide average upload speed is 6 Mbps Average download speed For residents in Beemer, NE, the county-wide average download speed is 9 Mbps. Locate all of the best top-rated Internet providers in Beemer, NE With Wirefly, it’s incredibly easy to find new Internet service in your city. Wirefly’s comprehensive comparison tools enable you to search for Internet providers, plans, and packages in Beemer, NE. Wirefly also allows you to compare by a myriad of features like connection speed and more. Check out the benefits of each Internet service plan, and also check the rating score by the providers’ current and former users to see how well each Internet provider is rated, and how much their Internet plans cost when compared to other providers. In this day and age, it’s extremely important to have a fast and reliable Internet connection. Whether you need Internet for leisure or work, online teleconferencing, online gaming, or streaming video, your Internet connection needs to have enough bandwidth and speed to support your online activities. There are a host of Internet service providers available to you to choose between in Beemer, NE. Find the best TV package for you in Beemer, NE Can't decide which television service to choose? Get help finding and selecting the TV plan that's perfect for you in Beemer, NE by using the tools here on Wirefly. We have assembled a great selection of TV deals and packages from the most popular TV service providers to make comparing plans and providers easy. Whether you're looking for basic TV programming or want a premium plan that offers the best collection of local and international news, sports, dramas, and more, we can help you find what you need. Simply enter your ZIP code into the search box to start comparing plans. Not sure which providers in Beemer, NE customers trust the most? Use our tool to see which providers can offer you the best TV service in your area. Our television plans showcase the best in affordable programming with a range of programming options and prices. Ready to start shopping? Use our tool now and explore TV plans and packages available in your area. Save money on TV, internet, and phone service bundles in Beemer, NE
pile-cc
What is 1593020 rounded to the nearest ten thousand? 1590000 What is 0.000011533 rounded to 6 decimal places? 0.000012 Round -7.7235 to one decimal place. -7.7 Round -1359.3 to the nearest one hundred. -1400 Round -0.010605 to 5 decimal places. -0.01061 What is 0.003223 rounded to four dps? 0.0032 Round -2494800 to the nearest 1000000. -2000000 Round 0.0012757 to 4 decimal places. 0.0013 What is 0.01424 rounded to 4 dps? 0.0142 Round -256.46 to the nearest ten. -260 Round 0.0000077382 to six dps. 0.000008 What is -54040 rounded to the nearest 10000? -50000 Round 0.0001359 to five dps. 0.00014 Round -82765000 to the nearest 1000000. -83000000 Round 1621.9 to the nearest 10. 1620 Round 0.81696 to 1 dp. 0.8 Round 8600.71 to the nearest 1000. 9000 Round -33096 to the nearest 10000. -30000 What is -17382600 rounded to the nearest 1000000? -17000000 Round -219070 to the nearest 1000. -219000 What is 58610 rounded to the nearest 10000? 60000 What is 0.0000016848 rounded to 6 dps? 0.000002 Round 1.305 to one dp. 1.3 What is 269.68 rounded to zero dps? 270 Round 0.000010065 to 7 dps. 0.0000101 Round -11690000 to the nearest one million. -12000000 What is -3721.3 rounded to the nearest 100? -3700 What is 0.000323 rounded to four decimal places? 0.0003 Round -0.001666 to 4 dps. -0.0017 What is -186.73 rounded to 0 dps? -187 What is 20200000 rounded to the nearest 1000000? 20000000 Round 0.0000664916 to seven decimal places. 0.0000665 Round 0.0000819 to
dm_mathematics
Ladies and Gentlemen, I would like to remind you that only postID of calcs that have TDS Flag (in Port Calc screen) set to "1" are included in TDS position load. We have noticed that ST-Bammel, ST-Bridgeline, GD-Texas,... and many more desks do not have the TDS Flag set to "1". Please call me (x30413
enron_emails
November 6, 2000 Before HIGGINBOTHAM, WIENER, and BARKSDALE, Circuit Judges. PER CURIAM:* Michael Hacker appeals his sentencing after having pled guilty to conspiracy to possess with intent to distribute marijuana. He argues that the district court clearly erred (1) in its determination of drug quantity for purposes of relevant conduct; (2) in denying a downward adjustment in his offense level for acceptance of responsibility; and (3) by assigning one criminal * Pursuant to 5TH CIR. R. 47.5, the court has determined that this opinion should not be published and is not precedent except under the limited circumstances set forth in 5TH CIR. R. 47.5.4. history point to his conviction for driving without insurance. Upon review of the records, briefings, and applicable case law, we conclude that the district court committed no reversible error. Hacker failed to produce evidence sufficient to rebut both the PSR's estimate of drug quantity and the testimony of the case agent, upon which the PSR estimate was based. Hacker's conclusory assertion that he made only 15 deliveries of marijuana, averaging only 40 pounds per delivery, is insufficient to establish clear error.1 In addition, Hacker tested positive for marijuana use on two separate occasions while on pretrial release. Even if these positive tests were based on Hacker's addiction to marijuana, they support the district court's decision to deny him the acceptance- of-responsibility adjustment.2 Finally, because the misdemeanor conviction resulted in a 60- day sentence of imprisonment and one year of probation, the district court did not err in applying it to a determination of Hacker's criminal history score. Indeed, Hacker's conviction for driving without insurance is "similar" to "[d]riving without a 1 See United States v. Mir, 919 F.2d 940, 943 (5th Cir. 1990). 2 See United States v. Flucas, 99 F.3d 177, 180 (
freelaw
Each member of the association pays something like $5000 for their part of the network, but that's tax deductible to some extent. ~~~ Xichekolas In the US, we'd probably call these 'economic associations' co-operatives, or co-ops for short. There are several municipalities trying to do something like that here. The problem is that the local telephone and cable companies lobby state governments to pass laws making it illegal to do so. It's rather ridiculous. ~~~ sp332 Burlington Telecom is one of the more successful, from Vermont: <http://www.burlingtontelecom.net/> ------ alex_c I know very little about telecom infrastructure, so this might have a really obvious answer - but why does the last stretch HAVE to to be underground? In other words, why isn't a "skip the trench, save $400" model feasible? ~~~ imajes I would suggest that: \- fiber is relatively more expensive than simple copper strands; \- hanging a cable from a telephone pole to the house is not resilient to weather; \- fiber can snap easily, and needs to be wrapped in thick protection: see point 2 \- most of it comes underground now so it'd be a waste to break out into the air and: wifi from cabinets in the street would be weird. :) ~~~ Xichekolas But is there any reason I couldn't run it in plastic tubing along the bottom of my fence for instance? Only thing I can think of is below freezing temps, which you wouldn't get when below the frost line. ------ pasbesoin Unrelated except for the impression it forms in me: This story reminds me of encountering one of the chief officers of a small/midsize electric power company in Iowa, back in the 1980's. They were actively working _with_ Amory Lovins, of the Rocky Mountain Institute, on energy conservation because they recognized that the resultant leveling of peak generation demands made them _more_ profitable. They sold less power, but their margins improved enough to more than compensate. Everyone won. It's always impressive to find a company willing to think outside of the established "box", and to work with their customers. To my mind, it represents a generalized
hackernews
Numerous recent studies link development of type 2 diabetes (T2D) to endoplasmic reticulum (ER) stress, a condition that occurs whenever protein-folding requirements overwhelm protein-folding capacity in the secretory pathway. Notably, there is mounting evidence that ER stress contributes to diminished glucose-responsive insulin secretion in ?-cells, to ?-cell apoptosis, and to general peripheral insulin resistance, all hallmarks of T2D. ER stress triggers the unfolded protein response (UPR)
nih_exporter
Roentgen stereophotogrammetric analysis (RSA) measures micromotion of an orthopaedic implant with respect to its surrounding bone. A problem in RSA is that the markers are sometimes overprojected by the implant itself. This study describes the so-called Marker Configuration Model-based RSA (MCM-based RSA) that is able to measure the pose of a rigid body in situations where less than three markers could be detected in both images of an RSA radiograph. MCM-
pubmed_abstracts
Our Western blot analysis showed that transgenic protein was expressed in the cortex and cerebellum from the earliest time point assayed, six weeks post-gestation, through 12 months of age. As has been previously reported, in non-transgenic animals we detected nuclear β-catenin only in the thalamus and other deep grey matter structures \[[@B31]\]. In transgenic lines expressing mutant, stabilized protein, immunohistochemical analysis revealed nuclear β-catenin in both internal granule layer (IGL) and molecular layer neurons of the cerebellum. Cortical neurons and hippocampal granule and pyramidal cells also contained nuclear β-catenin in transgenic but not non-transgenic animals. We also examined the subcellular localization of mutant β-catenin in newborn transgenic mice. In these P0 animals we failed to identify nuclear β-catenin in the proliferative cells of the cerebellar external granule cell layer or in periventricular neuroblasts. Thus in our transgenic animals, aberrant Wnt activation appears to be limited to mature, postmitotic neurons. Wnt activation in the adult hippocampus, cortex and cerebellum did not result in tumors or other CNS malformations. Strain effects are unlikely to have played a role in this lack of a neoplastic phenotype, as mice with the same background as the one we used have previously been shown to develop medulloblastomas \[[@B12]\]. We further attempted to induce CNS tumors by abrogating p53 function in conjunction with transgenic β-catenin expression. The rational for this approach was the markedly increased incidence of medulloblastomas seen in PTCH heterozygotes deficient for p53, and the enhanced intestinal adenoma phenotype of *p53*null, APC heterozygous *Min*mice \[[@B12],[@B32]\]. We did not observe any significant phenotypic changes in the CNS of β-catenin transgenic animals heterozygous or homozygous for disruption of the *p53*locus. However, most of the β-catenin transgenic mice heterozygous for *p53*were followed for only 9 months, and it is possible that some of these mice could develop tumors at a later age. In transgenic mice expressing mutant β-catenin in the breast or colon, protein levels similar to those we describe are sufficient to promote abnormal differentiation and tumors. Harada and colleagues documented intestinal polyposis in β-catenin transgenic mice with a less than 2-fold increase in β-catenin protein level in the polyps \[[@B33]\]. The authors point out that because the transgene was only expressed in a fraction of cells in this tissue, protein levels are likely higher in some epithelial cells
pubmed_central
Q: Android How can I using Cursor get image and video thumbnails in my direct path both? How can I using Cursor get image and video thumbnails in my direct path in same cursor? I need get the image and video thumbnails in /DCIM/100ANDRO folder. But I just can separate to get image and video in at sd card all data. private ArrayList<ImageItem> getData() { final ArrayList<ImageItem> imageItems = new ArrayList<>(); ContentResolver cr = mContext.getContentResolver(); String[] projection = {MediaStore.Images.Thumbnails.DATA, MediaStore.Video.Thumbnails.DATA}; Cursor cursor = cr.query(MediaStore.Images.Thumbnails.EXTERNAL_CONTENT_URI,projection,null,null,null); for( int i = 0 ; i < cursor.getCount(); i++) { cursor.moveToPosition(i); String filePath = cursor.getString(cursor.getColumnIndex(MediaStore.Images.Thumbnails.DATA)); Log.i("info","filePath:"+filePath); File file = new File(filePath); Bitmap myBitmap = BitmapFactory.decodeFile(file.getAbsolutePath()); imageItems.add( new ImageItem(myBitmap, "Image#" + i) ); } cursor = cr.query(MediaStore.Video.Thumbnails.EXTERNAL_CONTENT_URI,projection,null,null,null); for( int i = 0 ; i < cursor.getCount(); i++) { cursor.moveToPosition(i); String filePath = cursor.getString(cursor.getColumnIndex(MediaStore.Video.Thumbnails.DATA)); Log.i("info","filePath:"+filePath); File file = new File(filePath); Bitmap myBitmap = BitmapFactory.decodeFile(file.getAbsolutePath()); imageItems.add( new ImageItem(myBitmap, "Image#" + i) ); } cursor.close(); return imageItems; } Have possible using cursor direct folder
stackexchange
Furthermore, in the printing apparatus described in JP-A-2000-15837, ink is selectively supplied from at least a pair of ink cartridges for supplying the same color ink to an ink jet type recording head via an ink supply valve. In the printing apparatus, when an ink depletion detection unit detects that one of the ink cartridges is depleted, the valve is switched by valve opening and closing control unit, whereby the printing can be continued. However, in the printing apparatus of JP-A-2003-1842, if ink remains in any one of a plurality of ink tanks, ink dots are formed by the use of the nozzle row supplied with ink from the ink tank of the side where ink remains. In this case, the additional nozzle row and the black ink nozzle row are shifted by two dots in the sub scanning direction, and the dots printed in the first main scanning are different from each other between the additional nozzle row and the black ink nozzle row, and thus, there is a need to create the different print data depending on the use nozzle row. In this case, upon detecting the ink depletion, the ink tank of the ink depletion is confirmed (a cartridge confirmation process), and the nozzle row connected to another ink tank, where ink remains, is selected in the use nozzle row (a nozzle row selection process). Moreover, the print data depending on the selected use nozzle row is generated (a print data generating process). Furthermore, the reception place of the print data confirms whether or not the print data is correct depending on the use nozzle row (a data confirmation process). Moreover, when it is confirmed that the print data is correct corresponding to the use nozzle row, the print data is set to the driving system of the corresponding nozzle row and an ink droplet is ejected from the use nozzle row of the recording head, thereby performing the printing on the paper. In this manner, since there is a need to discriminate the nozzle row connected to the ink cartridge of the side in which ink remains and generates the print data depending on the discriminated nozzle row, as mentioned above, there is a need for a plurality of processes such as the cartridge confirmation process, the nozzle selection process, the print data generating processing, and the data confirmation process. For this reason, the process to be performed when the ink in the ink tank becomes depleted is complicated. As a consequence, there is a problem in that the process burden of a CPU due to the complication of the process is increased, and it is difficult to share the processing program between types of model
uspto_backgrounds
The AtlantiCare Regional Medical Center Mainland Campus is a 323-bed hospital, opened in 1975, and located in the Pomona section of Galloway Township, New Jersey, United States. Situated on the Stockton University campus, the Mainland Campus experienced a 44% growth in admissions from 1986 to 1992. The Mainland Campus completed a $16 million modernization or renovation project in early 1992. History What was once called Atlantic City Hospital in the late 19th century and early 20th century, and became Atlantic City Medical Center, and is now AtlantiCare Regional Medical Center has a history that is deeply tied to the roots of Atlantic City, New Jersey. Early years It wasn't until the late 1880s that community leaders took steps to provide basic medical care for Atlantic City residents and visitors. They designated a room in the old City Hall for medical emergencies and set up another building outside city limits to treat contagious diseases. This arrangement seemed to work for a while, especially since a private sanitarium—which could house additional patients—was built a few years later. However the sanitarium did not admit anyone with an infectious disease. Then, in 1895 and 1896, two disastrous incidents occurred that made people think about the adequacy of medical care in Atlantic City. First, a building collapsed during a crowded Elks convention, injuring too many people to be cared for at City Hall. The following year, a major railroad accident resulted in 100 patients, all of whom had to be cared for at the sanitarium. What would happen the next time there was an accident or health crisis? The proprietor of the sanitarium was considering ending his contract with the city. The time had come for Atlantic City to have a hospital. Creation of hospital At first it seemed that constructing a hospital in Atlantic City would be difficult. Only two people, John P. Rochford, founder of the sanitarium, and Alfred W. Heston, city comptroller, attended the initial meeting on February 17, 1897. Rochford and Heston immediately elected each other temporary president and secretary, respectively, and named a board of nine other members. After several meetings of the full board, the Atlantic City Hospital Association was incorporated on April 8, 1897. Their first step was to find a location for the hospital. The Association chose a converted white house on Ohio Ave. and realized $16,000 to purchase it. The newly formed Ladies A
wikipedia_en
\[lem:lowerBoundOnZ\] If $A \subseteq {\mathbb{F}}_2^n$, $|A+A| = K|A|$, then $\operatorname*{E}[Z] \geq \frac{|A|}{16 K^2}$ (where the expectation is over the uniform random choice of $\beta_1$ to $\beta_4$ in $A$). We see that $$\begin{aligned} \operatorname*{E}[Z] &= \operatorname*{E}\Bigl[ \sum_{a \in A} {\langle}a \in A({\beta_1+\beta_2}) \land |A({\beta_1+\beta_2})|\geq\tfrac{|A|}{2K} {\rangle}\times\nonumber\\ &\qquad\qquad\qquad\qquad {\langle}a \in A({\beta_3+\beta_4}) \land |A({\beta_3+\beta_4})|\geq\tfrac{|A|}{2K}{\rangle}\Bigr] \\ & = \sum_{a \in A} \Pr\Bigl[a \in A({\beta_1+\beta_2}) \land |A({\beta_1+\beta_2})|\geq\frac{|A|}{2K}\Bigr]^2\\ &\geq \frac{ \Bigl(\sum_{a \in A} \Pr[a \in A({\beta_1+\beta_2}) \land |A({\beta_1+\beta_2})|\geq\frac{|A|}{2K}]\Bigr)^2}{|A|}\label{eq:1}\end{aligned}$$ We now observe that $$\begin{aligned} \Pr_{\beta_1,\beta_2 \in A}\Bigl[|A({\beta_1+\beta_2})| \leq \frac{|A|}{2K}\Bigr] \leq \frac{|A+A| \frac{|A|}{2K}}{|A|^2} = \frac12.\end{aligned}$$ and so $$\begin{aligned} \MoveEqLeft{\sum_{a \in A} \Pr\Bigl[a \in A({\beta_1+\beta_2}) \land |A({\beta_1+\beta_2})| \geq \tfrac{|A|}{2K} \Bigr
arxiv
<div role="navigation" aria-label="breadcrumbs navigation"> <ul class="wy-breadcrumbs"> <li><a href="index.html">Docs</a> &raquo;</li> <li>supplychainpy.bot package</li> <li class="wy-breadcrumbs-aside"> <a href="_sources/supplychainpy.bot.rst.txt" rel="nofollow"> View page source</a> </li> </ul> <hr/> </div> <div role="main" class="document" itemscope="itemscope" itemtype="http://schema.org/Article"> <div itemprop="articleBody"> <div class="section" id="supplychainpy-bot-package"> <h1>supplychainpy.bot package<a class="headerlink" href="#supplychainpy-bot-package" title="Permalink to this headline">¶</a></h1> <div class="section" id="submodules"> <h2>Submodules<a class="headerlink" href="#submodules" title="Permalink to this headline">¶</a></h2> </div> <div class="section" id="module-supplychainpy.bot.dash"> <span id="supplychainpy-bot-dash-module"></span><h2>supplychainpy.bot.dash module<a class="headerlink" href="#module-supplychainpy.bot.dash" title="Permalink to this headline">¶</a></h2> <dl class="class"> <dt id="supplychainpy.bot.dash.ChatBot"> <em class="property">class </em><code class="descclassname">supplychainpy.bot.dash.</code><code class="descname">ChatBot</code><a class="headerlink" href="#supplychainpy.bot.dash.ChatBot" title="Permalink to this definition">¶</a></dt> <dd><p>Bases: <code class="xref py py-
github
Whenever there is a vicious storm or some other type of catastrophe, it never fails that Americans get in gear and do their best to assist others in need. As Hurricane Harvey devastated Texas and Irma did her worst in Florida and Georgia, the best in America rallied to their aid and it was a very heartwarming thing to see. In the course of modern American history, however, it has become a tradition of the Left to ensure that not only is someone a victim of this havoc, but someone is ultimately to blame. If it is a government entity, its an elected official. If it’s not an elected official, it’s a talk radio show host. When it comes down to it, the Left finds it very lucrative and enjoyable to have an opportunity to blame someone…anyone for the disasters that take place, especially when they can link them to Global Warming or man-made issues. Celebrities, of course, always manage to take their whack at the Republican Party as well. True to form, Stevie Wonder decided that going political during a rescue and recovery telethon effort was more important than the people who were hurting! The Daily Caller: Singer Stevie Wonder kicked off Tuesday’s star studded Hand In Hand telethon to raise money for hurricane recovery by getting political. Wonder started the show by saying, “Anyone who believes that there’s no such thing as global warming must be blind or unintelligent.” The Hand In Hand telethon was run on every broadcast network to benefit victims of hurricanes Harvey, which devastated the Houston area, and Irma, which slammed Florida over the weekend. The event mirrors past telethons for natural disasters. The 2005 telethon to raise money for victims of Hurricane Katrina became known for Kanye West’s infamous anti-President George W. Bush comments. “George Bush doesn’t care about black people,” West said as a stunned Mike Meyers looked on. In addition to musical performances, celebrities took phone calls during Tuesday’s telethon from people making pledges to help those in need. Interestingly, the whole Comic Relief show that was made famous on HBO for its charity work, was also ensconced in scandal once upon a time when it was discovered that 80% of the donations and proceeds had gone to pay the comics themselves. When it comes to the Left and its useful idiots in Hollywood, there is no shameful when it
pile-cc
7/120 Three letters picked without replacement from {j: 4, h: 1, n: 4, z: 4, t: 1, y: 1}. What is prob of sequence yzj? 8/1365 What is prob of sequence rdd when three letters picked without replacement from {d: 7, r: 3, j: 8}? 7/272 Two letters picked without replacement from {v: 2, u: 1, n: 2}. What is prob of sequence uv? 1/10 Calculate prob of sequence wm when two letters picked without replacement from ywwwmwymmw. 1/6 Four letters picked without replacement from {e: 4, t: 1, y: 5, o: 1}. Give prob of sequence teye. 1/132 What is prob of sequence ua when two letters picked without replacement from uuuuaaaaau? 5/18 Calculate prob of sequence di when two letters picked without replacement from {v: 3, i: 1, w: 1, c: 3, n: 2, d: 1}. 1/110 Calculate prob of sequence ttss when four letters picked without replacement from {i: 1, s: 2, t: 11}. 5/546 Calculate prob of sequence qq when two letters picked without replacement from {t: 8, r: 1, s: 9, q: 2}. 1/190 Two letters picked without replacement from kgtvgvv. Give prob of sequence kv. 1/14 Calculate prob of sequence sff when three letters picked without replacement from {f: 9, s: 10}. 40/323 What is prob of sequence xff when three letters picked without replacement from fxffx? 1/5 What is prob of sequence lul when three letters picked without replacement from {f: 4, u: 5, l: 5}? 25/546 Two letters picked without replacement from iditavv. Give prob of sequence dt. 1/42 Four letters picked without replacement from bbbdbbbbvjdjobbbbbbb. What is prob of sequence ddbb? 91/29070 Four letters picked without replacement from eddrrqdrqdedd. Give prob of sequence edde. 1/286 Three letters picked without replacement from {u: 2, s: 6, k: 2, c: 1
dm_mathematics
Rhonda L Denton 04/27/2001 05:06 PM To: Kay Mann/Corp/Enron@ENRON cc: Sharen Cason/HOU/ECT@ECT Subject: Re: Long form There are no riders. Elizabeth or Janice may be able to help you with muni language. I will ask Sharen on Monday (confirm queen) if she is aware of any muni language that she has used
enron_emails
Rance V. Buehler and Philip W. Domagalski, of Chicago, for appellant. Paul D. Frenz and Elias N. Matsakis, of McBride, Baker, Wienke & Schlosser, of Chicago, for appellees. Reversed and remanded. MR. JUSTICE UNDERWOOD delivered the opinion of the court: Plaintiff, an auto insurer, filed this subrogation action in the circuit court of Cook County, seeking to recover from defendants certain payments plaintiff made to its insured under the property damage and medical payments provisions of the insured's auto policy. Defendants moved to dismiss, raising as a bar a general release running from the insured to defendants. The circuit court dismissed the complaint and the appellate court affirmed (49 Ill. App.3d 569), citing an "unbroken line of Illinois appellate *211 court cases which support the circuit court's ruling that plaintiff's claim is barred by the insured's release to the defendants" (49 Ill. App.3d 569, 571). We granted leave to appeal and now reverse. Plaintiff-insurer alleged that on August 2, 1974, defendant Gary L. Gardner, an employee of defendant Ingram Barge, Inc., negligently drove an automobile owned by defendant Hertz Corporation so as to injure plaintiff's insured and damage his auto. Plaintiff also alleged that it paid its insured's property damage and medical payments policy claims in the amount of $2,082.36 and that it thereby became subrogated to the interests of the insured to the extent of those payments. Ingram submitted in support of its motion to dismiss a full and final release of all personal injury and property damage claims arising from the accident, which release was executed by the insured in consideration of the payment to him of $6,000. It is not disputed that this release had been executed by the insured in connection with the settlement of his separate suit against the defendants here for personal injury damages and the $100 property damage paid by him under his deductible clause, and that no recovery had been sought in that suit for the property damage paid by the insurer. It is also undisputed that defendants had notice of plaintiff's subrogation rights prior to the settlement of the insured's suit and the signing of the release. The precise question before us is whether an unlimited general release by an insured of all claims against a tortfeasor bars a subrogation action by an insurer-subrogee against that tortfeasor, where
freelaw
~~~ josephagoss I do wonder... I love the Satoshi speculations a lot, I think Bitcoin is awesome enough as it is, but to add that the creator is unknown just makes the story even more compelling. If Bitcoin does take off or a derivative based on Bitcoin, it will be weird having this anonymous guy as the creator. Most computer science history has no large mystery like Bitcoin will have. (If Bitcoin is still around in a decade or more) Very exciting. ~~~ mortenjorck It's funny, of all the William Gibson imaginings that have found their way into real life, Bitcoin is probably the most purely Gibsonian, in its plotline of the anonymous, genius creator of some earth-shaking thing whose identity is the stuff of legendary speculation. Makes me wonder if there's a Bigend out there with a crack team of Satoshi researchers on a globetrotting adventure... ~~~ waterlesscloud With millions of dollars piling into bitcoin, both via startups and via direct purchase of coins on the markets, it does seem likely that someone somewhere has put a "due dilligence" team on the case. I wonder what, if anything, they've found... ------ YAYERKA I find it troublesome that some of the code in BitMessage seems to be taken directly from Stackoverflow.com responses (it actually reminds me a lot of what I see happening at school). With that being said -- I do appreciate that this is new and can be improved upon quickly by a community of people with interest in such a system. [0] [https://github.com/Bitmessage/PyBitmessage/blob/master/src/a...](https://github.com/Bitmessage/PyBitmessage/blob/master/src/addresses.py#L18) [1] [http://stackoverflow.com/questions/1119722/base-62-conversio...](http://stackoverflow.com/questions/1119722/base-62-conversion- in-python) ~~~ dpacmittal I don't see anything wrong with taking a working and bug-free code/function and using it in your own software given the snippet is in public domain. Why
hackernews
Principal Investigator/Program Director (Last, first, middle): Miller, Josef, M. RESEARCH &RELATED Other Project Information 1. * Are Human Subjects Involved? l Yes m No 1.a. If YES to Human Subjects Is the IRB review Pending? l Yes m No IRB Approval Date: Exemption Number: 1 2 3 4 5 6 Human Subject Assurance Number 00004969 2. * Are Vertebrate Animals Used? m Yes l
nih_exporter
[Stability analysis of an enhanced load sharing dynamic pedicle screw fixation device and its equivalent rigid device]. To compare the stability of an enhanced load sharing dynamic pedicle screw fixation device with its equivalent rigid device and to evaluate biomechanical roles of the dynamic fixation. A model of L(1) body fracture was produced on seven specimens of fresh adult cadaver spine from T(10) to L(4). Both dynamic and rigid devices were applied in the specimens to strength the injured level. R
pubmed_abstracts
### NCCM-derived EVs and proteins induce GAG deposition in canine and human CLC micro-aggregates {#s2_2_1} Based on the expected EV sizes and protein measurements, the three NCCM SEC fractions with most EVs and proteins (P) were separately collected ([Supplementary Figure 3](#SD1){ref-type="supplementary-material"}). Part was directly used in culture (EV~qEV~ and P~qEV~), and part was subjected to 100,000*g* UC and thereafter used in culture (EV~UC~ and P~UC~). After 7 days of culture, no treatment significantly influenced the canine micro-aggregates' DNA content compared with controls (Figure [3a](#F3){ref-type="fig"}). The GAG and GAG/DNA content of the canine micro-aggregates were, however, significantly increased by 7-day unfractionated NCCM, EV~qEV~, EV~UC~, P~qEV~, and P~UC~ treatment (*p*\<0.05), with no differences between these treatments (Figure [3b](#F3){ref-type="fig"} and [3c](#F3){ref-type="fig"}). ![Notochordal cell-conditioned medium (NCCM)-derived extracellular vesicles (EVs) and proteins (P) induce increased glycosaminoglycan (GAG) deposition in chondrocyte-like cell (CLC) micro-aggregates derived from degenerated discs\ **(a, d)** DNA content **(b, e)** GAG content, **(c, f)** GAG/DNA content (mean ± SD) of canine and human CLC micro-aggregates, respectively, cultured in control culture medium, unfractionated porcine NCCM, or porcine NCCM-derived EVs or proteins for 7 (canine) or 21 (human) days. EV~qEV~: NCCM-derived EVs obtained after size exclusion chromatography (SEC), EV~UC~: NCCM-derived EVs obtained after SEC and subsequent 100,000*g* ultracentrifugation (UC), P~qEV~: NCCM-derived proteins obtained after SEC, P~UC~: NCCM-derived proteins obtained after SEC and subsequent 100,000*g* UC. Bars indicate significant differences between conditions (*p*\<0.05); \*, \*\*,\*\*\*: significantly different from controls (*p*\<0.05, *p*\<
pubmed_central
<stroke android:width="2dp" android:color="#404040" /> </shape> </item> <!--small dark circle--> <item> <shape android:shape="oval"> <solid android:color="#AEAEAE" /> <size android:width="28dp" android:height="28dp" /> <stroke android:width="1dp" android:color="#464646" /> </shape> </item> </layer-list> The usage of the drawable: <RadioButton android:id="@+id/radioButtonPositive" android:layout_width="wrap_content" android:layout_height="wrap_content" android:background="@android:color/transparent" android:button="@android:color/transparent" android:drawableTop="@drawable/ic_choice_background" android:gravity="center" android:onClick="onRadioButtonClicked" android:layout_marginRight="110dp"/> The xml generates But I want it to generate (the outer circles are the same size, this screenshot doesn't show it correctly) A: Change to below <?xml version="1.0" encoding="utf-8"?> <layer-list xmlns:android="http://schemas.android.com/apk/res/android"> <!--big light circle--> <item> <shape android:shape="oval"> <solid android:color="#EEEEEE" /> <size android:width="50dp" android:height="50dp" /> <stroke android:width="2dp" android:color="#404040" /> </shape> </item> <!--small dark circle--> <item android:bottom="11dp" android:left="11dp" android:right="11dp" android:top="11dp"> <shape android:shape="oval"> <solid android:color="#AEAEAE" /> <stroke android:width="1dp" android:color="#464646" /> </
stackexchange
Nucleic acid hybridization techniques are based upon the ability of a single stranded oligonucleotide probe to base-pair, i.e., hybridize, with a complementary nucleic acid strand. Exemplary in situ hybridization procedures are disclosed in U.S. Pat. No. 5,225,326 and copending U.S. patent application Ser. No. 07/668,751, the entire contents of which are incorporated herein by reference. Fluorescence in situ hybridization ("FISH") techniques, in which the nucleic acid probes are labeled with a fluorophor (i.e., a fluorescent tag or label that fluoresces when excited with light of a particular wavelength), represents a powerful tool for the analysis of numerical, as well as structural aberrations chromosomal aberrations. See, e.g., PCT Application WO 94/02646, inventors M. Asgari et al., published Feb. 3, 1994, (hereinafter, "Asgari") co-pending U.S. patent application Ser. No. 07/915,965; P. Lichter, et al., Genet. Anal. Tech. Appl. 8:24-35 (1991); and S. Du Manoir, et al., Human Genetics 90(6):590-610 (1993), the entire contents of which publications are incorporated herein by reference. Asgari reports in situ hybridization assays for determining the sex of a fetus, genetic characteristics or abnormalities, infectious agents and the like, by nucleic acid hybridization of fetal cells such as those circulating in material blood. The fetal cells are distinguished from maternal cells present in the fixed sample by staining with an antibody which specifically recognizes the maternal or fetal cell or by in situ hybridization to detect one or more fetal mRNAs. The method reportedly is useful for detecting chromosomal abnormalities in fetal cells. However, the fetal cells must be enriched prior to analysis. PCT Application WO 94/02830, inventors M. Greaves, et al., published Feb. 3, 1994, (hereinafter, "Greaves") report a method for phenotyping and genotyping a cell sample. The method involves contacting a fixed cell with an antibody labeled with a first fluorophor for phenotyping the cell via histochemical staining, followed by contacting the fixed cell with a DNA probe labeled with a second fluorophor for genotyping the cell. The first and second fluorophors fluoresce at different wavelengths from one another, thereby allowing the phenotypic and genetic analysis on the identical fixed sample. Despite the above-described advances
uspto_backgrounds
Canines have been seen to develop significant resistance to A. caninum naturally with age; this protection develops faster in and fully mature females show substantially greater resistance than fully mature dogs. Specifically the age-related resistance means A. caninum takes longer to reach sexual maturity in older animals and fewer larvae fully develop. Vaccination Numerous vaccines have been developed with varying success against A. caninum. Use of an enzyme important in the worm's feeding process is popular, with one example being AcCP2, a protease, which, when used to vaccinate dogs, gives a strong antibody response, a lowering of numbers of eggs found in stools and a decrease in intestinal worm size. These effects are attributed to reduced AcCP2 activity upon antibody binding. A similar approach has been taken using another A. caninum digestive enzyme, AcGST1, but it failed to give statistically significant results in dogs. An alternative approach has been to disrupt the migratory ability of A. caninum; this was done successfully using the AcASP1 protein of A. caninum, which gives an increase in antibody levels of all subclasses, as well as a reduced worm burden. Other studies using the same vaccine have shown 79% reduction of worm burden resulting from this approach. Animals with prior exposure to A. caninum show enhanced resistance, but careful removal of all worms from the previous infection results in loss of this resistance. Studies in mice show resistance due to past exposure can protect against otherwise lethal worm doses and that this is a general form of resistance – defense is offered against subsequent infections via either mouth or skin. Medication Drugs used in treatment of A. caninum infections of dogs include: dichlorvos, fenbendazole, flubendazole, mebendazole, nitroscanate, piperazine, pyrantel, milbemycin, moxidectin, diethylcarbamazine, oxibendazole, and ivermectin. In humans In inappropriate hosts such as humans, A. caninum is able to enter the skin, but cannot proceed into the circulation and on to the intestine; instead, the disease dermal larva migrans results, caused by movement of the nematode within the skin and which can persist for several months without intervention. While access to the intestine is not possible via this route, it can occur via ingestion;
wikipedia_en
S. Rachel, I. Göthel, D. P. Arovas, and M. Vojta, Phys. Rev. Lett. [**117**]{}, 266801 (2016). K. Nakata, S. K. Kim, J. Klinovaja, and D. Loss, **96**, 224414 (2017). Y. Ferreiros and M. A. H. Vozmediano, **97**, 054404 (2018). In the semiclassical limit, $S\to\infty$, the Hamiltonian on the honeycomb lattice has a Néel ground state for any choice of $J_{ij}>0$ which follows from energy minimization. M. Neek-Amal, L. Covaci, K. Shakouri, and F. M. Peeters, Phys. Rev. B [**88**]{}, 115428 (2013). See supplemental material for a derivation of the continuum field theory, an illustration of the supersymmetric nature of the spectrum, a discussion of the effect of strain on the Goldstone modes, and for additional numerical results. A. Kitt, V. Pereira, A. Swan, and B. Goldberg, Phys. Rev. B **85**, 115432 (2012). M. R. Masir, D. Moldovan, and F. M. Peeters, Solid State Comm. **175**, 76 (2013). S. Wessel and I. Milat, Phys. Rev. B **71**, 104427 (2005). C. Poli, J. Arkinstall, and H. Schomerus, Phys. Rev. B **90**, 155418 (2014). M. M. Nayga *et al.*, to be published. D. Greif, M. F. Parsons, A. Mazurenko, C. S. Chiu, S. Blatt, F. Huber, G. Ji, and M. Greiner, Science **351**, 953 (2016). T. Hensgens, T. Fujita, L. Janssen, X. Li, C. J. Van Diepen, C. Reichl, W. Wegscheider, S. Das Sarma, and L. M. K. Vandersypen, Nature **548**, 70 (2017). J. Salfi,
arxiv
uri = '/identitypools/{0}'.format(identity_pool_id) return self.make_request('GET', uri, expected_status=200) def describe_identity_usage(self, identity_pool_id, identity_id): """ Gets usage information for an identity, including number of datasets and data usage. :type identity_pool_id: string :param identity_pool_id: A name-spaced GUID (for example, us- east-1:23EC4050-6AEA-7089-A2DD-08002EXAMPLE) created by Amazon Cognito. GUID generation is unique within a region. :type identity_id: string :param identity_id: A name-spaced GUID (for example, us- east-1:23EC4050-6AEA-7089-A2DD-08002EXAMPLE) created by Amazon Cognito. GUID generation is unique within a region. """ uri = '/identitypools/{0}/identities/{1}'.format( identity_pool_id, identity_id) return self.make_request('GET', uri, expected_status=200) def get_identity_pool_configuration(self, identity_pool_id): """ Gets the configuration settings of an identity pool. :type identity_pool_id: string :param identity_pool_id: A name-spaced GUID (for example, us- east-1:23EC4050-6AEA-7089-A2DD-08002EXAMPLE) created by Amazon Cognito. This is the ID of the pool for which to return a configuration. """ uri = '/identitypools/{0}/configuration'.format(identity_pool_id) return self.make_request('GET', uri, expected_status=200) def list_datasets(self, identity_pool_id, identity_id, next_token=None, max_results=None): """ Lists datasets for an identity. The credentials used to make this API call need to have access
github
The SukanyaSamriddhi Account is basically a scheme that has been started by the government of the country with a vision to help the girl child in the country. According to this saving scheme the parents or the guardian of the girl child can deposit up to Rs. 1.5 lakhs in the name of the girl child every year in this account. Once the deposit is made in the account it accrues an interest at the rate of about 9.2% per annum and has a maturity period of 21 years from the date of opening of the savings account or marriage whichever is earlier. The SukanyaSamriddhi Account can be opened with a minimum amount of Rs.1, 000 and consequently the deposits that are made have to be multiples of Rs.100. This girl child saving account also allows partial withdrawal when the girl child turns 18 years old, in order to supports expenses with regards to her education as well as marriage. An extra advantage of this girl child saving scheme is that, the investments in this account needs to be made only for the first 14 years, after which no deposits are required to be made in the account. The credit amount in this account at the end of 14 years will continue to accrue interest until this scheme matures. The maximum amount that an individual can earn in this account with investing Rs.1.5 lakhs every year for 14 years at the rate of 9.2% interest per annum is Rs.78, 90,763. There are many advantages to the SukanyaSamriddhi Scheme, but here are some of the most important ones: This scheme allows an individual to know exactly the maturity value once the account matures. If you set this scheme up in an excel sheet, you can put up the amount you intend to invest in this scheme currently and you can see how it will affect your maturity amount. One could also set up the calculator to calculate the maturity value of the investment on a monthly or yearly basis. The SukanyaSamriddhi Account calculator could be extremely precise if it is configured correctly. Once can also change the amount you intend to invest at any point of time and can still get the accurate maturity value in a matter of a few seconds. Being an ELSS scheme the SukanyaSamriddhi Account calculator also acts as an ELSS calculatorand you can also calculate and work out the total amount you intend to invest in
pile-cc
1 Rearrange (2*a - 4*a + a)*(-7 + 1 - 9) - 1085 + 1085 - 183*a + 512*a to the form t + y*a and give y. 344 Express (7*w - 3*w - w)*(-4 + 2 + 1) - 667*w + 184*w + 66 - 33 - 232*w - 33 as d*w + g and give d. -718 Rearrange -1 + 42035*z**2 + z - 43699*z**2 + 3 to the form t*z + d*z**2 + a and give a. 2 Rearrange 1 + 3256*d**2 - 1636*d**2 - 1625*d**2 + 57*d to s*d + y + r*d**2 and give r. -5 Rearrange 139 + r**2 + r - 137 + 141*r**2 - 4*r**2 to the form n + x*r**2 + f*r and give n. 2 Rearrange (293 + 728 + 950 - 295 + 790)*(-2*t + t + 0*t) to the form l*t + i and give l. -2466 Express (-38 - 38 - 35 + 111 - 71587*m - 85769*m)*(m - 2*m**3 - m) in the form h*m**4 + i*m + n*m**2 + v*m**3 + b and give h. 314712 Express (-2*g**3 + 0*g**2 + 0*g**2)*(-790*g - 928*g + 1923*g)*(1 - 1 + 1)*(1 - 1 + 4) as n*g**4 + h*g**2 + i*g + l + f*g**3 and give n. -1640 Express 20 - 20 + 4*t**4 + (5*t**2 - 2*t**2 - 2*t**2)*(-51*t**2 + 80*t**2 + 61*t**2) as w*t**3 + k*t**2 + l + u*t + h*t**4 and give h. 94 Express -5*g**3 + 2*g**4 + 8*
dm_mathematics
Hi Dawn: The Research Group has moved around so much that we do not know who to contact for accounting issues. We need to reverse some money back to one of the groups we are supporting, but do not know who to contact. Do you have a clue? We are also still using an SAP Corp. Co# and RC# because we do not know where to go to get the new ENA #'s. If you could help
enron_emails
Appellees' first counterpoint asserts: Appellant has waived its right to complain of the trial court's action in granting appellees' motion for instructed verdict because appellant failed to attack in this appeal each and every independent ground contained in such motion. In support of this counterpoint appellees argue that the points of error raised by appellant are germane only to two of the grounds included in the motion for instructed verdict and do not challenge the sufficiency of the other thirteen grounds. Consequently, appellees argue that appellant has failed to discharge its burden to establish that the instructed verdict cannot be supported on the other grounds stated. After this question was raised by appellees, appellant made no request for leave to amend its brief to include points and argument attacking the other grounds stated in the motion. We agree with appellees that appellant's first four points all relate to the matter of the alleged agreement by appellees to assume the rental payments, and even if well taken, they do not establish that the instructed verdict cannot be sustained on other, independent grounds. Appellant's burden to show that the instructed verdict cannot be sustained on any of the grounds stated in the motion is established by the following cases: McKelvy v. Barber, 381 S.W.2d 59, 62 (Tex.1964); Dunham and Ross Co. v. Stevens, 538 S.W.2d 212, 214 (Tex.Civ.App.—Waco 1976, no writ); Woodrum v. Long, 527 S.W.2d 281, 283 (Tex.Civ. App.—Austin 1975, no writ); Carrico v. Stop-N-Go Markets of Texas, Inc., 492 S.W.2d 383, 384 (Tex.Civ.App.—San Antonio 1973, no writ). Some of the grounds stated in the motion for instructed verdict are obviously insufficient, such as general averments that "there is no evidence that warrants the submission of the case to the jury" and that "the evidence is wholly insufficient to warrant the submission of this case to the jury." Others are more substantial, at least on the face of the motion, and several relate to the defense that plaintiff cannot recover the rentals specified in the lease because the lease has been assigned to the Hillcrest National Bank. Appellant does not attack any of these grounds either by its points of error or in the argument under its points. This court should not undertake to search the record and investigate the authorities bearing on these independent grounds without the assistance of counsel for either party. Therefore, with respect to
freelaw
I'm most interested right now in The City of God due to the context/thesis being relevant today. As a teenager I switched to Buddhism (20 or so years ago) but have gained new interest in my Catholic upbringing as I was finding it hard to relate to Buddhism and its history. Culturally it was different from my own and I always had a feeling of being an outsider/imposter. Most of HN and others who are in educated professions appear to dismiss religion though I've come to find it as a guiding principal and cultural history - Western Civilization is built on Christianity, Catholcism for a larger portion. Currently in the US we are losing our sense cultural understanding, in my opinion, and wish for the government to set laws and regulations on everything. The freedoms set forth in the first amendment give us the freedom to guide our lives as we see fit, religion filling the moral and spiritual need in our lives. The libertarian in me agrees with the freedom but to ensure others are given the same freedom as long we do no harm to others - nor should we judge or force our beliefs onto others. Now I understand that certain groups haven't experienced the same freedoms as others but is that religions fault? I would say no, and offer the perspective of culture. Simple cultural norms bring us together. I live in the PNW and have a beard, I know if I were to back to New Orleans where I'm from a beard would be viewed differently causing issues with employment. This is a simple and harmless is example that isn't a non-issue compared to others. Overall I'm excited to begin the journey with the open mind of an adult. Sorry for tangent and possible incoherent ramble - on my tablet. ~~~ geerlingguy > Most of HN and others who are in educated professions appear to dismiss > religion I think a lot of us just keep our mouths shut due to the large amount of vitriol that results from any rational discussion of metaphysics or the supernatural :) ~~~ humanrebar To attempt to dispel some hesitance, I have a lot of conversations about this sort of thing. Only a minority involve any vitriol, and they're easy enough to walk away from. The more principled extroverts might comment on the tone of con
hackernews
Described here is a multidisciplinary program which is aimed at elucidating the cellular mechanisms involved in the accumulation and remodeling of muscle connective tissue and the reduced range of movement that occur in aging and/or inactive individuals. The first hypothesis is that the amount and properties of the connective tissue in the muscle belly are influenced by the type of activity that the muscle is subjected to and that stretch is the important factor. The second hypothesis is that connective tissue remodeling is linked with adjustments in sarcomere number so that there
nih_exporter
Age as a prognostic factor in cancer of the cervix: the UAMS experience. Current literature has conflicting reports as to the effect of age on prognosis in cancer of the uterine cervix. In order to evaluate this in our patient population we undertook a retrospective chart review of 235 cases of cervical cancer that were seen at the Central Arkansas Radiation Therapy Institute (CARTI) and the University of Arkansas for Medical Sciences (UAMS) from March 1974 to June 1985 and were followed for a minimum
pubmed_abstracts
Advances in mathematical modeling have led to various effective tools for early diagnosis, such as the application of thermometry ultrasonic techniques. Before implementation of the ultrasonic noninvasive estimation of thermal gradients into tissues based on spectral changes, rigorous analyses, over transient echotraces acquired from well-controlled biological and computational phantoms, must be still made in order to improve resolutions and evaluate clinic limitations. I. Bazan et al. applied this technique to computationally modeled echotraces from scattered biological phantoms, attaining high resolution (better than 0.1°C). They also provided computer methods for viability evaluation of thermal estimation from echoes with distinct noise levels, making it difficult to interpret the readings. As a result of their analyses, the technique has been evaluated as a possible effective diagnosis tool for scattered tissues applications. Such research and analyses are of great importance since the ability to detect changes of thermal origin in ultrasonic echo spectra means the achievement of precise noninvasive temperature estimations that could be very useful as an early complementary indicator of infections, inflammations, or cancer. Obstructive sleep apnea (OSA) is an important health issue and has been subject to different modeling investigations. C. T. Su et al. have applied a Mutliclass Mahalanobis-Taguchi System (MMTS) to the problem of prediagnosing the condition using readily available patient information. Their model results in a better than 84% accuracy. This statistical diagnostic/predictive method comes from pattern information technology and demonstrates an important application of a little used modeling paradigm in biology. The paper by C. Pagel et al. addresses a problem of growing relevance with an aging population, dwindling resources, and a declining number of healthcare providers: that of optimal scheduling in the context of a stepped care. This topic is of considerable interest, not only in the domain addressed by the authors, but in other populations requiring complex, highly specialized care. The author\'s model includes stratified levels of intensity of care, and can be used to analyze expected changes in waiting times and throughput under different allocations of scheduled slots. This quantitative model will be of highly operational interest---particularly to large, integrated healthcare systems confronted with a growing mental healthcare population. Moreover, since the model is sufficiently flexible, it may be adapted to address queuing systems germane to other highly complex medical conditions. Healthcare providers and networks face more than resource limitations: increased oversight and an emphasis on the quality of care are wending their way
pubmed_central
Overridden doDML() in EntityImpl does not refresh attributes I am using an Oracle ADF page to update data in a table. My entity object is based on the table, but I want the DML (inserts, updates, deletes) to go through a package procedure in the database instead of using the default DML generated by the ADF framework. To accomplish this, I am following Oracle's documentation, found here: http://docs.oracle.com/cd/E23943_01/web.1111/b31974/bcadveo.htm#ADFFD1129 This all works fine. The problem is, the default ADF DML processing will automatically refresh the entity row after writing it, either with a RETURNING INTO clause or with a separately issued SELECT statements (depending on the value of isUseReturningClause() in the EntityDefImpl object). This is done so that the application front end gets updated in case the row was modified by the database during the DML process (e.g., a BEFORE ROW trigger changes values). But, when I overwrite doDml() to replace the default framework DML with a call to my package procedure, it no longer automatically refreshes, even if isUseReturningClause() returns false. I tried adding code to my doDml() implementation to requery afterwards, but it didn't work (maybe I didn't do it correctly). But, Oracle's documentation doesn't say anything about having to do that. Does anyone know how to accomplish this? Update I went back to my attempt to have doDml() refresh afterwards by calling doSelect() and it works. My original attempt didn't work because doSelect() wasn't sending notifications of its changes. Still, I'm concerned that this isn't how Oracle's documentation says to do it so I have no idea if this is correct or a kludge or a plain bad idea. So, my original question still stands. A: I logged an SR with Oracle. Their response was that if you override doDML() and do not call super.doDML() then you lose the automatic refresh functionality of the framework. They wouldn't comment on my solution, which was to call doSelect(false) after any inserts or updates in my doDML() override. Their policy is that if you want advice
stackexchange
Anthrax is primarily a disease of sheep, cattle, horses, goats and swine caused by Bacillus anthracis, a gram-positive spore-forming aerobic rod that produces exotoxins. The organism is transmitted to humans by inoculation of broken skin or mucous membranes causing cutaneous or gastrointestinal infections, or by inhalation, causing pulmonary infection. Anthrax is a rare occupational disease of farmers, veterinarians and wool workers. B. anthracis is designated as category A biothreat agent because of the ease of weaponization of spores and its persistence in the environment. The bioterrorism threat from inhaled B. anthracis spores has increased the need for effective treatments and preventions of this deadly disease. Inhalation anthrax is the most deadly form of the disease. The incubation period ranges from 1-43 days, with a mean incubation period of 16 days (Cieslak et al., 1999). The standard course of antibiotic treatment post-exposure is 60 days, but the length of treatment for full protection is currently unknown. The mean duration of non-specific prodromal symptoms is 4.1 days, and the mean duration of the fulminant phase is 1.1 days, after which the death rate approaches 100% in the absence of treatment (Holty et al. 2006). The events leading to death from anthrax in humans are not well understood (Jernigan et al. 2001), but the terminal stages of the disease involve bacteremia with vascular damage and injury to multiple organs. Anthrax pathogenesis has been reviewed (Dixon et al. 1999). B. anthracis produces two exotoxins, Edema Toxin (EdTx) and Lethal Toxin (LeTx). During the initial phases of the disease, the toxins cause destruction of the lymphatic tissue, helping the bacteria gain access to the blood stream (Dixon et al., 1999). They also impair the function of leukocytes that are crucial for phagocytosis and mounting an immune response (O'Brien et al. 1985; Comer et al. 2005; During et al. 2005; Erwin et al. 2001; Fang et al. 2006). EdTx is composed of Edema Factor (EF) and Protective Antigen (PA), and LeTx is composed of Lethal Factor (LF) and PA. As single entities, none of these proteins are known to have any lethal effects. PA is the essential component for EF and LF entry into target cells. PA binds to specific receptors
uspto_backgrounds
The Taiwan Strait Tourism Association (TSTA; ) is a semi-official representative office of the Republic of China in Mainland China handling tourism-related affairs. Its counterpart body in Taiwan by the People's Republic of China is the Cross-Strait Tourism Exchange Association. Offices Beijing office The first TSTA office in Mainland China was opened on 4 May 2010. The TSTA office is located at LG Twin Towers in Chaoyang District, Beijing. During the office official opening ceremony in Beijing, Shao Qiwei, President of the Mainland's Cross-Strait Tourism Exchange Association, said that with the establishment of the reciprocal tourism office across the Taiwan Strait means positive progress for exchange and interactions in various aspects between the two sides. Janice Lai, Chairperson of TSTA said that the establishment of the association in Beijing will also promote tourism industry of Taiwan and introduce Taiwan's sightseeing spots to the people in Mainland China. This establishment also marks a new milestone leading to closer bilateral tourism exchanges between the two sides. Shanghai office The second TSTA office in Mainland China is the Shanghai office, located in Zhabei District. The official opening ceremony was held on 15 November 2012, attended by David W. J. Hsieh, Director-General of the Tourism Bureau of the Republic of China, Shao Qiwei, President of the Cross-Strait Tourism Exchange Association and Tu Jiang, Chairman of Association for Tourism Exchange Across the Taiwan Straits. The office will handle Taiwan-related tourism affairs in Shanghai, Jiangsu, Zhejiang, Anhui, Fujian and Jiangxi. Tasks The three major tasks of TSTA are: Expanding distribution channels and improving the packaging of quality tourism products Strengthening publicity and promotion Introducing theme packages by regions Transportation The Beijing office of TSTA is accessible within walking distance southwest from Yong'anli Station of the Beijing Subway. The Shanghai office of TSTA is accessible within walking distance southeast from People's Square Station of the Shanghai Metro. See also Cross-Strait Tourism Exchange Association List of diplomatic missions of Taiwan Cross-Strait relations References Category:Organizations established in 2010 Category:2010 establishments in China Category:Organizations based in Beijing Category:Organizations based in Shanghai Category:Tourism agencies Category:Tourism in
wikipedia_en
The one-bond system in Fig. 1 (a) is taken as 4-level dimer to model the ionic-covalent bonding. When one quasielectron is removed from such a dimer, the remained one occupying $| 1 \rangle \otimes | \sigma \rangle $ in Fig. 2 (b) has no correlated partner. Because atom A has the higher electro-negativity, we can approximate the remained quasielectron by $\rho ^{(1)}$ in Eq. (11) and obtain the energy $E_{b} ^{(-)} = tr H _{sb} \rho ^{(1)}$ as $| \Psi _{b} \rangle$ becomes the uncorrelated one-electron state $| \Psi _{b,1, \uparrow } \rangle = c _{ A \uparrow } ^{\dag} | 0 \rangle$ or $| \Psi _{b,1, \downarrow } \rangle = c _{ A \downarrow } ^{\dag} | 0 \rangle$. On the other hand, there are three quasielectrons when we change $| \Psi _{b} \rangle$ to a three-electron state, which corresponds to the left-hand side of Fig. 2(c), by the affinitve process. We can see from Fig. 2 (c) that such a three-electron state is equivalent to the one-hole state because there are only 4 levels. The remained quasihole is located at $| \bar{1} \rangle \otimes | \sigma \rangle$, and its spatial part $| \bar{1} \rangle$ can be approximated by $ | B \rangle $ in $\mathbb{C}^{2} _{\Omega}$ because atom $B$ is of the lower electro-negativity. So we can take $| \Psi _{b,3, \sigma } \rangle = c _{ B \sigma} | Fb \rangle \propto c _{ B \underline{ \sigma } } ^{ \dag } c _{ A \sigma } ^{\dag} c _{ A \underline{\sigma} } ^{\dag} | 0 \rangle \propto c _{ L \underline{\sigma} } ^{\dag} c _{ A \sigma } ^{\dag} c _{ \bar{L} \underline{\sigma} } ^{\dag} | 0 \rangle$ as the wavefunction of the three-electron or one-hole state for $\sigma = \uparrow$ or $\downarrow$, and the added electron is located at the spatial ket $|
arxiv
UNAME := $(shell uname) ifeq ($(UNAME), Darwin) LIBRARY_FILE=libpyvex.dylib STATIC_LIBRARY_FILE=libpyvex.a LDFLAGS=-Wl,-install_name,@rpath/$(LIBRARY_FILE) endif ifeq ($(UNAME), Linux) LIBRARY_FILE=libpyvex.so STATIC_LIBRARY_FILE=libpyvex.a LDFLAGS=-Wl,-soname,$(LIBRARY_FILE) endif ifeq ($(UNAME), NetBSD) LIBRARY_FILE=libpyvex.so STATIC_LIBRARY_FILE=libpyvex.a LDFLAGS=-Wl,-soname,$(LIBRARY_FILE) endif ifeq ($(findstring MINGW,$(UNAME)), MINGW) LIBRARY_FILE=pyvex.dll STATIC_LIBRARY_FILE=libpyvex.a LDFLAGS= endif # deeply evil # https://www.cmcrossroads.com/article/gnu-make-meets-file-names-spaces-them sp =$(null) $(null) qs = $(subst ?,$(sp),$1) sq = $(subst $(sp),?,$1) CC=gcc AR=ar INCFLAGS=-I "$(VEX_INCLUDE_PATH)" CFLAGS=-g -O2 -Wall -shared -fPIC -std=c99 $(INCFLAGS) OBJECTS=pyvex.o logging.o analysis.o postprocess.o HEADERS=pyvex.h all: $(LIBRARY_FILE) $(STATIC_LIBRARY_FILE) %.o: %.c $(CC) -c $(CFLAGS) $< $(LIBRARY_FILE): $(OBJECTS) $(HEADERS) $(call sq,$(VEX_LIB_PATH)/libvex.a) $(CC) $(CFLAGS) -o $(LIBRARY_FILE) $(OBJECTS) "$(VEX_LIB_PATH)/libvex.a" $(LDFLAGS) $(STATIC_LIBRARY_FILE): $(OBJECTS) $(HEADERS) $(call sq,$(VEX_LIB_PATH)/libvex.a
github
We meet for four hours a day, five days a week, for seven weeks. That time includes twice-weekly generative writing workshops, field trips, and professional visitors (we’re having a published author, a performer from Second City, and a professional storyteller this summer), plus ample time for self-directed reading and writing. Any working adult writer would be jealous and covetous of the experience, I am quite sure! CC:Do you think there are any societal barriers that can prevent youth from exploring creative writing? KB: Something that is really important to a child’s aptitude for reading and writing is the value that is placed on these activities in the home, and within their communities. You might assume that for an economically disadvantaged or socially marginalized family, less value is placed on abstract literacy skills and more on vocational skills that can tangibly lead to employment, but I have not found this to be true. Our team for Summer Matters represents a very wide range of culture, class, and ethnicity from every corner and neighborhood of Chicago: public school kids from the impoverished south and west side and private school kids from affluent Lincoln Park. Somewhere along the lines of their lives someone has demonstrated to them that reading and writing are fun, interesting and worthy pursuits, and these kids have taken that to heart. CC:What do you think youth gain from writing? Do their perspectives of themselves and the world shift as they pursue creative writing? KB: Creative writing helps affirm to young people that their experiences and lives are interesting and have value and merit. It gives them confidence in the power of their own voices and that their voices and perspectives matter. It also allows students to practice abstract thinking and creative problem solving (what happens next? What needs to happen to get this story where you want it to be?), which are higher levels of thinking. Reading fiction has been demonstrated to increase a person’s empathy, their ability to put themselves in someone else’s shoes and understand that the world is bigger than their small fraction of it. How can you even quantify the value of any of these individual outcomes, let alone all of them in combination? CC:What are some of the challenges you face in teaching creative writing to youth? KB: They are often the same challenges I get teaching creative writing to adults – getting them to trust their voices and their imaginations, to not censor themselves or pull back; encouraging them to keep going, to
pile-cc
Suppose -15 + 35 = 5*j. Suppose -12 + 5 = 3*c - 2*u, -5*c - 15 = -5*u. Let i(x) = -x + 1. Let p(a) = -5*a + 2. Determine c*p(h) + j*i(h). h + 2 Let x(u) = 3*u**2 + u + 5. Let t(q) = 2*q**2 + q + 3. Suppose 9 = -6*z - 9. Determine z*x(b) + 5*t(b). b**2 + 2*b Let y(j) = -4*j - j - j. Let k(u) = -u. Calculate -34*k(r) + 6*y(r). -2*r Let o(p) = -p. Let i be (-5)/(-2) + (-3)/6. Let k(y) = 2*y**i + 4 - 3 + 0 - 2*y + y**3. What is -k(w) + 2*o(w)? -w**3 - 2*w**2 - 1 Let y(a) = 8*a + 5. Let q(x) be the second derivative of x**4/24 + x**3/6 + 4*x**2 + 4*x. Let o(w) be the first derivative of q(w). Determine 5*o(g) - y(g). -3*g Let i(f) = -5*f**2 + 8*f - 2. Suppose -3*g + 7 = 5*l, 2*g + 2*g = -5*l + 11. Let c be (6 + 0 + -1)/l. Let w(k) = 4*k**2 - 7*k + 2. Give c*i(v) - 6*w(v). v**2 + 2*v - 2 Let j(b) = -b**2 + 9. Suppose 12 - 2 = 5*q. Let a(c) be the first derivative of 9*c - 1. Let s(u) = -5. Let f(m) = 6*a(m) + 11*s(m). Give q
dm_mathematics
Options Equity Total Rogers Herndon $250K $250K $500K Don Black $250K $250K $500K Jeff Richter $100K $100K $200K Bernie Aucoin $100K $100K $200K I assume that you have Tim and Kevin managed. Views? When are we
enron_emails
12 Benson and Beckman did not discover anything; they rediscovered something that Secretary Knox considered in 1913. Thirty-eight states ratified the sixteenth amendment, and thirty-seven sent formal instruments of the ratification to the Secretary of State.... Only four instruments repeat the language of the sixteenth amendment exactly as Congress approved it. The others contain errors of diction, capitalization, punctuation, and spelling.... [the defendant] insists that because the states did not approve exactly the same text, the amendment did not go into effect. Secretary Knox considered this argument. The Solicitor of the Department of State drew up a list of the errors in the instruments and--taking into account both the triviality of the deviations and the treatment of earlier amendments that had experienced more substantial problems--advised the Secretary that he was authorized to declare the amendment adopted. The Secretary did so.... [his] decision is now beyond review. 13 Id. at 1253 (emphasis in original). See also United States v. Stahl, 792 F.2d 1438, 1439 (9th Cir.1986), cert. denied 479 U.S. 1036, 107 S.Ct. 888, 93 L.Ed.2d 840 (1987) (propriety of the ratification process is a political question). 14 We find it hard to understand why the long and unbroken line of cases upholding the constitutionality of the sixteenth amendment generally, Brushaber v. Union Pacific Railroad Company, 240 U.S. 1, 36 S.Ct. 236, 60 L.Ed.2d 493 (1916), and those specifically rejecting the argument advanced in The Law That Never Was, have not persuaded Miller and his compatriots to seek a more effective forum for airing their attack on the federal income tax structure. See Foster, 789 F.2d at 463 n. 6 (the propriety of the ratification of a constitutional amendment may be a non-justiciable political question). Determined and persistent tax protesters like Miller seek to utilize the federal judicial forum without consideration of the significant limitations on the authority of both the district courts and the courts of appeal. One such limitation stems from the bedrock principle of stare decisis: lower courts are bound by the precedential authority of cases rendered by higher courts. U.S. Ex Rel. Shore v. O'Leary
freelaw
====== drallison This dispute centers upon whether APIs can be copyrighted. This case has broad implications for everyone who builds and uses software. See [https://www.eff.org/cases/oracle-v-google](https://www.eff.org/cases/oracle- v-google) for a bit more background. ------ tzs I'm confused about how precedent works in this kind of case. Generally, the precedent that a particular court must follow in a case is the rulings of courts that its ruling in the case can be appealed to. So, a California district court has to follow 9th Circuit precedent in a copyright case, because it will be the 9th Circuit appeals court that gets the case on appeal. The California district court does not have to follow, say, 2nd Circuit precedent, because the case will not ever reach the 2nd Circuit appeals court. For a patent case, the path is a little different. All patent appeals go to the Court of Appeals for the Federal Circuit (CAFC) rather then to the Circuit appeals courts. Thus, a California district court hearing a patent case follows CAFC precedent, because that's where the case will go on appeal. The Oracle-Google case is _both_ copyright _and_ patent. Because of the patent aspect, the appeal from the district court went to the CAFC. Although a copyright appeal would not go to CAFC on its own, CAFC is allowed to handle it when it is part of a patent case. Thus, we end up with the CAFC issuing a copyright ruling. What I do not understand is which courts have to take the CAFC copyright ruling as precedent. Suppose I sue someone over copyright in California, and suppose there are no patent issues anywhere near the case...it's just a pure copyright case. The appeal then will go to the 9th Circuit appeals court, not to CAFC, so does the district court in this case have to follow CAFC's Oracle ruling? Or do they look strictly to what the 9th Circuit has said? Given the theoretical basis for precedent, I'd expect that the district court follows the 9th Circuit. If that's the case, suppose that the defendant would really prefer to operate under CAFC copyright precedent rather than 9
hackernews
People in recovery from serious mental illness are often excluded from making decisions about their own mental health care, frequently resulting in poor alliances with their care providers. While the Patient Protection and Affordable Care Act addresses this issue by requiring programs to be person-centered and recovery-oriented, providers often struggle to identify concrete ways to change their practices. Person-Centered Recovery Planning (PCRP) is an evidence-based approach to collaborative service planning among an individual, the treatment team, and supports. PCRP
nih_exporter
Chromosomal and genetic alterations of 7,12-dimethylbenz[a]anthracene-induced melanoma from TP-ras transgenic mice. The TP-ras transgenic mouse line expresses an activated human T24 Ha-ras gene with a mutation in codon 12, regulated by a mouse tyrosinase promoter. The transgene is expressed in melanocytes of the skin, eyes, and brain. The mice develop cutaneous melanoma when treated with 7,12-dimethylbenz[a]anthr
pubmed_abstracts
**Cognitive domain** **Measures used for each target population** ---------------------- ---------------------------------------------- --------------------------- ------- General cognition MMSE MMSE MMSE Processing speed AMT; PASAT AMT -- Memory DSF; DSB; Letter number; SSF; SSB Story memory; word memory -- Verbal fluency D-KEFS Verbal fluency; VFL VFL -- Attentional control TMT-A TMT-A TMT-A Executive function FAB; Stroop; TMT-B TMT-B -- Visuospatial Block design; CDT; SDMT; TMT-A CDT -- *MMSE, Mini-Mental State Examination; AMT, Attentional Matrices Test; PASAT, Paced Serial Addition Task; DSF, Digit Span Forward; DSB, Digit Span Backward; SSF, Spatial Span Forward; SSB, Spatial Span Backward; D-KEFS, Delis-Kaplan Executive Function System; VFL, Verbal Fluency-Letter; TMT, Trail Making Test; FAB, Frontal Assessment Battery Test; CDT, Clock Drawing Test; SDMT, Symbol Digit Modalities Test*. The present analysis also investigated whether there were differences in outcomes for the different types of instrument playing tasks. For overall effects on each of seven cognitive domains, low effect sizes were obtained for general cognition (*d* = 0.28), memory (*d* = 0.26), verbal fluency (*d* = 0.19), attentional control (*d* = 0.22), executive function (*d* = 0.25), and visuospatial perception (*d* = 0.19). A large effect size was observed for processing speed (*d* = 0.94). Substantial heterogeneity was found with processing speed, memory, and executive function (61--84%), while low heterogeneity was found with general cognition, verbal fluency, attentional control, and visuospatial perception. In order to see which type of cognitive domain might be addressed more effectively with which type of cognitive involvement, subgroup analysis was conducted with the moderating variable of the type of cognitive involvement \[i.e., immediate engagement with the addition
pubmed_central
how to delete a backbone model I have created the following code and i'm unable to destroy a model from the backend. I get a 'model is not defined error'. I don't know why it cannot find a model? what parameters am i missing? am i wrong in adding this in this list view? should i add it in the models view? and if that is the case i added the save new model in the list view so can't see why i can't add it her. window.LibraryView = Backbone.View.extend({ tagName: 'section', className: 'mynotes', events: { "keypress #new-title": "createOnEnter", //"keypress #new-content": "createOnEnter" "click .mybutton": "clearCompleted" }, initialize: function() { _.bindAll(this, 'render'); this.template = _.template($('#library-template').html()); this.collection.bind('reset', this.render); this.collection.bind('add', this.render); this.collection.bind('remove', this.render); }, render: function() { var $mynotes, collection = this.collection; $(this.el).html(this.template({})); $mynotes = this.$(".mynotes"); collection.each(function(mynote) { var view = new LibraryMynoteview({ model: mynote, collection: collection }); $mynotes.append(view.render().el); }); return this; }, createOnEnter: function(e) { var input = this.$("#new-title"); var input2 = this.$("#new-content"); //var msg = this.model.isNew() ? 'Successfully created!' : "Saved!"; if (!input || e.keyCode != 13) return; // this.model.save({title: this.$("#new-title").val(), content: this.$("#new-content").val() }, { var newNote = new Mynote({
stackexchange
The subject matter of this application relates to probe microscopy. More particularly, the subject matter of this application relates to methods and devices for probe and force microscopes with sensors having improved sensitivity. 2. Description of the Prior Art Conventional atomic force microscope (AFM) and its variations have been used to probe a wide range of physical and biological processes, including mechanical properties of single molecules, electric and magnetic fields of single atoms and electrons. Moreover, cantilever based structures inspired by the AFM have been a significant driver for nanotechnology resulting in chemical sensor arrays, various forms of lithography tools with high resolution, and terabit level data storage systems. Despite the current rate of success, the AFM needs to be improved in terms of speed, sensitivity, and an ability to generate quantitative data on the chemical and mechanical properties of the sample. For example, when measuring molecular dynamics at room temperature, the molecular forces need to be measured in a time scale that is less than the time of the thermal fluctuations to break the bonds. This requires a high speed system with sub-nanoNewton and sub-nanometer sensitivity. Current cantilever-based structures for AFM probes and their respective actuation methodologies lack speed and sensitivity and have hindered progress in the aforementioned areas. Imaging systems based on small cantilevers have been developed to increase the speed of AFMs, but this approach has not yet found wide use due to demanding constraints on optical detection and bulky actuators. Several methods have been developed for quantitative elasticity measurements, but the trade-off between force resolution, measurement speed, and cantilever stiffness has been problematic especially for samples with high compliance and high adhesion. Cantilever deflection signals measured during tapping mode imaging have been inverted to obtain elasticity information with smaller impact forces, but complicated dynamic response of the cantilever increases the noise level and prevents calculation of the interaction forces. Arrays of AFM cantilevers with integrated piezoelectric actuators have been developed for parallel lithography, but complex fabrication methods have limited their use. Most of the scanning probe microscopy techniques, including tapping mode imaging and force spectroscopy, rely on measurement of the deflection of a microcantilever with a sharp tip. Therefore, the resulting force data depend on the dynamic properties of the cantilever, which shapes the frequency response. This can be quite limiting, as mechanical structures like cantilevers are resonant vibrating structures and they provide information mostly only around these resonances. For example, in tapping mode imaging it is nearly impossible to recover all the information about the
uspto_backgrounds
Pandabeswar Pandabeswar (also spelled Pandaveswar) is an administrative centre in Pandabeswar CD Block in Durgapur subdivision of Paschim Bardhaman district in the state of West Bengal, India. Geography Police station Pandabeswar police station has jurisdiction over Pandabeswar CD Block. The area covered is 161 km2 and the population covered is 176,445. CD Block HQ The headquarters of Pandabeswar CD Block are located at Pandabeswar. Urbanisation As per the 2011 census, 79.22% of the population of Durgapur subdivision was urban and 20.78% was rural. Durgapur subdivision has 1 municipal corporation at Durgapur and 38 (+1 partly) census towns (partly presented in the map alongside; all places marked on the map are linked in the full-screen map). Demographics Pandabeswar is shown as part of Baidyanathpur in the map of Pandabeswar CD Block on page 243 of the District Census Handbook, Bardhaman, 2011. Separate demographic statistics are not available. Economy As per the Shodhganga website, collieries in the Pandaveswar Area of Eastern Coalfields are: Madaipur, Mandarbani, Nutandanga, Pandaveswar, Dalurbandh, Kendra, Samla, South Samla, Khottadih, Kankartala, Dalurbandh OCP, Palasthali OCP and Gangaramchak OCP. As per ECL website telephone numbers, operational collieries in the Pandaveswar Area in 2018 are: Dalurband Colliery, Khottadih OCP, Khottadih UG, Madhaipur Colliery, Manderbony Colliery, Pandaveswar Colliery and South Samla Colliery. Transport There is a Railway station in Pandabeswar on the Andal-Sainthia branch line. NH 14 (old number NH 60) passes through Pandabeswar. Education Pandaveswar College was established at Pandabeswar in 2005. It is affiliated with Kazi Nazrul University. It offers honours courses in Hindi, English, history and
wikipedia_en
In Figure \[fig:bounce\_moreFV\], we denote bounce solutions for false vacuum bubbles in true vacuum backgrounds by potentials in Figure \[fig:moreFV\] ($\Phi_{\mathrm{f}}>1$). We plot $\Phi$, $\rho$, and $\dot{\rho}$ as functions of $\eta$. We also note that behaviors of $\dot{\rho}$ ($\cos$, $1$, $\cosh$, etc.) are consistent for the inside and the outside of the transition region. \[sec:via\]False vacuum bubble nucleation via effective potentials ------------------------------------------------------------------ Although $V(\Phi_{\mathrm{t}}) < V(\Phi_{\mathrm{f}})$, if the vacuum energy of $\Phi_{\mathrm{f}}$ in the Einstein frame is smaller than that of $\Phi_{\mathrm{t}}$, i.e., $U_{E}(\Phi_{\mathrm{t}}) > U_{E}(\Phi_{\mathrm{f}})$, where $U_{E}$ is the potential in the Einstein frame, then, interestingly, it may be possible to obtain a false vacuum bubble in the Jordan frame, even if $\omega > -3/2$. Note that the dynamics of the Brans-Dicke field is determined by the effective potential $U$. Hence, we also should check whether $U(\Phi_{\mathrm{t}}) > U(\Phi_{\mathrm{f}})$. Note that such conditions can be represented as $$\begin{aligned} V(\Phi_{\mathrm{f}})-V(\Phi_{\mathrm{t}}) = \Phi_{\mathrm{f}}^{2} \left( \int_{1}^{\Phi_{\mathrm{f}}} \frac{F(\bar{\Phi})}{\bar{\Phi}^{3}} d \bar{\Phi} + V_{0} \right) - V_{0} > 0\end{aligned}$$ and $$\begin{aligned} U_{E}(\Phi_{\mathrm{f}})-U_{E}(\Phi_{\mathrm{t}}) = \int_{1}^{\Phi_{\mathrm{f}}} \frac{F(\bar{\Phi})}{\bar{\Phi}^{3}} d \bar{\Phi} \equiv \Delta E < 0.\end{aligned}$$ Therefore, we require $V_{0} > \Phi^{2}_{\mathrm{f}} |\Delta E|/ (\Phi^{2}_{\mathrm{f}}-1)$ and we conclude that such false vacuum bubbles can form only in a de Sitter space background ($
arxiv
jade: { dev: { options: { pretty: true }, files: { 'temp/_template.html': 'src/abn_tree_template.jade', 'test/tests_page.html': 'test/tests_page.jade' } }, bs2_ng115_test_page: { files: { 'test/bs2_ng115_test_page.html': 'test/test_page.jade' }, options: { pretty: true, data: { bs: "2", ng: "1.1.5" } } }, bs3_ng115_test_page: { files: { 'test/bs3_ng115_test_page.html': 'test/test_page.jade' }, options: { pretty: true, data: { bs: "3", ng: "1.1.5" } } }, bs2_ng120_test_page: { files: { 'test/bs2_ng120_test_page.html': 'test/test_page.jade' }, options: { pretty: true, data: { bs: "2", ng: "1.2.12" } } }, bs3_ng120_test_page: { files: { 'test/bs3_ng120_test_page.html': 'test/test_page.jade' }, options: { pretty: true, data: { bs: "3", ng: "1.2.12" } } } }, "string-replace": { dev: { files: { 'temp/_directive.coffee': 'src/abn_tree_directive.coffee' }, options: { replacements: [ { pattern: "{html}",
github
Ms. Haidar is married to Ms. Badawi’s brother, Raif Badawi, who was arrested in 2012 and sentenced to ten years in prison and 1,000 lashes for promoting freedom of expression and women’s rights. In a rare public distancing from the Salmans, Saudi Prince Ahmed bin Abdelaziz – one of the few still living sons of the founder of Saudi Arabia and a younger brother of King Salman, asked anti-Saudi protesters on a London street chanting “down, down Al Saud” and “Al Saud criminal family”: “What does the al-Saud family have to do with your chants? We have nothing to do with what is happening (in Yemen). Certain officials are responsible.” Asked by protesters who he held responsible, Prince Ahmed, who served as deputy interior minister for 37 years and briefly as interior minister under King Salman’s predecessor, King Abdullah, said “the king and his heir apparent,” a reference to King Salman and Prince Mohammed. The state-run Saudi News Agency subsequently quoted Prince Ahmed as seeking to roll back his comments captured on video by saying that he said that “the King and the Crown Prince are responsible for the state and its decisions. This is true for the security and stability of the country and the people.” In a bid to stymie criticism, Saudi prosecutors this week reportedly sought the death penalty against prominent cleric Salman Al-Odah who was detained a year ago. “The Saudi attorney general accused my father @salman_alodah of 37 charges and asked for his execution,” his son Abdullah said in a tweet. He said some of the charges were related to comments Mr. Al-Odah had posted on Twitter and membership in organizations associated with Qatar and Qatari-Egyptian Islamic scholar Sheikh Yousef al-Qaradawi, who is close to the Muslim Brotherhood. Mr. Al-Odah has 14 million Twitter followers. Applying a cost-benefit analysis, The Kings College/Oxford Research Group report concluded that, contrary to the projections of the government of Prime Minister Theresa May and popular perception, Britain enjoyed limited economic benefit from its relationship with Saudi Arabia while suffering considerable reputational damage. The report noted that Britain’s $8 billion in exports to Saudi Arabia accounted for a mere one percent of total exports in 2016. The British Treasury reaped $38.5 million in revenues from
pile-cc
-1 Let s = -3 - -2. Let m = 0 - s. Let c be ((-10)/(-25))/(12/(-10)). What is the nearest to -0.1 in c, 5, m? c Let z(w) = -w**3 - 6*w**2 - 1. Let r be z(-6). Let c = 3 + -8. What is the closest to r in 0.1, -2/3, c? -2/3 Suppose 4*p + 8 = h - 8, 2*p = -2*h + 42. Let i = -40 + h. Let d be i/12 + (-2 - -3). Which is the closest to d? (a) 4/7 (b) 5 (c) -4/7 c Let w(f) = -2*f**3 - 9*f**2 + 5*f - 3. Let v be w(-5). Which is the nearest to -14? (a) v (b) 0 (c) -5 c Let u = -4.2 + 4.6. Let b = 48 - 237/5. What is the nearest to b in -2, u, 3? u Let r = 1.03 - -0.27. Let x = -0.6 + r. Let c = 0.6 - x. What is the closest to c in 5, 1/7, -3? 1/7 Let g(d) = d**3 + 2*d**2 - d - 3. Let t be g(-3). Let f(u) = -u - 10. Let o be f(t). Which is the closest to o? (a) -2/5 (b) -1/3 (c) -0.5 c Let f be -1 - (2 - (-2 - 1)). Let g be 3/(1 + 11)*f. What is the closest to -0.1 in 1/5, -0.3, g? -0.3 Let i = 13 + -11. Let f be -5 + 4 - (1 + 3). What is the closest to i in -4, 0, f? 0 Let w = -1 - 2. Let l = 3 -
dm_mathematics
To book this week's special rates for Hilton Family Hotels, visit and book at: http://continentalairlines.rsc01.net/servlet/cc?JHDUUBEqmohsmFLJmDLgkhgDJhtE0EZ Special rates apply only for the dates listed at each hotel and are subject to availability. Check hilton.com for specific dates at each Hilton Family Hotel. Or call at 1-800-774-1500 and
enron_emails
B. F-16 Contract In the July 2002 Order, the Court acknowledged that Plaintiffs had pled facts raising a specter that the statements regarding the F-16s were misleading. See July 2002 Order at 13. However, since the statements regarding the F-16 contract are forward-looking, Plaintiffs must demonstrate that Defendants actually knew that the forward-looking statements were false or misleading when they were made and must plead facts sufficient to establish such knowledge in order to survive a motion to dismiss. See In re Splash Tech. Holdings Secs. Litig., 160 F.Supp.2d at 1069. Although Plaintiffs had repeatedly failed to plead facts sufficient to demonstrate *951 Defendants' knowledge, the Court granted leave to "amend the complaint to show that the Defendants actually knew that the allegedly misleading statements were false when made." July 2002 Order at 15. The CTAC incorporates few changes to the F-16 allegations, and the changes that have been made are clearly insufficient to meet the PSLRA's requirements. Preliminarily, the allegations are legally insufficient because Plaintiffs' allegations about why Defendants had actual knowledge of the alleged facts are based solely upon conjecture. Plaintiffs attribute the knowledge not to any inside sources, documentation, or available public information; rather, Lockheed is claimed to have knowledge of the alleged facts because of its position as "the primary contractor for the manufacture of the F-16 fighter aircraft," (CTAC ¶ 73), and because "Boeing's F-15 was a major competitor to Lockheed's F-16," (CTAC ¶ 74). If these types of logical inferences and generalizations were sufficient to meet the PSLRA's requirements, plaintiffs could effectively manufacture support in any case to overcome the PSLRA's requirements. In any event, Plaintiffs' allegations suffer from another shortcoming. Although Plaintiffs continue to allege that numerous sources of information existed that demonstrate the false or misleading nature of the F-16 statements, they muster facts sufficient only to allege that a portion of this information was known to Lockheed. Even if the Court were inclined to agree that this entire latter set of information was actually known to Lockheed, the Court would still find that information insufficient to demonstrate that Lockheed knew that its statements were false or misleading when made. The items of information that Plaintiffs actually claim were known by Lockheed show only that the Block 60 technology was cutting-edge, not that Defendants knew that the United States would not allow sale of such technology to the UAE. That the United States
freelaw
[http://www.telegraph.co.uk/news/worldnews/asia/china/1013239...](http://www.telegraph.co.uk/news/worldnews/asia/china/10132391/Riot- after-Chinese-teachers-try-to-stop-pupils-cheating.html) ~~~ stephengillie If you look at it another way, it's not so bizarre. The person is retrieving their information from another's head. They're using a social storage mechanism. This works fine in the classroom, it works OK in the workplace. It works well in most situations. The only place it breaks down is during testing. Because standard testing is only supposed to verify that you're storing the data locally. Standard testing is designed in a way that only helps "local storage" people, and alienates these users who get their information from their environment. Open-book, open-note, and open-internet testing removes this barrier and levels the playing field for these "network storage" learners. Or am I completely out of touch? ~~~ crimsonalucard Why is it even bizarre? Chinese people cheat for the same reasons anyone would cheat. Being chinese and born in America, I actually found it really surprising the first time I met software engineers who refuse to download even one copy of pirated software. Culturally we just feel significantly less guilty about it. Doesn't mean we aren't aware that it's wrong. Chinese people are fully aware of what's right and wrong and we choose to deliberately cheat. Whether that's a cultural tendency or genetic one is another story. ~~~ dimino > Chinese people are fully aware of what's right and wrong and we choose to > deliberately cheat. Whether that's cultural tendency or genetic one is > another story. What?! Genetic?! There is _very_ little, if _any_ evidence to support the idea that genetics has anything to do with the Chinese propensity to cheat... ~~~ crimsonalucard There's no evidence at all. Even when attempting to do research on this, the political backlash could destroy any scientist's career. No official evidence will ever be collected because of this. I only speak from personal experience
hackernews
Nonalcoholic Fatty Liver Disease (NAFLD) is a rapidly emerging disease estimated to afflict 30 to 70 million people in the U.S. in general. NAFLD, if allowed to progress, can result in premature death. Heritability is strong in NAFLD, and those with genetic predisposition are at higher risk for disease progression. Little is known about symptoms and health-related quality of life (HRQOL) in persons with NAFLD. This pilot study will examine the
nih_exporter
Development of coagulation disorders remains a major challenge in pig-to-primate organ xenotransplantation. Our previous studies demonstrated that porcine aortic endothelial cells (pAEC) activate human platelets to express tissue factor (TF). In this study, we investigated the molecular interaction between human platelets and pAEC to identify possible targets for further genetic modification and/or systemic therapy. Human platelets were incubated with pAEC from wild-type (WT), α1,3-galactosyltransferase gene-knock
pubmed_abstracts
Regarding the translational use of IDO inhibitors, different clinical trials are ongoing. Recently, a failure on a phase 3 trial in metastatic melanoma, based on the combination of epacadostat (IDO1 inhibitor) with pembrolizumab (anti-PD-1 antibody), generated a disappointment in the so-called "second generation" of immuno-oncology drugs (clinical trial information: NCT02752074) ([@B25]). However, in another trial based on epacadostat plus a multipeptide melanoma vaccine, besides normalized serum kynurenine/tryptophan ratios in most patients, data indicated an enhancement of CD8^+^ T cell infiltration in tumor milieu in patients with melanoma submitted to the combination therapy (clinical trial information: NCT01961115) ([@B26]). Interestingly, a phase 2 trial with another class of IDO inhibitor, the indoximod (D-1MT), plus gemcitabine and nab-paclitaxel showed promising results regarding the use of IDO inhibitors for patients with metastatic pancreas cancer (clinical trial information: NCT02077881) ([@B27]). In this trial, data indicate increased intra-tumoral CD8^+^ T cell density in biopsies of responder patients submitted to the combination therapy. Overall, these data highlight the importance of the association of antitumor vaccines, and/or immuno-chemotherapy with IDO inhibitors. We recently showed that the gDE7-based vaccine induces multifunctional E7-specific CD8^+^ T cells with cytotoxic activity as well as expansion of effector memory T cells and activation of mouse and human specialized DC subset capable to promote antigen cross-presentation ([@B29]). In the present study, we observed that treatment with one metabolic adjuvant provided enhanced gDE7-mediated antitumor protection but only the combination of melatonin and one IDO inhibitor conferred complete tumor protection. Regarding IDO1 inhibitors, we observed a superior preclinical antitumor activity relative to DL-1MT in side-by-side comparisons to D-1MT, which is the isoform actually under clinical trials ([@B23]). Previous evidences indicated that D-1MT was more effective than DL-1MT as an anti-cancer agent and reversed the T cell suppression effect mediated by IDO1-expressing DCs ([@B33]). Similarly, recruitment and activation of tumor-infiltrating MDSCs and regulatory T cells, driven by expression of IDO1, could be successfully reversed by D-1MT in mice ([@B19]). On the other hand, the
pubmed_central
Method to remove any symbols, which I use in the function above. \$O(k)\$ complexity where \$k\$ is the length of the string: def remove_any_symbols(s_string): """We take a string and remove any symbols from it. """ acceptable_characters = string.ascii_letters + string.digits no_s_string_list = [c for c in s_string if c in acceptable_characters] if s_string.startswith("-"): return "-"+''.join(no_s_string_list) else: return ''.join(no_s_string_list) I then use the typed list that's generated above to sort integers and strings separately. Then using the original list to generate a list with the same type items in their original order. \$O(n log n)\$ complexity for both sorting functions and then \$O(n)\$ for adding to the final output list. def sort_em_up(no_symbol_list=None): """we take a list here, note the type, sort and then return a sorted list""" sorted_int = sorted([int(i) for i in no_symbol_list if isinstance(i, int)]) sorted_str = sorted([s for s in no_symbol_list if isinstance(s, str)]) final_sorted_list = [] i = j = 0 for item in no_symbol_list: if isinstance(item, int): final_sorted_list.append(str(sorted_int[i])) i += 1 else: final_sorted_list.append(sorted_str[j]) j += 1 return ' '.join(final_sorted_list) if __name__=="__main__": input_file = sys.argv[1] list_of_strings = listify(input_file) print(sort_em_up(typed_list(list_of_strings))) A: listify function Since, as you mentioned in the comments, the function is meant to read a single first line from a file only - you can
stackexchange
In conventional magnetic recording systems, a spinning rotary disc includes a plurality of magnetic recording heads at spaced intervals for recording information on lines traversing a magnetic recording tape passing across the rotary disc. Typically, the rotary head spins at approximately 14,400 rpm and has positioned on its periphery four magnetic heads spaced at 90.degree. intervals. Each transverse line is recorded by one head and switching between the heads occurs near an end of each transverse line. The information recorded on each transverse line of the tape is sufficient for about 16 to 17 horizontal lines of video display. As is known, the interlaced video display includes two fields each with 262.5 horizontal lines such that 16 recorded lines are required to produce each field of the video display. Although this requires switching between magnetic recording heads 16 times, the high quality of the electronics associated with the relatively expensive studio equipment permits switching with relatively imperceptible distortion on the reproduced display. Further, there is sufficient recorded video information on each transverse line so that switching between heads can occur near the end of each line which switching will occur off of the video display of the television receiver. As a result, switching between heads does not produce perceptible visual distortion. With the introduction of portable equipment typically used for on-site news gathering, small portable cameras are employed with less expensive tape recording machines and the problem of head switching line distortion is prevelant. Typically, the recorder employed with the mini-cams employs a cylindrical recording drum with a pair of spaced magnetic recording heads. Instead of the magnetic recording tape passing parallel to the axis of rotation of the drum, the tape is passed around the periphery of the drum at a small angle to the perpendicular of the axis of rotation. As a result, the path of the tape is generally helical, producing a diagonal line of recorded signal or video information. Typically, there is sufficient recorded information on each of the diagonal lines to produce one entire field or 2621/2 horizontal lines of video information. The switching between the pair of magnetic heads typically employed in such recording systems occurs near the end of each diagonal line of recorded material just before the occurrence of the vertical synchronization signals. The switching point appears as a line distortion at the bottom of the displayed video picture on a television receiver. Such distortion may include horizontal misalignment of displayed information below the switching point in addition to a horizontal line of poor quality video information across the displayed picture at the switching point. Each recorded diagonal line also includes a vertical blanking interval during which there is no video information for display but instead camera
uspto_backgrounds
Background The film lampoons the legitimate documentary Madonna: Truth or Dare (also known as In Bed with Madonna outside the United States and Canada). In the original, American singer Madonna allowed cameras to follow her around for a no-holds-barred peek into her life during her Blond Ambition World Tour. In this spoof, Brown plays Medusa, a controlling, hyper-sexual blonde bombshell who has allowed a documentary crew to follow her on her "Blonde Leading the Blonde Tour". The film, about one hour long and originally produced as a Showtime television special, goes to great pains to recreate costumes, sets and situations that occurred in the original documentary. Plot The film begins with the camera panning through pictures of Medusa's album covers and film posters eventually showing her lying in a bed while getting a massage and her hair done. She starts telling the viewers about how lonely she feels since her tour ended. The film then flashes back to when Medusa was rehearsing her "Blonde Leading the Blonde Tour". After being crushed by a giant genitalia statue, Medusa explains in a voice-over how the tour was a technical nightmare. Eventually, the tour begins in the Philippines, only for Medusa to find out that she was performing during the eruption of a volcano. In an interview, Medusa's manager Benny explains how Medusa's first single "Like a Video" ("Like a Virgin") was a hit for MTV, leading into a parody performance of Madonna's "Blond Ambition" version. After that, Medusa is shown talking to her boyfriend. The tour then moves to Japan where Medusa tells her poverty stricken dancers that they'll be receiving a pay cut. Another shows women protesting Medusa and her director showing how Medusa gained the inspiration to shoot a music video involving robbing a store. Finally, the tour moves to the U.S where Medusa and her dancers play a game of Truth or Dare. After that, she is shown being at a party where a director who tries to get her to star in a movie similar to "Heidi". Later, while Medusa is listing negative things about people, Bobcat Goldthwait shows up and gets offended when he sees Medusa gag after he called her show "neat". After that, Medusa is shown reciting lines from "Romeo and Juliet " while a voice-over explains that Medusa is planning to star in the Broadway show
wikipedia_en
As introduced by [@beaver], used by [@bogdanov-laur-willemson], and reviewed in Table \[Beaver\], privacy-preserving multiplication of $U$ and $X$ is also possible whenever $U$ and $X$ are matrices such that their product $UX$ is well-defined. Summing across the two parties in line 10 of Table \[Beaver\] would yield $PR + (U-P)R + P(X-R) + (U-P)(X-R) = UX$, as desired. Notice that $U-P$ and $X-R$ in lines 8 and 9 of Table \[Beaver\] are still masked by the random matrices $P$ and $R$ whose values are unknown to the two parties. The all-reduce in lines 8 and 9 requires the parties to conspire and distribute to each other the results of summing their respective shares of lines 6 and 7, but does not require the parties to get shares of any secret distributed data — that was necessary only for the original data $U$ and $X$ being multiplied (and this “original” data can be the result of prior secure multiparty computations). Also, all values on lines 3–5 are independent of $U$ and $X$, so can be precomputed and stored on disk. As with addition, multiplication via the Beaver scheme never requires securely distributing secret shares, so long as the input data and so-called Beaver triples $(P, R, PR)$ from Table \[Beaver\] have already been securely distributed into shares. The secure distribution of shares is completely separate from the processing of the resulting distributed data set. Communication among the parties during processing is solely via the all-reduce in lines 8 and 9. Table \[Beaver\]’s scheme also works with matrix multiplication replaced by convolution of sequences. line source party 1 party 2 ------ --------------------------------- --------------------------- ------------------ 1 distributed data $U-V$ $V$ 2 distributed data $X-Y$ $Y$ 3 read from disk $P-Q$ $Q$ 4 read from disk $R-S$ $S$ 5 read from disk $PR-T$ $T$ 6
arxiv
# -*- mode: autoconf -*- # # gtk-doc.m4 - configure macro to check for gtk-doc # Copyright (C) 2003 James Henstridge # 2007-2017 Stefan Sauer # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. # # As a special exception, the above copyright owner gives unlimited # permission to copy, distribute and modify the configure scripts that # are the output of Autoconf when processing the Macro. You need not # follow the terms of the GNU General Public License when using or # distributing such scripts, even though portions of the text of the # Macro appear in them. The GNU General Public License (GPL) does govern # all other use of the material that constitutes the Autoconf Macro. # serial 2 dnl Usage: dnl GTK_DOC_CHECK([minimum-gtk-doc-version]) AC_DEFUN([GTK_DOC_CHECK], [ AC_REQUIRE([PKG_PROG_PKG_CONFIG]) AC_BEFORE([AC_PROG_LIBTOOL],[$0])dnl setup libtool first AC_BEFORE([AM_PROG_LIBTOOL],[$0])dnl setup libtool first ifelse([$1],[],[gtk_doc_requires="gtk-doc"],[gtk_doc_requires="gtk-doc >= $1"]) AC_MSG_CHECKING([for gtk-doc]) PKG_CHECK_EXISTS([$gtk_doc_requires],[have_gtk_doc=yes],[have_gtk_doc=no]) AC_MSG_RESULT($
github
March 2017 ICMA writes to Olivier Guersent (Director General of DG-FISMA) and Steven Maijoor (Chair of ESMA) informing them of changes to the ICMA ‘buy-in rules’. In light of the consultation that precipitated and informed the update to the ICMA secondary market rules and recommendations buy-in procedure, ICMA also highlights to the Commission and ESMA its concerns with respect to the projected implementation of the mandatory buy-in regime under CSDR.Letter to Olivier GuersentLetter to Steven Maijoor March 2016 ICMA publishes a paper illustrating the problems arising from an asymmetry in the proposed CSDR mandatory buy-in process that only allows for the settlement of the buy-in or cash compensation price differential to be paid in one direction. Conventional buy-in processes, such as under ICMA Rules, allow for the payment of the buy-in differential to be paid in either direction between the buyer and seller, depending on whether the buy-in price is higher or lower than the original trade price. This ensures an equitable remedy, with neither the buyer or seller incurring an undue profit or loss as a result of the buy-in. The CSDR buy-in process, however, only allows for the payment to be made by the seller to the buyer in the event that the buy-in price (or cash compensation reference price) is higher than the original trade price. From a risk perspective, this asymmetry is the equivalent of any seller of securities also writing a free at-the-money put option which will become active in the event of a buy-in. Conversely, any purchaser of securities will be long this free option. ICMA is hopeful that ESMA and the European Commission will address this highly technical, but fundamental, anomaly before attempting implementation of the mandatory buy-in regime, currently projected for early 2019. Since the publication of the Level 1 draft text of CSDR Regulation, ICMA has been highly engaged in cross-industry advocacy related to the Regulation’s provisions for settlement discipline, in particular mandatory buy-ins, which is broadly recognised as having a potentially detrimental impact on European bond and repo market liquidity and efficiency. 1 February 2016 ESMA published the long-awaited draft RTS for mandatory buy-ins. Given the restrictions of the Level 1 text, and the concerns raised by earlier draft RTS, the final draft RTS attempt to strike a balance between consistency with the intent of
pile-cc
1/4 What is the closest to 0 in -16/17, 2, -0.03, -2/23? -0.03 Which is the closest to 1/5? (a) -2 (b) 25.8 (c) -6/11 c Which is the nearest to -4.71? (a) -1/4 (b) -0.2 (c) 3 a What is the closest to -199 in 0.5, -0.1, -1, 0? -1 What is the closest to 2 in 3, -2, 0.4, -12, 3/37? 3 Which is the closest to -162? (a) 0.4 (b) 4/171 (c) -0.1 c What is the closest to 81 in -0.037, 0, 6, 0.3? 6 What is the closest to -0.2 in 19, 2/3, 2/13, -10? 2/13 Which is the closest to -2/21? (a) 0.01 (b) 3 (c) 19 (d) -2/5 a What is the nearest to 3 in 0.5, -76.78, 1/3, -1/11? 0.5 What is the nearest to -17 in 0.2, 14, -11, 2, 11? -11 What is the closest to 1 in 1.6, 0.3, 36, -8? 1.6 Which is the closest to 2/3? (a) -4/9 (b) 0.3 (c) -156 (d) 3 b What is the closest to -2 in -1, -5, 0.1, 18? -1 Which is the closest to -14? (a) -1/3 (b) -32/15 (c) -1/4 (d) -4 d What is the closest to -1 in -1, 83, 14, -0.3, 1/4? -1 Which is the closest to -2/9? (a) -1479 (b) -4 (c
dm_mathematics
TD {font-family: Arial, Helvetica, sans-serif; font-size: 10pt; font-weight: normal; color: black; } .myWxTitle {font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10pt; font-weight: bold; color: white; } .myWxTitle1 {font-family: Verdana, Arial, Helv
enron_emails
The test for determining admissibility of a photograph is whether it is a true and accurate representation of the subject which it purports to represent, as it existed at the time pertinent to inquiry. Elmore v. State, 414 So.2d 175 (Ala.Cr.App.1982); Osborn v. Brown, 361 So.2d 82 (Ala.1978). The court in Osborn, supra, held that "... the determination as to the sufficiency of the preliminary proofs offered to identify the photograph or show that it is an accurate representation of the objects which it purports to portray is a matter within the sound discretion of the trial court and will not be reviewable except for gross abuse," at 86. Hurst v. State, 397 So.2d 203 (Ala.Cr.App.) cert. denied, 397 So.2d 208 (Ala.1981); Carpenter v. State, 400 So.2d 427 (Ala.1981); Moon v. Nolen, 294 Ala. 454, 318 So.2d 690 (1975). *185 Generally, photographs are admissible if they are verified by a person familiar with the subject matter of the photograph and if they are relevant to some disputed or material issue, illustrate or elucidate some other relevant fact or evidence, or corroborate or contradict some other evidence offered. Photographs may also be admitted if they have some tendency to shed light on, strengthen, or illustrate other testimony in the case. Donner v. State, 409 So.2d 461 (Ala.Cr.App.1981). Testimony of the State's witness established that the photographs correctly depicted the scene at the time they were taken. Both the murder weapon and the victim's body were certainly relevant in this trial. We find no abuse of discretion. The fourth issue raised by appellant is whether the trial court erred in sentencing her to twenty years in the penitentiary under § 13A-5-6(a)(4) Code of Alabama 1975. Appellant was convicted of murder, which is a class A felony under § 13A-6-2(c), Code of Alabama 1975. In regard to sentencing in Class A felony convictions, § 13A-5-6 reads in pertinent part: "(4) For a Class A felony in which a firearm or deadly weapon was used or attempted to be used in the commission of the felony, not less than 20 years." Appellant argues that this section is not mandatory and should not be applied in her case since there
freelaw
------ LogicHoleFlaw I played woodwind instruments all through middle and high school. I started on the clarinet, then the alto and tenor saxophones, and the bassoon as well. I was quite proficient and seriously considered majoring in bassoon performance in college but I decided to pursue CS instead. Unfortunately I haven't played seriously since I graduated high school and I miss it dearly. I really should find a used Tenor somewhere and pick it up again. ------ foulmouthboy 14 years of piano lessons. Also clarinet and saxaphone and I'll mess around with just about everything else. When I told my piano teacher that I was going to school for engineering and got into the pre-med program (as opposed to music), she was in total shock and her immediate response was, "wait... are you smart?" ------ pkeane Fingerstyle guitar. <http://peterkeane.com> ------ liangzan I play the classical guitar as a hobby(other than programming). Still learning now. Now I'm performing for free at old folk's homes during festivals. That's much more meaningful than playing it alone in my room. ------ nickfox I've been playing guitar and singing for a good number of years. I'm working on my second music video. It's the song Patience by Guns n' Roses. My first music video was Across the Universe by the Beatles. I don't have very good "stage presence" in my first video but the one I'm working on now will be much better. Here's my first video: [http://www.youtube.com/watch?v=u7zro5VpUf0&feature=chann...](http://www.youtube.com/watch?v=u7zro5VpUf0&feature=channel_page) ------ baddox Took piano lessons until 8th grade, in 9th grade picked up guitar on my own, learned to play by ear, I'm pretty decent albeit a casual player. I don't play in bands much, just jam around with friends, and I know I don't have the chops to be a professional. Music is a great thing to geek out with, you can
hackernews
An organism's ability to detect and respond to environmental stimuli is critical for its survival. It is particularly important for animals to incorporate contextual information, such as internal state or external cues, in order to modify behavioral responses and maximize fitness. This behavioral plasticity has largely been studied in the context of learning or adaptation. However, how environmental cues modulate the valence of innate responses to nave stimuli remains poorly understood. Behavioral plasticity can stem from genetic, molecular, and circuit level changes in neural function, ultimately leading
nih_exporter
Since adjuvant chemotherapy and hormonal therapy generally extend disease free survival in breast cancer rather than provide a cure, we have examined the current breast cancer paradigm. Heterogeneity is a fundamental characteristic of breast cancer tissue and a well recognized aspect of the disease. There are variations in natural history, histopathology, biochemistry and endocrinology, and molecular biology of cancer tissues and cells within the tissues. A variety of data indicate that growth kinetics are also variable, not only from tumor to tumor, but also during
pubmed_abstracts
![**Mutation of the MSD activates polyadenylation in the 5'LTR.** (**A**) Overview of the luciferase constructs and the position of the RPA probe (**B**) RPA of transcripts expressed by wild-type, SDm2, and SDm1 constructs (above the panel). Probes without RNase digestion (lanes 1--3) and the digest without cellular RNA (lane 4) were used as controls. The localization of the probes is indicated in the plasmid schema above the panel. (**C**) Luciferase assays of the U3, U3R, and LTR promoter activity showing that sequences in R and U5 act negatively on gene expression. The constructs are depicted above the panel. Bars represent the mean value of three independent transfections, and the error bars represent the standard deviation. (**D**) Southern blot of RT-PCR products using oligo d(T) as primer for cDNA synthesis and +1 and oligo d(T) as primers for PCR. The wild-type and SDm2-derived short transcripts are polyadenylated at the 5′LTR. Positions of size markers and plasmids used for transfection are indicated. PCR products were hybridized to an antisense RNA probe encompassing nucleotides +1 to +250.](1742-4690-10-55-2){#F2} These constructs were used to analyse the SDm1 and SDm2 LTR variants by ribonuclease protection assays (RPAs) (Figure [2](#F2){ref-type="fig"}B). For the RPA, three antisense RNA probes complementary to nucleotides +1 to +250 -- encoding the wild-type, the SDm1, or the SDm2 MSD -- were produced. A specific probe for each construct was necessary to avoid cleavage of the RNA probe at the mutated MSD due to non-pairing. All transfections included a Tas expression plasmid (pCMVTas) as expression of the viral transactivator Tas is required to activate the LTR promoter. Transcripts cleaved/polyadenylated at the LTR poly(A) site should result in a protected 193-nucleotide fragment (Figure [2](#F2){ref-type="fig"}A), whereas suppression of this site should result in a 250-nucleotide fragment. The RPAs showed that suppression of the poly(A) site at the 5′LTR is incomplete and that suppression of polyadenylation acts at the first step of polyadenylation, i.e
pubmed_central
It is my first time to use Java Thread Pool for my new project, after I came across this link http://www.javacodegeeks.com/2013/01/java-thread-pool-example-using-executors-and-threadpoolexecutor.html, I am more confused on this, here is the code from the page, package com.journaldev.threadpool; public class WorkerThread implements Runnable { private String command; public WorkerThread(String s){ this.command=s; } @Override public void run() { System.out.println(Thread.currentThread().getName()+' Start. Command = '+command); processCommand(); System.out.println(Thread.currentThread().getName()+' End.'); } private void processCommand() { try { Thread.sleep(5000); } catch (InterruptedException e) { e.printStackTrace(); } } @Override public String toString(){ return this.command; } } package com.journaldev.threadpool; import java.util.concurrent.ExecutorService; import java.util.concurrent.Executors; public class SimpleThreadPool { public static void main(String[] args) { ExecutorService executor = Executors.newFixedThreadPool(5); for (int i = 0; i < 10; i++) { Runnable worker = new WorkerThread('' + i); executor.execute(worker); } executor.shutdown(); while (!executor.isTerminated()) { } System.out.println('Finished all threads'); } } in the code, a fixed size pool is created and 10 worker threads are created, am I right? The thread pool is supposed to decrease the burden of a system, on the contrary, in the above code, I think it increases the burden by creating the pool in addition to the worker threads. why bother to use the thread pool? Can anyone explain? Thanks I also read this post on StackOverflow http://stackoverflow.com/questions/19765904/
stackexchange
1. Field of the Invention The present invention relates to a method and a control apparatus for controlling a high-pressure fuel supply pump which is configured to supply pressurized fuel to an internal combustion engine, in particular to a common rail having a plurality of fuel injectors for injecting pressurized fuel into a combustion chamber of the internal combustion engine. Specifically, the present invention relates to a method and a control apparatus for controlling a high-pressure fuel supply pump which comprises a compression chamber, a normally-open-type solenoid-actuated intake valve for delivering unpressurized fuel to the compression chamber, a movable plunger reciprocating in the compression chamber between a first plunger position, e.g. the so-called bottom dead center position, and a second plunger position, e.g. the so-called top dead center position, for pressurizing fuel in the compression chamber, and a discharge valve for discharging pressurized fuel from the compression chamber to be supplied to the internal combustion engine. The normally-open-type solenoid-actuated intake valve of the high-pressure fuel supply pump is configured to be closed or kept closed by means of magnetic force. The present invention also relates to a computer program product comprising computer program code means configured to adapt a control apparatus. 2. Description of the Related Art In recent years, gasoline direct injection (GDI) has become increasingly popular due to its advantages for increased power (due to a lower tendency to knock) and hence higher fuel efficiency. In gasoline direct injection, low-pressure fuel is delivered from the fuel tank by means of a low-pressure fuel pump to a high-pressure pump. In a compression chamber of the high-pressure pump, the low-pressure fuel is pressurized to high pressure and delivered to a common rail comprising a plurality of injectors for being directly injected at high pressure into a combustion chamber of the internal combustion engine. In general, the amount of high-pressure fuel supplied by the high-pressure fuel supply pump is electronically controlled by controlling a solenoid-actuated intake valve of the high-pressure fuel supply pump. There are known normally-closed-type solenoid-actuated intake valves which can be opened and/or kept open by energizing one or more solenoids of the solenoid-actuated intake valve while being biased by one or more biasing members (such as e.g. springs) into a closing direction of the solenoid-actuated intake valve. Also, there are known normally-
uspto_backgrounds
History The clock tower was built in 1607 and on the small bell-tower attached to the sacristy, the date 1669 is inscribed. The church was listed on the 11 May 1932. Only the church and ossuary remain of the original parish enclosure. The original sanctuary or priory dates back to around 1200 when it was established by Hervé 1st of Léon and dedicated to Saint Thomas Becket, who had been assassinated by Henry II of England. Historians suggest that the choice of Becket as the patron saint was a demonstration of Hervé 1st's determination to avoid English domination and to remove the stigma left by his father's defeat and death at the hands of the English in 1167. When Brittany began to prosper in the 16th and 17th centuries, the existing church was replaced by something more substantial and the resultant church included a bell tower with porch, a nave with five transepts and two aisles and a flat chevet in the Flamboyant Gothic style, so typical of the region's churches in the 16th century. The Église Saint-Houardon is also an important church in Landerneau. The porch The arched porch has a leaf shaped keystone and has three niches topped with the carving of a crescent moon, a design attributed to Philibert Delorme and common to the area. The porch interior has 12 niches to accommodate statues of the apostles but these niches are empty. There is however a stoup carved from Kersanton stone, this having a fluted bowl. The sablières These have both Renaissance type motifs with masks, putti and vases and some more bizarre and humorous carvings such as a sow drinking from a barrel whilst a woman has taken a knife and attempts to carve a piece from the sow's bottom. The altar This takes the shape of a tomb. The altar was built in 1711 and is surmounted by a five lancet window and on one side of the altar there is a statue of Saint Thomas of Canterbury and on the other Saint Blaise. Under each statue there is a bas-relief depicting their martyrdoms. Above the steps of the altar are two reliefs. One depicts the Last Supper and the second Jesus washing the disciples' feet. Statues The church has many fine statues in the nave and choir
wikipedia_en
In the FMD approach we employ Gaussian wave packets $$\label{eq:wavepacket} {\big\langle {{\mathbf{x}}} \big| {q} \big\rangle} = \exp\left\{-\frac{({\mathbf{x}}-{\mathbf{b}})^2}{2 a}\right\} \otimes {\big| \,{\chi^\uparrow, \chi^\downarrow}\, \big> } \otimes {\big| \,{\xi}\, \big> }$$ as single-particle basis states. The complex parameters ${\mathbf{b}}$ encode the mean positions and momenta of the wave packets and $a$ the widths of the wave packets. The spins can assume any direction, isospin is $\pm 1$ denoting a proton or a neutron. Intrinsic many-body basis states are Slater determinants $$\label{eq:sldet} {\big| \,{Q}\, \big> } = \mathcal{A} \left\{\ {\big| \,{q_1}\, \big> } \otimes \ldots \otimes {\big| \,{q_A}\, \big> }\ \right\} \:$$ that reflect deformation or clustering and break the symmetries of the Hamiltonian with respect to parity, rotation and translation. To restore the symmetries the intrinsic basis states are projected on parity, angular momentum and total linear momentum $${\big| \,{Q; J^\pi MK; {\mathbf{P}}=0}\, \big> } = {\hat{P}}^\pi {\hat{P}}^J_{MK} {\hat{P}}^{{\mathbf{P}}=0} \; {\big| \,{Q}\, \big> } .$$ In a full FMD calculation the many-body Hilbert space is spanned by a set of $N$ projected intrinsic basis states $\left\{\ {\big| \,{Q^{(a)}; J^\pi MK; {\mathbf{P}}=0}\, \big> } , a=1,\ldots,N \ \right\}$. By diagonalizing the Hamiltonian in this set of non-orthogonal basis states the amplitudes of the various configurations contained in the many-body eigenstate are determined. Starting from the realistic Argonne V18 interaction [@wiringa95] we derive a phase-shift-equivalent effective low-momentum interaction using the unitary correlation operator method (UCOM). The basic idea of the UCOM approach is to explicitly include short-range central and tensor correlations by means of a unitary operator [@ucom98
arxiv
#ifndef NCSJPCDEFS_H #define NCSJPCDEFS_H // // Disable dll-interface warning, compiler gives it on protected/private members. // Disable truncated name mangling warning // #ifdef _MSC_VER #pragma warning( disable : 4251 4786 4717 4275 4163) #endif // // Remove unnecessary stubs to reduce binary size // #define NCSJPC_LEAN_AND_MEAN #ifndef NCSDEFS_H #include "NCSDefs.h" #endif // NCSDEFS_H #if defined(WIN32)&&!defined(_WIN32_WCE)&&((defined(_X86_) && defined(_MSC_FULL_VER) && (_MSC_FULL_VER >= 12008804))||(defined(_AMD64_) && defined(_MSC_VER) && _MSC_VER >= 1400)) // // X86 "Multi Media Intrinsics" - ie, MMX, SSE, SSE2 optimisations // // Only defined if Win32, X86 and VC6 Processor Pack or newer _OR_ AMD64 and >= VS.NET 2005/AMD64 PlatformSDK compiler (ie, SSE intrinsics support in the compiler) // #define NCSJPC_X86_MMI #if !defined(_AMD64_) #define NCSJPC_X86_MMI_MMX // Prevent mmintrin.h from being included //#define _MMINTRIN_H_INCLUDED #endif #endif // // Use LCMS for ICC->RGB conversions, supports both // restricted and full ICC profiles. // #define NCSJPC_USE_LCMS // // Use TinyXML for XML DOM Parsing // #define NCSJPC_USE_TINYXML // // Include ECW Decompression in lib // #define NCSJPC_ECW_SUPPORT // // Include ECW Compression in lib // #define ECW_COMPRESS #ifndef NCSJPC_EXPORT #define NCSJPC_EXPORT NCS_EXPORT #endif // NCSJPC_EXPORT #ifndef
github