Search is not available for this dataset
text
string
meta
dict
I got a wake up call, I got to make this workCause if we don´t we´re left with nothing and that´s what hurtsWe´re so close to giving up but something keeps us here I can´t see what´s yet to comeBut I have imagined life without you and it feels wrongI want to know where love begins, not where it ends Cause we don´t know what we´re doingWe´re just built this wayWe´re careless but we´re tryingCause we both make mistakesAnd I don´t want to keep on runningIf we´re only gonna fall behindWe´ve almost got it rightBut almost wasn´t what I had in mind We want it all and deserve no lessBut all we seem to give each other is second bestWe´re still reaching out for something that we can´t touch Cause we don´t know what we´re doingWe´re just built this wayWe´re careless but we´re tryingCause we both make mistakesAnd I don´t want to keep on runningIf we´re only gonna fall behindWe´ve almost got it rightBut almost wasn´t what I had in mind You know there´s nothing like this loveSo we don´t want to let it go Cause we don´t know what we´re doingWe´re just built this wayWe´re careless but we´re tryingCause we both make mistakesAnd I don´t want to keep on runningIf we´re only gonna fall behindWe´ve almost it got rightBut almost wasn´t what I had in mind
{ "pile_set_name": "Pile-CC" }
USA The EU is a political system with a unique structure and functioning, incomparable to anything which has existed before, far away from any classical, either national or international model. In such supranational union that is neither a pure intergovernmental organization nor a true federal state, political institutions appear vague and somewhat obscure and indistinguishable. Are Iran and Saudi Arabia going to war? They are already fighting – by proxy – all over the region. Relations between Saudi Arabia and Iran quickly deteriorated in January 2016 following Riyadh’s execution of Shiite cleric Nimr al-Nimi but their struggle for power dates back to Iran's Islamic Revolution in 1979. Tehran's influence extends today across a broad area of the Middle East from Iran in the east to Lebanon in the west. UNESCO’s Director-General, Irina Bokova and the Italian Minister for Foreign Affairs, Paolo Gentiloni signed in February 2016 in Rome an agreement on the establishment of a Task Force of cultural heritage experts in the framework of UNESCO’s global coalition “Unite for Heritage”. Under the agreement, UNESCO will be able to ask the Italian Government to make experts of the Task Force available for deployment for the conservation of cultural heritage in areas affected by crises. In October 2016 John Sawers, a former MI6 chief, told BBC that the world was entering an era possibly “more dangerous” than the Cold War, as “we do not have that focus on a strategic relationship between Moscow and Washington”. Lt. Gen. Eugeny Buzhinsky, head of PIR Centre, a Moscow Think Tank, did maintain: “If we talk about the last Cold War, we are currently somewhere between the erection of the Berlin Wall and the Cuban Missile Crisis but without the mechanisms to manage the confrontation”.
{ "pile_set_name": "Pile-CC" }
Chronic energy deficiency and its association with dietary factors in adults of drought affected desert areas of Western Rajasthan, India. To asses the impact of drought on nutritional status of adults of a rural population in desert area. Threestage sampling technique. 24 villages belonging to 6 tehsils (sub units of district) of Jodhpur district, a drought affected desert district of Western Rajasthan, in 2003. 1540 adults were examined for their anthropometry, dietary intake and nutritional deficiency signs. Overall chronic energy deficiency (CED) was found high (42.7 %). Severe CED was 10.7 percent, significantly higher in males than females. Regarding vitamin A deficiency, overall prevalence of Bitot spot and night blindness was 1.8 and 0.2 percent respectively, higher in females than males. Regarding vitamin B complex deficiency, angular stomatitis, cheliosis, and glossitis was 1.0, 2.6 and 5.4 percent. Anemia was 35.6 percent. Overall mean calorie and protein intake deficit was very high (38 and 16.4 %). The comparison of present drought results with earlier studies in desert normal and desert drought conditions showed higher deficiencies of calories and proteins in their diet. Severity of malnutrition is critical as CED was more than the cut-off point of 40 percent stated by World Health Organization. Vitamin A and B complex deficiencies, anemia, protein calorie malnutrition along with deficit in calories and proteins in their diet were higher in comparison to non desert areas, which may be due to the harsh environmental conditions in desert areas. Efforts should be made to incorporate intervention measures to ensure the supply of adequate calories and proteins to all age groups.
{ "pile_set_name": "PubMed Abstracts" }
CIBC Poll: Nearly half of all Canadians with debt not making progress in paying it down Many say they simply don't have the money, but may be missing opportunities to get advice about how to reduce their debt TORONTO, June 5, 2013 /CNW/ - A new CIBC(TSX: CM) (NYSE: CM) Poll conducted by Harris/Decima reveals that half of Canadians with debtsay their debt level is the same or higher than it was a year ago, despite prior CIBC polls showing debt repayment as the top priority for Canadians in 2013. Highlights of the poll include: 71 per cent of Canadians said they currently carry some form of debt, in line with the national average in a similar poll conducted last year (72 per cent) Among Canadians with debt, 21 per cent say their level of debt has increased in the last 12 months, while another 28 per cent say their debt level has stayed the same - which indicates nearly half (49 per cent) of Canadians with debt did not make progress towards paying it down in the past year The top reason cited for not making progress on debt reduction was not having the money to do so 50 per cent said they have reduced their debt in the last year "Though Canadians have identified paying down debt as their top financial priority for the past three years, our poll shows almost an even split between those who are making strides and those who aren't," said Christina Kramer, Executive Vice President, Retail Distribution and Channel Strategy, CIBC. "Today's historically low interest rates represent a real opportunity to reduce your total debt level, however to take advantage of these low rates it is critical that Canadians have a plan to make that happen." CIBC's annual Financial Priorities Poll, released in January 2013, found that paying down debt was the top financial priority of Canadians for the third consecutive year. "Not Having the Money" Cited as Top Reason for not Making Progress Among those Canadians who said they aren't making progress on debt repayment, the top reason provided was they don't have the money to put against what they owe (29 per cent), followed by unplanned expenses which affected their ability to pay more towards their debt (12 per cent). A CIBC study from earlier this year shows that despite being a financial priority, debt is not top of mind when it comes to getting advice. When Canadians were asked what topics come to mind about a conversation they may have with an advisor, only 6 per cent cited debt. "It can be challenging to find the money each month to put towards reducing your debt, but our poll clearly shows that many Canadians are doing just that despite having the same everyday financial pressures of those who say they are not making progress," said Ms. Kramer. She noted that with many Canadians avoiding conversations about debt management, they are missing an opportunity to get personalized advice and put a plan in place. "You should talk with an advisor about your debt management goals the same way you would talk to them about your goals for retirement, because your finances are all connected," added Ms. Kramer. "A conversation with an advisor can lead to a plan that puts on you on track to achieve your broader financial goals." Advice on Managing Debt: CIBC offers these tips to help Canadians take charge of their finances and reduce debt as part of their long term financial plan. Make lump sum payments to higher interest debt first to reduce interest costs If you have debt, work with an advisor to structure it to minimize your overall interest costs by utilizing debt products that offer a lower interest rate and having a strategy to pay these balances down in a specific time frame While interest rates remain near historic lows, don't ignore the long term benefits of making small adjustments to your payment today. Setting your debt payment even slightly higher than your required payment can reduce your overall interest costs and help you become debt free faster Use free budgeting tools to help you stay on budget - CIBC CreditSmart, available to CIBC credit card holders, allows you to set customized budgets and receive spend alerts if you exceed your planned budget for the month, helping you stay on top of your everyday budgeting and saving KEY POLL FINDINGS Percentage of Canadians currently managing some form of debt, by region: 2013 2012 National 71% 72% Atlantic Canada 79% 78% Quebec 71% 72% Ontario 71% 69% Manitoba and Saskatchewan 73% 77% Alberta 69% 75% B.C. 64% 71% Percentage of Canadians currently managing some form of debt, by age: 2013 2012 National 71% 72% 18-24 59% 51% 25-34 82% 84% 35-44 79% 83% 45-54 78% 78% 55-64 66% 67% 65 + over 56% 56% Among Canadians with debt, percentage of those that say they have increased their debt over the past 12 months, by region: National 21% Atlantic Canada 8% Quebec 24% Ontario 23% Manitoba and Saskatchewan 24% Alberta 18% British Columbia 21% Among Canadians with debt, percentage of those that say their level of debt has stayed the same over the past 12 months, by region: National 28% Atlantic Canada 32% Quebec 33% Ontario 26% Manitoba and Saskatchewan 23% Alberta 24% British Columbia 31% *Each week, Harris/Decima interviews just over 1000 Canadians through teleVox, the company's national telephone omnibus survey. These data were gathered in samples of 2002 Canadians between March 28 to April 7, 2013 and 1002 Canadians between April 25 - 28, 2013. Samples of this size have a margin of error of +/-2.2%, 19 times out of 20 and +/-3.1%, 19 times out of 20 respectively. CIBC is a leading North American financial institution with over 11 million personal banking and business clients. CIBC offers a full range of products and services through its comprehensive electronic banking network, branches and offices across Canada, and has offices in the United States and around the world. You can find other news releases and information about CIBC in our Media Centre on our corporate website at www.cibc.com.
{ "pile_set_name": "Pile-CC" }
@comment $NetBSD: PLIST,v 1.5 2017/06/21 08:28:43 markd Exp $ share/texmf-dist/scripts/luaotfload/luaotfload-tool.lua share/texmf-dist/scripts/luaotfload/mkcharacters share/texmf-dist/scripts/luaotfload/mkglyphlist share/texmf-dist/scripts/luaotfload/mkimport share/texmf-dist/scripts/luaotfload/mkstatus share/texmf-dist/scripts/luaotfload/mktests share/texmf-dist/tex/luatex/luaotfload/fontloader-2017-02-11.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-basics-gen.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-basics-nod.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-basics.tex share/texmf-dist/tex/luatex/luaotfload/fontloader-data-con.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-afk.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-cff.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-cid.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-con.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-def.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-dsp.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-gbn.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-ini.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-lua.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-map.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-ocl.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-one.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-onr.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-osd.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-ota.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-otc.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-oti.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-otj.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-otl.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-oto.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-otr.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-ots.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-oup.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-tfm.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-font-ttf.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-fonts-demo-vf-1.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-fonts-enc.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-fonts-ext.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-fonts-syn.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-fonts.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-fonts.tex share/texmf-dist/tex/luatex/luaotfload/fontloader-l-boolean.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-l-file.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-l-function.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-l-io.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-l-lpeg.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-l-lua.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-l-math.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-l-string.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-l-table.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-languages.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-languages.tex share/texmf-dist/tex/luatex/luaotfload/fontloader-math.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-math.tex share/texmf-dist/tex/luatex/luaotfload/fontloader-mplib.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-mplib.tex share/texmf-dist/tex/luatex/luaotfload/fontloader-plain.tex share/texmf-dist/tex/luatex/luaotfload/fontloader-preprocessor-test.tex share/texmf-dist/tex/luatex/luaotfload/fontloader-preprocessor.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-preprocessor.tex share/texmf-dist/tex/luatex/luaotfload/fontloader-reference.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-swiglib-test.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-swiglib-test.tex share/texmf-dist/tex/luatex/luaotfload/fontloader-swiglib.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-swiglib.tex share/texmf-dist/tex/luatex/luaotfload/fontloader-test.tex share/texmf-dist/tex/luatex/luaotfload/fontloader-util-fil.lua share/texmf-dist/tex/luatex/luaotfload/fontloader-util-str.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-auxiliary.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-blacklist.cnf share/texmf-dist/tex/luatex/luaotfload/luaotfload-characters.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-colors.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-configuration.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-database.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-diagnostics.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-features.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-glyphlist.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-init.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-letterspace.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-loaders.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-log.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-main.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-parsers.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-resolvers.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload-status.lua share/texmf-dist/tex/luatex/luaotfload/luaotfload.sty
{ "pile_set_name": "Github" }
Ask HN: How to approach two competing job offers - is bidding war an option? - mbord I studied Computer Science, and I recently graduated as a bachelor. I went on to apply to two major Silicon Valley companies, let's call them A and B, and aced the interviews.<p>I got an offer from A, which I would have happily accepted had I not had another company still contemplating their offer. Now B contacted me, not yet ready to give an offer, but they mentioned that their offer would likely be significantly larger if they would be able to see the offer from A in writing.<p>I got my offer from A both verbally and in informal writing to my e-mail. I find it clear that if I asked them for the offer in writing now, they would certainly know what's happening (given that I've kept them waiting for some time now). I told this to B already previously, they understood, but it would certainly benefit me if I had it in writing now.<p>How should this game be played in your opinion? I actually prefer A, and if B's offer were roughly the same size, I would be very happy to take A. However, I am wondering whether I am a wussy if I play it safe now, and take no action, and should I instead try to get some competition between these two. There's also a small chance that A is trying to lowball me with their offer, since I might be too humble analyzing my own value. All this leads me to think that I might just want to get the offer in writing, not caring what they think about it, but I am very very open to other ideas.<p>Also, I know that I should probably never try to bluff, and that's my intention, too - I'll never try to inflate my offer if I am not really willing to take the competing one. These both are great companies, and B can become better in my mind if their offer triumphs on the financial side. ====== gvb _Now B contacted me, not yet ready to give an offer, but they mentioned that their offer would likely be significantly larger if they would be able to see the offer from A in writing._ I see nothing but red flags here. It also sounds like you are already dabbling with a bidding war... you are holding back on A, B knows about A, B is "offering" to out-bid A. Now you are wondering if you can leverage a questionable offer from B to up A's offer. If you escalate this further into a full out bidding war, the probability is high that it won't turn out well. If B wins, you work for a sketchy company just for the money... or they don't come through with a _real_ offer, A drops out (note that you do not have a _formal_ offer from A yet), and you are screwed. If A wins, the person you work for knows what you did to them and resents it. Sorry to be harsh, but from the outside looking in, B sounds pretty sketchy and your line of questioning doesn't reflect well on you. ------ antidoh "I recently graduated" "aced the interviews" "I got an offer from A" " I actually prefer A" "B can become better in my mind if their offer triumphs on the financial side." I believe that last is the only untrue thing you've said. You're young, capable and have a lot of years in front of you. Work where you want and enjoy it. ------ helen842000 I think B only want to see the letter in writing so that they can go slightly above what A has offered.It makes no sense to go largely over. Why not ask B to make a blind offer based on the value you can bring and what you're worth, tell them you're not interested in them upping A's offer, just formulating their own based on value not competition. You want to hear what they would have offered without company A in the picture. Not only do you come across less money-motivated but I think you're more likely to get a higher offer from B this way. Plus if you do get company B's offer in writing - maybe you can take that back to A. After all if you prefer company A, you should be going with them regardless. ------ ggk IMO, there is no harm asking for formal offer letter (probably a soft copy). But I would suggest choose the job which is of your interest. Salary should be the second factor. If you choose a job of your interest, you will perform well there and your career growth will be much faster there. ~~~ pmtarantino That's my opinion too. I worked in two different jobs in the last years. One of them was in company A, which I always wanted to be part of. The salary was not amazing (in fact, after of some talk with friends, it was low), but I was happy. Then, I worked in company B. The salary was superb, it was higher than average, but I was not happy. That was not what I wanted. I quit. ------ lsiebert ask for offer in writing, explain why, and that you'd prefer A, see if they are open to matching B's offer. If so, you might want to take their initial offer to B. Get B's offer in writing and go to A. Tell A if they match it, you'll work for them. Do so, that is, if they match B's offer, work for A. Explain to B, but invite them to contact you sometime in the future to see if you are happy at A. Use B's contact to either move to B if A isn't great or to negotiate from position from strength at A. But work at A to start with.
{ "pile_set_name": "HackerNews" }
Vasa, Minnesota Vasa is an unincorporated community in Vasa Township, Goodhue County, Minnesota, United States. The community is nine miles east of Cannon Falls at the junction of State Highway 19 (MN 19) and County 7 Boulevard. It is within ZIP code 55089 based in Welch. Nearby places include Cannon Falls, Red Wing, Welch, and White Rock. Vasa is 12 miles west-southwest of Red Wing. References Category:Unincorporated communities in Minnesota Category:Unincorporated communities in Goodhue County, Minnesota
{ "pile_set_name": "Wikipedia (en)" }
--- sandbox/linux/BUILD.gn.orig 2019-04-08 08:18:26 UTC +++ sandbox/linux/BUILD.gn @@ -12,12 +12,12 @@ if (is_android) { } declare_args() { - compile_suid_client = is_linux + compile_suid_client = is_linux && !is_bsd - compile_credentials = is_linux + compile_credentials = is_linux && !is_bsd # On Android, use plain GTest. - use_base_test_suite = is_linux + use_base_test_suite = is_linux && !is_bsd } if (is_nacl_nonsfi) { @@ -379,7 +379,7 @@ component("sandbox_services") { public_deps += [ ":sandbox_services_headers" ] } - if (is_nacl_nonsfi) { + if (is_nacl_nonsfi || is_bsd) { cflags = [ "-fgnu-inline-asm" ] sources -= [ @@ -387,6 +387,8 @@ component("sandbox_services") { "services/init_process_reaper.h", "services/scoped_process.cc", "services/scoped_process.h", + "services/syscall_wrappers.cc", + "services/syscall_wrappers.h", "services/yama.cc", "services/yama.h", "syscall_broker/broker_channel.cc", @@ -405,6 +407,10 @@ component("sandbox_services") { "syscall_broker/broker_process.h", "syscall_broker/broker_simple_message.cc", "syscall_broker/broker_simple_message.h", + ] + sources += [ + "services/libc_interceptor.cc", + "services/libc_interceptor.h", ] } else if (!is_android) { sources += [
{ "pile_set_name": "Github" }
Q: Is the sum of separating vectors always separating? If $\mathcal{R}$ is a von Neumann algebra acting on Hilbert space $H$ and $v, w \in H$ are separating vectors for $\mathcal{R}$, must $v+w$ be (either zero or) separating for $\mathcal{R}$? [I have edited to remove the restriction to type III factors and am moving my proposed partial solution to an answer below.] A: No, there must be a counterexample, under the mild assumption that there exists a nontrivial unitary $U \in \mathcal{R}$ whose restriction to the range of some nonzero projection $P \in \mathcal{R}$ is trivial (i.e. the identity). Fix such a $U$ and $P$. Let $v$ be any separating vector for $\mathcal{R}$ and let $w = -Uv$. This $w$ is separating for $\mathcal{R}$ since any nonzero $T \in \mathcal{R}$ that annihilated $w$ would make $-TU$ a nonzero operator in $\mathcal{R}$ than annihilates $v$. But we can show, using the fact that $UP = P$ and $U(1-P) = (1-P)U$, that $v + w$ is not separating for $\mathcal{R}$: $v + w = v - Uv = (Pv + (1-P)v) - (UPv + U(1-P)v)$ $= (1-P)v - U(1-P)v = (1-P)v - (1-P)Uv = (1-P)(1-U)v$; and $(1-P)(1-U)v$ is annihilated by $P$.
{ "pile_set_name": "StackExchange" }
OS 10.2 - Permanently deleting emails and files This is my first time posting so I hope I don't screw this up...Does anyone have any advice on how to permanently delete emails and files? I am running on OS X 10.3.9 and have deleted files in my trash using the secure empty trash function, however, I have a large number of emails I have deleted in Mail. Are these permenently deleted as well? Secondly, is some of the shareware or freeware out there such as Shredit any good? I have a concern that someone is going to try and retrieve deleted data off my computer sometime soon and I really don't want any emails/files showing up that I have deleted. If you are using Mail as your email client and you account is setup as a pop3 account not leaving a copy on the server and your mac is not remotely backed up and your home folder is local then your mail lives in /Users/username/Library/Mail. Using the erase deleted messages from the mailbox menu will get rid of your mail. Will it be recoveerable from a drive recovery company,...possibly. Your company on the other handprobably not. Unless the above criteria is false.
{ "pile_set_name": "Pile-CC" }
N. American home video distributor announces Spring 2012 release The North American home video distributor Discotek announced on Tuesday that it licensed the first season of the Lupin the 3rd television anime series for release on DVD next spring. The first season consists of the first 23 episodes of the Lupin the 3rd television series. Director Hayao Miyazaki of Ghibli fame directed 14 episodes in the first season. The second season of Lupin the 3rd was previously licensed by Geneon Entertainment USA and aired on Cartoon Network's Adult Swim block. Monkey Punch's original manga began serialization in 1967 and features Lupin the Third, the great nephew of gentleman thief Arsène Lupin. He is routinely pursued by Investigator Zenigata while attempting to steal priceless items and woo women. The manga was adapted into numerous movies, including a Detective Conan crossover special and most recently Lupin III: The Last Job in 2010.
{ "pile_set_name": "OpenWebText2" }
Q: CMake link directory passing when compiling shared library Say I have C project with the following structure (simplified): |- CMakeLists.txt <- This is root CMake |- lib |- <some source files> |- CMakeLists.txt <- CMake file for building the library |- demo |- <some source files> |- CMakeLists.txt <- CMake for building demo apps |- extra_lib |- <some source files> |- CMakeLists.txt <- CMake for building supplementary library Now, I want to build my library (living in lib) as a shared library to be used by demo apps from demo directory. Additional library, that can not be a part of my library (it is essentially a wrapper for some C++ external library) is also to be compiled as a shared library and then linked to my library. I have a problem with including dependencies for additional library. In its CMakeLists.txt I've defined link_directories to point location where .so libs are stored and then target_link_libraries to point which should be linked. At the end I did export target. include_directories(${EXTERNAL_DIR}/include) link_directories(${EXTERNAL_DIR}/lib) add_library(extra_lib SHARED extra_lib.cpp) target_link_libraries(extra_lib some_lib ) export(TARGETS extra_lib FILE extra_lib.cmake) The point is that when I try to compile lib and link it against extra_lib I get an error that some_lib is not found what I guess means that link_directories is local to the extra_lib. Now, question is how can I make it propagate together with dependencies? I'd like it to work in the way that adding extra_lib as subdirectory and as a dependency for my lib would automatically add linked directories from extra_lib to the lib linking process. The linking process would look like: (some external library) --> extra_lib --> lib --> demo app A: First off, the CMake docs state that commands like include_directories and link_directories are rarely necessary. In fact, it is almost always better to use target_include_directories and target_link_libraries instead. Secondly, the reason your approach fails is because you need to let CMake know about the existence of some_lib. You can do this like so: add_library(some_lib SHARED IMPORTED) set_target_properties(some_lib PROPERTIES IMPORTED_LOCATION ${EXTERNAL_DIR}/lib/libsome_lib.so) Then, afterwards: target_link_libraries(extra_lib some_lib)
{ "pile_set_name": "StackExchange" }
Q: What are the challenges for recognising the handwritten characters? This 2014 article saying that a Chinese team of physicists have trained a quantum computer to recognise handwritten characters. Why did they have to use a quantum computer to do that? Is it just for fun and demonstration, or is it that recognising the handwritten characters is so difficult that standard (non-quantum) computers or algorithms cannot do that? If standard computers can achieve the same thing, what are the benefits of using quantum computers to do that then over standard methods? A: Handwritten digit recognition is a standard benchmark in Machine Learning in the form of the MNIST dataset. For example, scikit-learn, a python package for Machine Learning uses it as a tutorial example. The paper you cite uses this standard task as a proof of concept, to show that their system works.
{ "pile_set_name": "StackExchange" }
The bantamweight champion of DEEP, Takafumi Otsuka, will take on Koichi Ishiuzka on May 13th at Differ Ariake in Tokyo. Otsuka was supposed to fight Fernando Vieira for the WSOF-GC bantamweight title in December. However, the Brazilian was over the weight at the first weigh-in and never showed up at the second weigh-in. Vieira was nowhere to be found after this.The Brazilian basically fled from the entire show. Otsuka became the inaugural WSOF-GC champ but this means, the last time he fought was back in August of last year. That was, however, against a Mongolian fighter named Baataryn Azjavkhlan who was 1-0 at the time. In terms of competitive fight, vs Daisuke Engo in February 2016 maybe is the last time Otsuka went through, which is more than a year ago. Ishizuka is basically born and raised in DEEP. And, he is undefeated in the last ten fights. For Ishizuka, this must be the opportunity he has been looking for all of his pro MMA career. So, Ishizuka has to be motivated than ever. The only concern is, his recent changes in the training environment. In last year, Ishizuka moved to Aichi because of the job which forced him to leave team Brightness Monma. And, Ishizuka joined team ALIVE which is based in Aichi prefecture. But Ishizuka left ALIVE now, and his status is “independent.” Besides this title fight between Otsuka and Ishizuka, men’s strawweight bout between Haruo Ochi and “Rambo” Kosuke is also confirmed. These two met all the way back in May of 2011. This fight took place in Shooto. “Rambo” almost caught Ochi with an armbar in the first round. But Ochi came back and KO’d Kosuke in the second round. That was “Rambo”‘s first pro defeat in seven fights.
{ "pile_set_name": "Pile-CC" }
This article is from the archive of our partner . WikiLeaks has a track record of friction with the media organizations it collaborates with, and in the latest example of that, it rubbed The Associated Press the wrong way simply by identifying the news organization as a collaborator. The Syria Files, a massive dump of 2.4 million internal Syrian government emails WikiLeaks released Thursday, initially listed the AP among the organization's "collaborators" on the release. But, as Huffington Post's Michael Calderone reported Thursday, the link to AP was later removed from the collaborators list on WikiLeaks' site. AP spokesman Paul Colford confirmed to The Atlantic Wire that it was AP that asked to be removed from the list. "It was their characterization of what was going on that was inaccurate. It wasn’t a characterization that we asked them to make," he said. Colford explained that WikiLeaks gave AP an advance look at the Syria Files, as do many organizations hoping to generate possible stories, but, as Colford says, "to make it appear as if that rises to the level of us being a collaborator with WikiLeaks is a few miles different." It's not the first time WikiLeaks has driven off media organizations it considered collaborators. The antisecrecy organization really did work cooperatively with outlets like The New York Times and The Guardian in some of its early data dumps like the diplomatic cables it released in 2010. But eventually it fell out with them, and started listing smaller news organizations as collaborators.
{ "pile_set_name": "OpenWebText2" }
--recursive --require @babel/register
{ "pile_set_name": "Github" }
AA Türkiye, Cumhurbaşkanlığı sisteminin kabul edildiği 16 Nisan referandumu sonrası ilk defa sandık başına gitti. 56 milyonu aşkın seçmen, cumhurbaşkanı ve 600 milletvekilini belirlemek üzere tek zarfta iki pusulayla oyunu hem yurt içinde hem de yurt dışında kullandı. Oy kullanma işleminin 17.00'de sona ermesinin ardından cumhurbaşkanlığı ve milletvekili seçimleri için yurt dışından ilk sonuçlar gelmeye başladı. HABERTÜRK'ÜN SEÇİM ÖZEL CANLI YAYININI İZLEMEK İÇİN TIKLAYINIZ... YENİ SİSTEMDE NE GİBİ DEĞİŞİKLİKLER OLACAK? 16 Nisan 2017 halkoylamasıyla kesinleşen yeni hükümet sistemi kapsamında bir dizi değişiklik ilk kez uygulanacak. Bazı partiler ilk kez pusulada görülecek şekilde ittifakla seçime girdi. 16 Nisan referandumu ile gerçekleşen Anayasa değişikliği, partili cumhurbaşkanına imkân tanıdığı için bazı cumhurbaşkanı adayları, aynı zamanda partisinin genel başkanı olarak kendi belirlediği milletvekili aday listeleriyle seçmenin önüne çıktı. Başbakanlık ise artık yok... İşte ülke ülke yurtdışı seçim sonuçları... CUMHURBAŞKANI SEÇİMİ ALMANYA FEDERAL CUMHURİYETİ Toplam Sandık : 1.638 Toplam Seçmen : 1.443.585 Açılan Sandık : 395 Açılan Sandık Oranı : % 24,11 Kullanılan Oy : 121.814 Geçerli Oy : 120.409 Katılım Oranı : % 35,62 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 64,97 78.227 Muharrem İnce : % 22,5 27.097 Selahattin Demirtaş : % 9,09 10.950 Meral Akşener : % 2,65 3.185 Temel Karamollaoğlu : % 0,59 708 Doğu Perinçek : % 0,2 242 AMERİKA BİRLEŞİK DEVLETLERİ Toplam Sandık : 114 Toplam Seçmen : 106.301 Açılan Sandık : 17 Açılan Sandık Oranı : % 14,91 Kullanılan Oy : 3.966 Geçerli Oy : 3.950 Katılım Oranı : % 25,93 Oy Oranı Oy Sayısı Muharrem İnce : % 74,1 2.927 Recep Tayyip Erdoğan : % 12,38 489 Meral Akşener : % 7,34 290 Selahattin Demirtaş : % 5,29 209 Temel Karamollaoğlu : % 0,58 23 Doğu Perinçek : % 0,3 12 ARNAVUTLUK CUMHURİYETİ Toplam Sandık : 2 Toplam Seçmen : 1.350 Açılan Sandık : 2 Açılan Sandık Oranı : % 100 Kullanılan Oy : 471 Geçerli Oy : 469 Katılım Oranı : % 34,89 Oy Oranı Oy Sayısı Muharrem İnce : % 52,67 247 Recep Tayyip Erdoğan : % 32,62 153 Selahattin Demirtaş : % 7,46 35 Meral Akşener : % 5,33 25 Temel Karamollaoğlu : % 1,28 6 Doğu Perinçek : % 0,64 3 AVUSTRALYA Toplam Sandık : 53 Toplam Seçmen : 46.764 Açılan Sandık : 9 Açılan Sandık Oranı : % 16,98 Kullanılan Oy : 176 Geçerli Oy : 175 Katılım Oranı : % 3,04 Oy Oranı Oy Sayısı Muharrem İnce : % 62,86 110 Recep Tayyip Erdoğan : % 17,71 31 Selahattin Demirtaş : % 12 21 Meral Akşener : % 4 7 Doğu Perinçek : % 2,29 4 Temel Karamollaoğlu : % 1,14 2 AVUSTURYA CUMHURİYETİ Toplam Sandık : 124 Toplam Seçmen : 106.657 Açılan Sandık : 50 Açılan Sandık Oranı : % 40,32 Kullanılan Oy : 16.573 Geçerli Oy : 16.398 Katılım Oranı : % 38,32 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 72,01 11.808 Muharrem İnce : % 16,76 2.748 Selahattin Demirtaş : % 8,3 1.361 Meral Akşener : % 1,73 284 Temel Karamollaoğlu : % 1,03 169 Doğu Perinçek : % 0,17 28 AZERBAYCAN CUMHURİYETİ Toplam Sandık : 7 Toplam Seçmen : 5.742 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 BAHREYN KRALLIĞI Toplam Sandık : 2 Toplam Seçmen : 1.376 Açılan Sandık : 2 Açılan Sandık Oranı : % 100 Kullanılan Oy : 686 Geçerli Oy : 685 Katılım Oranı : % 49,85 Oy Oranı Oy Sayısı Muharrem İnce : % 74,01 507 Recep Tayyip Erdoğan : % 17,96 123 Meral Akşener : % 5,11 35 Selahattin Demirtaş : % 2,34 16 Temel Karamollaoğlu : % 0,29 2 Doğu Perinçek : % 0,29 2 BELÇİKA KRALLIĞI Toplam Sandık : 136 Toplam Seçmen : 142.463 Açılan Sandık : 30 Açılan Sandık Oranı : % 22,06 Kullanılan Oy : 16.249 Geçerli Oy : 16.026 Katılım Oranı : % 51,73 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 74,57 11.950 Muharrem İnce : % 15,18 2.433 Selahattin Demirtaş : % 6,48 1.038 Meral Akşener : % 2,54 407 Temel Karamollaoğlu : % 0,97 155 Doğu Perinçek : % 0,27 43 BİRLEŞİK ARAP EMİRLİKLERİ Toplam Sandık : 6 Toplam Seçmen : 6.525 Açılan Sandık : 1 Açılan Sandık Oranı : % 16,67 Kullanılan Oy : 363 Geçerli Oy : 362 Katılım Oranı : % 28,01 Oy Oranı Oy Sayısı Muharrem İnce : % 72,93 264 Recep Tayyip Erdoğan : % 19,61 71 Meral Akşener : % 3,59 13 Selahattin Demirtaş : % 3,31 12 Doğu Perinçek : % 0,55 2 Temel Karamollaoğlu : % 0 0 BOSNA HERSEK Toplam Sandık : 4 Toplam Seçmen : 2.463 Açılan Sandık : 1 Açılan Sandık Oranı : % 25 Kullanılan Oy : 310 Geçerli Oy : 309 Katılım Oranı : % 50,41 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 62,78 194 Muharrem İnce : % 26,54 82 Meral Akşener : % 7,77 24 Temel Karamollaoğlu : % 1,62 5 Selahattin Demirtaş : % 0,97 3 Doğu Perinçek : % 0,32 1 BULGARİSTAN CUMHURİYETİ Toplam Sandık : 15 Toplam Seçmen : 7.604 Açılan Sandık : 11 Açılan Sandık Oranı : % 73,33 Kullanılan Oy : 925 Geçerli Oy : 921 Katılım Oranı : % 16,05 Oy Oranı Oy Sayısı Muharrem İnce : % 56,24 518 Recep Tayyip Erdoğan : % 28,01 258 Meral Akşener : % 8,25 76 Selahattin Demirtaş : % 5,97 55 Temel Karamollaoğlu : % 1,09 10 Doğu Perinçek : % 0,43 4 BÜYÜK BRİTANYA VE KUZEY İRLANDA BİRLEŞİK KRALLIĞI Toplam Sandık : 124 Toplam Seçmen : 99.250 Açılan Sandık : 53 Açılan Sandık Oranı : % 42,74 Kullanılan Oy : 14.141 Geçerli Oy : 14.018 Katılım Oranı : % 33,6 Oy Oranı Oy Sayısı Muharrem İnce : % 51,95 7.283 Selahattin Demirtaş : % 23,89 3.349 Recep Tayyip Erdoğan : % 21,14 2.963 Meral Akşener : % 2,5 351 Temel Karamollaoğlu : % 0,29 41 Doğu Perinçek : % 0,22 31 CEZAYİR DEMOKRATİK HALK CUMHURİYETİ Toplam Sandık : 2 Toplam Seçmen : 1.477 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 ÇEK CUMHURİYETİ Toplam Sandık : 1 Toplam Seçmen : 1.367 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 ÇİN HALK CUMHURİYETİ Toplam Sandık : 8 Toplam Seçmen : 2.260 Açılan Sandık : 6 Açılan Sandık Oranı : % 75 Kullanılan Oy : 595 Geçerli Oy : 593 Katılım Oranı : % 40,48 Oy Oranı Oy Sayısı Muharrem İnce : % 57,34 340 Recep Tayyip Erdoğan : % 26,14 155 Meral Akşener : % 7,59 45 Selahattin Demirtaş : % 5,9 35 Temel Karamollaoğlu : % 1,85 11 Doğu Perinçek : % 1,18 7 DANİMARKA KRALLIĞI Toplam Sandık : 33 Toplam Seçmen : 35.196 Açılan Sandık : 10 Açılan Sandık Oranı : % 30,3 Kullanılan Oy : 3.823 Geçerli Oy : 3.614 Katılım Oranı : % 35,86 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 52,05 1.881 Selahattin Demirtaş : % 19,76 714 Muharrem İnce : % 15,8 571 Meral Akşener : % 11,51 416 Doğu Perinçek : % 0,64 23 Temel Karamollaoğlu : % 0,25 9 FİNLANDİYA CUMHURİYETİ Toplam Sandık : 8 Toplam Seçmen : 5.688 Açılan Sandık : 3 Açılan Sandık Oranı : % 37,5 Kullanılan Oy : 773 Geçerli Oy : 772 Katılım Oranı : % 36,24 Oy Oranı Oy Sayısı Selahattin Demirtaş : % 41,58 321 Muharrem İnce : % 34,84 269 Recep Tayyip Erdoğan : % 20,08 155 Meral Akşener : % 2,98 23 Temel Karamollaoğlu : % 0,39 3 Doğu Perinçek : % 0,13 1 FRANSA CUMHURİYETİ Toplam Sandık : 330 Toplam Seçmen : 340.751 Açılan Sandık : 135 Açılan Sandık Oranı : % 40,91 Kullanılan Oy : 60.996 Geçerli Oy : 60.256 Katılım Oranı : % 44,67 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 64,59 38.922 Selahattin Demirtaş : % 18,26 11.001 Muharrem İnce : % 14,68 8.844 Meral Akşener : % 1,69 1.020 Temel Karamollaoğlu : % 0,65 394 Doğu Perinçek : % 0,12 75 GÜNEY AFRİKA CUMHURİYETİ Toplam Sandık : 1 Toplam Seçmen : 1.093 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 GÜRCİSTAN CUMHURİYETİ Toplam Sandık : 2 Toplam Seçmen : 1.799 Açılan Sandık : 1 Açılan Sandık Oranı : % 50 Kullanılan Oy : 248 Geçerli Oy : 248 Katılım Oranı : % 28,15 Oy Oranı Oy Sayısı Muharrem İnce : % 45,16 112 Recep Tayyip Erdoğan : % 42,34 105 Meral Akşener : % 9,68 24 Selahattin Demirtaş : % 2,82 7 Temel Karamollaoğlu : % 0 0 Doğu Perinçek : % 0 0 HOLLANDA KRALLIĞI Toplam Sandık : 355 Toplam Seçmen : 260.264 Açılan Sandık : 159 Açılan Sandık Oranı : % 44,79 Kullanılan Oy : 44.582 Geçerli Oy : 44.109 Katılım Oranı : % 36,25 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 72,72 32.076 Muharrem İnce : % 18,21 8.032 Selahattin Demirtaş : % 5,46 2.407 Meral Akşener : % 2,79 1.230 Temel Karamollaoğlu : % 0,68 301 Doğu Perinçek : % 0,14 63 IRAK CUMHURİYETİ Toplam Sandık : 3 Toplam Seçmen : 3.421 Açılan Sandık : 1 Açılan Sandık Oranı : % 33,33 Kullanılan Oy : 31 Geçerli Oy : 30 Katılım Oranı : % 3,4 Oy Oranı Oy Sayısı Muharrem İnce : % 43,33 13 Recep Tayyip Erdoğan : % 40 12 Meral Akşener : % 13,33 4 Selahattin Demirtaş : % 3,33 1 Temel Karamollaoğlu : % 0 0 Doğu Perinçek : % 0 0 İRAN İSLAM CUMHURİYETİ Toplam Sandık : 3 Toplam Seçmen : 1.082 Açılan Sandık : 3 Açılan Sandık Oranı : % 100 Kullanılan Oy : 282 Geçerli Oy : 281 Katılım Oranı : % 26,06 Oy Oranı Oy Sayısı Muharrem İnce : % 40,57 114 Recep Tayyip Erdoğan : % 35,94 101 Meral Akşener : % 11,39 32 Selahattin Demirtaş : % 7,83 22 Temel Karamollaoğlu : % 2,49 7 Doğu Perinçek : % 1,78 5 İRLANDA CUMHURİYETİ Toplam Sandık : 3 Toplam Seçmen : 2.238 Açılan Sandık : 1 Açılan Sandık Oranı : % 33,33 Kullanılan Oy : 310 Geçerli Oy : 310 Katılım Oranı : % 41,55 Oy Oranı Oy Sayısı Muharrem İnce : % 66,13 205 Recep Tayyip Erdoğan : % 17,42 54 Selahattin Demirtaş : % 11,61 36 Meral Akşener : % 4,52 14 Temel Karamollaoğlu : % 0,32 1 Doğu Perinçek : % 0 0 İSPANYA KRALLIĞI Toplam Sandık : 4 Toplam Seçmen : 3.568 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 İSRAİL DEVLETİ Toplam Sandık : 4 Toplam Seçmen : 4.969 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 İSVEÇ KRALLIĞI Toplam Sandık : 34 Toplam Seçmen : 38.879 Açılan Sandık : 7 Açılan Sandık Oranı : % 20,59 Kullanılan Oy : 2.170 Geçerli Oy : 2.158 Katılım Oranı : % 27,12 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 42,82 924 Selahattin Demirtaş : % 33,27 718 Muharrem İnce : % 19,65 424 Meral Akşener : % 3,8 82 Temel Karamollaoğlu : % 0,42 9 Doğu Perinçek : % 0,05 1 İSVİÇRE KONFEDERASYONU Toplam Sandık : 98 Toplam Seçmen : 98.929 Açılan Sandık : 35 Açılan Sandık Oranı : % 35,71 Kullanılan Oy : 15.427 Geçerli Oy : 15.297 Katılım Oranı : % 43,57 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 35,92 5.494 Muharrem İnce : % 32,17 4.921 Selahattin Demirtaş : % 28,45 4.352 Meral Akşener : % 2,62 401 Temel Karamollaoğlu : % 0,51 78 Doğu Perinçek : % 0,33 51 İTALYA CUMHURİYETİ Toplam Sandık : 15 Toplam Seçmen : 15.496 Açılan Sandık : 4 Açılan Sandık Oranı : % 26,67 Kullanılan Oy : 1.885 Geçerli Oy : 1.870 Katılım Oranı : % 45,18 Oy Oranı Oy Sayısı Muharrem İnce : % 45,4 849 Recep Tayyip Erdoğan : % 28,82 539 Selahattin Demirtaş : % 21,82 408 Meral Akşener : % 3,48 65 Doğu Perinçek : % 0,27 5 Temel Karamollaoğlu : % 0,21 4 JAPONYA Toplam Sandık : 4 Toplam Seçmen : 3.863 Açılan Sandık : 2 Açılan Sandık Oranı : % 50 Kullanılan Oy : 856 Geçerli Oy : 843 Katılım Oranı : % 44,35 Oy Oranı Oy Sayısı Selahattin Demirtaş : % 40,33 340 Recep Tayyip Erdoğan : % 37,25 314 Muharrem İnce : % 19,57 165 Meral Akşener : % 2,14 18 Temel Karamollaoğlu : % 0,36 3 Doğu Perinçek : % 0,36 3 KANADA Toplam Sandık : 39 Toplam Seçmen : 28.095 Açılan Sandık : 16 Açılan Sandık Oranı : % 41,03 Kullanılan Oy : 4.195 Geçerli Oy : 4.176 Katılım Oranı : % 28,3 Oy Oranı Oy Sayısı Muharrem İnce : % 53,11 2.218 Recep Tayyip Erdoğan : % 27,3 1.140 Selahattin Demirtaş : % 15,4 643 Meral Akşener : % 3,42 143 Temel Karamollaoğlu : % 0,48 20 Doğu Perinçek : % 0,29 12 KATAR DEVLETİ Toplam Sandık : 6 Toplam Seçmen : 3.394 Açılan Sandık : 6 Açılan Sandık Oranı : % 100 Kullanılan Oy : 1.432 Geçerli Oy : 1.427 Katılım Oranı : % 42,19 Oy Oranı Oy Sayısı Muharrem İnce : % 60,13 858 Recep Tayyip Erdoğan : % 29,22 417 Meral Akşener : % 5,19 74 Selahattin Demirtaş : % 4,7 67 Temel Karamollaoğlu : % 0,56 8 Doğu Perinçek : % 0,21 3 KAZAKİSTAN CUMHURİYETİ Toplam Sandık : 6 Toplam Seçmen : 4.568 Açılan Sandık : 2 Açılan Sandık Oranı : % 33,33 Kullanılan Oy : 358 Geçerli Oy : 355 Katılım Oranı : % 24,47 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 53,8 191 Muharrem İnce : % 31,83 113 Selahattin Demirtaş : % 6,76 24 Meral Akşener : % 6,48 23 Temel Karamollaoğlu : % 0,85 3 Doğu Perinçek : % 0,28 1 KIRGIZ CUMHURİYETİ Toplam Sandık : 2 Toplam Seçmen : 2.331 Açılan Sandık : 2 Açılan Sandık Oranı : % 100 Kullanılan Oy : 843 Geçerli Oy : 827 Katılım Oranı : % 36,16 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 58,52 484 Muharrem İnce : % 21,4 177 Meral Akşener : % 12,33 102 Selahattin Demirtaş : % 5,44 45 Temel Karamollaoğlu : % 2,06 17 Doğu Perinçek : % 0,24 2 KOSOVA CUMHURİYETİ Toplam Sandık : 2 Toplam Seçmen : 1.666 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 KUVEYT DEVLETİ Toplam Sandık : 1 Toplam Seçmen : 1.912 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 KUZEY KIBRIS TÜRK CUMHURİYETİ Toplam Sandık : 60 Toplam Seçmen : 106.446 Açılan Sandık : 9 Açılan Sandık Oranı : % 15 Kullanılan Oy : 5.880 Geçerli Oy : 5.830 Katılım Oranı : % 36,83 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 50,81 2.962 Muharrem İnce : % 36,31 2.117 Selahattin Demirtaş : % 7,72 450 Meral Akşener : % 4,72 275 Temel Karamollaoğlu : % 0,22 13 Doğu Perinçek : % 0,22 13 LÜBNAN CUMHURİYETİ Toplam Sandık : 6 Toplam Seçmen : 4.759 Açılan Sandık : 3 Açılan Sandık Oranı : % 50 Kullanılan Oy : 870 Geçerli Oy : 855 Katılım Oranı : % 36,57 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 94,5 808 Muharrem İnce : % 3,27 28 Selahattin Demirtaş : % 1,29 11 Meral Akşener : % 0,94 8 Temel Karamollaoğlu : % 0 0 Doğu Perinçek : % 0 0 LÜKSEMBURG BÜYÜK DÜKALIĞI Toplam Sandık : 22 Toplam Seçmen : 778 Açılan Sandık : 6 Açılan Sandık Oranı : % 27,27 Kullanılan Oy : 2.457 Geçerli Oy : 2.440 Katılım Oranı : % 1170 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 61,31 1.496 Muharrem İnce : % 22,75 555 Selahattin Demirtaş : % 14,06 343 Meral Akşener : % 1,27 31 Temel Karamollaoğlu : % 0,33 8 Doğu Perinçek : % 0,29 7 MACARİSTAN Toplam Sandık : 2 Toplam Seçmen : 2.156 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 MAKEDONYA CUMHURİYETİ Toplam Sandık : 4 Toplam Seçmen : 2.518 Açılan Sandık : 4 Açılan Sandık Oranı : % 100 Kullanılan Oy : 645 Geçerli Oy : 642 Katılım Oranı : % 25,62 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 58,41 375 Muharrem İnce : % 29,13 187 Meral Akşener : % 6,54 42 Selahattin Demirtaş : % 5,14 33 Temel Karamollaoğlu : % 0,78 5 Doğu Perinçek : % 0 0 MALTA CUMHURİYETİ Toplam Sandık : 1 Toplam Seçmen : 678 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 MISIR ARAP CUMHURİYETİ Toplam Sandık : 2 Toplam Seçmen : 1.486 Açılan Sandık : 1 Açılan Sandık Oranı : % 50 Kullanılan Oy : 273 Geçerli Oy : 271 Katılım Oranı : % 22,86 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 56,46 153 Muharrem İnce : % 33,21 90 Meral Akşener : % 5,54 15 Selahattin Demirtaş : % 2,58 7 Temel Karamollaoğlu : % 1,85 5 Doğu Perinçek : % 0,37 1 MOLDOVA CUMHURİYETİ Toplam Sandık : 1 Toplam Seçmen : 573 Açılan Sandık : 1 Açılan Sandık Oranı : % 100 Kullanılan Oy : 167 Geçerli Oy : 163 Katılım Oranı : % 29,14 Oy Oranı Oy Sayısı Muharrem İnce : % 44,17 72 Recep Tayyip Erdoğan : % 40,49 66 Meral Akşener : % 7,98 13 Selahattin Demirtaş : % 7,36 12 Temel Karamollaoğlu : % 0 0 Doğu Perinçek : % 0 0 NORVEÇ KRALLIĞI Toplam Sandık : 12 Toplam Seçmen : 8.676 Açılan Sandık : 6 Açılan Sandık Oranı : % 50 Kullanılan Oy : 1.411 Geçerli Oy : 1.407 Katılım Oranı : % 32,53 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 49,54 697 Muharrem İnce : % 25,44 358 Selahattin Demirtaş : % 19,9 280 Meral Akşener : % 3,55 50 Temel Karamollaoğlu : % 1,42 20 Doğu Perinçek : % 0,14 2 ÖZBEKİSTAN CUMHURİYETİ Toplam Sandık : 1 Toplam Seçmen : 866 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 POLONYA CUMHURİYETİ Toplam Sandık : 3 Toplam Seçmen : 3.980 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 ROMANYA Toplam Sandık : 8 Toplam Seçmen : 6.819 Açılan Sandık : 3 Açılan Sandık Oranı : % 37,5 Kullanılan Oy : 917 Geçerli Oy : 914 Katılım Oranı : % 30,51 Oy Oranı Oy Sayısı Muharrem İnce : % 44,97 411 Recep Tayyip Erdoğan : % 33,81 309 Selahattin Demirtaş : % 15,75 144 Meral Akşener : % 4,49 41 Temel Karamollaoğlu : % 0,55 5 Doğu Perinçek : % 0,44 4 RUSYA FEDERASYONU Toplam Sandık : 14 Toplam Seçmen : 11.350 Açılan Sandık : 3 Açılan Sandık Oranı : % 21,43 Kullanılan Oy : 850 Geçerli Oy : 848 Katılım Oranı : % 27,48 Oy Oranı Oy Sayısı Muharrem İnce : % 58,25 494 Recep Tayyip Erdoğan : % 24,53 208 Selahattin Demirtaş : % 9,79 83 Meral Akşener : % 6,49 55 Temel Karamollaoğlu : % 0,47 4 Doğu Perinçek : % 0,47 4 SIRBİSTAN CUMHURİYETİ Toplam Sandık : 1 Toplam Seçmen : 571 Açılan Sandık : 1 Açılan Sandık Oranı : % 100 Kullanılan Oy : 187 Geçerli Oy : 187 Katılım Oranı : % 32,75 Oy Oranı Oy Sayısı Muharrem İnce : % 63,64 119 Recep Tayyip Erdoğan : % 23,53 44 Meral Akşener : % 6,95 13 Selahattin Demirtaş : % 4,28 8 Temel Karamollaoğlu : % 1,07 2 Doğu Perinçek : % 0,53 1 SİNGAPUR CUMHURİYETİ Toplam Sandık : 1 Toplam Seçmen : 647 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 SUDAN CUMHURİYETİ Toplam Sandık : 2 Toplam Seçmen : 924 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 SUUDİ ARABİSTAN KRALLIĞI Toplam Sandık : 20 Toplam Seçmen : 23.552 Açılan Sandık : 3 Açılan Sandık Oranı : % 15 Kullanılan Oy : 932 Geçerli Oy : 921 Katılım Oranı : % 26,48 Oy Oranı Oy Sayısı Recep Tayyip Erdoğan : % 49,4 455 Muharrem İnce : % 45,71 421 Selahattin Demirtaş : % 1,95 18 Meral Akşener : % 1,85 17 Temel Karamollaoğlu : % 0,98 9 Doğu Perinçek : % 0,11 1 TAYLAND KRALLIĞI Toplam Sandık : 1 Toplam Seçmen : 883 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 TÜRKMENİSTAN Toplam Sandık : 6 Toplam Seçmen : 1.576 Açılan Sandık : 6 Açılan Sandık Oranı : % 100 Kullanılan Oy : 488 Geçerli Oy : 486 Katılım Oranı : % 30,96 Oy Oranı Oy Sayısı Muharrem İnce : % 50,21 244 Recep Tayyip Erdoğan : % 35,6 173 Meral Akşener : % 7,82 38 Selahattin Demirtaş : % 4,12 20 Temel Karamollaoğlu : % 2,06 10 Doğu Perinçek : % 0,21 1 UKRAYNA Toplam Sandık : 4 Toplam Seçmen : 3.557 Açılan Sandık : 2 Açılan Sandık Oranı : % 50 Kullanılan Oy : 422 Geçerli Oy : 421 Katılım Oranı : % 30,47 Oy Oranı Oy Sayısı Muharrem İnce : % 49,88 210 Recep Tayyip Erdoğan : % 30,64 129 Selahattin Demirtaş : % 9,74 41 Meral Akşener : % 8,79 37 Temel Karamollaoğlu : % 0,48 2 Doğu Perinçek : % 0,48 2 UMMAN SULTANLIĞI Toplam Sandık : 2 Toplam Seçmen : 1.218 Açılan Sandık : 1 Açılan Sandık Oranı : % 50 Kullanılan Oy : 246 Geçerli Oy : 245 Katılım Oranı : % 40,39 Oy Oranı Oy Sayısı Muharrem İnce : % 71,02 174 Recep Tayyip Erdoğan : % 24,08 59 Selahattin Demirtaş : % 3,27 8 Meral Akşener : % 1,22 3 Temel Karamollaoğlu : % 0,41 1 Doğu Perinçek : % 0 0 ÜRDÜN HAŞİMİ KRALLIĞI Toplam Sandık : 2 Toplam Seçmen : 1.940 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 YENİ ZELANDA Toplam Sandık : 1 Toplam Seçmen : 812 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı Muharrem İnce : % NaN 0 Meral Akşener : % NaN 0 Recep Tayyip Erdoğan : % NaN 0 Selahattin Demirtaş : % NaN 0 Temel Karamollaoğlu : % NaN 0 Doğu Perinçek : % NaN 0 YUNANİSTAN CUMHURİYETİ Toplam Sandık : 14 Toplam Seçmen : 11.055 Açılan Sandık : 13 Açılan Sandık Oranı : % 92,86 Kullanılan Oy : 896 Geçerli Oy : 888 Katılım Oranı : % 9,08 Oy Oranı Oy Sayısı Muharrem İnce : % 55,18 490 Recep Tayyip Erdoğan : % 23,31 207 Selahattin Demirtaş : % 17,12 152 Meral Akşener : % 3,83 34 Temel Karamollaoğlu : % 0,45 4 Doğu Perinçek : % 0,11 1 MİLLETVEKİLİ GENEL SEÇİMİ ALMANYA FEDERAL CUMHURİYETİ Toplam Sandık : 1.638 Toplam Seçmen : 1.443.585 Açılan Sandık : 359 Açılan Sandık Oranı : % 21,92 Kullanılan Oy : 106.361 Geçerli Oy : 105.168 Katılım Oranı : % 34,66 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 63,5 66.785 AK PARTİ : % 54,75 57.582 MHP : % 7,59 7.987 MİLLET İTTİFAKI : % 19,85 20.874 CHP : % 15,92 16.743 İYİ PARTİ : % 3,29 3.463 SAADET PARTİSİ : % 0,64 675 HÜDA PAR : % 0,16 173 VATAN PARTİSİ : % 0,17 180 HDP : % 13,18 13.864 DİĞER : % 2,94 3.087 AMERİKA BİRLEŞİK DEVLETLERİ Toplam Sandık : 114 Toplam Seçmen : 106.301 Açılan Sandık : 16 Açılan Sandık Oranı : % 14,04 Kullanılan Oy : 3.772 Geçerli Oy : 3.755 Katılım Oranı : % 26,45 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 9,77 367 AK PARTİ : % 10,68 401 MHP : % 1,81 68 MİLLET İTTİFAKI : % 58,03 2.179 CHP : % 52,17 1.959 İYİ PARTİ : % 12,06 453 SAADET PARTİSİ : % 1,15 43 HDP : % 20,88 784 DİĞER : % 0,43 16 VATAN PARTİSİ : % 0,19 7 HÜDA PAR : % 0 0 ARNAVUTLUK CUMHURİYETİ Toplam Sandık : 2 Toplam Seçmen : 1.350 Açılan Sandık : 1 Açılan Sandık Oranı : % 50 Kullanılan Oy : 186 Geçerli Oy : 186 Katılım Oranı : % 27,56 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 42,47 79 AK PARTİ : % 32,26 60 MHP : % 8,06 15 MİLLET İTTİFAKI : % 43,55 81 CHP : % 31,18 58 İYİ PARTİ : % 8,6 16 SAADET PARTİSİ : % 3,76 7 HÜDA PAR : % 0 0 VATAN PARTİSİ : % 1,08 2 HDP : % 12,9 24 AVUSTRALYA Toplam Sandık : 53 Toplam Seçmen : 46.764 Açılan Sandık : 10 Açılan Sandık Oranı : % 18,87 Kullanılan Oy : 650 Geçerli Oy : 648 Katılım Oranı : % 9,53 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 35,8 232 AK PARTİ : % 32,25 209 MHP : % 2,93 19 MİLLET İTTİFAKI : % 43,98 285 CHP : % 36,88 239 İYİ PARTİ : % 6,48 42 SAADET PARTİSİ : % 0,31 2 HÜDA PAR : % 0 0 VATAN PARTİSİ : % 0,93 6 HDP : % 19,29 125 AVUSTURYA CUMHURİYETİ Toplam Sandık : 124 Toplam Seçmen : 106.657 Açılan Sandık : 41 Açılan Sandık Oranı : % 33,06 Kullanılan Oy : 14.102 Geçerli Oy : 13.958 Katılım Oranı : % 39,55 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 71,87 10.032 AK PARTİ : % 63,1 8.807 MHP : % 7,74 1.081 MİLLET İTTİFAKI : % 15,53 2.168 CHP : % 11,18 1.561 İYİ PARTİ : % 2,71 378 SAADET PARTİSİ : % 1,28 178 HDP : % 12,11 1.691 DİĞER : % 0,16 22 HÜDA PAR : % 0,17 24 VATAN PARTİSİ : % 0,15 21 AZERBAYCAN CUMHURİYETİ Toplam Sandık : 7 Toplam Seçmen : 5.742 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 BAHREYN KRALLIĞI Toplam Sandık : 2 Toplam Seçmen : 1.376 Açılan Sandık : 2 Açılan Sandık Oranı : % 100 Kullanılan Oy : 686 Geçerli Oy : 683 Katılım Oranı : % 49,85 Oy Oranı Oy Sayısı VATAN PARTİSİ : % 0,59 4 HDP : % 10,83 74 DİĞER : % 6,44 44 BELÇİKA KRALLIĞI Toplam Sandık : 136 Toplam Seçmen : 142.463 Açılan Sandık : 25 Açılan Sandık Oranı : % 18,38 Kullanılan Oy : 12.745 Geçerli Oy : 12.583 Katılım Oranı : % 48,7 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 74,49 9.373 AK PARTİ : % 63,62 8.005 MHP : % 9,92 1.248 HÜDA PAR : % 0,16 20 VATAN PARTİSİ : % 0,18 23 HDP : % 9,71 1.222 DİĞER : % 0,44 55 MİLLET İTTİFAKI : % 9 1.133 CHP : % 10,4 1.309 İYİ PARTİ : % 3,48 438 SAADET PARTİSİ : % 1,06 133 BİRLEŞİK ARAP EMİRLİKLERİ Toplam Sandık : 6 Toplam Seçmen : 6.525 Açılan Sandık : 1 Açılan Sandık Oranı : % 16,67 Kullanılan Oy : 363 Geçerli Oy : 361 Katılım Oranı : % 28,01 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 20,78 75 AK PARTİ : % 16,62 60 MHP : % 3,88 14 MİLLET İTTİFAKI : % 66,48 240 CHP : % 54,29 196 İYİ PARTİ : % 11,91 43 SAADET PARTİSİ : % 0 0 HÜDA PAR : % 0 0 VATAN PARTİSİ : % 0,28 1 HDP : % 12,47 45 BOSNA HERSEK Toplam Sandık : 4 Toplam Seçmen : 2.463 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 BULGARİSTAN CUMHURİYETİ Toplam Sandık : 15 Toplam Seçmen : 7.604 Açılan Sandık : 11 Açılan Sandık Oranı : % 73,33 Kullanılan Oy : 925 Geçerli Oy : 922 Katılım Oranı : % 16,05 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 29,28 270 AK PARTİ : % 24,19 223 MHP : % 4,88 45 MİLLET İTTİFAKI : % 60,09 554 CHP : % 43,17 398 İYİ PARTİ : % 15,4 142 SAADET PARTİSİ : % 1,41 13 HÜDA PAR : % 0 0 VATAN PARTİSİ : % 0,11 1 HDP : % 10,52 97 BÜYÜK BRİTANYA VE KUZEY İRLANDA BİRLEŞİK KRALLIĞI Toplam Sandık : 124 Toplam Seçmen : 99.250 Açılan Sandık : 46 Açılan Sandık Oranı : % 37,1 Kullanılan Oy : 12.198 Geçerli Oy : 12.068 Katılım Oranı : % 33,4 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 21,21 2.560 AK PARTİ : % 18,19 2.195 MHP : % 2,88 348 MİLLET İTTİFAKI : % 29,14 3.517 CHP : % 24,62 2.971 İYİ PARTİ : % 3,96 478 SAADET PARTİSİ : % 0,46 55 HÜDA PAR : % 0,17 21 VATAN PARTİSİ : % 0,29 35 HDP : % 47,8 5.768 DİĞER : % 1,38 167 CEZAYİR DEMOKRATİK HALK CUMHURİYETİ Toplam Sandık : 2 Toplam Seçmen : 1.477 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 ÇEK CUMHURİYETİ Toplam Sandık : 1 Toplam Seçmen : 1.367 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 ÇİN HALK CUMHURİYETİ Toplam Sandık : 8 Toplam Seçmen : 2.260 Açılan Sandık : 6 Açılan Sandık Oranı : % 75 Kullanılan Oy : 595 Geçerli Oy : 590 Katılım Oranı : % 40,48 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 16,95 100 AK PARTİ : % 23,05 136 MHP : % 3,73 22 MİLLET İTTİFAKI : % 54,92 324 CHP : % 39,15 231 İYİ PARTİ : % 13,22 78 SAADET PARTİSİ : % 1,86 11 HÜDA PAR : % 0 0 VATAN PARTİSİ : % 0,51 3 HDP : % 16,61 98 DİĞER : % 1,02 6 DANİMARKA KRALLIĞI Toplam Sandık : 33 Toplam Seçmen : 35.196 Açılan Sandık : 10 Açılan Sandık Oranı : % 30,3 Kullanılan Oy : 3.657 Geçerli Oy : 3.628 Katılım Oranı : % 34,31 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 53,94 1.957 AK PARTİ : % 45,89 1.665 MHP : % 7,52 273 MİLLET İTTİFAKI : % 14,36 521 CHP : % 11,03 400 İYİ PARTİ : % 2,98 108 SAADET PARTİSİ : % 0,28 10 HÜDA PAR : % 0,03 1 VATAN PARTİSİ : % 0,28 10 HDP : % 31,09 1.128 DİĞER : % 0,3 11 FİNLANDİYA CUMHURİYETİ Toplam Sandık : 8 Toplam Seçmen : 5.688 Açılan Sandık : 3 Açılan Sandık Oranı : % 37,5 Kullanılan Oy : 774 Geçerli Oy : 774 Katılım Oranı : % 36,29 Oy Oranı Oy Sayısı HÜDA PAR : % 0,26 2 VATAN PARTİSİ : % 0,26 2 HDP : % 52,58 407 DİĞER : % 0,13 1 FRANSA CUMHURİYETİ Toplam Sandık : 330 Toplam Seçmen : 340.751 Açılan Sandık : 100 Açılan Sandık Oranı : % 30,3 Kullanılan Oy : 43.544 Geçerli Oy : 43.007 Katılım Oranı : % 42,56 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 64,84 27.886 AK PARTİ : % 56,3 24.212 MHP : % 7,91 3.402 HÜDA PAR : % 0,08 36 VATAN PARTİSİ : % 0,18 79 HDP : % 21,65 9.311 DİĞER : % 1,03 445 MİLLET İTTİFAKI : % 10,12 4.354 CHP : % 9,64 4.145 İYİ PARTİ : % 1,94 835 SAADET PARTİSİ : % 0,59 252 GÜNEY AFRİKA CUMHURİYETİ Toplam Sandık : 1 Toplam Seçmen : 1.093 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 GÜRCİSTAN CUMHURİYETİ Toplam Sandık : 2 Toplam Seçmen : 1.799 Açılan Sandık : 1 Açılan Sandık Oranı : % 50 Kullanılan Oy : 249 Geçerli Oy : 247 Katılım Oranı : % 28,26 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 44,13 109 AK PARTİ : % 33,6 83 MHP : % 9,72 24 MİLLET İTTİFAKI : % 46,15 114 CHP : % 33,6 83 İYİ PARTİ : % 11,34 28 SAADET PARTİSİ : % 0,81 2 HÜDA PAR : % 0 0 VATAN PARTİSİ : % 0 0 HDP : % 9,72 24 HOLLANDA KRALLIĞI Toplam Sandık : 355 Toplam Seçmen : 260.264 Açılan Sandık : 148 Açılan Sandık Oranı : % 41,69 Kullanılan Oy : 38.663 Geçerli Oy : 38.322 Katılım Oranı : % 33,19 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 72,63 27.833 AK PARTİ : % 61,67 23.634 MHP : % 10,52 4.032 MİLLET İTTİFAKI : % 16,98 6.508 CHP : % 12,39 4.747 İYİ PARTİ : % 3,46 1.326 SAADET PARTİSİ : % 0,98 377 HÜDA PAR : % 0,08 31 VATAN PARTİSİ : % 0,19 71 HDP : % 9,38 3.593 DİĞER : % 0,75 286 IRAK CUMHURİYETİ Toplam Sandık : 3 Toplam Seçmen : 3.421 Açılan Sandık : 1 Açılan Sandık Oranı : % 33,33 Kullanılan Oy : 31 Geçerli Oy : 31 Katılım Oranı : % 3,4 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 38,71 12 AK PARTİ : % 38,71 12 MHP : % 0 0 MİLLET İTTİFAKI : % 51,61 16 CHP : % 35,48 11 İYİ PARTİ : % 16,13 5 SAADET PARTİSİ : % 0 0 HÜDA PAR : % 3,23 1 VATAN PARTİSİ : % 0 0 HDP : % 6,45 2 İRAN İSLAM CUMHURİYETİ Toplam Sandık : 3 Toplam Seçmen : 1.082 Açılan Sandık : 3 Açılan Sandık Oranı : % 100 Kullanılan Oy : 283 Geçerli Oy : 282 Katılım Oranı : % 26,16 Oy Oranı Oy Sayısı HDP : % 15,25 43 DİĞER : % 0,35 1 CUMHUR İTTİFAKI : % 29,08 82 AK PARTİ : % 28,72 81 MHP : % 6,74 19 MİLLET İTTİFAKI : % 33,33 94 CHP : % 26,95 76 İYİ PARTİ : % 15,96 45 SAADET PARTİSİ : % 3,9 11 HÜDA PAR : % 0,35 1 VATAN PARTİSİ : % 1,42 4 İRLANDA CUMHURİYETİ Toplam Sandık : 3 Toplam Seçmen : 2.238 Açılan Sandık : 1 Açılan Sandık Oranı : % 33,33 Kullanılan Oy : 310 Geçerli Oy : 310 Katılım Oranı : % 41,55 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 17,1 53 AK PARTİ : % 13,87 43 MHP : % 2,9 9 MİLLET İTTİFAKI : % 55,81 173 CHP : % 43,87 136 İYİ PARTİ : % 11,29 35 SAADET PARTİSİ : % 0,65 2 HÜDA PAR : % 0,32 1 VATAN PARTİSİ : % 0,32 1 HDP : % 26,45 82 İSPANYA KRALLIĞI Toplam Sandık : 4 Toplam Seçmen : 3.568 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 İSRAİL DEVLETİ Toplam Sandık : 4 Toplam Seçmen : 4.969 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 İSVEÇ KRALLIĞI Toplam Sandık : 34 Toplam Seçmen : 38.879 Açılan Sandık : 6 Açılan Sandık Oranı : % 17,65 Kullanılan Oy : 1.948 Geçerli Oy : 1.930 Katılım Oranı : % 28,4 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 43,58 841 AK PARTİ : % 36,01 695 MHP : % 7,25 140 MİLLET İTTİFAKI : % 18,81 363 CHP : % 13,89 268 İYİ PARTİ : % 4,4 85 SAADET PARTİSİ : % 0,47 9 VATAN PARTİSİ : % 0,1 2 HDP : % 37,41 722 DİĞER : % 0,1 2 İSVİÇRE KONFEDERASYONU Toplam Sandık : 98 Toplam Seçmen : 98.929 Açılan Sandık : 24 Açılan Sandık Oranı : % 24,49 Kullanılan Oy : 10.163 Geçerli Oy : 10.085 Katılım Oranı : % 41,92 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 37,58 3.790 AK PARTİ : % 31,84 3.211 MHP : % 5,39 544 MİLLET İTTİFAKI : % 20,49 2.066 CHP : % 16,46 1.660 İYİ PARTİ : % 3,42 345 SAADET PARTİSİ : % 0,56 56 HÜDA PAR : % 0,15 15 VATAN PARTİSİ : % 0,26 26 HDP : % 41,13 4.148 DİĞER : % 0,4 40 İTALYA CUMHURİYETİ Toplam Sandık : 15 Toplam Seçmen : 15.496 Açılan Sandık : 2 Açılan Sandık Oranı : % 13,33 Kullanılan Oy : 891 Geçerli Oy : 886 Katılım Oranı : % 40,65 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 27,09 240 AK PARTİ : % 24,15 214 MHP : % 2,82 25 MİLLET İTTİFAKI : % 36,68 325 CHP : % 30,36 269 İYİ PARTİ : % 5,98 53 SAADET PARTİSİ : % 0,23 2 HÜDA PAR : % 0,34 3 VATAN PARTİSİ : % 0,11 1 HDP : % 35,78 317 JAPONYA Toplam Sandık : 4 Toplam Seçmen : 3.863 Açılan Sandık : 1 Açılan Sandık Oranı : % 25 Kullanılan Oy : 304 Geçerli Oy : 303 Katılım Oranı : % 31,5 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 38,94 118 AK PARTİ : % 34,32 104 MHP : % 3,96 12 MİLLET İTTİFAKI : % 20,79 63 CHP : % 14,85 45 İYİ PARTİ : % 4,62 14 SAADET PARTİSİ : % 1,32 4 HÜDA PAR : % 0 0 VATAN PARTİSİ : % 0,33 1 HDP : % 39,93 121 KANADA Toplam Sandık : 39 Toplam Seçmen : 28.095 Açılan Sandık : 15 Açılan Sandık Oranı : % 38,46 Kullanılan Oy : 4.128 Geçerli Oy : 4.106 Katılım Oranı : % 31,81 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 27,81 1.142 AK PARTİ : % 24,18 993 MHP : % 3,36 138 MİLLET İTTİFAKI : % 42,3 1.737 CHP : % 35,53 1.459 İYİ PARTİ : % 5,87 241 SAADET PARTİSİ : % 0,56 23 VATAN PARTİSİ : % 0,15 6 HDP : % 28,54 1.172 DİĞER : % 1,12 46 HÜDA PAR : % 0,07 3 KATAR DEVLETİ Toplam Sandık : 6 Toplam Seçmen : 3.394 Açılan Sandık : 4 Açılan Sandık Oranı : % 66,67 Kullanılan Oy : 968 Geçerli Oy : 963 Katılım Oranı : % 42,83 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 29,18 281 AK PARTİ : % 24,3 234 MHP : % 4,67 45 MİLLET İTTİFAKI : % 56,18 541 CHP : % 44,86 432 İYİ PARTİ : % 9,97 96 SAADET PARTİSİ : % 0,73 7 HÜDA PAR : % 0 0 VATAN PARTİSİ : % 0,31 3 HDP : % 14,33 138 KAZAKİSTAN CUMHURİYETİ Toplam Sandık : 6 Toplam Seçmen : 4.568 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 KIRGIZ CUMHURİYETİ Toplam Sandık : 2 Toplam Seçmen : 2.331 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 KOSOVA CUMHURİYETİ Toplam Sandık : 2 Toplam Seçmen : 1.666 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 KUVEYT DEVLETİ Toplam Sandık : 1 Toplam Seçmen : 1.912 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 KUZEY KIBRIS TÜRK CUMHURİYETİ Toplam Sandık : 60 Toplam Seçmen : 106.446 Açılan Sandık : 10 Açılan Sandık Oranı : % 16,67 Kullanılan Oy : 6.487 Geçerli Oy : 6.419 Katılım Oranı : % 36,57 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 50,58 3.247 AK PARTİ : % 42,02 2.697 MHP : % 7,59 487 MİLLET İTTİFAKI : % 36,3 2.330 CHP : % 27,2 1.746 İYİ PARTİ : % 8,35 536 SAADET PARTİSİ : % 0,65 42 HÜDA PAR : % 0,02 1 VATAN PARTİSİ : % 0,14 9 HDP : % 12,76 819 DİĞER : % 0,2 13 LÜBNAN CUMHURİYETİ Toplam Sandık : 6 Toplam Seçmen : 4.759 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 LÜKSEMBURG BÜYÜK DÜKALIĞI Toplam Sandık : 22 Toplam Seçmen : 778 Açılan Sandık : 2 Açılan Sandık Oranı : % 9,09 Kullanılan Oy : 1.060 Geçerli Oy : 1.048 Katılım Oranı : % 1514,29 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 61,45 644 AK PARTİ : % 48,85 512 MHP : % 12,02 126 HÜDA PAR : % 0,1 1 HDP : % 16,98 178 DİĞER : % 7,25 76 MACARİSTAN Toplam Sandık : 2 Toplam Seçmen : 2.156 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 MAKEDONYA CUMHURİYETİ Toplam Sandık : 4 Toplam Seçmen : 2.518 Açılan Sandık : 4 Açılan Sandık Oranı : % 100 Kullanılan Oy : 645 Geçerli Oy : 643 Katılım Oranı : % 25,62 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 59,56 383 AK PARTİ : % 52,72 339 MHP : % 6,53 42 MİLLET İTTİFAKI : % 31,73 204 CHP : % 20,53 132 İYİ PARTİ : % 6,38 41 SAADET PARTİSİ : % 4,67 30 HÜDA PAR : % 0,16 1 VATAN PARTİSİ : % 0,47 3 HDP : % 8,09 52 MALTA CUMHURİYETİ Toplam Sandık : 1 Toplam Seçmen : 678 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 MISIR ARAP CUMHURİYETİ Toplam Sandık : 2 Toplam Seçmen : 1.486 Açılan Sandık : 1 Açılan Sandık Oranı : % 50 Kullanılan Oy : 273 Geçerli Oy : 272 Katılım Oranı : % 22,86 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 55,88 152 AK PARTİ : % 52,21 142 MHP : % 2,94 8 MİLLET İTTİFAKI : % 34,93 95 CHP : % 22,43 61 İYİ PARTİ : % 9,56 26 SAADET PARTİSİ : % 2,94 8 HÜDA PAR : % 0 0 VATAN PARTİSİ : % 0,37 1 HDP : % 8,82 24 MOLDOVA CUMHURİYETİ Toplam Sandık : 1 Toplam Seçmen : 573 Açılan Sandık : 1 Açılan Sandık Oranı : % 100 Kullanılan Oy : 167 Geçerli Oy : 164 Katılım Oranı : % 29,14 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 40,24 66 AK PARTİ : % 35,37 58 MHP : % 4,88 8 MİLLET İTTİFAKI : % 45,12 74 CHP : % 32,93 54 İYİ PARTİ : % 10,98 18 SAADET PARTİSİ : % 0,61 1 HÜDA PAR : % 0 0 VATAN PARTİSİ : % 0 0 HDP : % 14,63 24 NORVEÇ KRALLIĞI Toplam Sandık : 12 Toplam Seçmen : 8.676 Açılan Sandık : 5 Açılan Sandık Oranı : % 41,67 Kullanılan Oy : 1.209 Geçerli Oy : 1.203 Katılım Oranı : % 33,44 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 49,88 600 AK PARTİ : % 45,72 550 MHP : % 3,82 46 VATAN PARTİSİ : % 0,25 3 HDP : % 25,77 310 DİĞER : % 0,08 1 ÖZBEKİSTAN CUMHURİYETİ Toplam Sandık : 1 Toplam Seçmen : 866 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 POLONYA CUMHURİYETİ Toplam Sandık : 3 Toplam Seçmen : 3.980 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 ROMANYA Toplam Sandık : 8 Toplam Seçmen : 6.819 Açılan Sandık : 2 Açılan Sandık Oranı : % 25 Kullanılan Oy : 571 Geçerli Oy : 568 Katılım Oranı : % 28,49 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 33,1 188 AK PARTİ : % 29,23 166 MHP : % 3,52 20 MİLLET İTTİFAKI : % 39,26 223 CHP : % 30,11 171 İYİ PARTİ : % 7,92 45 SAADET PARTİSİ : % 0,7 4 HÜDA PAR : % 0 0 VATAN PARTİSİ : % 0,18 1 HDP : % 27,46 156 RUSYA FEDERASYONU Toplam Sandık : 14 Toplam Seçmen : 11.350 Açılan Sandık : 2 Açılan Sandık Oranı : % 14,29 Kullanılan Oy : 497 Geçerli Oy : 495 Katılım Oranı : % 24,1 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 23,84 118 AK PARTİ : % 17,78 88 MHP : % 5,86 29 MİLLET İTTİFAKI : % 52,93 262 CHP : % 40,4 200 İYİ PARTİ : % 11,11 55 SAADET PARTİSİ : % 1,41 7 HÜDA PAR : % 0 0 VATAN PARTİSİ : % 0,61 3 HDP : % 22,63 112 SIRBİSTAN CUMHURİYETİ Toplam Sandık : 1 Toplam Seçmen : 571 Açılan Sandık : 1 Açılan Sandık Oranı : % 100 Kullanılan Oy : 187 Geçerli Oy : 187 Katılım Oranı : % 32,75 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 24,06 45 AK PARTİ : % 17,11 32 MHP : % 5,88 11 MİLLET İTTİFAKI : % 57,75 108 CHP : % 42,78 80 İYİ PARTİ : % 13,37 25 SAADET PARTİSİ : % 0,53 1 HÜDA PAR : % 0,53 1 VATAN PARTİSİ : % 0,53 1 HDP : % 17,11 32 SİNGAPUR CUMHURİYETİ Toplam Sandık : 1 Toplam Seçmen : 647 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 SUDAN CUMHURİYETİ Toplam Sandık : 2 Toplam Seçmen : 924 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 SUUDİ ARABİSTAN KRALLIĞI Toplam Sandık : 20 Toplam Seçmen : 23.552 Açılan Sandık : 3 Açılan Sandık Oranı : % 15 Kullanılan Oy : 932 Geçerli Oy : 920 Katılım Oranı : % 26,48 Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % 49,89 459 AK PARTİ : % 45,22 416 MHP : % 4,35 40 MİLLET İTTİFAKI : % 39,67 365 CHP : % 36,52 336 İYİ PARTİ : % 1,96 18 SAADET PARTİSİ : % 1,09 10 HÜDA PAR : % 0 0 VATAN PARTİSİ : % 0,22 2 HDP : % 10,22 94 TAYLAND KRALLIĞI Toplam Sandık : 1 Toplam Seçmen : 883 Açılan Sandık : 0 Açılan Sandık Oranı : % 0 Kullanılan Oy : 0 Geçerli Oy : 0 Katılım Oranı : % NaN Oy Oranı Oy Sayısı CUMHUR İTTİFAKI : % NaN 0 AK PARTİ : % NaN 0 MHP : % NaN 0 MİLLET İTTİFAKI : % NaN 0 CHP : % NaN 0 SAADET PARTİSİ : % NaN 0 İYİ PARTİ : % NaN 0 HÜDA PAR : % NaN 0 VATAN PARTİSİ : % NaN 0 HDP : % NaN 0 TÜRKMENİSTAN
{ "pile_set_name": "OpenWebText2" }
Accounting Surf Works offer a range of accounting services suitable for all types of business. Below, we have listed packages suitable for sole traders, partnerships and limited companies. The packages can be fully tailored to your requirements by adding extra services to create the exact service that you and your business requires. All services are carried out on time with the minimum of fuss by our in house, fully qualified accountant The list of services offered is not exhaustive so please let us know if you require a service not listed. If you have specific needs we can build a bespoke accountancy package tailored to your exact requirements. Standard Packages From Sole Trader to Limited Company, we can organise your accounting with a simple, no-nonsense standard package. Sole Traderfrom £25pm Partnershipfrom £45pm Personal Tax Return for each partner (includes partnership income and bank interest received) Limited Co.from £65pm Year End Accounts Accounts Filed at Companies House Company Tax Return Payroll for Directors Salary Dividend Paperwork Directors Personal Tax Return Return Filed at Companies House Bolt on Services Year End Accounts Bookkeeping VAT Returns Payroll CIS Returns Management Accounts Company Formations Company Annual Returns Personal Tax Returns Partnership Tax Returns Company Tax Returns Rental Property Accounts Capital Gains Tax Inheritance Tax Warning: strpos() expects parameter 1 to be string, array given in /srv/users/serverpilot/apps/surfworks/public/wp-content/themes/kallyas/framework/hg-theme-framework/inc/helpers/functions-image-helpers.php on line 157 Warning: strpos() expects parameter 1 to be string, array given in /srv/users/serverpilot/apps/surfworks/public/wp-content/themes/kallyas/framework/hg-theme-framework/inc/helpers/functions-image-helpers.php on line 157 We also offer a fully outsourced finance function that includes: Raise and issue sales invoices to your customers Collect, allocate and bank money from your customers Maintain your purchases ledger Issue payments to your suppliers when invoices are due For more information about our accountancy services, give us a call or email :-)
{ "pile_set_name": "Pile-CC" }
Molecular-dynamics simulations of electron-ion temperature relaxation in a classical Coulomb plasma. Molecular-dynamics simulations are used to investigate temperature relaxation between electrons and ions in a fully ionized, classical Coulomb plasma with minimal assumptions. Recombination is avoided by using like charges. The relaxation rate agrees with theory in the weak coupling limit (g identical with potential/kinetic energy << 1), whereas it saturates at g > 1 due to correlation effects. The "Coulomb log" is found to be independent of the ion charge (at constant g) and mass ratio > 25.
{ "pile_set_name": "PubMed Abstracts" }
How Idris Elba's 'Luther' Puts Us in the Mindset of a Renegade Detective "Luther" is a series about righteous indignation. Yes, it's a police drama, a dark (sometimes ludicrously so) crime saga set in a moody London with a greater and grimmer murder rate to equal that of other bleak procedurals. Yes, it's a police drama, a dark (sometimes ludicrously so) crime saga set in a moody version of London with a greater and grimmer murder rate to equal that of other bleak procedurals. But the satisfaction of seeing those cases solved, those murderers and kidnappers caught, is muted, secondary to the suffering and sacrifice and validation of protagonist John Luther, the detective played by Idris Elba with a staggering display of movie star charisma that seems like it ought to produce static shocks with everything with which he comes into contact. Luther's devoted to his job with an obsessiveness that's destroying him, that, as the series began in 2010, had ended his marriage and eaten him up inside, changing him. He's good at what he does, if prone to extremes, and yet he seems to be perpetually doubted, maligned and hurt because of it. In season one, Luther was framed for the murder of his beloved wife and forced to run from his fellow officers, and it's not the only time in the series he's a suspect. In season two he's treated like a certain career contaminant by a new, ambitious, by-the-books officer assigned to report to him. And in the four-episode third season airing on BBC America from September 3 through 6, that former colleague, DS Erin Gray (Nikki Amuka-Bird), is targeting him as part of an investigation of police corruption with DSU George Stark (David O'Hara), who may be a little obsessive himself. Aside from his sidekick DS Justin Ripley (Warren Brown), few seem to appreciate Luther and his incredible abilities -- instead, he's infamous, the rest of the police force apparently all too able of believing he's capable of dark things. We, as viewers, don't, because of Idris Elba. John Luther is Elba's best role since that of the fascinatingly savvy Stringer Bell in "The Wire," because it showcases the actor's utterly assured presence, his air of rakishly rumpled confidence in his tweed coat. Luther does not have swagger, he has conviction, conviction that informs his every -- frequently correct -- move. It's why it's so easy to trust him in a way that the characters working with him don't, and not without reason. When the series began in 2010, it was with Luther letting a pedophile fall to what could have been his death after extracting from him information about the location of the girl he'd kidnapped. It didn't doom his career -- he got lucky -- but he hasn't really changed. He even threatens a suspect with a similar fate toward the start of the new season -- but the move doesn't come across as harsh. We're more worried, when it happens, that it'll get him in trouble again. "Luther" is mesmerizing because of Elba, and because the show is so consumed by his performance that it becomes not one about a maverick cop but instead one of a man outpacing the justice system he's allegedly a part of, one that hampers him with its pesky rules, its politics and its skeptics. It encourages us to buy into his worldview, in which he should just be allowed to do his job and get justice done, though that may mean covering up crimes or allowing culprits he's judged deserving to go free -- like Alice Morgan (Ruth Wilson), his psychopathic superhero of a friend, and a wonderful, preposterous character who's essentially too enjoyable to be locked up. Luther's tactics make him so dangerous to the people around him that the case Stark tries to build against him is based on the peripheral body count rather than evidence, and when, in the new season, he starts a tentative romance with Mary Day (Sienna Guillory), a woman another character dismissively sums up as a "pixie," it's accompanied by a sense of dread. The series comes close to confronting the nature of its protagonist in the new season, introducing a grieving man who turns to vigilanteism and gathers public support for his actions as he starts targeting rapists and killers who've gotten off lightly. Confronting Luther on opposite sides of a canal, the man says "One out of five murders are committed by men on bail," and demands to know why nothing is being done about it. "It's complicated," Luther replies. "No, it's not," says the man. "No... it's not. You've got me there," Luther admits. The difference is that, while Luther may bend the rules to fit his ideas about crime and punishment, he doesn't do so looking for outside approval the way the antagonist he's facing down does -- the opposite, really. Instead, it's the viewers who seethe on his behalf and yearn for his efforts to continue, and it's that conflicting emotion far more than the procedural aspects that lifts "Luther" above the plethora of similarly lurid recent dark crime dramas it resembles.
{ "pile_set_name": "Pile-CC" }
ARMED SERVICES BOARD OF CONTRACT APPEALS Appeal of -- ) ) _ ) ASBCA N°' 60315 ) ) Under Contract No. HTC71 l-l4-D-R033 APPEARANCE FOR THE APPELLANT: _ President APPEARANCES FOR THE GOVERNMENT: Jeffrey P. Hildebrant, Esq. Air Force Deputy Chief Trial Attomey Lt Col Mark E. Allen, USAF Jason R. Smith, Esq. Trial Attomeys OPINlON BY ADMINISTRATIVE JUDGE D’ALESSANDRIS ON APPELLANT’S MOTION FOR RECONSIDERAT]ON Appellant _ (-) has timely filed a motion for reconsideration of our 21 November 2016 decision granting the govemment’s motion for summary judgment and denying this appeal. -, ASBCA No. 60315, 1(»1 BCA 11 36,569. Familiariiy with our decision is presumed In deciding a motion for reconsideration, we examine whether the motion is based upon newly discovered evidence, mistakes in our findings of fact, or errors of law. Zulco International, lnc., ASBCA No. 55441, 08-1 BCA 1| 33,799 at 167,319. A motion for reconsideration does not provide the moving party the opportunity to reargue its position or to advance arguments that properly should have been presented in an earlier proceeding See Dixon v. Shz`nseki, 741 F.3d 1367, 1378 (Fed. Cir. 2014). We do not grant motions for reconsideration absent a compelling reason. J.F. Taylor, Inc., ASBCA Nos. 56105, 56322, 12-2 BCA 11 35,125 at 172,453. - argues in its motion for reconsideration that the government breached the contract by violating PAR 52.233-3, PROTEST AFTER AWARD (AUG 1996) for failing to cancel the stop-work order or terminating the contract for convenience after the post-award protest period (app. mot. at l, 8). In our decision, we addressed this same argument and stated that “the suspension of work and termination for convenience clauses provide no relief when no work was ordered under an [indefinite-delivery, indefinite-quantity] contract and the contractor has been paid the minimum contract value.” _, 16-1 BCA 11 36,569 ar 178,109. -, in its reply, acknowledges that part of our decision cited above, but argues that the government should still pay costs which it incurred after the suspension of work was allegedly lifted (app. reply br. at 7). However, all of the costs incurred were considered in our decision and found to be generated by tasks which was already expected to do under the terms of the contract. 16-1 BCA il 36,569 at 178,110-11. 3 We conclude - has not shown any compelling reason to modify our original decision, as - merely reargues its original position relying on the same facts. CONCLUSION For the reasons stated above, -’s motion for reconsideration is denied. Dated: 15 March 2017 DAVID D’ALESSANDRIS Administrative Judge Armed Services Board of Contract Appeals Iconcur% I concur MARK N. STEMPLER / RICHARD SHACKLEFORD Administrative Judge Administrative Judge Acting Chairman Vice Chairman Armed Services Board Armed Services Board of Contract Appeals of Contract Appeals I certify that the foregoing is a true copy of the Opinion and Decision of the Armed services Board of Contract Appeals in ASBCA Ne. 60315, Appeai ef- _, rendered in conformance with the Board’s Charter. Dated: JEFFREY D. GARDIN Recorder, Armed Services Board of Contract Appeals
{ "pile_set_name": "FreeLaw" }
<HTML><HEAD> <TITLE>Invalid URL</TITLE> </HEAD><BODY> <H1>Invalid URL</H1> The requested URL "&#91;no&#32;URL&#93;", is invalid.<p> Reference&#32;&#35;9&#46;44952317&#46;1507271057&#46;135fad8 </BODY></HTML>
{ "pile_set_name": "Github" }
JTA: The Candidates’ Stances on Israel Report by JTA: “Ahead of the Iowa caucus: A Jewish guide to the presidential candidates” On Monday, Iowans will gather to launch the 2016 presidential election with an arcane ritual — the caucus. In living rooms and meeting halls throughout the state, caucus-goers will group themselves into clusters according to which presidential candidate they favor. By the end of the day, two real-life winners will emerge: not a “leader in the polls,” not a “likely front-runner,” but the Democrat and Republican who will have secured Iowa’s delegation to the parties’ respective conventions in the summer. Iowa’s delegates, which come as a bloc, account for just 1 percent or so of the national total. But their selections will be the first substantive results in what has been a raucous and unpredictable campaign, rife with speculation, especially on the Republican side. A week and a day later, voters in New Hampshire will cast ballots in a more straightforward process, and by the late hours of Feb. 9, the race will truly be on – with the media in hot pursuit. At JTA, the question is what it has been for nearly a century: What does all this mean for the Jews? In that spirit, here’s a look at the leading candidates – their Jewish friends, family, advisers and donors, their stances on Israel and their Jewish-related controversies. THE REPUBLICANS Donald Trump, 68, real estate magnate, reality TV star Jewish cohorts Trump’s daughter, Ivanka, is married to Jared Kushner, the Jewish publisher of the New York Observer and, like her, the child of a real estate magnate. She underwent an Orthodox conversion before marrying, and the couple are raising their children Jewish. Donald Trump, a billionaire with a natural gift for generating free publicity, has yet to tap major donors, but given his New York origins and his professional fields – real estate and show business – it’s not surprising that some of his closest associates are Jewish. One of his leading proxies in the media is Michael Cohen, the Trump Organization’s Jewish executive vice president. Stance on Israel Trump, who as a negotiator made his name playing his cards close to the chest, declined last month to commit to recognizing all of Jerusalem as Israel’s capital, explaining that doing so could preempt any bid for Israeli-Palestinian peace. That earned him boos at the Republican Jewish Coalition presidential forum. This month, he said he would move the U.S. Embassy to Jerusalem. Like the other GOP candidates, he does not like the Iran deal, but he is one of several who has refused to say he would scrap it outright. He also wondered at the RJC event whether Israel has the “commitment” to make peace. Controversy Trump’s Republic Jewish Coalition forum appearance made headlines less for his refusal to embrace right-wing pro-Israel doctrine than for his joshing with the audience about how skilled everyone in the room was at making money. He likes compliments, and has retweeted flattery, even when it seemingly comes from white supremacists. He has also slipped a couple Nazi symbols into tweets, before pulling the posts down and claiming oversights. He has also achieved the neat trick of uniting pretty much the entire Jewish spectrum in condemnation of his proposals to ban Muslim entry into the United States, shut down some mosques and create a Muslim registry. READ: When it comes to Jewish ties, no GOP candidate trumps Trump Ted Cruz, 45, Texas senator Jewish cohorts Much has been written in recent days about the four billionaires funding Cruz’s insurgent candidacy; none of them are Jewish. But Sheldon Adelson, the casino magnate and GOP kingmaker, says he and his wife have yet to settle on a candidate, and while Adelson favors Marco Rubio, Miriam Adelson favors Cruz. Cruz has not shied from cultivating Jewish fundraisers. He made headlines last spring when, despite his strongly conservative bona fides, he met with two Jewish and gay hoteliers. The “gay” part is what made headlines, but the hoteliers’ pro-Israel interests is what led to the meeting. Cruz’s point man in the Jewish community is Nick Muzin, a rising young political player and an Orthodox Jew. Stance on Israel Cruz says he would scrap the Iran nuclear deal and move the embassy to Jerusalem as soon as he enters office. He says he also would invite Israeli Prime Minister Benjamin Netanyahu to attend his first State of the Union address. Cruz has cultivated the pro-Israel right, appearing at Zionist Organization of American events and organizing an anti-Iran rally on Capitol Hill last summer. Controversy Cruz has taken to bashing neoconservatives, blaming them for for overseas interventions – including the Iraq War – that he says have weakened America. He also has insistently disparaged “New York values.” Some see his references to both groups – neoconservatives and New Yorkers – as coded attacks on the Jews. His supporters cry nonsense, saying his issue is with policy and values. READ: Ted Cruz aims to liberate GOP from ‘crazy’ neoconservatives Marco Rubio, 44, Florida senator Jewish cohorts Norman Braman, a South Florida car retailer, has been Rubio’s principal backer since his days in the Florida Legislature and employs Rubio’s wife, Jeanette Rubio, at his family’s charitable foundation. Sheldon Adelson is said to favor Rubio, although he has yet to commit, and late last year, Rubio secured the backing of Paul Singer, a hedge fund billionaire who is deeply involved in pro-Israel funding. As far as those neocons Cruz is running away from, Rubio says bring them on and seeks their advice. He has consulted with prominent Jewish thinkers and Republican administration veterans Elliott Abrams, Robert Kagan and Eric Edelman. He also has met with Henry Kissinger, President Richard Nixon’s secretary of state. Stance on Israel Rubio says he would move the embassy to Jerusalem and scrap the Iran deal. His campaign website has an Israel page, and it faithfully reflects right-wing pro-Israel talking points. Controversy Debbie Wasserman Schultz, the Jewish chair of the Democratic National Committee, slammed Rubio for attending a fundraiser at the home of Harlan Crow, who collects Nazi art. Rubio fired back with outrage of his own, and by most accounts came out on top in the exchange. READ: Rubio pledges Israel trip would be first presidential visit abroad Jeb Bush, 62, former Florida governor Jewish cohorts More than any other candidate, Bush has garnered the support of the Jewish Republicans who backed his brother President George W. Bush. Among donors, these include Fred Zeidman, a Texas businessman, and Mel Sembler, a Florida real estate magnate. Jeb Bush’s advisers include some of the most senior Jewish veterans of the second Bush administration, including former Homeland Security Secretary Michael Chertoff and former Attorney General Michael Mukasey. Stance on Israel Bush also has said he will move the U.S. embassy to Jerusalem, but like several candidates who strongly oppose the Iran nuclear deal, he says it would likely be too late to scrap it by the time the next president assumes office. Controversy Bush raised conservative pro-Israel hackles when he named his father’s secretary of state James Baker as an adviser. Baker has clashed with Israel and the Jewish community. It didn’t help when within a month of coming on board with Jeb Bush, Baker addressed J Street, the liberal Jewish Middle East policy group, and extolled the virtues of pressuring Israel. Bush has said that while he values Baker’s deep reservoirs of experience – overall, the George H. W. Bush presidency is considered a foreign policy success story – he does not look to him for Israel advice. READ: On foreign policy, Jeb Bush navigates between brother and father Ben Carson, 64, retired neurosurgeon, best-selling author Jewish cohorts Among Carson’s foreign policy advisers is George Birnbaum, who served as chief of staff for Netanyahu during his first term, from 1996 to 1999, and has been a partner to Arthur Finkelstein, the GOP public relations guru and political wizard who also has advised Netanyahu. In speaking of anyone advising Carson, especially on foreign policy, there is an enormous caveat: He does not like taking advice, and some of his advisers have, on the record, called him out on it – extraordinary, if not unprecedented, during a presidential campaign. Stance on Israel Carson has said he will abandon the Iran deal and has accused the Obama administration of abandoning Israel. But in real time, he seems less than familiar with the country and the challenges it faces. At the Republican Jewish Coalition forum, he mangled the pronunciation of “Hamas,” making it sound like “hummus.” More substantively, the speech he delivered – awkwardly, from notes – appeared to suggest that if only Fatah and Hamas learned to get along, peace would be achievable. Controversy Carson earned rebukes from much of the Jewish establishment last year when he suggested that gun control was in part responsible for the Holocaust. He refused to stand down. READ: Ben Carson is a Seventh-day Adventist. Here’s why it matters John Kasich, 63, Ohio governor Jewish cohorts Kasich has friends of longstanding in Ohio’s Jewish community, including Brad Kastan, a financial advisor; Albert Ratner, the scion of a family of Ohio real estate magnates; Gary Heiman, a textile industry executive, and Jay Schottenstein, whose family is listed as the 100th most wealthy by Forbes for its fashion business. The state’s governor delivered an emotional eulogy at the 2014 funeral of Gordon Zacks, heir to a footwear fortune and a prominent pro-Israel advocate who hosted Kasich on an Israel tour. A congressman from 1983-2001, Kasich is friendly with Natan Sharansky, the former Soviet dissident and now the chairman of the Jewish Agency for Israel, and frequently drops his name. Kasich pushed for the building of a Holocaust memorial in Columbus, the state capital. Stance on Israel Kasich, like the other Republicans in the race, has blamed the Obama administration for the tensions between the governments; unlike many of the others, he has not committed to moving the embassy to Jerusalem, and has said that scrapping the Iran nuclear plan would be foolish, however misbegotten it is. Controversy Kasich, addressing the Republican Jewish Coalition forum, delivered an encomium to Jewish friendship that may have seemed in place among his many Jewish friends in Ohio, but that raised eyebrows as trading in stereotypes – however flattering — in a national setting. “My mother told me one time, I was a very young man, she said, ‘Johnny if you want to look for a very good friend, get somebody who’s Jewish,’” he said. He has also proposed creating a “Department of Judeo-Christian Values,” while struggling to explain what that means, and has taken to berating Jewish reporters about their shul attendance. Chris Christie, 53, New Jersey governor Jewish cohorts C’mon – he’s from Jersey! Seriously, Christie’s best-known Jewish connection is also notorious for being the wealthiest Jewish Wall Streeter who does not give to Jewish causes: Hedge Fund billionaire Steven A. Cohen, who is one of Christie’s national finance chairmen. Other national finance chairmen include Jeff Fox of St. Louis, whose father, Sam Fox, was a major George W. Bush backer and a past chairman of the Republican Jewish Coalition; and Bill Kilberg of the Washington suburbs in northern Virginia, a major donor to the Hebrew University of Jerusalem. Stance on Israel Christie, like every other GOP candidate, says Obama has poisoned the relationship, and this month promised that one of his first acts as president would be to squirrel Netanyahu away for a weekend and let him vent about the previous eight years. He has said he would also ask his aides how best to get out of the Iran nuclear deal. Controversy Christie, speaking in Las Vegas in 2014 to the Republican Jewish Coalition, used the term “occupied territories.” Mort Klein, the Zionist Organization of America president, upbraided him for the heresy on the spot, and later the same day, Christie apologized to Adelson, whose Venetian resort hotel was the venue for the event. THE DEMOCRATS Bernie Sanders, 74, Vermont senator Jewish cohorts Sanders is Jewish and spent time on a kibbutz with his first (Jewish) wife, although which kibbutz, no one has been able to determine, despite arduous efforts by Jewish journalists. Not long after his Israel sojourn, Sanders moved to Vermont, where he became best friends with two Jewish guys – philosopher Richard Sugarman [who is, reportedly, an “unapologetic Zionist” who is , “left of center on every issue ‘except Israel’.”] and Huck Gutman, a professor of literature at the University of Vermont with a fondness for Yehuda Amichai [an Israeli poet who fought in several of Israel’s wars]. Stance on Israel Since his days as mayor of Burlington in the 1980s, Sanders has been unstinting both in his criticism of Israel’s policies toward the Palestinians and his support of Israel’s right to exist and defend itself. He backed the Iran nuclear deal. Controversy Sanders’ older brother, Larry, based in Oxford, England, last year tweeted “yes” to whether he supports the Boycott, Divestment and Sanctions movement, or BDS, against Israel and favors dismantling Israel’s weapons of mass destruction. Bernie Sanders’ campaign won’t comment, but, brothers, right? [Much more at Where does Bernie Sanders, the Jewish candidate for president, stand on Israel? At a town hall in Cabot, Vermont, during last summer’s Gaza war, a constituent commended Sanders for not signing onto a Senate resolution that solely blamed Hamas for the conflict, but wondered if he would “go further.” “Has Israel overreacted? Have they bombed U.N. facilities? The answer is yes, and that is terribly, terribly wrong,” Sanders said. “On the other hand – and there is another hand – you have a situation where Hamas is sending missiles into Israel – a fact – and you know where some of those missiles are coming from. They’re coming from populated areas; that’s a fact. Hamas is using money that came into Gaza for construction purposes – and God knows they need roads and all the things that they need – and used some of that money to build these very sophisticated tunnels into Israel for military purposes.” Hecklers interrupted, some shouting epithets. “Excuse me, shut up, you don’t have the microphone,” Sanders said. “You asked the question, I’m answering it. This is called democracy. I am answering a question and I do not want to be disturbed.” As mayor of Burlington, Vermont, in 1988, Sanders was asked if he backed then-candidate for president Jesse Jackson’s support for the Palestinians during the first intifada. Sanders excoriated what he depicted as Israeli brutality as well as Arab extremism. “What is going on in the Middle East right now is obviously a tragedy, there’s no question about it. The sight of Israeli soldiers breaking the arms and legs of Arabs is reprehensible. The idea of Israel closing down towns and sealing them off is unacceptable,” he said at a news conference, according to video unearthed by Alternet writer Zaid Jilani. “You have had a crisis there for 30 years, you have had people at war for 30 years, you have a situation with some Arab countries where there are still some Arab leadership calling for the destruction of the State of Israel and the murder of Israeli citizens.” Sanders said the United States should exercise the prerogative it has as an economic power. “We are pouring billions of dollars in arms into Arab countries. We have the clout to demand they and Israel, who we’re also heavily financing, to begin to sit down and work out a sensible solution to the problem which would guarantee the existence of the State of Israel and which would also protect Palestinian rights,” he said.] READ: The Jewish Bernie Sanders only Vermonters know Hillary Rodham Clinton, former secretary of state, former senator from New York, former first lady Jewish cohorts Like Trump, Clinton has a Jewish son-in-law, Marc Mezvinsky, an investment banker whose mother, Marjorie Margolies-Mezvinsky, then a Democratic congresswoman from Pennsylvania, provided the critical vote in 1993 that passed President Bill Clinton’s first budget. In Clinton’s world, with its layers of loyalties, this is as tight as it gets. [Chelsea’s father-in-law was served five years in prison for a “Nigerian” scam]. Bill and Hillary Clinton were accruing Jewish fans even before they moved to Arkansas as a couple. Bill Clinton had a Jewish fan base as the state’s governor and attracted Jewish supporters when he ran for president in 1992, many who remain loyal to Hillary Clinton. She also has cornered the party’s Jewish fundraisers, and her rival for Jewish loyalty in 2009, Barack Obama, has given his blessing to his Jewish supporters to back Clinton this election. Her most prominent backer may be Haim Saban, the Israeli-American entertainment magnate. One of her closest and most loyal advisers is Martin Indyk, whom she met during her husband’s presidential campaign when Indyk headed the Washington Institute for Near East Policy, a think tank he had spun off from the American Israel Public Affairs Committee. Indyk, a veteran of the failed Israeli-Palestinian peace efforts of both the Clinton and Obama administrations, is now vice president at the Brookings Institution. Stance on Israel Clinton has ties with Israel dating back to her days as first lady of Arkansas, when she adopted an Israeli early education program for the state. Since quitting as Obama’s first secretary of state, she has broadly embraced his quest for Israeli-Palestinian peace as well as his Iran policy – indeed, she now credits herself as one of the architects of both policies – but she has also emphasized subtle differences. Clinton has suggested she was not comfortable with making settlements a key point of contention between the Obama and Netanyahu governments, and she says she would closely monitor Iran’s compliance with the nuclear deal. Controversy Despite her closeness to Israel, Clinton’s decades in the spotlight mean every inflection has come under microscopic examination. Paul Fray, who managed her husband’s failed 1974 congressional race, says she called him a “f—ing Jew bastard” on election night, although he also acknowledges the Clintons did not know at the time that he was one-eighth Jewish. The Clintons deny any such exchange. Clinton was the first official in her husband’s government to speak openly about the prospect of a Palestinian state. As first lady, Clinton embraced Suha Arafat, the wife of the late PLO leader Yasser Arafat, after Suha Arafat delivered a speech accusing Israel of poisoning children. Clinton, who was listening to a simultaneous translation, claims she missed that passage. When last year, Clinton’s private emails were dumped as part of an investigation into her privacy practices while she was secretary of state, it was revealed that one of her Jewish advisers, Sidney Blumenthal, to whom she remains fiercely loyal, kept sending her anti-Israel screeds by his son, Max. Clinton occasionally complimented Max Blumenthal’s writing to Sidney – but there is no evidence she took any of his son’s advice. READ: Throughout Hillary Clinton’s life and career, US Jews have been close at hand THE UNLIKELYS Rick Santorum, former Republican Senator for Pennsylvania, talked Iran sanctions way before it was fashionable, but on Muslims, is even more prone than Trump to sweeping generalizations. Carly Fiorina, the former Hewlett Packard CEO, and a Republican, at times sounds like she has Netanyahu on speed dial, but has also been in the sticky position of defending HP sales to Iran. Mike Huckabee, the former Republican Arkansas governor, is perhaps the candidate who has most frequently visited Israel, leading tours there for evangelical Christians. He is also probably the most pronouncedly opposed candidate to a two-state solution, and is unafraid of Holocaust metaphors to attack his opponents. Jim Gilmore, the former Virginia governor, a Republican, answered the kishkes question and also took a crash course on Holocaust films. Sen. Rand Paul, R-Ky., began his congressional career calling for cuts in defense assistance to Israel, but then got himself some Talmud study. Martin O’Malley, the former Democratic governor of Maryland, signed bills sanctioning Iran and conditioning business with a French rail company on its accounting for its Nazi-era collaboration. He is backed by Howard Friedman, a past American Israel Public Affairs Committee president.
{ "pile_set_name": "OpenWebText2" }
The date is fast approaching for our spring rally. I have posted the reservation information in the Calendar section, I will post more details in the calendar section as they become available. If you have any questions please e-mail me at txjeff123@gmail.com.
{ "pile_set_name": "Pile-CC" }
New York (CNN Business) On Sunday, Ford will announce what is possibly the biggest change ever in the 55-year history of the Mustang. The automaker will unveil a vehicle bearing the Mustang brand that's not a two-door car. Called the Ford Mustang Mach-E, it's a fully electric crossover SUV that will wear the Mustang's chrome pony. Ford has apparently learned from brands like Porsche, Lamborghini and Jeep that even ardent fans will forgive the use of a brand name on a once-unthinkable type of vehicle. That's as long as the new vehicle maintains some core aspects of the original and as long as the original vehicle that made the brand carries on as well. Ford provided this teaser image of the crossover SUV before Sunday's launch. For instance, Porsche fans were once outraged by the Cayenne SUV . But because Porsche still makes sports cars like the 911 and the Cayenne can credibly claim to be "the Porsche of SUVs," the brand remains strong. Likewise, Jeep has been able to make crossover SUVs that will rarely leave pavement as long as those crossovers are available in tough "Trail Rated" versions and Jeep keeps making the ultra-rugged Wrangler. Read More
{ "pile_set_name": "OpenWebText2" }
Q: Class AB amplifier What role does Rv play in this AB class amplifier? A: This is a class B amplifier: - Your circuit is a class AB amplifier: - Rv adjusts the bias point of the two transistors so that T1 and T2 are always conducting a little bit of current - this avoids excessive cross over distortion: - See also this article, Crossover Distortion in Amplifiers, for more information. Rv modifies the volt drop across the two series diodes. Remember that diodes are not just fixed 0.7 v devices. The forward volt drop can be adjusted so that the base-emitter junctions of each output transistor are conducting 1 mA or so, placing the transistors in a much more linear region of their characteristic at the expense of a sending DC current thru the transistors (an increase in power dissipation).
{ "pile_set_name": "StackExchange" }
Koolstra K, Beenakker J‐WM, Koken P, Webb A, Börnert P. Cartesian MR fingerprinting in the eye at 7T using compressed sensing and matrix completion‐based reconstructions. Magn Reson Med. 2019;81:2551--2565. 10.1002/mrm.27594 30421448 **Funding information** This project was partially funded by the European Research Council Advanced Grant 670629 NOMA MRI. 1. INTRODUCTION {#mrm27594-sec-0005} =============== Ophthalmologic disease diagnosis conventionally relies mainly on ultrasound and optical imaging techniques such as fundus photography and fluorescent angiography (FAG), MRI is increasingly being used in the radiological community.[1](#mrm27594-bib-0001){ref-type="ref"}, [2](#mrm27594-bib-0002){ref-type="ref"}, [3](#mrm27594-bib-0003){ref-type="ref"} One of the main advantages of MRI is its capability to assess nontransparent tissues such as ocular tumors or structures behind the globe such as the eye muscles. Currently, however, these applications are mainly based on qualitative MRI methods using the large number of tissue contrasts addressable by MR. As an example, in Graves' ophthalmopathy fat‐suppressed T~2~‐weighted MRI is the standard to detect inflammation in the eye muscles,[4](#mrm27594-bib-0004){ref-type="ref"}, [5](#mrm27594-bib-0005){ref-type="ref"} whereas in the diagnosis of retinoblastoma, a rare intraocular cancer in children, standard T~1~‐ and T~2~‐weighted MRI is often performed to confirm the presence of the tumor and to screen for potential optic nerve involvement.[2](#mrm27594-bib-0002){ref-type="ref"} In more recent ophthalmologic applications of MRI, such as uveal melanoma (the most common primary intraocular tumor), quantitative MRI techniques including DWI[6](#mrm27594-bib-0006){ref-type="ref"} and DCE imaging[7](#mrm27594-bib-0007){ref-type="ref"} have been shown, but currently diagnosis is still based on qualitative methods.[3](#mrm27594-bib-0003){ref-type="ref"} To personalize treatment plans quantitative parameters of the tissues involved, as can be acquired invasively for example by performing biopsies,[8](#mrm27594-bib-0008){ref-type="ref"} are highly desirable. However, quantitative parameter mapping by means of MRI requires long examination times, which would result in significant eye‐motion artifacts, as well as patient discomfort.[9](#mrm27594-bib-0009){ref-type="ref"} MR fingerprinting (MRF) is a recently introduced method for rapid quantitation of tissue relaxation times and other MR‐related parameters.[10](#mrm27594-bib-0010){ref-type="ref"} It uses a flip angle sweep to induce a unique signal evolution for each tissue type. Incoherent undersampling can be applied during sampling of the MRF train, enabling acceleration of the MRF scans.[10](#mrm27594-bib-0010){ref-type="ref"} Together with its ability to measure simultaneously T~1~ and T~2~, MRF offers a solution to the problem of obtaining quantitative measures in an efficient manner and in relatively short scanning times. One of the main challenges in ocular imaging is in‐plane and through‐plane eye motion, often associated with eye blinking.[11](#mrm27594-bib-0011){ref-type="ref"}, [12](#mrm27594-bib-0012){ref-type="ref"}, [13](#mrm27594-bib-0013){ref-type="ref"} The motion results in corrupted k‐space data that introduces artifacts and blurring throughout the entire image. Shortening the scans would reduce motion‐related artifacts, but standard acceleration techniques are not optimal for the current eye application due to the following 3 reasons. First, a cued‐blinking protocol is typically used to control and reduce the eye motion.[3](#mrm27594-bib-0003){ref-type="ref"}, [11](#mrm27594-bib-0011){ref-type="ref"} This requires an instruction screen placed at the end of the MR tunnel to be visible to the patient which complicates the use of small phased array receive coils in front of the eye, blocking the view. Instead, a custom‐built single‐element eye loop coil is used, which provides a high local SNR[3](#mrm27594-bib-0003){ref-type="ref"} and screen visibility, but which clearly excludes the possibility of scan acceleration by means of parallel imaging.[14](#mrm27594-bib-0014){ref-type="ref"} Second, the gel‐like vitreous body has an extremely long T~1~, particularly at high field.[15](#mrm27594-bib-0015){ref-type="ref"} Its value of 3 to 5 s requires a long duration of the MRF sequence to encode the MR parameters (T~1~,T~2~) sufficiently. Thus, using a flip angle train with a small number of RF pulses is not feasible, hindering scan time reduction. Finally, a time‐efficient spiral sampling scheme, usually applied in MRF,[10](#mrm27594-bib-0010){ref-type="ref"}, [16](#mrm27594-bib-0016){ref-type="ref"}, [17](#mrm27594-bib-0017){ref-type="ref"}, [18](#mrm27594-bib-0018){ref-type="ref"}, [19](#mrm27594-bib-0019){ref-type="ref"} introduces off‐resonance effects in each of the individual MRF images.[20](#mrm27594-bib-0020){ref-type="ref"} This occurs even when combined with unbalanced sequences such as fast imaging with steady state precession,[16](#mrm27594-bib-0016){ref-type="ref"} which are in themselves robust to off‐resonance effects.[21](#mrm27594-bib-0021){ref-type="ref"} The off‐resonance effects present in spiral sampling schemes are much stronger at high field, where they result in blurring,[22](#mrm27594-bib-0022){ref-type="ref"} caused by strong main field inhomogeneities (particularly in the eye region due to many air‐tissue‐bone interfaces), as well as the presence of significant amounts of off‐resonant orbital fat around the eye. In this work, a Cartesian sampling scheme is used, which is more robust than spiral sampling to off‐resonance effects, but which is significantly less time‐efficient.[23](#mrm27594-bib-0023){ref-type="ref"} With such a Cartesian sampling scheme, undersampling artifacts have a more structured nature compared with spiral sampling, which increases the temporal coherence of the artifacts in the MRF image series.[10](#mrm27594-bib-0010){ref-type="ref"}, [20](#mrm27594-bib-0020){ref-type="ref"} In this case, direct matching of the measured MRF signal reconstructed by plain Fourier transformations, to the simulated dictionary elements is not sufficiently accurate for high undersampling factors.[24](#mrm27594-bib-0024){ref-type="ref"}, [25](#mrm27594-bib-0025){ref-type="ref"} Therefore, the quality of the reconstructed MRF data has to be improved before the matching process. Compressed sensing (CS) has been introduced as a technique to reconstruct images from randomly undersampled data by enforcing signal sparsity (in the spatial dimension only or both in spatial and temporal dimensions),[26](#mrm27594-bib-0026){ref-type="ref"}, [27](#mrm27594-bib-0027){ref-type="ref"} allowing a scan time reduction in many applications.[28](#mrm27594-bib-0028){ref-type="ref"}, [29](#mrm27594-bib-0029){ref-type="ref"}, [30](#mrm27594-bib-0030){ref-type="ref"} The flexibility of MRF toward different sampling schemes and undersampling factors makes it possible to reconstruct the source images by means of CS.[27](#mrm27594-bib-0027){ref-type="ref"}, [31](#mrm27594-bib-0031){ref-type="ref"}, [32](#mrm27594-bib-0032){ref-type="ref"} Higher acceleration factors might be feasible if the correlation in the temporal dimension is better used.[33](#mrm27594-bib-0033){ref-type="ref"} Examples of such reconstructions specifically tailored to MRF are given in Davies et al, Pierre et al, and Zhao et al[34](#mrm27594-bib-0034){ref-type="ref"}, [35](#mrm27594-bib-0035){ref-type="ref"}, [36](#mrm27594-bib-0036){ref-type="ref"} which take into account the simulated dictionary atoms in the image reconstruction process. Recent work has shown that the temporal correlation in the MRF data can be exploited even further by incorporating the low rank structure of the data into the cost function,[37](#mrm27594-bib-0037){ref-type="ref"} a technique which was introduced into MR in Liang[38](#mrm27594-bib-0038){ref-type="ref"} and in MRF in Zhao[39](#mrm27594-bib-0039){ref-type="ref"} and used by many others[40](#mrm27594-bib-0040){ref-type="ref"}, [41](#mrm27594-bib-0041){ref-type="ref"}, [42](#mrm27594-bib-0042){ref-type="ref"}: these techniques can also be combined with sparsity constraints.[43](#mrm27594-bib-0043){ref-type="ref"}, [44](#mrm27594-bib-0044){ref-type="ref"} Most of the aforementioned techniques involve Fourier transformations in each iteration, making the reconstruction process time‐consuming. In this application, the single‐element receive coil allows us to perform the reconstruction process entirely in k‐space when exploiting the low rank structure of the MRF data as is performed in matrix completion (MC)‐based reconstructions.[42](#mrm27594-bib-0042){ref-type="ref"}, [45](#mrm27594-bib-0045){ref-type="ref"} In this work, undersampled Cartesian ocular MRF is investigated using CS and MC‐based reconstructions. Simulations and experiments performed in 6 healthy volunteers for confirmation are compared with fully sampled MRF in terms of the quality of the parameter maps, and mean relaxation times were derived for different ocular structures at 7T. Finally, parameter maps after an MC‐based reconstruction are included for a uveal melanoma patient, showing the feasibility of ocular MRF in eye tumor patients. 2. METHODS {#mrm27594-sec-0006} ========== 2.1. Fingerprinting definition {#mrm27594-sec-0007} ------------------------------ The MRF encoding principle is based on a variable flip angle train with relatively short TRs, so that the magnetization after each RF pulse is influenced by the spin history. Following closely the implementation of the sinusoidal MRF pattern described in Jiang et al,[16](#mrm27594-bib-0016){ref-type="ref"} a flip angle pattern of 240 RF excitation pulses ranging from 0° to 60° (see Figure [1](#mrm27594-fig-0001){ref-type="fig"}A) was defined by the function$$FA\left( x \right) = \left\{ \begin{matrix} {20\,\text{sin}(\frac{\pi}{110}x)\,\text{for}\, 1 \leq x \leq 110} \\ {60\,\text{sin}(\frac{\pi}{130}\left( {x - 110} \right))\,\text{for}\, 110 < x \leq 240} \\ \end{matrix} \right.$$ ![The MRF sequence, instructed blinking set‐up, sampling pattern, and temporal correlation used in all experiments. A, Each flip angle train is preceded by an adiabatic 180° inversion pulse. The flip angle pattern consists of 240 RF pulses ranging from 0° to 60°. The total number of repetitions K of the MRF train is determined by the undersampling factor. The 2.5 s repetition delay between trains allows for instructed eye blinking when the scanner is not acquiring data. B, During data acquisition, a cross is shown on a screen placed at the end of the MR tunnel, which can be seen through 1 eye by means of a small mirror attached to the eye coil. During the repetition delay, the cross changes into a red circle, indicating that blinking is allowed before data acquisition starts again. The single loop eye coil setup is illustrated as well. C, Each time point (shot number) in the flip angle train is sampled differently. A simple variable density scheme is used. The outer region of k‐space is randomly sampled, whereas the central part of k‐space is fully sampled for each time point. The incoherent variable density sampling allows a CS reconstruction, while the fully sampled center can be used as calibration data for the MC‐based reconstruction. D, The singular values of the central k‐space/calibration matrix decay very quickly, which shows the low rank property of the eye MRF data, and forms the basis of the MC‐based reconstruction. Plots were generated for an undersampling factor of R = 12.3 in the outer region of k‐space, which results in a total undersampling factor of 6.7. E, Anatomical T~1~‐weighted 3D MR image of the eye, showing different ocular structures. L, lens nucleus; V, vitreous body; F, orbital fat; M, extraocular muscle; N, optic nerve](MRM-81-2551-g001){#mrm27594-fig-0001} preceded by an inversion pulse (16). A fast imaging with steady state precession sequence was used,[16](#mrm27594-bib-0016){ref-type="ref"}, [19](#mrm27594-bib-0019){ref-type="ref"} in which the TE was chosen as 3.5 ms and 4.0 ms for low resolution scans and high resolution scans, respectively. The selected excitation RF pulse had a time‐bandwidth product of 10, resulting in a reasonably sharp slice profile. The RF pulse phase was fixed to 0°. To simplify dictionary calculations, because of the simplification of the magnetization coherence pathways,[46](#mrm27594-bib-0046){ref-type="ref"} the TR was set to a constant value of 11 ms. A 3D dictionary was calculated following the extended phase graph formalism,[21](#mrm27594-bib-0021){ref-type="ref"}, [46](#mrm27594-bib-0046){ref-type="ref"} based on the Bloch equations,[47](#mrm27594-bib-0047){ref-type="ref"}, [48](#mrm27594-bib-0048){ref-type="ref"} incorporating 27,885 signal evolutions.[46](#mrm27594-bib-0046){ref-type="ref"} T~1~ values ranged from 10 to 1000 ms in steps of 10 ms, and from 1000 to 5000 ms in steps of 100 ms. T~2~ values ranged from 10 to 100 ms in steps of 10 ms and from 100 to 300 ms in steps of 20 ms. A B~1~ ^+^ fraction ranging from 0.5 to 1.0 in steps of 0.05 was incorporated into the dictionary calculation. To shorten the scan time, we used a short waiting time between repetitions of the MRF train (called the repetition delay) of 2.5 s. Therefore, each MRF scan was preceded by 3 dummy trains to establish steady state magnetization,[19](#mrm27594-bib-0019){ref-type="ref"} which was considered in the dictionary calculation. The longitudinal magnetization after the 3 dummy trains, required for correction of the M~0~ maps, was calculated for each T~1~/T~2~ combination. The repetition delay of 2.5 s was efficiently used as the blink time.[3](#mrm27594-bib-0003){ref-type="ref"}, [11](#mrm27594-bib-0011){ref-type="ref"} 2.2. Experimental setup {#mrm27594-sec-0008} ----------------------- All experiments were approved by the local medical ethics committee, and all volunteers and patients signed an appropriate informed consent form. The experiments in this study were performed on 6 healthy volunteers and 1 uveal melanoma patient using a 7T MR system (Philips Healthcare) equipped with a quadrature head volume coil (Nova Medical) for transmission and a custom‐built single‐element eye coil for reception, with a diameter of approximately 4 cm.[3](#mrm27594-bib-0003){ref-type="ref"}, [49](#mrm27594-bib-0049){ref-type="ref"} A cued‐blinking protocol was followed, which means that all subjects were instructed to focus on a fixation target shown on a screen during data acquisition and to blink in the 2.5 s repetition delay. This was performed using a small mirror integrated into the eye coil, allowing visualization of a screen placed outside the magnet through 1 eye, while the eye to be imaged was closed and covered by a wet gauze to reduce susceptibility artifacts in the eye lid.[50](#mrm27594-bib-0050){ref-type="ref"} This setup is shown schematically in Figure [1](#mrm27594-fig-0001){ref-type="fig"}B. 2.3. MR data acquisition {#mrm27594-sec-0009} ------------------------ Because of the presence of significant orbital fat around the eye, and the sensitivity of the spiral to off‐resonance resulting in blurring,[22](#mrm27594-bib-0022){ref-type="ref"} a Cartesian sampling scheme was used to acquire all data. The fingerprinting scans were acquired as a single slice at 2 different spatial resolutions: 1.0 × 1.0 × 5.0 mm^3^ and 0.5 × 0.5 × 5.0 mm^3^. The lower resolution scan was performed twice, the first fully sampled to serve as a reference, and the second one undersampled. The scan time of the fully sampled scan was 7:02 min, while the scan time of the undersampled scan, in which 15% of the data was acquired, was 1:16 min. The high resolution scan was only acquired as an undersampled data set, in which 12.5% of the data was acquired, resulting in a scan time of 1:57 min. In the undersampled scans a simple variable density k‐space sampling was applied, schematically shown in Figure [1](#mrm27594-fig-0001){ref-type="fig"}C, supporting both CS and MC‐based reconstructions. A fully sampled center of k‐space was acquired for each time point consisting of 6/8 k‐space lines for the low resolution/high resolution scans, respectively. For all scans, the FOV was set to 80 × 80 mm^2^, resulting in an acquisition matrix of 80 × 80 and 160 × 160 for the low and the high resolution scans, respectively. The phase encoding direction was set from left‐to‐right to minimize contamination by any residual motion artifacts in the eye lens, and the read out direction was set to the anterior‐posterior direction. B~1~ ^+^ maps were acquired using the dual refocusing echo acquisition mode method[51](#mrm27594-bib-0051){ref-type="ref"} with the following scan parameters: FOV = 80 × 80 mm^2^, in‐plane resolution 1 mm^2^, slice thickness 5 mm, 1 slice, TE~1~/TE~2~ = 2.38/1.54 ms, TR = 3.7 ms, FA = α:60°/ß:10°: the scan time for a single slice was less than 1 s. 2.4. Reconstruction {#mrm27594-sec-0010} ------------------- For each time point, the corresponding images were reconstructed from the available data, using custom software written in MATLAB (Mathworks, Inc) and run on a Windows 64‐bit machine with an Intel i3‐4160 CPI @ 3.6 GHz and 16 GB internal memory. Different reconstructions were performed: (i) a fast Fourier transform (FFT) of the fully sampled data and of the zero‐filled undersampled data; (ii) a CS reconstruction with total variation regularization in the spatial dimension (2D CS), and with total variation in both spatial and temporal dimensions (3D CS) of the undersampled data; (iii) an MC‐based reconstruction of the undersampled data. ### 2.4.1. CS reconstruction {#mrm27594-sec-0011} In this reconstruction, the complete image series is reconstructed by iteratively solving the nonlinear problem$$\hat{\mathbf{x}} = \text{argmin}_{\mathbf{x}}TV\left( \mathbf{x} \right)s.t.\, RF\mathbf{x} = \mathbf{y}_{u}$$ through the unconstrained version$$\hat{\mathbf{x}} = \text{argmin}_{\mathbf{x}}{\frac{\mu}{2}{|RF\mathbf{x} - \mathbf{y}_{u}|}}_{2}^{2} + \frac{\lambda}{2}TV{(\mathbf{x})}$$ In this formulation, $F \in \mathbb{C}^{Nt \times Nt}$ is a block diagonal matrix with the 2D Fourier transform matrix in each diagonal block, $R \in \mathbb{C}^{Nt \times Nt}$ is a diagonal matrix incorporating the sampling locations, $\mathbf{y}_{u} \in \mathbb{C}^{Nt \times 1}$ is the undersampled k‐t space data, $\hat{\mathbf{x}} \in \mathbb{C}^{Nt \times 1}$ is an estimate of the true image series and $\mathit{TV}$ is a total variation operator which is used to enforce sparsity in the reconstruction.[52](#mrm27594-bib-0052){ref-type="ref"}, [53](#mrm27594-bib-0053){ref-type="ref"} Here, $N$ is the number of k‐space locations per image frame and $t$ is the number of measured time points (or flip angles in the MRF train). The regularization parameters $\mu$ and $\lambda$ in Equation [\[Link\]](#mrm27594-disp-0001){ref-type="disp-formula"} were determined empirically and set to $\mu = 0.1\, and\,\lambda = 0.2.$ Two basic versions of the total variation operator,$$TV\left( \mathbf{x} \right) = {|\nabla_{x}{\mathbf{x}|}}_{1} + {|\nabla_{y}{\mathbf{x}|}}_{1}$$ $$TV\left( \mathbf{x} \right) = {|\nabla_{\mathbf{x}}{\mathbf{x}|}}_{1} + {|\nabla_{\mathbf{y}}{\mathbf{x}|}}_{1} + {|\nabla_{\mathbf{t}}{\mathbf{x}|}}_{1}$$ were implemented to investigate the effect of promoting sparsity either only in the spatial dimension (2D CS) or in both the spatial and temporal dimensions (3D CS). In these expressions, $\nabla_{x},\nabla_{y}$ and $\nabla_{t}$ are the first derivative operators acting on the spatial $x$ and $y$ dimensions and the time dimension, respectively. Solving the problem given in Equation [\[Link\]](#mrm27594-disp-0001){ref-type="disp-formula"} is done in this work using Split Bregman. For details on this algorithm the reader is referred to Goldstein and Osher.[54](#mrm27594-bib-0054){ref-type="ref"} ### 2.4.2. MC reconstruction {#mrm27594-sec-0012} Similar to CS with the TV operator acting in 3 dimensions (see Equation [(1)](#mrm27594-disp-0003){ref-type="disp-formula"}), MC uses the information from the temporal dimension.[45](#mrm27594-bib-0045){ref-type="ref"}, [55](#mrm27594-bib-0055){ref-type="ref"} A main difference between CS and MC, however, is that sparsity of singular values, which is a priori information in the MC reconstruction, can be observed both in image space and in k‐space. This allows one to complete the entire reconstruction in k‐space, which is computationally efficient, especially if only a single receiver coil is used.[42](#mrm27594-bib-0042){ref-type="ref"} The MC‐based reconstruction iteratively solves$$\hat{M} = \mathit{argmin}_{M}{|M|}_{\ast}\, s.t.\,\mathcal{P}_{\Omega}M = M_{u}$$ with ${| \bullet |}_{\ast}$ being the nuclear norm, $\mathcal{P}_{\Omega}$ the sampling operator selecting the measured k‐t space locations, $M_{u} \in {}^{t \times N}$ the undersampled k‐t space data and $\hat{M} \in \mathbb{C}^{t \times N}$ an estimate of the true k‐t space. The nuclear norm of *M* sums the singular values of *M*, and can thus be written as ${|\sigma(M)|}_{1}$, where $\sigma$ transforms $M$ into a vector containing the singular values of $M$. The central k‐t space is used as calibration data, of which the rank can be used as a priori information in the reconstruction of undersampled data. In this process, a projection matrix $\mathcal{P}_{U_{n}} \in \mathbb{C}^{t \times t}$ projects in each iteration $i$ the undersampled data matrix $M^{i}$ onto a low‐rank subspace spanned by the columns of $U_{n} \in \mathbb{C}^{t \times n}$, such that$$\overset{\mspace{600mu}}{M^{i}} = \mathcal{P}_{U_{n}}M^{i}$$ with$$\mathcal{P}_{U_{n}} = U_{n}U_{n}^{H}.$$ Here, $U_{n}$ contains the $n$ most significant left singular vectors of the calibration matrix $M_{c} \in \mathbb{C}^{t \times p}$ and is constructed from the full singular value decomposition $M_{c} = U\Sigma V^{H}$, $U \in \mathbb{C}^{t \times t}$, $\Sigma \in \mathbb{R}^{t \times p}$, $V \in \mathbb{C}^{p \times p}$, which is performed once at the beginning of the algorithm. In the second step of each iteration, the data are updated according to$$M^{i + 1} = M_{u} + {(I - \mathcal{P}_{\Omega})}{\overset{\sim}{M}}^{i}.$$ The value $n$ was determined empirically from the singular value plots (shown in Figure [1](#mrm27594-fig-0001){ref-type="fig"}D for 1 volunteer) and set to 4 for all MC‐based reconstructions. Further details of the adopted algorithm to solve Equation [(2)](#mrm27594-disp-0004){ref-type="disp-formula"}, and its implementation can be found in Doneva et al.[42](#mrm27594-bib-0042){ref-type="ref"} To ensure convergence of the iterative CS and MC‐based reconstructions, 40 Split Bregman iterations (1 inner loop) were used for the CS reconstructions and 100 iterations were used for all MC‐based reconstructions. To judge the performance of the reconstruction methods, relative error measures are defined throughout the manuscript as$$\mathit{RelativeError}\left( \mathbf{u} \right) = \frac{{{|\mathbf{u} -}\mathbf{u}_{\mathbf{r}\mathbf{e}\mathbf{f}}|}_{2}}{{|\mathbf{u}_{\mathbf{r}\mathbf{e}\mathbf{f}}|}_{2}},$$ where $\mathbf{u}_{\mathit{ref}}$ is the fully sampled image series and both $\mathbf{u}$ and $\mathbf{u}_{\mathit{ref}}$ are vectorized. 2.5. Dictionary matching process {#mrm27594-sec-0013} -------------------------------- For each subject, the measured B~1~ ^+^ map was used to calculate an average B~1~ ^+^ value in the eye. Based on this value, a 2D subdictionary was chosen that matches the drop in B~1~ ^+^ for each volunteer. Each voxel signal in the reconstructed MRF image series was then matched to an element of the subdictionary. In this process, the best match between the measured signal and the dictionary elements was found for each voxel by solving$$m = \mathit{argmax}_{\mathbf{i} \in {\{{1,..,\mathbf{M}}\}}}\left\{ {\mathbf{d}_{\mathbf{i}} \bullet \mathbf{s}} \right\}$$ where $\mathbf{d}_{i} \in \mathbb{C}^{t \times 1}$ is the ith normalized dictionary element and $\mathbf{s} \in \mathbb{C}^{t \times 1}$ is the normalized measured signal. The index $m$ that maximizes the inner product describes the dictionary element $\mathbf{d}_{m}$ (with corresponding T~1~ and T~2~ values) that gives the best match with the measured signal. Finally, the scalar proton density per voxel was determined from the model$$\mathbf{S}{= rM}_{0}\mathbf{D}_{\mathbf{m}},$$ where $\mathbf{S} \in \mathbb{C}^{t \times 1}$ is the nonnormalized signal per voxel and $\mathbf{D}_{m} \in {}^{t \times 1}$ the nonnormalized dictionary element corresponding to the best match $\mathbf{d}_{m}$, such that$$M_{0} = \frac{1}{r}\frac{(\mathbf{D}_{m} \bullet \mathbf{S})}{(\mathbf{D}_{m} \bullet \mathbf{D}_{m})}$$ *r* is a value between 0 and 1, describing the fraction of the initial longitudinal magnetization that is left after the dummy trains, also depending on T~1~ and T~2~, which takes into account the short repetition delay in between the MRF trains. M~0~ maps are all shown on a log‐scale due to the high dynamic range of the respective proton densities, with that of the vitreous body being more than an order of magnitude larger than other structures. The processed T~1~, T~2~, and M~0~ maps were compared for different reconstruction methods (FFT, 2D CS, 3D CS, and MC) and for different acquisitions (low spatial resolution, high spatial resolution). T~1~ and T~2~ values were averaged in different regions of interest, annotated in Figure [1](#mrm27594-fig-0001){ref-type="fig"}E for each volunteer. These values were used to determine mean ± SD values over all volunteers for the different reconstructions. 3. RESULTS {#mrm27594-sec-0014} ========== 3.1. Simulation results {#mrm27594-sec-0015} ----------------------- Figure [2](#mrm27594-fig-0002){ref-type="fig"} shows the parameter maps (T~1~, T~2~, and M~0~) obtained for different reconstruction methods, after subsampling the fully sampled k‐space data of 1 healthy volunteer. Even though an incoherent sampling scheme was used, a zero‐filled FFT reconstruction does not lead to accurate parameter maps. The CS reconstruction with total variation regularization in the spatial domain leads to only minor improvement for the high undersampling factor that was chosen. The results show that including the sparsity constraint in the temporal dimension on top of the spatial dimension improves the CS reconstruction, with the largest improvement in the optic nerve and the lens nucleus, indicated by the white arrows. The total undersampling factor of 6.7, however, in combination with the low resolution reconstruction matrix and the single channel signal, results in loss of detail in the CS approach. ![Simulated effect of different reconstruction methods on the parameter maps. Columns 1 to 4 show parameter maps after reconstruction of subsampled source images using a zero‐filled FFT, CS with spatial regularization (2D), CS with spatial and temporal regularization (3D), and MC. Column 5 shows parameter maps after an FFT of the fully sampled data. Adding the temporal regularization in the 3D CS reconstruction improves the quality of the parameter maps (M~0~, T~1~, T~2~) compared with the zero‐filled FFT and the 2D CS reconstruction (see white arrows). The parameter maps resulting from an MC‐based reconstruction show more detail (see white circles), much smaller errors, and the errors have a more noise‐like structure. Note that all M~0~ maps are shown on a log‐scale due to the high dynamic range of the tissue proton densities](MRM-81-2551-g002){#mrm27594-fig-0002} This is not the case for the MC‐based reconstructions. The parameter maps resulting from the MC‐based approach are very close to the parameter maps obtained from the fully sampled scan, enabling visualization of the extraocular muscles and the orbital fat, indicated by the white circles. The error maps in Figure [2](#mrm27594-fig-0002){ref-type="fig"}, defined as the relative difference with the parameter maps from the fully sampled scan, given in percentages, confirm these findings. The error has a more noise‐like behavior for the MC‐based reconstruction compared with the CS reconstruction, and is much lower in the sensitive region of the eye coil. The error maps for T~1~ show larger percentage improvements compared with T~2~. These general trends were also true for different undersampling factors (see Supporting Information Figure [S1](#mrm27594-sup-0001){ref-type="supplementary-material"}, which is available online). 3.2. Experimental results {#mrm27594-sec-0016} ------------------------- Parameter maps obtained in an undersampled experiment are shown in Figure [3](#mrm27594-fig-0003){ref-type="fig"} for low spatial resolution images. The experimental results confirm the findings from the simulation study. The parameter maps obtained from the undersampled MRF scan with a 3D CS reconstruction show loss of detail compared with the parameter maps obtained with an MC‐based reconstruction. This is especially visible in the M~0~ maps. For the MC‐based reconstruction, the parameter maps are similar quality to those obtained from the fully sampled scans, showing the feasibility of accelerating MRF in the eye using a Cartesian sampling scheme. It should be noted that the full k‐space data and the undersampled k‐space data originate from different scans, which is why residual motion artifacts are different between the resulting parameter maps. The parameter maps at high resolution in Figure [4](#mrm27594-fig-0004){ref-type="fig"} show more detail compared with the parameter maps at low resolution in Figure [3](#mrm27594-fig-0003){ref-type="fig"}, indicated by the white circle. For the high resolution case, however, the 3D CS reconstruction gives larger improvements compared with the low resolution case. ![The effect of different reconstruction methods on the parameter maps of experimental data at low resolution. Parameter maps obtained at low (1.0 × 1.0 × 5.0 mm^3^) resolution confirm the findings from the simulation (c.f., Figure [2](#mrm27594-fig-0002){ref-type="fig"}). The parameter maps obtained from a CS reconstruction show loss of detail. The quality of the maps obtained from the undersampled scan after an MC‐based reconstruction is comparable to the quality of the maps from a fully sampled scan. Inhomogeneities are visible in the vitreous body, which is very hard to accurately encode due to the low sensitivity of the MRF train for very long T~1~ values](MRM-81-2551-g003){#mrm27594-fig-0003} ![The effect of different reconstruction methods on the parameter maps of experimental data at high resolution. Parameter maps obtained at high (0.5 × 0.5 × 5.0 mm^3^) resolution for the same subject as in Figure [3](#mrm27594-fig-0003){ref-type="fig"} show more structural detail, indicated by the white circle. Note that Figure [3](#mrm27594-fig-0003){ref-type="fig"} and Figure [4](#mrm27594-fig-0004){ref-type="fig"} were different scans, in which motion artifacts are also different. Fully sampled data sets were not acquired for the high resolution case due to the prohibitively long scanning times required](MRM-81-2551-g004){#mrm27594-fig-0004} Parameter maps obtained in the 6 different volunteers for the low resolution scans are shown in Figure [5](#mrm27594-fig-0005){ref-type="fig"}. In all volunteers, some inhomogeneities are visible in the vitreous body, which is a region that is very sensitive to any type of motion or system imperfections because of the low sensitivity of the MRF sequence for very long T~1~ compared with short T~1~. This effect is illustrated in Figure [6](#mrm27594-fig-0006){ref-type="fig"}, where differences in short T~1~ values (500‐1000 ms) result in more distinguishable dictionary elements compared with the same absolute differences in long T~1~ values, (3500‐4000 ms) especially in the first half of the MRF train. These inhomogeneities differ slightly between successive scans in the same volunteer, and are more visible in the scans of volunteer 3 (Figure [5](#mrm27594-fig-0005){ref-type="fig"}C) and volunteer 5 (Figure [5](#mrm27594-fig-0005){ref-type="fig"}E). Overall, the shortened scan time reduces the risk of motion artifacts, which is clearly visible in volunteers 5 and 6 (Figure [5](#mrm27594-fig-0005){ref-type="fig"}E,F). The high resolution parameter maps for the same volunteers are shown in Supporting Information Figure [S2](#mrm27594-sup-0001){ref-type="supplementary-material"}A‐F, with several regions of improved structural detail indicated by the white circles. ![The parameter maps in all healthy volunteers. Parameter maps, resulting from low resolution scans, obtained in 6 healthy volunteers are shown in (A‐F), respectively. In all volunteers, the parameter maps obtained from a CS reconstruction (3D CS) show loss of detail compared with the maps obtained from the undersampled scan after an MC‐based reconstruction, for which the quality is comparable to that of the fully sampled scan: values are given in Table [1](#mrm27594-tbl-0001){ref-type="table"}. In some volunteers the inhomogeneities in the vitreous body appear stronger than in others, which probably correspond with cases of more motion. This can also be seen in (E,F), where the quality of the maps is better for the shorter scans (MC) compared with the fully sampled ones](MRM-81-2551-g005){#mrm27594-fig-0005} ![Simulated dictionary elements for different relaxation times. A, The simulated normalized absolute signal intensities for tissues with a T~1~ of 500 ms (blue) is plotted together with the signal evolution for tissues with a T~1~ of 1000 ms (red). Solid lines show simulation results for T~2~ values of 50 ms, while dotted lines show results for T~2~ values of 150 ms. Comparison of the red and blue graphs shows that the difference in T~1~ is encoded mostly in the first half of the MRF sequence, whereas T~2~ is encoded over the entire train. Comparison of the solid and dotted graphs shows that the second half helps to further encode differences in T~2~. B, The same results are plotted for a T~1~ of 3500 ms (blue) and 4000 ms (red), showing much smaller differences between the 2 simulated signal evolutions for the same absolute difference in relaxation times. This indicates that a certain difference in T~1~ is easier detected for lower T~1~ values with the current MRF train. Optimization of the MRF train might increase the encoding capability for large T~1~ values. For all simulations the B~1~ ^+^ fraction was set to 1](MRM-81-2551-g006){#mrm27594-fig-0006} Average T~1~ and T~2~ values in the lens nucleus, the vitreous body, the orbital fat, and the extraocular muscles are reported in Table [1](#mrm27594-tbl-0001){ref-type="table"} for the different low resolution scans and reconstruction methods. The relaxation times obtained with a CS reconstruction are relatively close to those of the MC‐based reconstruction, but differences are observed in small anatomical structures such as the extraocular muscles and the eye lens. Differences between the relaxation times from the MC‐based reconstructions and the FFT of the fully sampled data can in part be explained by the fact that motion artifacts differ from scan to scan. Average relaxation times obtained from high resolution scans (not reported) follow the results for the low resolution scans. Reference T~1~ values at 7T reported in Richdale et al[15](#mrm27594-bib-0015){ref-type="ref"} are included in Table [1](#mrm27594-tbl-0001){ref-type="table"}; it should be noted that these reported values show large differences in relaxation times between different measurement techniques. ###### T~1~ and T~2~ values for different ocular structures (annotated in Figure [1](#mrm27594-fig-0001){ref-type="fig"}C), averaged within the structure and over 6 volunteers[a](#mrm27594-note-0002){ref-type="fn"} CS 3D MC Full 7T Richdale et al. -------------------- --------------- ---------- ---------- -------------------- Lens nucleus 1403±178 1037±220 996±248 1520/1020 Vitreous body 3632±375 3614±444 3599±334 5000/4250 Orbital fat 93±23 100±29 95±26 -- Extraocular muscle 731±342 1736±346 1545±191 -- **T~2~ (ms)** Lens nucleus 29±9 29±12 21±10 -- Vitreous body 139±14 147±20 145±12 -- Orbital fat 55±12 51±16 51±19 -- Extraocular muscle 67±26 50±12 55±25 -- Values, given in milliseconds, were averaged in different regions of interest (lens nucleus, vitreous body, orbital fat, and extraocular muscle) from the different scans at low resolution, using different reconstruction methods, for each of the 6 healthy volunteers. The resulting values were used to determine mean ± SD values over all volunteers. The CS reconstruction produced different relaxation times in small anatomical regions such as the lens nucleus and the extraocular muscles. The TRs for the MC‐based reconstructions are close to the values for the fully sampled scans. Remaining differences can be explained by motion artifacts that differ from scan to scan. Reference values at 7T (variable flip angle gradient echo/inversion recovery) from previous literature were reported in the last 2 columns, showing large differences in T~1~ values between different techniques. John Wiley & Sons, Ltd Parameter maps in a uveal melanoma patient are shown in Figure [7](#mrm27594-fig-0007){ref-type="fig"}, together with a T~2~‐weighted, fat‐suppressed, TSE image for anatomical reference. The tumor and the detached retina are characterized in the MRF maps by much lower T~1~, T~2~, and M~0~ values compared with the vitreous body, which allows for clear discrimination between tumor and healthy tissue. Dictionary matches and measured signals (both normalized) in the detached retina, the lens nucleus, the eye tumor, and the fat are also shown. The average values in regions of interest are reported in Table [2](#mrm27594-tbl-0002){ref-type="table"}. ![Parameter maps and matches in a uveal melanoma patient. A, T~2~‐weighted turbo spin‐echo (TSE) images with fat suppression (SPIR) were obtained and shown (zoomed‐in) for reference, with scan parameters: FOV = 40 × 60 mm^2^; in‐plane resolution 0.5 mm^2^; 2 mm slice thickness; 10 slices; TE/TR/TSE factor = 62 ms/3000 ms/12; FA = 110°; refocusing angle = 105°; WFS = 4.1 pixels; and scan time = 1:18 min. The eye tumor, indicated by the white cross, is visible as well as retinal detachment, pointed out by the white circle in the subretinal fluid. The high resolution parameter maps show much lower T~1~, T~2~, and M~0~ values in the tumor compared with the vitreous body, while the subretinal fluid can also be distinguished from the tumor by slightly higher T~1~, T~2~, and M~0~ values. B, Signal evolutions are shown in blue together with the matched dictionary element in red, for the retina (white circle), the lens nucleus, the eye tumor (white cross) and the fat](MRM-81-2551-g007){#mrm27594-fig-0007} ###### T~1~ and T~2~ values for different ocular structures in a uveal melanoma patient[a](#mrm27594-note-0003){ref-type="fn"} T~1~(ms) T~2~(ms) ------------------------------- ---------- ---------- Lens nucleus 916 24 Vitreous body 4218 209 Orbital fat 112 84 Extraocular muscle 1282 56 Eye tumor 883 36 Liquid behind detached retina 1814 64 T~1~ and T~2~ values in milliseconds were averaged over drawn regions of interest. The eye tumor shows different relaxation times (both T~1~ and T~2~) compared with the vitreous body and with the liquid behind the detached retina, which allows for discrimination between tumor and healthy tissue. John Wiley & Sons, Ltd Reconstruction times for the different reconstruction methods were averaged over 6 healthy volunteers and reported in Table [3](#mrm27594-tbl-0003){ref-type="table"}. The iterative nature of CS and MC increases the reconstruction times compared with the direct FFT reconstruction, but the MC‐based reconstruction is much more time‐efficient because it is performed entirely in k‐space, and uses only fast matrix vector multiplications.[42](#mrm27594-bib-0042){ref-type="ref"} ###### Reconstruction times[a](#mrm27594-note-0004){ref-type="fn"} Computation time (s) -------------------------- ---------------------- ------ CS 3D (40 SB iterations) 584 2734 MC (100 iterations) 12 44 FFT 0.1 0.5 Mean values of reconstruction times in seconds calculated over 6 healthy volunteers for CS 3D, MC, and the direct FFT. The reconstruction times for both CS and MC take longer compared to the direct FFT due to the iterative process, but the MC‐based reconstruction is much more time‐efficient than the CS reconstruction because it is performed entirely in k‐space. John Wiley & Sons, Ltd 4. DISCUSSION {#mrm27594-sec-0017} ============= The results in the simulation study clearly show the benefit of using the temporal dimension in the reconstruction of MRF data, as is performed using MC. The low rank property of the signal evolutions allows higher undersampling factors than in a CS reconstruction, in which the TV operator was used to enforce sparsity in the temporal as well as in the spatial dimensions. The experimental results confirmed these findings, and showed the feasibility of reducing the MRF scan time with the proposed MC‐based reconstruction from 7:02 min to 1:16 min. Using MC, high resolution parameter maps can be obtained, which was out of practical reach for full sampling due to the long scan time. The technique was also demonstrated in a uveal melanoma patient, in which relaxation times showed a clear difference between tumor and healthy tissue. The CS reconstruction resulted in smoothed parameter maps, which averages out motion artifacts, but also reduces the amount of visible detail. One reason why the CS reconstruction did not perform as well as the MC‐based reconstruction might be that the TV operator is not the optimal sparsifying transform for transforming the measured data along the temporal domain. Other sparsifying transforms, such as the Wavelet transform or even learned transforms or dictionaries,[56](#mrm27594-bib-0056){ref-type="ref"}, [57](#mrm27594-bib-0057){ref-type="ref"} might result in improvements of the parameter maps after a CS reconstruction. For the high resolution data, however, the 3D CS reconstruction seemed to perform better compared with the low resolution case, while the MC‐based reconstruction performed well in both the low and the high resolution cases. This suggests that the CS reconstruction is more dependent on the resolution of the acquired data than MC, which might be explained by the fact that MC, as implemented here, does not incorporate any spatial correlation into the reconstruction process. Furthermore, reducing the resolution might reduce the sparsity of the images in appropriate transform domains, while this is one of the key ingredients for CS to work. Images from undersampled scans were reconstructed with MC, in which the chosen rank of the projection matrix influences the error. Here, the number of incorporated singular values was determined empirically in a simulation study: 4 singular values resulted in the smallest error after 100 iterations of the algorithm. Other sampling patterns, flip angle trains or anatomies will likely require new optimization of the projection matrix. In the current acquisition, 15% or 12.5% of the data was acquired with 6 or 8 fully sampled central k‐space lines for each image frame. Further tuning of the sampling pattern might improve the accuracy of the reconstructions or allow even shorter scan times. One should keep in mind, however, that the sampled k‐t lines are used to reconstruct the missing k‐t lines. Because higher undersampling factors result in shorter scan times, this reduces the risk of motion‐corrupted k‐space lines, but if there is still significant motion, this affects a larger percent of the acquired data. Therefore, care should be taken to find a balance between the scan time and the robustness of the reconstruction algorithm to motion. In this work, the projection matrix was constructed from the central k‐t lines of the measurement data. In Doneva et al,[42](#mrm27594-bib-0042){ref-type="ref"} it was shown that this type of projection matrix results in a more accurate reconstruction compared with a projection matrix constructed from randomly selected k‐t lines due to the lower SNR in the latter case. Other works have used the simulated MRF dictionary as calibration data, which would eliminate the need to fully sample the centers of k‐space.[41](#mrm27594-bib-0041){ref-type="ref"} Such an approach will probably show a steeper decay in normalized singular values due to the absence of noise and motion in the simulations (see Supporting Information Figure [S3](#mrm27594-sup-0001){ref-type="supplementary-material"}). The central k‐space based projection matrix, however, results in a smaller reconstruction error, indicating that the central k‐space approximates the rank of the measurement data better. Further work should investigate whether this approach could be advantageous in terms of mitigating motion artifacts. As an alternative approach to the method used in our work, in which a low‐rank constraint is added as a penalty term to the cost function, the low‐rank property of the unknown image series can be incorporated directly in the data fidelity term, transforming the minimization problem into a linear one, which may be beneficial in terms of computational costs.[41](#mrm27594-bib-0041){ref-type="ref"} It would be interesting to compare the accuracy of the 2 methods in future work. Although this study has shown the feasibility of using MR fingerprinting to characterize the relaxation times of different anatomical structures in the eye, eye motion can still be a limiting factor. The parameter maps presented in the results section show inhomogeneities in the vitreous body, which can be a result of different types of motion in the eye (see Supporting Information Figure [S4](#mrm27594-sup-0001){ref-type="supplementary-material"}). The presence of motion in combination with the long T~1~ of the vitreous body and the low sensitivity of the MRF train to these long values, make it challenging to accurately map the relaxation times in the vitreous body itself, as was shown in Figure [6](#mrm27594-fig-0006){ref-type="fig"}. Adopting a longer MRF train, as well as pattern optimization of the MRF train, might help to increase the encoding capability, but a longer time between the cued‐blinks will strongly increase the chance of blink‐induced artifacts. However, one should recognize from a clinical point‐of‐view that for almost all ocular conditions the vitreous body is not affected and, therefore, an accurate quantification of its T~1~ is clinically not relevant. Outer volume suppression pulses, applied immediately before the inversion pulse or during 0 flip angle phases in the MRF train, might offer a way to reduce the flow of fresh magnetization (caused by motion) coming from slices above and below the imaging slice or from the left and the right of the imaging field of view, during repetitions of the flip angle train. However, such an approach and its effect on the quality of the parameter maps has to be investigated further. The parameter maps corresponding to patient data showed a very large difference between tumor tissue and healthy vitreous body, suggesting that fully homogeneous regions of T~1~ in the vitreous body are not necessary for disease quantification and classification. Future work should investigate the extension of the current single slice approach to a 3D approach, such that the entire eye can be efficiently quantified from 1 scan. The measured relaxation times are different between volunteers, potentially explained by anatomical or other volunteer‐specific differences. Small differences in relaxation times were observed for different scans in the same volunteer, caused by motion artifacts that change from scan to scan, but overall they are consistent within each volunteer, which is important for the use of this technique in practice. Considering the large deviations in measured relaxation times between different studies, it will be interesting to compare the MRF technique to standard T~1~ and T~2~ mapping techniques on a patient‐specific basis, and in this way investigate the origin of deviations from mean values as well as compare the robustness to motion for the different techniques. It should be noted, however, that in Ma et al,[58](#mrm27594-bib-0058){ref-type="ref"} it was already observed that MRF values do not always agree perfectly with reference values from other techniques, and potential reasons for this need to be investigated. Parameter maps in the current study were not corrected for slice profile effects, but all experiments were performed using an RF pulse with a very high time‐bandwidth product, minimizing the effects as demonstrated in Ma et al.[58](#mrm27594-bib-0058){ref-type="ref"} The flip angle map, which is used as an input in the matching process, was produced with DREAM, in which the B~1~ ^+^ encoding slice thickness was set to be double the acquisition slice thickness to eliminate the slice profile effect.[51](#mrm27594-bib-0051){ref-type="ref"} Values for the optic nerve were not reported in this study because the optic nerve was not visible in all scans due to small differences in planning and anatomy, and the slice thickness of 5 mm makes the measured values in the optic nerve very sensitive to partial volume effects. These partial volume effects also complicate quantification of heterogeneous tumors. In particular, tumor relaxation values could become inaccurate due to averaging with the strong signal coming from the surrounding vitreous body. Planning the imaging slice through the tumor as well as through the center of the vitreous body, such that the imaging plane is perpendicular to the tangent along the retina, would help to reduce these effects. One limitation of the current study is the rather high slice thickness used (which is limited by the gradient strengths). With small changes in the sequence such as using a slightly longer echo time, acquisition and reconstruction of a 2‐mm‐thick slice is feasible (see Supporting Information Figure [S5](#mrm27594-sup-0001){ref-type="supplementary-material"}). The in‐plane resolution of 0.5 mm is satisfactory for tumor quantification and classification, as well as visualizing small structures such as the sclera and the ciliary body. The results in this study show the potential to perform ocular MRF in tumor patients. To adopt ocular MRF in clinics, the technique could be further tailored to quantify specifically the relevant T~1~ and T~2~ values of tumors. Extensions to multislice or 3D acquisitions could be developed such that the whole tumor volume can be covered and quantified. Further studies should investigate which clinical applications will benefit from ocular MRF and in that way explore the clinical relevance of the technique. In conclusion, the high undersampling factors used for this Cartesian, nonparallel imaging‐based approach shorten scan time and in this way reduce the risk of motion artifacts, which is most relevant for elderly patients, who typically experience difficulties focusing on a fixation target. Supporting information ====================== ###### **FIGURE S1** The effect of the undersampling factor on the performance of different reconstruction methods. Undersampled data sets were obtained by subsampling a fully sampled data set, while fixing the number of central k‐space lines to six for all undersampling factors. For larger undersampling factors, MC outperforms 2D and 3D CS. For undersampling factors smaller than three, MC has a slightly higher error compared to 3D CS. Overall, the error appears to be less affected by the undersampling factor for MC compared to the other reconstruction methods. Error measures are defined according to Equation 5 **FIGURE S2** The parameter maps in all healthy volunteers for high resolution scans. Parameter maps obtained in six healthy volunteers are shown in (a)‐(f), respectively. The CS 3D reconstruction performs better for the high resolution scans than for the low resolution scans, but the parameter maps still show loss of detail compared to the maps obtained from the undersampled scan after an MC‐based reconstruction, with examples indicated by the white circles. Fully sampled reference scans were not obtained due to the long scan time required. A zoomed‐in version of the MC result in volunteer 1 is shown in (g), and repeated in (h) with a different color scale **FIGURE S3** Comparison of 2 different projection matrices. (a) The normalized singular value vector of the simulated MRF dictionary shows a steeper decay compared to the normalized singular vector of the central k‐space data. (b) The reconstruction error (defined as in Equation 5) as a function of the n most significant left singular values, is smaller when using the central k‐space as calibration data. A rank 3‐4 projection matrix results in the smallest reconstruction error when using the central k‐space data **FIGURE S4** The effect of motion on the parameter maps. (a) Motion was simulated by randomly replacing 1 of the 12 acquired k‐space lines in each MRF frame by (type 1) its phase‐modulated version with a random phase shift between 0 and 2π, mimicking in‐plane rigid body motion and (type 2) white gaussian noise (matching the maximum intensity of the replaced k‐space line), representing the worst case scenario of a completely corrupted signal. For motion type 1 larger differences are visible in the vitreous body. Motion type 2 results in noise break‐through in the parameter maps. For both types of motion, less than 6% change in T~1~ was observed in the vitreous body, while the T~2~ of the eye lens was changed by more than 20%, underlining the nonlinear effect of motion on the parameter maps. (b) The singular values of the calibration data show a less steep decay when k‐space lines are corrupted by motion **FIGURE S5** Parameter maps obtained from a thinner slice. By increasing the echo time from 3.5 ms to 4.6 ms, a slice of 2 mm can be acquired, spatial resolution 1×1×2 mm^3^. With this slice thickness the resulting parameter maps are less susceptible to partial volume effects, but slightly more noise is present in the maps due to the reduced SNR in the MRF images ###### Click here for additional data file. The authors thank Mariya Doneva for helpful discussions on reconstruction, and Thomas O'Reilly and Luc van Vught for useful insights during data acquisition.
{ "pile_set_name": "PubMed Central" }
Story highlights Toys "R" Us Canada is searching for a new chief play officer Alex Thorne, 13, is stepping down (CNN) Retirement isn't usually part of a growing child's life, but Alex Thorne's life is far from ordinary. Come December 31, Alex will not only be celebrating his 14th birthday, he's stepping down from his position as chief play officer for Toys "R" Us Canada. Alex, of Pickering, Ontario, became the fourth kid to take the job of CPO after winning a competition in 2013 organized by the Canadian division of the toy company. During his tenure, Alex has played with "hundreds and hundreds" of toys, deciding what's hot and what's not in toys targeting all age groups and genders. Alex Thorne has held the tough job of chief play officer for Toys "R" Us Canada. "There are some toys I test that are really for toddlers so, personally, they don't appeal to me. But I can definitely see how I would like them if I was younger," he said. Read More
{ "pile_set_name": "OpenWebText2" }
var config = { type: Phaser.AUTO, parent: 'phaser-example', width: 800, height: 600, scene: { create: create }, }; var game = new Phaser.Game(config); function create() { var graphics = this.add.graphics(); drawStar(graphics, 100, 300, 4, 50, 50 / 2, 0xffff00, 0xff0000); drawStar(graphics, 400, 300, 5, 100, 100 / 2, 0xffff00, 0xff0000); drawStar(graphics, 700, 300, 6, 50, 50 / 2, 0xffff00, 0xff0000); } function drawStar (graphics, cx, cy, spikes, outerRadius, innerRadius, color, lineColor) { var rot = Math.PI / 2 * 3; var x = cx; var y = cy; var step = Math.PI / spikes; graphics.lineStyle(4, lineColor, 1); graphics.fillStyle(color, 1); graphics.beginPath(); graphics.moveTo(cx, cy - outerRadius); for (i = 0; i < spikes; i++) { x = cx + Math.cos(rot) * outerRadius; y = cy + Math.sin(rot) * outerRadius; graphics.lineTo(x, y); rot += step; x = cx + Math.cos(rot) * innerRadius; y = cy + Math.sin(rot) * innerRadius; graphics.lineTo(x, y); rot += step; } graphics.lineTo(cx, cy - outerRadius); graphics.closePath(); graphics.fillPath(); graphics.strokePath(); }
{ "pile_set_name": "Github" }
My Hero Academia Season 2- Episode 18 After last weeks episode, I was really curious what they had in store for us this week. How the heroes will come back to Earth after such a traumatic experience. And good thing for us, this episode is rightly named “The Aftermath of Hero Killer: Stain”. My Hero Academia- Funimation We open with Izuku, Iida, and Todoroki all in the hospital. They are all recovering from their tremendous fight. But also reflecting how lucky they are to be alive still. The door opens and we see Gran Torino and Pro Hero Manual. First thing Gran Torino does of course is scold Midoriya. But before Gran Torino goes full instructor on him, he tells the boys that they have a visitor. My Hero Academia- Funimation A tall figure turns the corner wearing a professional business suit. It’s Hosu’s chief of police, Kenji Tsuragamae. Who also happens to look like a dog (just go along with it I guess?). Kenji tells the boys that Stain is in custody and is being treated for several broken bones and serious burns. He also reminds them that what they have done was not okay on paper. Uncertified heroes using their Quirks against their instructors orders is highly frowned upon. But Todoroki is not taking it. He tells the chief that if Iida didn’t step in, then Pro Hero Native would have been killed. And the both of them would have been killed without Izuku’s help. But Gran Torino tells Todoroki to hear the chief out. Kenji tells them that the punishment would only happen if this was made public. And the people would applaud their efforts anyway. But if the police kept it quiet, no one gets punished, but the boys don’t get the praise they deserve. Instead Endeavor will get the praise from the masses. It would also explain Stain’s burn scars. So they choose to not be celebrated as heroes and apologize anyways. But Kenji tells them he respects what they did and he thanks them for protecting the peace. So it has hit the news that Endeavor has stopped hero killer Stain and the nomus from destroying Hosu City. It’s all anyone is talking about. Meanwhile, we get a look at how everyone else from Class 1-A is doing in their internship programs. First we look at Bakugo who is having a less than stellar time. The first thing he wants to do is go knock some heads around but his mentor is not allowing him and says it will be business as usual. Hopefully that could help Bakugo control his temper. Kirishima finds out the reason why Midoriya sent him his location. Apparently he also reported the incident last night. Go Kirishima! Momo debuted in a commercial with her mentor and it seems obvious modelling is not what she wants to be doing. But her mentor is letting her go on patrol like she has wanted since the start of their training together. My Hero Academia- Funimation And finally there is Uraraka who is on the phone with Midoriya. She tells him how glad she is that they are all safe. Midoriya of course apologizes for not contacting sooner but she understands. In the midst of the conversation, Uraraka’s mentor Gunhead reminds her that they are going to start their basic training. She then says bye to Midoriya and Gunhead asks in a very cute way, “Your boyfriend?”. And she immediately dismisses it. When Midoriya hangs up he gets all worked up that he talked to a girl on the phone. This scene was my favorite from this episode it had me busting up! We get back to the guys in the hospital and Iida comes out and tells the two that he may have long-term damage in his hand. But he reflects on his actions from that night and regrets them greatly. He shouldn’t have acted so swiftly and carelessly. But Midoriya doesn’t let Iida beat himself up too much. He agrees that him and Iida should get stronger together. My Hero Academia- Funimation We cut to U.A. with All Might in the staff room. He gets a phone call from Gran Torino. He tells All Might that he has had his teaching licence revoked for six months because of Midoriya’s actions but there was no way of avoiding that and that he has come to terms with it. But All Might is very ashamed of himself for letting down his former instructor. But this isn’t the reason Gran Torino called. He really wants to talk about Stain. He says in the few minutes he was with him, it had him trembling. It was because of how intimidating and obsessed he was on what he think a hero should be and what he will do to correct our society. Because this has hit so many news stations, Stains ideology and opinions will be put on blast. People will become influenced by Stain’s beliefs and become a plague. But All Might doesn’t believe it will be a problem because they will probably show up sporadically and they will be taken out 1 by 1. But this is where the League of Villains comes in. If they all combine their hatred and Shigaraki gives them an outlet to express and deal with their evil intentions, it will become a serious problem. Gran Torino then reminds All Might that he must tell Midoriya properly what is concerning him and One for All. Which I have no idea what that is all about. Apparently the quirk is “on the move”? I’m interested in what that might mean. This episode was mostly a lot of dialogue and context but it was needed after such a shift in the story. It was refreshing getting some insight on how everyone else is doing too. I’m hoping next time they elaborate on what is concerning All Might and what is happening with his quirk? Only time will tell.
{ "pile_set_name": "Pile-CC" }
This invention relates to a metal-cutting milling tool. Such tools are known that comprise a body rotatable around a central geometric axis, which body has a peripheral envelope surface extending between opposite end surfaces. In the envelope surface, recesses are provided which open outwards, each recess defined by a front wall, a rear wall and a bottom wall and has the purpose of receiving a machining element (e.g., a cassette which carries a cutting insert) as well as at least one clamping wedge arranged in the recess for fixing the machining element in place. The clamping wedge can be tightened by means of a clamping screw which enters a threaded hole formed in the bottom wall of the recess. The rear wall of the recess has first serrations arranged to co-operate with second serrations disposed on a rear side of the machining element, while the front wall is smooth in order to cooperate with a similar smooth front surface on the clamping wedge. A contact surface on the clamping wedge and a front contact surface on the machining element are both smooth in order to allow a substantially radial displacement of the clamping wedge in relation to the machining element during the clamping thereof.
{ "pile_set_name": "USPTO Backgrounds" }
The Effects of Event Rate on a Cognitive Vigilance Task. The present experiment sought to examine the effects of event rate on a cognitive vigilance task. Vigilance, or the ability to sustain attention, is an integral component of human factors research. Vigilance task difficulty has previously been manipulated through increasing event rate. However, most research in this paradigm has utilized a sensory-based task, whereas little work has focused on these effects in relation to a cognitive-based task. In sum, 84 participants completed a cognitive vigilance task that contained either 24 events per minute (low event rate condition) or 40 events per minute (high event rate condition). Performance was measured through the proportion of hits, false alarms, mean response time, and signal detection analyses (i.e., sensitivity and response bias). Additionally, measures of perceived workload and stress were collected. The results indicated that event rate significantly affected performance, such that participants who completed the low event rate task achieved significantly better performance in terms of correction detections and false alarms. Furthermore, the cognitive vigil utilized in the present study produced performance decrements comparable to traditional sensory vigilance tasks. Event rate affects cognitive vigilance tasks in a similar manner as traditional sensory vigilance tasks, such that a direct relation between performance and level of event rate was established. Cognitive researchers wishing to manipulate task difficulty in their experiments may use event rate presentation as one avenue to achieve this result.
{ "pile_set_name": "PubMed Abstracts" }
Located on the Kefalonia Island in Greece, this spectacular cave was lost for centuries until being rediscovered in 1951 by Giannis Petrocheilos. Take a look at this beautiful cave system and the island that it is part of. The famous Mytros Beach is also on this island. In Greek mythology it is believed that Nymph's used to live in these caves.
{ "pile_set_name": "Pile-CC" }
Vale de Lua – Moon Surface on Earth The valley terrain is all covered with rock formations and intricate labyrinths created by nature. In ancient times, there were deposits of quartz. But the noisy river San Miguel has streamed lots of passages over the years. Now, quartz rocks hang over the pond and the holes of different shapes remind those seen on the moon. Due to the different degrees of refraction of light water in some places seems to be dark blue, in other - clear and transparent. Dark brown and almost black, sometimes bluish-gray rocks vary in height and shape. Such miracle undoubtedly shows that the forces of nature are capable of creating the most unusual landscapes. In Brazil, Vale de Lua unusual relief appeared also due to the presence of sand. Gradually, layer after layer, it was brought there with river’s stream, settled on the coastal cliffs and formed numerous mounds an unusual shape. If looking a little closer you will notice that in some places the quartz rock thinned to such an extent that its thickness does not exceed the thickness of a sheet of paper. The magnificent landscape of small lakes is completed with waterfalls.
{ "pile_set_name": "Pile-CC" }
United States Court of Appeals For the Eighth Circuit ___________________________ No. 12-3842 ___________________________ Barbara Hager lllllllllllllllllllll Plaintiff - Appellee v. Arkansas Department of Health; Namvar Zohoori, individually and in his official capacity lllllllllllllllllllll Defendants - Appellants ____________ Appeal from United States District Court for the Eastern District of Arkansas - Little Rock ____________ Submitted: September 24, 2013 Filed: November 14, 2013 ____________ Before LOKEN, COLLOTON, and BENTON, Circuit Judges. ____________ BENTON, Circuit Judge. Barbara Hager was fired from the Arkansas Department of Health by her supervisor, Dr. Namvar Zohoori. Hager sued Dr. Zohoori and the Department for statutory and constitutional violations. The district court granted, in part, their motion to dismiss. They appeal. Having jurisdiction under 28 U.S.C. § 1291 over Dr. Zohoori’s appeal, this court reverses and remands. I. Hager claims that in May 2011, her branch chief and supervisor, Dr. Zohoori, instructed her to cancel a doctor’s appointment (necessary, she says, to prevent cataracts) in order to discuss a report. When she refused, she alleges Dr. Zohoori became irritated and falsely claimed she was insubordinate and disrespectful. Four days later, he terminated her without explanation. Hager sued Dr. Zohoori, in his individual and official capacities, and the Department alleging violations of Title VII of the Civil Rights Act of 1964, the Equal Protection and Due Process Clauses of the Constitution (§ 1983 claim), the Age Discrimination and Employment Act, the Rehabilitation Act, and the Family and Medical Leave Act (FMLA). Dr. Zohoori and the Department moved to dismiss for failure to state a claim and sovereign immunity. The district court denied their motion in part, allowing three claims against Dr. Zohoori in his individual capacity (§ 1983 gender discrimination, FMLA “interference,” and FMLA “retaliation”) and two claims against the Department (Title VII and Rehabilitation Act). They appeal. II. Hager objects to this court’s jurisdiction over Dr. Zohoori’s appeal, arguing it turns on issues of factual sufficiency. A denial of qualified immunity is an appealable “final decision” only “to the extent it turns on an issue of law.” Mitchell v. Forsyth, 472 U.S. 511, 530 (1985). Hager relies on cases reviewing a denial of summary judgment based on qualified immunity. See Johnson v. Jones, 515 U.S. 304, 313-14 (1995) (holding that where a district court’s summary judgment order on qualified immunity turns on the issue of evidence sufficiency—“which facts a party may, or -2- may not, be able to prove at trial”—the order is not appealable); Powell v. Johnson, 405 F.3d 652, 654-55 (8th Cir. 2005). In Ashcroft v. Iqbal, the Supreme Court determined the jurisdiction of a court of appeals in a case like Hager’s—denial of a motion to dismiss based on qualified immunity: As a general matter, the collateral-order doctrine may have expanded beyond the limits dictated by its internal logic and the strict application of the criteria set out in Cohen. But the applicability of the doctrine in the context of qualified-immunity claims is well established; and this Court has been careful to say that a district court’s order rejecting qualified immunity at the motion-to-dismiss stage of a proceeding is a “final decision” within the meaning of § 1291. Behrens, 516 U.S., at 307, 116 S. Ct. 834. Applying these principles, we conclude that the Court of Appeals had jurisdiction to hear petitioners’ appeal. The District Court’s order denying petitioners’ motion to dismiss turned on an issue of law and rejected the defense of qualified immunity. It was therefore a final decision “subject to immediate appeal.” Ibid. Respondent says that “a qualified immunity appeal based solely on the complaint’s failure to state a claim, and not on the ultimate issues relevant to the qualified immunity defense itself, is not a proper subject of interlocutory jurisdiction.” Brief for Respondent Iqbal 15 (hereinafter Iqbal Brief). In other words, respondent contends the Court of Appeals had jurisdiction to determine whether his complaint avers a clearly established constitutional violation but that it lacked jurisdiction to pass on the sufficiency of his pleadings. Our opinions, however, make clear that appellate jurisdiction is not so strictly confined. Iqbal, 556 U.S. 662, 672-73 (2009). -3- Here, Dr. Zohoori challenges the sufficiency of Hager’s pleadings to state § 1983, FMLA “interference,” and FMLA “retaliation” claims. This is an issue of law over which this court has jurisdiction. See id. at 672-74; Bradford v. Huckabee, 394 F.3d 1012, 1015 (8th Cir. 2005). See also Rondigo, L.L.C. v. Township of Richmond, 641 F.3d 673, 679 (6th Cir. 2011). III. This court reviews de novo the denial of a motion to dismiss on the basis of qualified immunity. Bradford, 394 F.3d at 1015. A complaint must “state a claim to relief that is plausible on its face.” Bell Atlantic Corp. v. Twombly, 550 U.S. 544, 570 (2007). Under Federal Rule of Civil Procedure 12(b)(6), the factual allegations in the complaint are accepted as true and viewed most favorably to the plaintiff. Gross v. Weber, 186 F.3d 1089, 1090 (8th Cir. 1999). Courts must not presume the truth of legal conclusions couched as factual allegations. Papasan v. Allain, 478 U.S. 265, 286 (1986). Courts should dismiss complaints based on “labels and conclusions, and a formulaic recitation of the elements of a cause of action.” Twombly, 550 U.S. at 555. Under the doctrine of qualified immunity, a court must dismiss a complaint against a government official in his individual capacity that fails to state a claim for violation of “clearly established statutory or constitutional rights of which a reasonable person would have known.” Harlow v. Fitzgerald, 457 U.S. 800, 818 (1982). See also Iqbal, 556 U.S. at 685; Mitchell, 472 U.S. at 526 (“Unless the plaintiff’s allegations state a claim of violation of clearly established law, a defendant pleading qualified immunity is entitled to dismissal before the commencement of discovery.”). A court considers whether the plaintiff has stated a plausible claim for violation of a constitutional or statutory right and whether the right was clearly established at the time of the alleged infraction. Powell, 405 F.3d at 654-55. See Pearson v. Callahan, 555 U.S. 223, 236 (2009) (“[D]istrict courts and the courts of -4- appeals should be permitted to exercise their sound discretion in deciding which of the two prongs of the qualified immunity analysis should be addressed first in light of the circumstances in the particular case at hand.”). A. The § 1983 claim against Dr. Zohoori individually (Count I) alleges that Hager was “a victim of gender discrimination . . . and has been denied her right of equal protection of the law and due process of the law.” Specifically, she contends she “was discharged under circumstances summarily [sic] situated nondisabled males . . . were not.” “[T]he Equal Protection Clause requires that the government treat such similarly situated persons alike.” Keevan v. Smith, 100 F.3d 644, 648 (8th Cir. 1996), citing City of Cleburne v. Cleburne Living Ctr., Inc., 473 U.S. 432, 439 (1985); Klinger v. Department of Corrs., 31 F.3d 727, 731 (8th Cir. 1994). Absent evidence of direct discrimination, courts apply the McDonnell Douglas burden- shifting analysis to claims of employment discrimination under the Equal Protection Clause. Lockridge v. Board of Trs. of Univ. of Arkansas, 315 F.3d 1005, 1010 (8th Cir. 2003) (en banc). Under McDonnell Douglas, a prima facie case of discrimination requires that a plaintiff prove: “(1) membership in a protected group; (2) qualification for the job in question; (3) an adverse employment action; and (4) circumstances that support an inference of discrimination.” Swierkiewicz v. Sorema N. A., 534 U.S. 506, 510 (2002), citing McDonnell Douglas Corp. v. Green, 411 U.S. 792, 801 (1973). Dr. Zohoori argues that Hager does not state a § 1983 claim for gender discrimination because her allegation—that she “was discharged under circumstances summarily [sic] situated nondisabled males, younger people, or those that did not require leave or accommodation were not”—is a legal conclusion. Hager contends -5- her “similarly situated” allegation is sufficient because McDonnell Douglas is “an evidentiary standard, not a pleading requirement.” Swierkiewicz, 534 U.S. at 510; Ring v. First Interstate Mortg., 984 F.2d 924, 926 (8th Cir. 1993). Under Swierkiewicz, a plaintiff need not plead facts establishing a prima facie case of discrimination under McDonnell Douglas in order to defeat a motion to dismiss. Swierkiewicz, 534 U.S. at 510-11. The complaint “must contain only ‘a short and plain statement of the claim showing the pleader is entitled to relief.’” Id. at 508. “Such a statement must simply ‘give the defendant fair notice of what the plaintiff’s claim is and the grounds upon which it rests.’” Id. at 512, citing Conley v. Gibson, 355 U.S. 41, 47 (1957). In Twombly, the Supreme Court stated that Swierkiewicz did not change the law of pleading. Twombly, 550 U.S. at 569. Rather, courts need “not require heightened fact pleading of specifics, but only enough facts to state a claim to relief that is plausible on its face.” Id. at 570. “[L]egal conclusions can provide the framework of a complaint” but “must be supported by factual allegations,” Iqbal, 556 U.S. at 679, that “raise a right to relief above the speculative level.” Twombly, 550 U.S. at 555. Thus, this court applies “the ordinary rules for assessing the sufficiency of a complaint,” Swierkiewicz, 534 U.S. at 511, to consider whether Hager states a § 1983 claim for gender discrimination. See Twombly, 550 U.S. at 570. Hager relies primarily on Swierkiewicz. However, her complaint has far fewer factual allegations than the complaint there. In Swierkiewicz, the complaint for age and nationality discrimination alleged: the plaintiff was demoted and replaced by a younger employee of the employer’s nationality; the replacement was inexperienced; in promoting the younger, inexperienced employee, the employer wanted to “energize” the department; the employer excluded and isolated plaintiff from business decisions and meetings; plaintiff sent a memo outlining his grievances and tried to -6- meet with the employer to discuss his discontent; and plaintiff was fired. Swierkiewicz, 534 U.S. at 508-09. Hager makes only two conclusory allegations of gender discrimination: (1) she “is a victim of gender discrimination;” and (2) she “was discharged under circumstances summarily [sic] situated nondisabled males . . . were not.” She does not allege any gender-related comments or conduct before her termination. See Rondigo, 641 F.3d at 682 (granting qualified immunity in part because the complaint contained no allegations of gender-based discriminatory actions). She also does not allege facts showing that similarly situated employees were treated differently. See Coleman v. Maryland Court of Appeals, 626 F.3d 187, 190-91 (4th Cir. 2010) (plaintiff’s conclusory allegation that he “was treated differently as a result of his race than whites”—even where plaintiff identified an alleged comparator—was insufficient to sustain a Title VII claim because no factual allegations plausibly suggested the comparator was similarly situated). See also Keevan, 100 F.3d at 648 (“To establish a gender-based claim under the Equal Protection Clause, the appellants must, as a threshold matter, demonstrate that they have been treated differently by a state actor than others who are similarly situated simply because appellants belong to a particular protected class.”). In sum, Hager does not state a § 1983 claim for gender discrimination. Hager’s allegation that she is the victim of gender discrimination fails to give Dr. Zohoori fair notice of the claim and the grounds upon which it rests. See Swierkiewicz, 534 U.S. at 512. Hager’s conclusory assertion that she was discharged under circumstances similarly situated men were not imports legal language couched as a factual allegation and fails to raise a right to relief above the speculative level. See Twombly, 550 U.S. at 555. The district court erred in denying Dr. Zohoori’s motion to dismiss the § 1983 claim. -7- B. Hager alleges a claim for “interfering with exercise of Plaintiff’s rights under the FMLA.” Under the categorization in Pulczinski v. Trinity Structural Towers, Inc., 691 F.3d 996 (8th Cir. 2012), Hager’s “interference” claim is an entitlement claim. Pulczinski, 691 F.3d at 1005-06. “The FMLA entitles an employee to twelve workweeks of leave during any twelve-month period if he or she has a ‘serious health condition that makes the employee unable to perform the functions of the position of such employee.’” Sisk v. Picture People, Inc., 669 F.3d 896, 899 (8th Cir. 2012), quoting Wierman v. Casey’s Gen. Stores, 638 F.3d 984, 999 (8th Cir. 2011), quoting 29 U.S.C. § 2612(a)(1)(D). An FMLA entitlement claim arises when an employer denies or interferes with an employee’s substantive FMLA rights. Scobey v. Nucor Steel-Arkansas, 580 F.3d 781, 785 (8th Cir. 2009). An employee seeking FMLA leave must give the employer notice of the need for leave and indicate when she anticipates returning to work. Id. at 785-86. See also Rynders v. Williams, 650 F.3d 1188, 1196-97 (8th Cir. 2011) (plaintiff must prove she gave timely notice to defendant himself). Although the notice need not specifically invoke the FMLA, an employee “must provide information to suggest that [her] health condition could be serious.” Scobey, 580 F.3d at 786. When the leave is foreseeable, the employee must give at least thirty days notice. 29 C.F.R. § 825.302. When the leave is not foreseeable, “an employee must provide notice to the employer as soon as practicable under the facts and circumstances of the particular case.” 29 C.F.R. § 825.303. Hager alleges that she “saw a physician regularly for her cataracts,” but “[o]n May 13, 2011, [Dr. Zohoori] instructed her to cancel the doctor’s appointment so she and he could discuss a report.” She also avers that she explained “the reason she needed to go to the doctor,” that “she could not cancel the appointment,” and why she could not cancel. These allegations do not state an FMLA entitlement claim. While -8- Hager alleges that she provided information suggesting a serious health condition, she does not allege that she provided timely notice. Hager’s pleadings at best suggest Dr. Zohoori was aware of her leave request immediately prior to the appointment. They do not assert that she provided notice within thirty days or “as soon as practicable under the circumstances.” Nor do they assert that she indicated when she would return. See generally Bosley v. Cargill Meat Solutions Corp., 705 F.3d 777, 780 (8th Cir. 2013) (there is a “rigorous notice standard for employees seeking to use FMLA leave for absences”). The district court erred in denying Dr. Zohoori’s motion to dismiss the FMLA entitlement claim. C. Hager also alleges a claim for “retaliating against her.” Under the categorization in Pulczinski, Hager’s “retaliation” claim is a discrimination claim. Pulczinski, 691 F.3d at 1006. In a discrimination claim, “the employee alleges that the employer discriminated against her for exercising her FMLA rights.” Sisk, 669 F.3d at 899, quoting Wierman, 638 F.3d at 999. Absent direct evidence, an FMLA discrimination claim is analyzed under the McDonnell Douglas burden-shifting framework. Sisk, 669 F.3d at 899. The plaintiff must “show that she exercised rights afforded by the Act, that she suffered an adverse employment action, and that there was a causal connection between her exercise of rights and the adverse employment action.” Phillips v. Mathews, 547 F.3d 905, 912 (8th Cir. 2008), quoting Smith v. Allen Health Sys., Inc., 302 F.3d 827, 832 (8th Cir. 2002). This is an evidentiary, not a pleading, standard. Swierkiewicz, 534 U.S. at 510. Hager alleges that Dr. Zohoori discriminated against her—firing her—because she exercised her FMLA rights—tried to take leave for a doctor’s appointment, which was “necessary to insure that [her] condition did not develop into a serious health -9- condition, cataracts.” If Hager had properly alleged notice, these allegations would be sufficient. See Wehrley v. American Family Mut. Ins. Co., 513 Fed. Appx. 733, 742 (10th Cir. 2013) (“Three other circuits have concluded that notifying an employer of the intent to take FMLA leave is protected activity. . . . We are persuaded to follow these circuits.”), citing Pereda v. Brookdale Senior Living Communities, Inc., 666 F.3d 1269, 1276 (11th Cir. 2012); Erdman v. Nationwide Ins. Co., 582 F.3d 500, 509 (3d Cir. 2009); Skrjanc v. Great Lakes Power Serv. Co., 272 F.3d 309, 314 (6th Cir. 2001). However, because Hager failed to plead notice of intent to take FMLA leave, and that she was qualified for that leave, she has not sufficiently alleged that she exercised FMLA rights. See Nicholson v. Pulte Homes Corp., 690 F.3d 819, 828 (7th Cir. 2012) (“The district court held that because Nicholson did not provide sufficient notice of the need for FMLA-qualifying leave, she never engaged in any activity protected by the FMLA. For the reasons we have explained, we agree.”). The district court erred in denying Dr. Zohoori’s motion to dismiss the FMLA discrimination claim. IV. Although Hager did not move to amend the complaint in the district court—where the relevant pleadings were found sufficient—she requests remand to allow an amended complaint for any claims insufficiently pled. Hager should be no worse off, and no better off, than she would have been if the district court had granted the motion to dismiss. See Horras v. American Capital Strategies, Ltd., 729 F.3d 798, 804-05 (8th Cir. 2013) (evaluating standards applicable to post-judgment motions). This court remands for the district court to consider whether to allow Hager to amend her pleadings. See Zenith Radio Corp. v. Hazeltine Research, Inc., 401 U.S. 321, 330 (1971) (granting leave to amend is within the discretion of the district court). -10- V. The Arkansas Department of Health requests that this court exercise its pendent appellate jurisdiction to review the district court’s partial denial of its motion to dismiss. See Langford v. Norris, 614 F.3d 445, 457 (8th Cir. 2010) (“[W]hen an interlocutory appeal is before us . . . as to the defense of qualified immunity, we have jurisdiction also to decide closely related issues of law, i.e., pendent appellate claims.”) (internal quotation marks omitted), quoting Kincade v. City of Blue Springs, Mo., 64 F.3d 389, 394 (8th Cir. 1995). The Department maintains that Hager’s claims against it are inextricably intertwined with her claims against Dr. Zohoori. The Department reasons that if Hager’s “similarly situated” allegation does not sustain her § 1983 and FMLA discrimination claims against Dr. Zohoori, it cannot sustain her Title VII and Rehabilitation Act claims against the Department. “[A] pendent appellate claim can be regarded as inextricably intertwined with a properly reviewable claim on collateral appeal only if the pendent claim is coterminous with, or subsumed in, the claim before the court on interlocutory appeal—that is, when the appellate resolution of the collateral appeal necessarily resolves the pendent claim as well.” Kincade, 64 F.3d at 394, quoting Moore v. City of Wynnewood, 57 F.3d 924, 930 (10th Cir. 1995). See also Lockridge, 315 F.3d at 1012. Here, resolution of the “similarly situated” issue may illuminate the Department’s argument that Hager failed to state a claim against it. However, the Department’s claims are not coterminous with or subsumed in Dr. Zohoori’s claims. Hager sues under different statutes, and the Department cannot invoke qualified immunity. This court does not have jurisdiction to hear the Department’s appeal. ******* -11- The denial of Dr. Zohoori’s motion to dismiss the § 1983 claim, the FMLA entitlement claim, and the FMLA discrimination claim is reversed. This case is remanded for proceedings consistent with this opinion. ______________________________ -12-
{ "pile_set_name": "FreeLaw" }
British scientists have identified a way in which Salmonella, the bacteria that cause typhoid fever and gastroenteritis, inactivate immune defenses in human cells. One way in which human cells fight off infections is by engulfing the smaller bacterial cells and then attacking them with toxic enzymes contained in small packets called lysosomes. Lysosomes constantly need to be replenished with fresh enzymes that are generated from a factory within human cells. These enzymes are carried from the factory along a dedicated transport pathway. After dropping off new enzymes at lysosomes, the transport carriers are sent back to the factory to pick up new enzymes. A study, published in the journal Science, shows that Salmonella protects itself from this attack by depleting the supply of toxic enzymes. The researchers found that after Salmonella bacteria have been engulfed by the cell, but before they are killed, Salmonella injects a protein that prevents the cell from recycling the transport carriers between the factory and the lysosome. This means that Salmonella effectively cuts off the supply line of the enzymes that would otherwise kill it. As a result, the enzymes get re-routed out of the cell and the lysosomes lose their potency. Salmonella is then able to exploit the disarmed lysosomes by feeding off the nutrients they contain. “This seems to be a very effective way for these harmful bacteria to interfere with our cell’s defense mechanisms, and then exploit the defective lysosomes to their own benefit,” explained Prof David Holden of the Imperial College London’s Department of Medicine and MRC Center for Molecular Bacteriology and Infection, senior author of the study. “Our challenge now is to understand in greater detail how the injected Salmonella protein works at the molecular level, and to exploit our findings to develop more effective vaccines. This is especially important since many Salmonella strains are now resistant to antibiotics,” Prof Holden concluded. _______ Bibliographic information: Kieran McGourty et al. Salmonella Inhibits Retrograde Trafficking of Mannose-6-Phosphate Receptors and Lysosome Function. Science, vol. 338, no. 6109, pp. 963-967; doi: 10.1126/science.1227037
{ "pile_set_name": "OpenWebText2" }
Micro-Loan Program In order to promote economic development in the City of Alamo, the Alamo EDC established the Alamo Small Business Micro-Loan Program (MLP) with assistance from USDA – Rural Development. The MLP is a self-sustaining project that works by lending money to local businesses, with the money paid back plus interest being reused. The following documents must be submitted for a loan application: Application form. An executive summary with three years of financial projections. A project budget. A personal financial statement. Two years of income tax returns – business and/or personal (for the most current years). Year-end financial statement(s) from an existing organization. Balance sheet(s) (yearly). Profit and loss statement(s) (last quarter). A minimum of two bids from non-related third-party vendors/contractors. A credit report (to be conducted by AEDC), steps for loan process. Filling out the loan application: Must submit all documents to AEDC via mail or hand delivery. The AEDC begins the loan application review to determine eligibility. The applicant will be notified of eligibility status. If eligible, the loan application will be presented to the Loan Review Committee. A committee recommendation will be presented to the AEDC Board for final approval. The applicant will be notified of the board’s decision to approve or deny the loan application as well as loan-specific terms, when applicable.
{ "pile_set_name": "Pile-CC" }
Ability of MR cholangiography to reveal stent position and luminal diameter in patients with biliary endoprostheses: in vitro measurements and in vivo results in 30 patients. Our goal was to evaluate the ability of MR cholangiography to show stent position and luminal diameter in patients with biliary endoprostheses. Susceptibility artifacts were evaluated in vitro in three different stent systems (cobalt alloy-based, nitinol-based, and polyethylene) using two breath-hold sequences (rapid acquisition with relaxation enhancement, half-Fourier acquisition single-shot turbo spin echo) on a 1.5-T MR imaging system. The size of the stent-related artifact was measured, and the relative stent lumen was calculated. In vivo stent position and patency were determined in 30 patients (10 cobalt alloy-based stents, five nitinol-based stents, and 15 polyethylene stents). In vitro, the susceptibility artifact of the cobalt stent caused complete obliteration of the stent lumen. The relative stent lumens of the nitinol-based and polyethylene stents were 38-50% and 67-100%, respectively. In vivo, all stents were patent at the time of imaging. The position of the cobalt alloy-based stent could be determined in nine of 10 patients, but stent patency could not be evaluated. Stent position of nitinol stents could not be adequately evaluated in any of the five patients, and internal stent diameter could be visualized in only one patient. In nine of 15 patients, the fluid column within the implanted polyethylene stent was seen on MR cholangiography. The internal stent lumen could be visualized in most patients with an indwelling polyethylene stent, but not in patients with cobalt alloy- or nitinol-based stents.
{ "pile_set_name": "PubMed Abstracts" }
The Doom Generation (1995) October 25, 1995 FILM REVIEW;Gory Kitsch in a Parody of Teen-Age Road Movies By JANET MASLIN Published: October 25, 1995 Production notes for Gregg Araki's "Doom Generation" say it is "Araki's first big-budget feature and marks the end of his film adolescence." Well, not exactly. After a promising debut with "The Living End" followed by the angrier, more marginalized "Totally F***ed Up," Mr. Araki is still sounding a note of self-congratulatory teen-age rebellion in a film gruesome and obvious enough to make "Natural Born Killers" look like a model of restraint. It's not even much of a change to find "The Doom Generation" billed as "a heterosexual movie," since it shares the effective homoerotic energy of his earlier work. That this film includes a teen-age girl, Amy Blue (Rose McGowan), as part of its sexual menage only means one especially clear target of contempt ("Don't get your uterus all tied in a knot" is one of the more printable things anyone says to her) in a film overflowing with it. Amy's insolence and Anna Karina hairdo (like Uma Thurman's in "Pulp Fiction") may offer a touch of Godard. But this film's satire of teen-age-wasteland cinema is so coarsely exaggerated that any homage is beside the point. Using outlaw characters named Red, White and Blue to condemn all aspects of unhip America, Mr. Araki indulges in such broad parody that thinking it clumsy means failure to get the joke. Though visibly more polished than his earlier films, "The Doom Generation" clings to a midnight movie sensibility founded on deliberate kitsch. So Amy is a one-note, rude, sulky heroine, saying things like "Life is lonely, boring and dumb" while the two men she's sleeping with enjoy an obvious attraction to each other. Not content to leave this as subtext, Mr. Araki throws in the occasional bumper sticker: "Ditch the bitch. Make the switch." Voluptuous Xavier Red (Johnathon Schaech) is way ahead of charmingly dim Jordan White (James Duval) in getting the hint about this, but it doesn't matter: "The Doom Generation" leads them both to a gory demonstration of America's intolerance toward sexual nonconformists. Obscured by strobe lights and boosted by the alternative-rock soundtrack that's sure to help sell the movie, this already notorious castration sequence is one of several gross-out epiphanies here. Others include the severing of a head that still talks, and even vomits, after it is removed from a vein-spurting body, and a blink-of-the-eye cameo by Heidi Fleiss. The genuine enthusiasm Mr. Araki brings to this film's bedroom scenes, with their whimsical sets and jokey porn ambiance, is matched by the occasionally workable black humor in his screenplay. ("You murdered two people tonight. Doesn't that faze you at all?" "Yeah, I'm bummed. To the max.") But sledgehammer direction, heavy irony and the easiest imaginable targets hardly show talent off to good advantage. THE DOOM GENERATION Written, edited and directed by Gregg Araki; director of photography, Jim Fealy; music by the Jesus and Mary Chain, Nine Inch Nails, Showdive, Curve, Meat Beat Manifesto, Pizzicato Five, Cocteau Twins and others; production designer, Therese Deprez; produced by Andrea Sperling, Mr. Araki and Why Not Productions (France); released by Trimark Pictures. At the Angelika Film Center, Mercer and Houston Streets. Running time: 90 minutes. This film is not rated.
{ "pile_set_name": "Pile-CC" }
Rakestraw Rakestraw is a surname. Notable people with the surname include: Larry Rakestraw (born 1942), American football player Paulette Rakestraw (born 1967), American politician from the state of Georgia Wilbur Rakestraw (1928–2014), American racing driver W. Vincent Rakestraw (born 1940), Former Assistant Attorney General of the United States, Former Special Assistant to the Ambassador of India See also Rakestraw House, a historic home located near Garrett in Keyser Township, DeKalb County, Indiana. Category:English-language surnames
{ "pile_set_name": "Wikipedia (en)" }
Characterization of biofilm and encrustation on ureteric stents in vivo. To examine the relationship between encrustation and microbial biofilm formation on indwelling ureteric stents. Ureteric stents from 40 patients were examined for the presence of a microbial biofilm and encrustations. Bacteria in stent biofilms were isolated and identified. A profuse biofilm (> 10(4) c.f.u. cm-3) was identified on 11 (28%) stents. Enterococcus faecalis was the most common biofilm organism identified and Proteus spp. were not present. Encrustation was seen in 23 (58%) of stents and was not associated with the level of urinary calcium. The major risk factor for stent encrustation was the presence of urolithiasis. Importantly, there was no causative link between stent biofilm formation and encrustation. Both biofilm formation and encrustation increased with the duration of stenting. The results indicate that polyurethane is readily encrusted and colonized by bacteria in vivo despite antibiotic prophylaxis. Newer materials must be sought if effective long-term stenting is to be achieved.
{ "pile_set_name": "PubMed Abstracts" }
From typical sequences to typical genotypes. We demonstrate an application of a core notion of information theory, typical sequences and their related properties, to analysis of population genetic data. Based on the asymptotic equipartition property (AEP) for nonstationary discrete-time sources producing independent symbols, we introduce the concepts of typical genotypes and population entropy and cross entropy rate. We analyze three perspectives on typical genotypes: a set perspective on the interplay of typical sets of genotypes from two populations, a geometric perspective on their structure in high dimensional space, and a statistical learning perspective on the prospects of constructing typical-set based classifiers. In particular, we show that such classifiers have a surprising resilience to noise originating from small population samples, and highlight the potential for further links between inference and communication.
{ "pile_set_name": "PubMed Abstracts" }
It is a truism that modern cell phones feature a multitude of features that expand on the traditional cell phone functionality. For example, today cell phone users are able to use their phones to connect to the Internet, manage meetings, appointments, and other aspects of their every day lives, listen to music and watch videos, etc. In essence the cell phone—which began as a single-function communicator—has grown into a fully functioning multimedia device. However the fundamental function of a cell phone remains communication. It should be noted that cell phones are also sometimes referred to as mobile phones, which in the proper meaning of the word indicates that the user of that phone is mobile, and is supposedly always available for anyone who might want to contact him or her. The core functionality of mobile/cell phones has been basically the same since the first devices were made available to consumers. Although there has been a rapid expansion in the feature set of most cell phones, the core functionality has not seen a similar expansion. The reasons for the development discrepancy likely have to do with the fact that the core functionality is sufficient for most users and that there are not just that many ways of enhancing the person-to-person communication experience on a mobile device Arguably, the most important enhancement in the cell phone, at least as it relates to interpersonal communication, has been the development of the capability of sending short text messages from one phone to another. Otherwise, the main improvements in communications have been largely concerned with connectivity. For example, communications protocols such as infrared and Bluetooth have become de facto requirements for all but the most inexpensive phones. In addition advances have been made in connectivity to the Internet (for example) and now it is routine for users to be able to access their e-mail and browse the web via their phones. However, these improvements in connectivity, as welcome as they might be, do not expand on the one-to-one personal communication aspect of the phone. One thing that would be a leap forward in such communications would be the ability to quickly and easily assemble a multi-user communication session that is hardware independent and, further, does not require the user to purchase additional hardware. Although the prior art has provided multi-user communications in the form of, for example, conference calls—the present technology of conference calls is quite limiting to the user. For example, it is typically limited to a predetermined number of user connections (e.g., 5). Further, a start time must be communicated to each user so there is little opportunity for spontaneity. Further, adding more users to the session may be very difficult or impossible. Finally, the conference call will ultimately be limited to known users, i.e., those who are known to one of the participants and have been invited. Additionally, exchanging short messages between users is a time-delayed communication mode that typically involves a one-to-one communication. Even though some software providers have offered solutions that allow a user to send one short message to multiple participants, such is not the same as real time voice communication between these same users. Of course, such group messaging is a time-delayed communication mode too, in which at least one participant is always in a waiting position. Thus, this communication option also offers little in the way of spontaneity or flexibility to the user. As was mentioned previously, over the last few years several attempts have been made to enhance the communication options available to owners of mobile devices, for example infrared and Bluetooth have been added but they have been used so far mostly for communication with other devices, i.e. for data transfer—not for direct communication between users. Those of ordinary skill in the art will recognize that infrared is limited to communications over a relative short line-of-sight distance between potential communication partners. As a consequence, the infrared protocol has typically been implemented as a simple data exchange protocol which is useful, for example, in synchronizing data between a mobile phone and a personal computer. On the other hand, the Bluetooth protocol provides for the creation of networks, so called piconets, in which up to 255 participants can be combined, of which only 8 participants can be active simultaneously, these 8 participants consist of one so called “master” device and seven so-called “slave” or secondary devices. The master device controls the communication and assigns so-called “sendslots” to participants. Additionally, communications within a piconet are based on the client server principle, which imposes the restriction that the master (server) is needed for on-going communications. Thus, when a master device looses the connection the piconet ceases to exist until a new master is selected and re-establishes the piconet by starting the creation process at the beginning. Although a Bluetooth device can be registered in multiple piconets, it can only be registered as master in one piconet. Additionally, those of ordinary skill in the art will recognize that the term scatternet is often used to refer to a combination of up to 10 piconets in which each piconet is associated with a different identification frequency. However, the technical specifications of the Bluetooth communication protocol limit the functionality of that communication option. For example, those of ordinary skill in the art will recognize that a piconet can accommodate a maximum of 8 active participants. Further, a piconet will collapse if the server (master) looses the connection. Others have sought, with varying degrees of success, to deliver enhanced communication functionality despite the limitations of the Bluetooth protocol. For example, U.S. Pat. No. 6,674,995 teaches the creation of a virtual ball game that utilizes data that is passed between participants via Bluetooth, thereby delivering to them the illusion that they are playing a ball game. As another example, U.S. patent application No. 20020151320 describes a method of giving users in a user community additional functionality when using a software package in a community environment. That is, certain functions are provided to the users depending on the number of participants, with higher user numbers being associated with the unlocking of additional program functionality. However, these sorts of approaches are still fundamentally limited by the nature of the Bluetooth protocol. As an example of an alternative approach to the use of Bluetooth, consider U.S. patent application 2005/0063409 that teaches a method for allowing users to communicate across several scatternets. However, this invention utilizes multiple interconnected servers and is not suitable for users that wish to quickly arrange and participate in an ad hoc communications group. None of the prior art communication options, however, deliver a flexible way of communicating with an arbitrary number of individual users. In each case either the users are restricted by the technical limitations of the Bluetooth standard or the communication options necessary to create a group chat are too involved for the average user to accomplish. Note that for purposes of the instant disclosure, the term enhancement of the communication options will be taken to refer to any approach that allows a user to communicate with a mobile device in addition to the already existing communication options. Thus what is needed is a method that gives the user of a cell phone or users of mobile devices the ability to create multi-user communications on that device without a need for elaborate equipment configurations, planning, or installation and which is not bound by the technical limitations of a specific communication protocol. Preferably the method will extend an invitation to others to join a communications group and will automatically provide the appropriate software for use by new users who do not already have it. Preferably the method will use a commonly available wireless protocol such as Bluetooth or Wi-Fi. Accordingly it should now be recognized, as was recognized by the present inventors, that there exists, and has existed for some time, a very real need for a system and method that would address and solve the above-described problems. Before proceeding to a description of the present invention, however, it should be noted and remembered that the description of the invention which follows, together with the accompanying drawings, should not be construed as limiting the invention to the examples (or preferred embodiments) shown and described. This is so because those skilled in the art to which the invention pertains will be able to devise other forms of the invention within the ambit of the appended claims.
{ "pile_set_name": "USPTO Backgrounds" }
Udzungwa red colobus The Uzungwa red colobus (Piliocolobus gordonorum), also known as the Udzungwa red colobus or Iringa red colobus, is a species of primate in the family Cercopithecidae. It is endemic to riverine and montane forest in the Udzungwa Mountains in Tanzania. It is threatened by habitat loss. References Uzungwa red colobus Category:Endemic fauna of Tanzania Category:Mammals of Tanzania Category:Endangered fauna of Africa Uzungwa red colobus Category:Taxonomy articles created by Polbot Category:Primates of Africa
{ "pile_set_name": "Wikipedia (en)" }
Serial imaging and SWAN sequence of developmental venous anomaly thrombosis with hematoma: Diagnosis and follow-up. Developmental venous anomalies (DVAs) are usually asymptomatic. We report a case of DVA thrombosis with recurrent tiny frontal hematoma in a 24-year-old man. The contribution of T2-GRE and SWAN sequences are discussed. Follow-up attested complete recanalization after anticoagulation.
{ "pile_set_name": "PubMed Abstracts" }
Retro futuristic UI/Data design concept inspired by sci-fi movies and video games of the 80’s based off the Swiss grid system.
{ "pile_set_name": "OpenWebText2" }
--- abstract: 'The purpose of this article is to study the problem of finding sharp lower bounds for the norm of the product of polynomials in the ultraproducts of Banach spaces $(X_i)_{\mathfrak U}$. We show that, under certain hypotheses, there is a strong relation between this problem and the same problem for the spaces $X_i$.' address: 'IMAS-CONICET' author: - Jorge Tomás Rodríguez title: On the norm of products of polynomials on ultraproducts of Banach spaces --- Introduction ============ In this article we study the factor problem in the context of ultraproducts of Banach spaces. This problem can be stated as follows: for a Banach space $X$ over a field ${\mathbb K}$ (with ${\mathbb K}={\mathbb R}$ or ${\mathbb K}={\mathbb C}$) and natural numbers $k_1,\cdots, k_n$ find the optimal constant $M$ such that, given any set of continuous scalar polynomials $P_1,\cdots,P_n:X\rightarrow {\mathbb K}$, of degrees $k_1,\cdots,k_n$; the inequality $$\label{problema} M \Vert P_1 \cdots P_n\Vert \ge \, \Vert P_1 \Vert \cdots \Vert P_n \Vert$$ holds, where $\Vert P \Vert = \sup_{\Vert x \Vert_X=1} \vert P(x)\vert$. We also study a variant of the problem in which we require the polynomials to be homogeneous. Recall that a function $P:X\rightarrow {\mathbb K}$ is a continuous $k-$homogeneous polynomial if there is a continuous $k-$linear function $T:X^k\rightarrow {\mathbb K}$ for which $P(x)=T(x,\cdots,x)$. A function $Q:X\rightarrow {\mathbb K}$ is a continuous polynomial of degree $k$ if $Q=\sum_{l=0}^k Q_l$ with $Q_0$ a constant, $Q_l$ ($1\leq l \leq k$) an $l-$homogeneous polynomial and $Q_k \neq 0$ . The factor problem has been studied by several authors. In [@BST], C. Benítez, Y. Sarantopoulos and A. Tonge proved that, for continuous polynomials, inequality (\[problema\]) holds with constant $$M=\frac{(k_1+\cdots + k_n)^{(k_1+\cdots +k_n)}}{k_1^{k_1} \cdots k_n^{k_n}}$$ for any complex Banach space. The authors also showed that this is the best universal constant, since there are polynomials on $\ell_1$ for which equality prevails. For complex Hilbert spaces and homogeneous polynomials, D. Pinasco proved in [@P] that the optimal constant is $$\nonumber M=\sqrt{\frac{(k_1+\cdots + k_n)^{(k_1+\cdots +k_n)}}{k_1^{k_1} \cdots k_n^{k_n}}}.$$ This is a generalization of the result for linear functions obtained by Arias-de-Reyna in [@A]. In [@CPR], also for homogeneous polynomials, D. Carando, D. Pinasco and the author proved that for any complex $L_p(\mu)$ space, with $dim(L_p(\mu))\geq n$ and $1<p<2$, the optimal constant is $$\nonumber M=\sqrt[p]{\frac{(k_1+\cdots + k_n)^{(k_1+\cdots +k_n)}}{k_1^{k_1} \cdots k_n^{k_n}}}.$$ This article is partially motivated by the work of M. Lindström and R. A. Ryan in [@LR]. In that article they studied, among other things, a problem similar to (\[problema\]): finding the so called polarization constant of a Banach space. They found a relation between the polarization constant of the ultraproduct $(X_i)_{\mathfrak U}$ and the polarization constant of each of the spaces $X_i$. Our objective is to do an analogous analysis for our problem (\[problema\]). That is, to find a relation between the factor problem for the space $(X_i)_{\mathfrak U}$ and the factor problem for the spaces $X_i$. In Section 2 we give some basic definitions and results of ultraproducts needed for our discussion. In Section 3 we state and prove the main result of this paper, involving ultraproducts, and a similar result on biduals. Ultraproducts ============= We begin with some definitions, notations and basic results on filters, ultrafilters and ultraproducts. Most of the content presented in this section, as well as an exhaustive exposition on ultraproducts, can be found in Heinrich’s article [@H]. A filter ${\mathfrak U}$ on a family $I$ is a collection of non empty subsets of $I$ closed by finite intersections and inclusions. An ultrafilter is maximal filter. In order to define the ultraproduct of Banach spaces, we are going to need some topological results first. Let ${\mathfrak U}$ be an ultrafilter on $I$ and $X$ a topological space. We say that the limit of $(x_i)_{i\in I} \subseteq X$ respect of ${\mathfrak U}$ is $x$ if for every open neighborhood $U$ of $x$ the set $\{i\in I: x_i \in U\}$ is an element of ${\mathfrak U}$. We denote $$\displaystyle\lim_{i,{\mathfrak U}} x_i = x.$$ The following is Proposition 1.5 from [@H]. \[buenadef\] Let ${\mathfrak U}$ be an ultrafilter on $I$, $X$ a compact Hausdorff space and $(x_i)_{i\in I} \subseteq X$. Then, the limit of $(x_i)_{i\in I}$ respect of ${\mathfrak U}$ exists and is unique. Later on, we are going to need the next basic Lemma about limits of ultraproducts, whose proof is an easy exercise of basic topology and ultrafilters. \[lemlimit\] Let ${\mathfrak U}$ be an ultrafilter on $I$ and $\{x_i\}_{i\in I}$ a family of real numbers. Assume that the limit of $(x_i)_{i\in I} \subseteq {\mathbb R}$ respect of ${\mathfrak U}$ exists and let $r$ be a real number such that there is a subset $U$ of $\{i: r<x_i\}$ with $U\in {\mathfrak U}$. Then $$r \leq \displaystyle\lim_{i,{\mathfrak U}} x_i.$$ We are now able to define the ultraproduct of Banach spaces. Given an ultrafilter ${\mathfrak U}$ on $I$ and a family of Banach spaces $(X_i)_{i\in I}$, take the Banach space $\ell_\infty(I,X_i)$ of norm bounded families $(x_i)_{i\in I}$ with $x_i \in X_i$ and norm $$\Vert (x_i)_{i\in I} \Vert = \sup_{i\in I} \Vert x_i \Vert.$$ The ultraproduct $(X_i)_{\mathfrak U}$ is defined as the quotient space $\ell_\infty(I,X_i)/ \sim $ where $$(x_i)_{i\in I}\sim (y_i)_{i\in I} \Leftrightarrow \displaystyle\lim_{i,{\mathfrak U}} \Vert x_i - y_i \Vert = 0.$$ Observe that Proposition \[buenadef\] assures us that this limit exists for every pair $(x_i)_{i\in I}, (y_i)_{i\in I}\in \ell_\infty(I,X_i)$. We denote the class of $(x_i)_{i\in I}$ in $(X_i)_{\mathfrak U}$ by $(x_i)_{\mathfrak U}$. The following result is the polynomial version of Definition 2.2 from [@H] (see also Proposition 2.3 from [@LR]). The reasoning behind is almost the same. \[pollim\] Given two ultraproducts $(X_i)_{\mathfrak U}$, $(Y_i)_{\mathfrak U}$ and a family of continuous homogeneous polynomials $\{P_i\}_{i\in I}$ of degree $k$ with $$\displaystyle\sup_{i\in I} \Vert P_i \Vert < \infty,$$ the map $P:(X_i)_{\mathfrak U}\longrightarrow (Y_i)_{\mathfrak U}$ defined by $P((x_i)_{\mathfrak U})=(P_i(x_i))_{\mathfrak U}$ is a continuous homogeneous polynomial of degree $k$. Moreover $\Vert P \Vert = \displaystyle\lim_{i,{\mathfrak U}} \Vert P_i \Vert$. If ${\mathbb K}={\mathbb C}$, the hypothesis of homogeneity can be omitted, but in this case the degree of $P$ can be lower than $k$. Let us start with the homogeneous case. Write $P_i(x)=T_i(x,\cdots,x)$ with $T_i$ a $k-$linear continuous function. Define $T:(X_i)_{\mathfrak U}^k \longrightarrow (Y_i)_{\mathfrak U}$ by $$T((x^1_i)_{\mathfrak U},\cdots,(x^k_i)_{\mathfrak U})=(T_i(x^1_i,\cdots ,x^k_i))_{\mathfrak U}.$$ $T$ is well defined since, by the polarization formula, $ \displaystyle\sup_{i\in I} \Vert T_i \Vert \leq \displaystyle\sup_{i\in I} \frac{k^k}{k!}\Vert P_i \Vert< \infty$. Seeing that for each coordinate the maps $T_i$ are linear, the map $T$ is linear in each coordinate, and thus it is a $k-$linear function. Given that $$P((x_i)_{\mathfrak U})=(P_i(x_i))_{\mathfrak U}=(T_i(x_i,\cdots,x_i))_{\mathfrak U}=T((x_i)_{\mathfrak U},\cdots,(x_i)_{\mathfrak U})$$ we conclude that $P$ is a $k-$homogeneous polynomial. To see the equality of the norms for every $i$ choose a norm $1$ element $x_i\in X_i$ where $P_i$ almost attains its norm, and from there is easy to deduce that $\Vert P \Vert \geq \displaystyle\lim_{i,{\mathfrak U}} \Vert P_i \Vert$. For the other inequality we use that $$|P((x_i)_{\mathfrak U})|= \displaystyle\lim_{i,{\mathfrak U}}|P_i(x_i)| \leq \displaystyle\lim_{i,{\mathfrak U}}\Vert P_i \Vert \Vert x_i \Vert^k = \left(\displaystyle\lim_{i,{\mathfrak U}}\Vert P_i \Vert \right)\Vert (x_i)_{\mathfrak U}\Vert^k .$$ Now we treat the non homogeneous case. For each $i\in I$ we write $P_i=\sum_{l=0}^kP_{i,l}$, with $P_{i,0}$ a constant and $P_{i,l}$ ($1\leq l \leq k$) an $l-$homogeneous polynomial. Take the direct sum $X_i \oplus_\infty {\mathbb C}$ of $X_i$ and ${\mathbb C}$, endowed with the norm $\Vert (x,\lambda) \Vert =\max \{ \Vert x \Vert, | \lambda| \}$. Consider the polynomial $\tilde{P_i}:X_i \oplus_\infty {\mathbb C}\rightarrow Y_i$ defined by $\tilde{P}_i(x,\lambda)=\sum_{l=0}^k P_{i,l}(x)\lambda^{k-l}$. The polynomial $\tilde{P}_i$ is an homogeneous polynomial of degree $k$ and, using the maximum modulus principle, it is easy to see that $\Vert P_i \Vert = \Vert \tilde{P_i} \Vert $. Then, by the homogeneous case, we have that the polynomial $\tilde{P}:(X_i \oplus_\infty {\mathbb C})_{\mathfrak U}\rightarrow (Y_i)_{\mathfrak U}$ defined as $\tilde{P}((x_i,\lambda_i)_{\mathfrak U})=(\tilde{P}_i(x_i,\lambda_i))_{\mathfrak U}$ is a continuous homogeneous polynomial of degree $k$ and $\Vert \tilde{P} \Vert =\displaystyle\lim_{i,{\mathfrak U}} \Vert \tilde{P}_i \Vert =\displaystyle\lim_{i,{\mathfrak U}} \Vert P_i \Vert$. Via the identification $(X_i \oplus_\infty {\mathbb C})_{\mathfrak U}=(X_i)_{\mathfrak U}\oplus_\infty {\mathbb C}$ given by $(x_i,\lambda_i)_{\mathfrak U}=((x_i)_{\mathfrak U},\displaystyle\lim_{i,{\mathfrak U}} \lambda_i)$ we have that the polynomial $Q:(X_i)_{\mathfrak U}\oplus_\infty {\mathbb C}\rightarrow {\mathbb C}$ defined as $Q((x_i)_{\mathfrak U},\lambda)=\tilde{P}((x_i,\lambda)_{\mathfrak U})$ is a continuous homogeneous polynomial of degree $k$ and $\Vert Q\Vert =\Vert \tilde{P}\Vert$. Then, the polynomial $P((x_i)_{\mathfrak U})=Q((x_i)_{\mathfrak U},1)$ is a continuous polynomial of degree at most $k$ and $\Vert P\Vert =\Vert Q\Vert =\displaystyle\lim_{i,{\mathfrak U}} \Vert P_i \Vert$. If $\displaystyle\lim_{i,{\mathfrak U}} \Vert P_{i,k} \Vert =0 $ then the degree of $P$ is lower than $k$. Note that, in the last proof, we can take the same approach used for non homogeneous polynomials in the real case, but we would not have the same control over the norms. Main result ============= This section contains our main result. As mentioned above, this result is partially motivated by Theorem 3.2 from [@LR]. We follow similar ideas for the proof. First, let us fix some notation that will be used throughout this section. In this section, all polynomials considered are continuous scalar polynomials. Given a Banach space $X$, $B_X$ and $S_X$ denote the unit ball and the unit sphere of $X$ respectively, and $X^*$ is the dual of $X$. Given a polynomial $P$ on $X$, $deg(P)$ stands for the degree of $P$. For a Banach space $X$ let $D(X,k_1,\cdots,k_n)$ denote the smallest constant that satisfies (\[problema\]) for polynomials of degree $k_1,\cdots,k_n$. We also define $C(X,k_1,\cdots,k_n)$ as the smallest constant that satisfies (\[problema\]) for homogeneous polynomials of degree $k_1,\cdots,k_n$. Throughout this section most of the results will have two parts. The first involving the constant $C(X,k_1,\cdots,k_n)$ for homogeneous polynomials and the second involving the constant $D(X,k_1,\cdots,k_n)$ for arbitrary polynomials. Given that the proof of both parts are almost equal, we will limit to prove only the second part of the results. Recall that a space $X$ has the $1 +$ uniform approximation property if for all $n\in {\mathbb N}$, exists $m=m(n)$ such that for every subspace $M\subset X$ with $dim(M)=n$ and every $\varepsilon > 0$ there is an operator $T\in \mathcal{L}(X,X)$ with $T|_M=id$, $rg(T)\leq m$ and $\Vert T\Vert \leq 1 + \varepsilon$ (i.e. for every $\varepsilon > 0$ $X$ has the $1+\varepsilon$ uniform approximation property). \[main thm\] If ${\mathfrak U}$ is an ultrafilter on a family $I$ and $(X_i)_{\mathfrak U}$ is an ultraproduct of complex Banach spaces then 1. $C((X_i)_{\mathfrak U},k_1,\cdots,k_n) \geq \displaystyle\lim_{i,{\mathfrak U}}(C(X_i,k_1,\cdots,k_n)).$ 2. $D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \geq \displaystyle\lim_{i,{\mathfrak U}}(D(X_i,k_1,\cdots,k_n)).$ Moreover, if each $X_i$ has the $1+$ uniform approximation property, equality holds in both cases. In order to prove this Theorem some auxiliary lemmas are going to be needed. The first one is due to Heinrich [@H]. \[aprox\] Given an ultraproduct of Banach spaces $(X_i)_{\mathfrak U}$, if each $X_i$ has the $1+$ uniform approximation property then $(X_i)_{\mathfrak U}$ has the metric approximation property. When working with the constants $C(X,k_1,\cdots,k_n)$ and $D(X,k_1,\cdots,k_n)$, the following characterization may result handy. \[alternat\] a) The constant $C(X,k_1,\cdots,k_n)$ is the biggest constant $M$ such that given any $\varepsilon >0$ there exist a set of homogeneous continuous polynomials $\{P_j\}_{j=1}^n$ with $deg(P_j)\leq k_j$ such that $$\label{condition} M\left \Vert \prod_{j=1}^{n} P_j \right \Vert \leq (1+\varepsilon) \prod_{j=1}^{n} \Vert P_j \Vert.$$ b\) The constant $D(X,k_1,\cdots,k_n)$ is the biggest constant satisfying the same for arbitrary polynomials. To prove this Lemma it is enough to see that $D(X,k_1,\cdots,k_n)$ is decreasing as a function of the degrees $k_1,\cdots, k_n$ and use that the infimum is the greatest lower bound. \[rmkalternat\] It is clear that in Lemma \[alternat\] we can take the polynomials $\{P_j\}_{j=1}^n$ with $deg(P_j)= k_j$ instead of $deg(P_j)\leq k_j$. Later on we will use both versions of the Lemma. One last lemma is needed for the proof of the Main Theorem. \[normas\] Let $P$ be a (not necessarily homogeneous) polynomial on a complex Banach space $X$ with $deg(P)=k$. For any point $x\in X$ $$|P(x)|\leq \max\{\Vert x \Vert, 1\}^k \Vert P\Vert . \nonumber$$ If $P$ is homogeneous the result is rather obvious since we have the inequality $$|P(x)|\leq \Vert x \Vert^k \Vert P\Vert . \nonumber$$ Suppose that $P=\sum_{l=0}^k P_l$ with $P_l$ an $l-$homogeneous polynomial. Consider the space $X \oplus_\infty {\mathbb C}$ and the polynomial $\tilde{P}:X \oplus_\infty {\mathbb C}\rightarrow {\mathbb C}$ defined by $\tilde{P}(x,\lambda)=\sum_{l=0}^k P_l(x)\lambda^{k-l}$. The polynomial $\tilde{P}$ is homogeneous of degree $k$ and $\Vert P \Vert = \Vert \tilde{P} \Vert $. Then, using that $\tilde{P}$ is homogeneous we have $$|P(x)|=|\tilde{P} (x,1)| \leq \Vert (x,1) \Vert^k \Vert \tilde{P} \Vert = \max\{\Vert x \Vert, 1\}^k \Vert P\Vert . \nonumber$$ We are now able to prove our main result. Throughout this proof we regard the space $({\mathbb C})_{\mathfrak U}$ as ${\mathbb C}$ via the identification $(\lambda_i)_{\mathfrak U}=\displaystyle\lim_{i,{\mathfrak U}} \lambda_i$. First, we are going to see that $D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \geq \displaystyle\lim_{i,{\mathfrak U}}(D(X_i,k_1,\cdots,k_n))$. To do this we only need to prove that $\displaystyle\lim_{i,{\mathfrak U}}(D(X_i,k_1,\cdots,k_n))$ satisfies (\[condition\]). Given $\varepsilon >0$ we need to find a set of polynomials $\{P_{j}\}_{j=1}^n$ on $(X_i)_{\mathfrak U}$ with $deg(P_{j})\leq k_j$ such that $$\displaystyle\lim_{i,{\mathfrak U}}(D(X_i,k_1,\cdots,k_n)) \left \Vert \prod_{j=1}^{n} P_j \right \Vert \leq (1+\varepsilon) \prod_{j=1}^{n} \left \Vert P_j \right \Vert .$$ By Remark \[rmkalternat\] we know that for each $i\in I$ there is a set of polynomials $\{P_{i,j}\}_{j=1}^n$ on $X_i$ with $deg(P_{i,j})=k_j$ such that $$D(X_i,k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} P_{i,j} \right \Vert \leq (1 +\varepsilon)\prod_{j=1}^{n} \left \Vert P_{i,j} \right \Vert.$$ Replacing $P_{i,j}$ with $P_{i,j}/\Vert P_{i,j} \Vert$ we may assume that $\Vert P_{i,j} \Vert =1$. Define the polynomials $\{P_j\}_{j=1}^n$ on $(X_i)_{\mathfrak U}$ by $P_j((x_i)_{\mathfrak U})=(P_{i,j}(x_i))_{\mathfrak U}$. Then, by Proposition \[pollim\], $deg(P_j)\leq k_j$ and $$\begin{aligned} \displaystyle\lim_{i,{\mathfrak U}}(D(X_i,k_1,\cdots,k_n)) \left \Vert \prod_{j=1}^{n} P_{j} \right \Vert &=& \displaystyle\lim_{i,{\mathfrak U}} \left(D(X_i,k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} P_{i,j} \right \Vert \right) \nonumber \\ &\leq& \displaystyle\lim_{i,{\mathfrak U}}\left((1+\varepsilon)\prod_{j=1}^{n}\Vert P_{i,j} \Vert \right)\nonumber \\ &=& (1+\varepsilon)\prod_{j=1}^{n} \Vert P_{j} \Vert \nonumber \nonumber \end{aligned}$$ as desired. To prove that $D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \leq \displaystyle\lim_{i,{\mathfrak U}}(D(X_i,k_1,\cdots,k_n))$ if each $X_i$ has the $1+$ uniform approximation property is not as straightforward. Given $\varepsilon >0$, let $\{P_j\}_{j=1}^n$ be a set of polynomials on $(X_i)_{\mathfrak U}$ with $deg(P_j)=k_j$ such that $$D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} P_j \right \Vert \leq (1+\varepsilon)\prod_{j=1}^{n} \Vert P_j \Vert .$$ Let $K\subseteq B_{(X_i)_{\mathfrak U}}$ be the finite set $K=\{x_1,\cdots, x_n\}$ where $ x_j$ is such that $$|P_j(x_j)| > \Vert P_j\Vert (1- \varepsilon) \mbox{ for }j=1,\cdots, n.$$ Being that each $X_i$ has the $1+$ uniform approximation property, then, by Lemma \[aprox\], $(X_i)_{\mathfrak U}$ has the metric approximation property. Therefore, exist a finite rank operator $S:(X_i)_{\mathfrak U}\rightarrow (X_i)_{\mathfrak U}$ such that $\Vert S\Vert \leq 1 $ and $$\Vert P_j - P_j \circ S \Vert_K< |P_j(x_j)|\varepsilon \mbox{ for }j=1,\cdots, n.$$ Now, define the polynomials $Q_1,\cdots, Q_n$ on $(X_i)_{\mathfrak U}$ as $Q_j=P_j\circ S$. Then $$\left\Vert \prod_{j=1}^n Q_j \right\Vert \leq \left\Vert \prod_{j=1}^n P_j \right\Vert$$ $$\Vert Q_j\Vert_K > | P_j(x_j)|-\varepsilon | P_j(x_j)| =| P_j(x_j)| (1-\varepsilon) \geq \Vert P_j \Vert(1-\varepsilon)^2.$$ The construction of this polynomials is a slight variation of Lemma 3.1 from [@LR]. We have the next inequality for the product of the polynomials $\{Q_j\}_{j=1}^n$ $$\begin{aligned} D((X_i)_{\mathfrak U},k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} Q_{j} \right \Vert &\leq& D((X_i)_{\mathfrak U},k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} P_{j} \right \Vert \nonumber \\ &\leq& (1+\varepsilon) \prod_{j=1}^{n} \left \Vert P_{j} \right \Vert . \label{desq}\end{aligned}$$ Since $S$ is a finite rank operator, the polynomials $\{ Q_j\}_{j=1}^n$ have the advantage that are finite type polynomials. This will allow us to construct polynomials on $(X_i)_{\mathfrak U}$ which are limit of polynomials on the spaces $X_i$. For each $j$ write $Q_j=\sum_{t=1}^{m_j}(\psi_{j,t})^{r_{j,t}}$ with $\psi_{j,t}\in (X_i)_{\mathfrak U}^*$, and consider the spaces $N=\rm{span} \{x_1,\cdots,x_n\}\subset (X_i)_{\mathfrak U}$ and $M=\rm{span} \{\psi_{j,t} \}\subset (X_i)_{\mathfrak U}^*$. By the local duality of ultraproducts (see Theorem 7.3 from [@H]) exist $T:M\rightarrow (X_i^*)_{\mathfrak U}$ an $(1+\varepsilon)-$isomorphism such that $$JT(\psi)(x)=\psi(x) \mbox{ } \forall x\in N, \mbox{ } \forall \psi\in M$$ where $J:(X_i^*)_{\mathfrak U}\rightarrow (X_i)_{\mathfrak U}^*$ is the canonical embedding. Let $\phi_{j,t}=JT(\psi_{j,t})$ and consider the polynomials $\bar{Q}_1,\cdots, \bar{Q}_n$ on $(X_i)_{\mathfrak U}$ with $\bar{Q}_j=\sum_{t=1}^{m_j}(\phi_{j,t})^{r_{j,t}}$. Clearly $\bar{Q}_j$ is equal to $Q_j$ in $N$ and $K\subseteq N$, therefore we have the following lower bound for the norm of each polynomial $$\Vert \bar{Q}_j \Vert \geq \Vert \bar{Q}_j \Vert_K = \Vert Q_j \Vert_K >\Vert P_j \Vert(1-\varepsilon)^2 \label{desbarq}$$ Now, let us find an upper bound for the norm of the product $\Vert \prod_{j=1}^n \bar{Q}_j \Vert$. Let $x=(x_i)_{\mathfrak U}$ be any point in $B_{(X_i)_{\mathfrak U}}$. Then, we have $$\begin{aligned} \left|\prod_{j=1}^n \bar{Q}_j(x)\right| &=& \left|\prod_{j=1}^n \sum_{t=1}^{m_j}(\phi_{j,t} (x))^{r_{j,t}}\right|=\left|\prod_{j=1}^n \sum_{t=1}^{m_j} (JT\psi_{j,t}(x))^{r_{j,t}} \right| \nonumber \\ &=& \left|\prod_{j=1}^n \sum_{t=1}^{m_j}((JT)^*\hat{x}(\psi_{j,t}))^{r_{j,t}}\right|\nonumber\end{aligned}$$ Since $(JT)^*\hat{x}\in M^*$, $\Vert (JT)^*\hat{x}\Vert =\Vert JT \Vert \Vert x \Vert \leq \Vert J \Vert \Vert T \Vert \Vert x \Vert< 1 + \varepsilon$ and $M^*=\frac{(X_i)_{\mathfrak U}^{**}}{M^{\bot}}$, we can chose $z^{**}\in (X_i)_{\mathfrak U}^{**}$ with $\Vert z^{**} \Vert < \Vert (JT)^*\hat{x}\Vert+\varepsilon < 1+2\varepsilon$, such that $\prod_{j=1}^n \sum_{t=1}^{m_j} ((JT)^*\hat{x}(\psi_{j,t}))^{r_{j,t}}= \prod_{j=1}^n \sum_{t=1}^{m_j} (z^{**}(\psi_{j,t}))^{r_{j,t}}$. By Goldstine’s Theorem exist a net $\{z_\alpha\} \subseteq (X_i)_{\mathfrak U}$ $w^*-$convergent to $z$ in $(X_i)_{\mathfrak U}^{**}$ with $\Vert z_\alpha \Vert = \Vert z^{**}\Vert$. In particular, $ \psi_{j,t}(z_\alpha)$ converges to $z^{**}(\psi_{j,t})$. If we call ${\mathbf k}= \sum k_j$, since $\Vert z_\alpha \Vert< (1+2\varepsilon)$, by Lemma \[normas\], we have $$\left \Vert \prod_{j=1}^{n} Q_j \right \Vert (1+2\varepsilon)^{\mathbf k}\geq \left|\prod_{j=1}^n Q_j(z_\alpha)\right| = \left|\prod_{j=1}^n \sum_{t=1}^{m_j} ((\psi_{j,t})(z_\alpha))^{r_{j,t}}\right| . \label{usecomplex}$$ Combining this with the fact that $$\begin{aligned} \left|\prod_{j=1}^{n} \sum_{t=1}^{m_j} ((\psi_{j,t})(z_\alpha))^{r_{j,t}}\right| &\longrightarrow& \left|\prod_{j=1}^{n} \sum_{t=1}^{m_j} (z^{**}(\psi_{j,t}))^{r_{j,t}}\right|\nonumber\\ &=& \left|\prod_{j=1}^{n} \sum_{t=1}^{m_j} ((JT)^*\hat{x}(\psi_{j,t}))^{r_{j,t}}\right| = \left|\prod_{j=1}^{n} \bar{Q}_j(x)\right|\nonumber\end{aligned}$$ we conclude that $\left \Vert \prod_{j=1}^{n} Q_j \right \Vert (1+2\varepsilon)^{\mathbf k}\geq |\prod_{j=1}^{n} \bar{Q}_j(x)|$. Since the choice of $x$ was arbitrary we arrive to the next inequality $$\begin{aligned} D((X_i)_{\mathfrak U},k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} \bar{Q}_j \right \Vert &\leq& (1+2\varepsilon)^{\mathbf k}D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} Q_j \right \Vert \nonumber \\ &\leq& (1+2\varepsilon)^{\mathbf k}(1+\varepsilon) \prod_{j=1}^{n} \left \Vert P_{j} \right \Vert \label{desbarq2} \\ &<& (1+2\varepsilon)^{\mathbf k}(1+\varepsilon) \frac{\prod_{j=1}^{n} \Vert \bar{Q}_j \Vert }{(1-\varepsilon)^{2n}} .\label{desbarq3} \\end{aligned}$$ In (\[desbarq2\]) and (\[desbarq3\]) we use (\[desq\]) and (\[desbarq\]) respectively. The polynomials $\bar{Q}_j$ are not only of finite type, these polynomials are also generated by elements of $(X_i^*)_{\mathfrak U}$. This will allow us to write them as limits of polynomials in $X_i$. For any $i$, consider the polynomials $\bar{Q}_{i,1},\cdots,\bar{Q}_{i,n}$ on $X_i$ defined by $\bar{Q}_{i,j}= \displaystyle\sum_{t=1}^{m_j} (\phi_{i,j,t})^{r_{j,t}}$, where the functionals $\phi_{i,j,t}\in X_i^*$ are such that $(\phi_{i,j,t})_{\mathfrak U}=\phi_{j,t}$. Then $\bar{Q}_j(x)=\displaystyle\lim_{i,{\mathfrak U}} \bar{Q}_{i,j}(x)$ $\forall x \in (X_i)_{\mathfrak U}$ and, by Proposition \[pollim\], $\Vert \bar{Q}_j \Vert = \displaystyle\lim_{i,{\mathfrak U}} \Vert \bar{Q}_{i,j} \Vert$. Therefore $$\begin{aligned} D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \displaystyle\lim_{i,{\mathfrak U}} \left \Vert \prod_{j=1}^{n} \bar{Q}_{i,j} \right \Vert &=& D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} \bar{Q}_{j} \right \Vert \nonumber \\ &<& \frac{(1+\varepsilon)(1+2\varepsilon)^{\mathbf k}}{(1-\varepsilon)^{2n}} \prod_{j=1}^{n} \Vert \bar{Q}_{j} \Vert \nonumber \\ &=& \frac{(1+\varepsilon)(1+2\varepsilon)^{\mathbf k}}{(1-\varepsilon)^{2n}} \prod_{j=1}^{n} \displaystyle\lim_{i,{\mathfrak U}} \Vert \bar{Q}_{i,j} \Vert . \nonumber \end{aligned}$$ To simplify the notation let us call $\lambda = \frac{(1+\varepsilon)(1+2\varepsilon)^{\mathbf k}}{(1-\varepsilon)^{2n}} $. Take $L>0$ such that $$D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \displaystyle\lim_{i,{\mathfrak U}} \left \Vert \prod_{j=1}^{n} \bar{Q}_{i,j} \right \Vert < L < \lambda \prod_{j=1}^{n} \displaystyle\lim_{i,{\mathfrak U}} \Vert \bar{Q}_{i,j} \Vert . \nonumber$$ Since $(-\infty, \frac{L}{D((X_i)_{\mathfrak U},k_1,\cdots,k_n)})$ and $(\frac{L}{\lambda},+\infty)$ are neighborhoods of $\displaystyle\lim_{i,{\mathfrak U}} \left \Vert \prod_{j=1}^{n} \bar{Q}_{i,j} \right \Vert$ and $\prod_{j=1}^{n} \displaystyle\lim_{i,{\mathfrak U}} \Vert \bar{Q}_{i,j} \Vert$ respectively, and $\prod_{j=1}^{n} \displaystyle\lim_{i,{\mathfrak U}} \Vert \bar{Q}_{i,j} \Vert= \displaystyle\lim_{i,{\mathfrak U}} \prod_{j=1}^{n} \Vert \bar{Q}_{i,j} \Vert$, by definition of $\displaystyle\lim_{i,{\mathfrak U}}$, the sets $$A=\{i_0: D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} \bar{Q}_{i_0,j} \right \Vert <L\} \mbox{ and }B=\{i_0: \lambda \prod_{j=1}^{n} \Vert \bar{Q}_{i_0,j} \Vert > L \}$$ are elements of ${\mathfrak U}$. Since ${\mathfrak U}$ is closed by finite intersections $A\cap B\in {\mathfrak U}$. If we take any element $i_0 \in A\cap B$ then, for any $\delta >0$, we have that $$D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} \bar{Q}_{i_0,j} \right \Vert \frac{1}{\lambda}\leq \frac{L}{\lambda} \leq \prod_{j=1}^{n} \Vert \bar{Q}_{i_0,j} \Vert < (1+ \delta)\prod_{j= 1}^{n} \Vert \bar{Q}_{i_0,j} \Vert \nonumber$$ Then, since $\delta$ is arbitrary, the constant $D((X_i)_{\mathfrak U},k_1,\cdots,k_n)\frac{1}{\lambda}$ satisfy (\[condition\]) for the space $X_{i_0}$ and therefore, by Lemma \[alternat\], $$\frac{1}{\lambda}D((X_i)_{\mathfrak U},k_1,\cdots,k_n) \leq D(X_{i_0},k_1,\cdots,k_n). \nonumber$$ This holds true for any $i_0$ in $A\cap B$. Since $A\cap B \in {\mathfrak U}$, by Lemma \[lemlimit\], $\frac{1}{\lambda}D((X_i)_{\mathfrak U},k_1,\cdots,k_n)\leq \displaystyle\lim_{i,{\mathfrak U}} D(X_i,k_1,\cdots,k_n) $. Using that $\lambda \rightarrow 1$ when $\varepsilon \rightarrow 0$ we conclude that $D((X_i)_{\mathfrak U},k_1,\cdots,k_n)\leq \displaystyle\lim_{i,{\mathfrak U}} D(X_i,k_1,\cdots,k_n).$ Similar to Corollary 3.3 from [@LR], a straightforward corollary of our main result is that for any complex Banach space $X$ with $1+$ uniform approximation property $C(X,k_1,\cdots,k_n)=C(X^{**},k_1,\cdots,k_n)$ and $D(X,k_1,\cdots,k_n)=D(X^{**},k_1,\cdots,k_n)$ . Using that $X^{**}$ is $1-$complemented in some adequate ultrafilter $(X)_{{\mathfrak U}}$ the result is rather obvious. For a construction of the adequate ultrafilter see [@LR]. But following the previous proof, and using the principle of local reflexivity applied to $X^*$ instead of the local duality of ultraproducts, we can prove the next stronger result. Let $X$ be a complex Banach space. Then 1. $C(X^{**},k_1,\cdots,k_n)\geq C(X,k_1,\cdots,k_n).$ 2. $D(X^{**},k_1,\cdots,k_n \geq D(X,k_1,\cdots,k_n)).$ Moreover, if $X^{**}$ has the metric approximation property, equality holds in both cases. The inequality $D(X^{**},k_1,\cdots,k_n) \geq D(X,k_1,\cdots,k_n)$ is a corollary of Theorem \[main thm\] (using the adequate ultrafilter mentioned above). Let us prove that if $X^{**}$ has the metric approximation property then $D((X^{**},k_1,\cdots,k_n)\geq D(X,k_1,\cdots,k_n)$. Given $\varepsilon >0$, let $\{P_j\}_{j=1}^n$ be a set of polynomials on $X^{**}$ with $deg(P_j)=k_j$ such that $$D(X^{**},k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} P_{j} \right \Vert \leq (1+\varepsilon)\prod_{j=1}^{n} \left \Vert P_{j} \right \Vert .\nonumber$$ Analogous to the proof of Theorem \[main thm\], since $X^{**}$ has the metric approximation, we can construct finite type polynomials $Q_1,\cdots,Q_n$ on $X^{**}$ with $deg(Q_j)=k_j$, $\Vert Q_j \Vert_K \geq \Vert P_j \Vert (1-\varepsilon)^2$ for some finite set $K\subseteq B_{X^{**}}$ and that $$D(X^{**},k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} Q_{j} \right \Vert < (1+\varepsilon)\prod_{j=1}^{n} \left \Vert P_{j} \right \Vert . \nonumber$$ Suppose that $Q_j=\sum_{t=1}^{m_j}(\psi_{j,t})^{r_{j,t}}$ and consider the spaces $N=\rm{span} \{K\}$ and $M=\rm{span} \{\psi_{j,t} \}$. By the principle of local reflexivity (see [@D]), applied to $X^*$ (thinking $N$ as a subspaces of $(X^*)^*$ and $M$ as a subspaces of $(X^*)^{**}$), there is an $(1+\varepsilon)-$isomorphism $T:M\rightarrow X^*$ such that $$JT(\psi)(x)=\psi(x) \mbox{ } \forall x\in N, \mbox{ } \forall \psi\in M\cap X^*=M,$$ where $J:X^*\rightarrow X^{***}$ is the canonical embedding. Let $\phi_{j,t}=JT(\psi_{j,t})$ and consider the polynomials $\bar{Q}_1,\cdots, \bar{Q}_n$ on $X^{**}$ defined by $\bar{Q}_j=\sum_{t=1}^{m_j}(\phi_{j,t})^{r_{j,t}}$. Following the proof of the Main Theorem, one arrives to the inequation $$D(X^{**},k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} \bar{Q_j} \right \Vert < (1+ \delta) \frac{(1+\varepsilon)(1+2\varepsilon)^{\mathbf k}}{(1-\varepsilon)^{2n}} \prod_{j=1}^{n} \Vert \bar{Q_j} \Vert \nonumber$$ for every $\delta >0$. Since each $\bar{Q}_j$ is generated by elements of $J(X^*)$, by Goldstine’s Theorem, the restriction of $\bar{Q}_j$ to $X$ has the same norm and the same is true for $\prod_{j=1}^{n} \bar{Q_j}$. Then $$D(X^{**},k_1,\cdots,k_n)\left \Vert \prod_{j=1}^{n} \left.\bar{Q_j}\right|_X \right \Vert < (1+ \delta) \frac{(1+\varepsilon)(1+2\varepsilon)^{\mathbf k}}{(1-\varepsilon)^{2n}} \prod_{j=1}^{n} \Vert \left.\bar{Q_j}\right|_X \Vert \nonumber$$ By Lemma \[alternat\] we conclude that $$\frac{(1-\varepsilon)^{2n}}{(1+\varepsilon)(1+2\varepsilon)^{\mathbf k}}D(X^{**},k_1,\cdots,k_n)\leq D(X,k_1,\cdots,k_n).$$ Given that the choice of $\varepsilon$ is arbitrary and that $\frac{(1-\varepsilon)^{2n}}{(1+\varepsilon)(1+2\varepsilon)^{\mathbf k}} $ tends to $1$ when $\varepsilon$ tends to $0$ we conclude that $D(X^{**},k_1,\cdots,k_n)\leq D(X,k_1,\cdots,k_n)$. Note that in the proof of the Main Theorem the only parts where we need the spaces to be complex Banach spaces are at the beginning, where we use Proposition \[pollim\], and in the inequality (\[usecomplex\]), where we use Lemma \[normas\]. But both results holds true for homogeneous polynomials on a real Banach space. Then, copying the proof of the Main Theorem we obtain the following result for real spaces. If ${\mathfrak U}$ is an ultrafilter on a family $I$ and $(X_i)_{\mathfrak U}$ is an ultraproduct of real Banach spaces then $$C((X_i)_{\mathfrak U},k_1,\cdots,k_n) \geq \displaystyle\lim_{i,{\mathfrak U}}(C(X_i,k_1,\cdots,k_n)).$$ If in addition each $X_i$ has the $1+$ uniform approximation property, the equality holds. Also we can get a similar result for the bidual of a real space. Let $X$ be a real Banach space. Then 1. $C(X^{**},k_1,\cdots,k_n)\geq C(X,k_1,\cdots,k_n).$ 2. $D(X^{**},k_1,\cdots,k_n) \geq D(X,k_1,\cdots,k_n).$ If $X^{**}$ has the metric approximation property, equality holds in $(a)$. The proof of item $(a)$ is the same that in the complex case, so we limit to prove $D(X^{**},k_1,\cdots,k_n) \geq D(X,k_1,\cdots,k_n))$. To do this we will show that given an arbitrary $\varepsilon >0$, there is a set of polynomials $\{P_{j}\}_{j=1}^n$ on $X^{**}$ with $deg(P_{j})\leq k_j$ such that $$D(X,k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} P_j \right \Vert \leq (1+\varepsilon) \prod_{j=1}^{n} \left \Vert P_j \right \Vert .$$ Take $\{Q_{j}\}_{j=1}^n$ a set of polynomials on $X$ with $deg(Q_j)=k_j$ such that $$D(X,k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} Q_{j} \right \Vert \leq (1 +\varepsilon)\prod_{j=1}^{n} \left \Vert Q_{j} \right \Vert.$$ Consider now the polynomials $P_j=AB(Q_j)$, where $AB(Q_j)$ is the Aron Berner extension of $Q_j$ (for details on this extension see [@AB] or [@Z]). Since $AB\left( \prod_{j=1}^n P_j \right)=\prod_{j=1}^n AB(P_j)$, using that the Aror Berner extension preserves norm (see [@DG]) we have $$\begin{aligned} D(X,k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} P_{j} \right \Vert &=& D(X,k_1,\cdots,k_n) \left \Vert \prod_{j=1}^{n} Q_{j} \right \Vert\nonumber \\ &\leq& (1 +\varepsilon)\prod_{j=1}^{n} \left\Vert Q_{j} \right\Vert \nonumber \\ &=& (1 +\varepsilon)\prod_{j=1}^{n} \left \Vert P_{j} \right \Vert \nonumber \end{aligned}$$ as desired. As a final remark, we mention two types of spaces for which the results on this section can be applied. Corollary 9.2 from [@H] states that any Orlicz space $L_\Phi(\mu)$, with $\mu$ a finite measure and $\Phi$ an Orlicz function with regular variation at $\infty$, has the $1+$ uniform projection property, which is stronger than the $1+$ uniform approximation property. In [@PeR] Section two, A. Pełczyński and H. Rosenthal proved that any ${\mathcal L}_{p,\lambda}-$space ($1\leq \lambda < \infty$) has the $1+\varepsilon-$uniform projection property for every $\varepsilon>0$ (which is stronger than the $1+\varepsilon-$uniform approximation property), therefore, any ${\mathcal L}_{p,\lambda}-$space has the $1+$ uniform approximation property. Acknowledgment {#acknowledgment .unnumbered} ============== I would like to thank Professor Daniel Carando for both encouraging me to write this article, and for his comments and remarks which improved its presentation and content. [HD]{} R. M. J. Arias-de-Reyna. *Gaussian variables, polynomials and permanents*. Linear Algebra Appl. 285 (1998), 107–114. R. M. Aron and P. D. Berner. *A Hahn-Banach extension theorem for analytic mapping*. Bull. Soc. Math. France 106 (1978), 3–24. C. Benítez, Y. Sarantopoulos and A. Tonge. *Lower bounds for norms of products of polynomials*. Math. Proc. Cambridge Philos. Soc. 124 (1998), 395–408. D. Carando, D. Pinasco y J.T. Rodríguez. *Lower bounds for norms of products of polynomials on $L_p$ spaces*. Studia Math. 214 (2013), 157–166. A. M. Davie and T. W. Gamelin. *A theorem on polynomial-star approximation*. Proc. Amer. Math. Soc. 106 (1989) 351–356. D. W. Dean. *The equation $L(E,X^{**})=L(E,X)^{**}$ and the principle of local reflexivity*. Proceedings of the American Mathematical Society. 40 (1973), 146-148. S. Heinrich. *Ultraproducts in Banach space theory*. J. Reine Angew. Math. 313 (1980), 72–104. M. Lindström and R. A. Ryan. *Applications of ultraproducts to infinite dimensional holomorphy*. Math. Scand. 71 (1992), 229–242. A. Pełczyński and H. Rosenthal. *Localization techniques in $L_p$ spaces*. Studia Math. 52 (1975), 265–289. D. Pinasco. *Lower bounds for norms of products of polynomials via Bombieri inequality*. Trans. Amer. Math. Soc. 364 (2012), 3993–4010. I. Zalduendo. *Extending polynomials on Banach Spaces - A survey*. Rev. Un. Mat. Argentina 46 (2005), 45–72.
{ "pile_set_name": "ArXiv" }
Q: How to create a navbar with 2 collapse menu? My codes are working fine on mobile view but on desktop right side Links are getting out of nav-bar. i am trying to create nav bar with Brand in center, search bar on left and links on right. and how to move hambuger bar on left and search on right side on mobile view .. (sorry for my english) .navbar-brand { position: absolute; width: 100%; left: 0; top: 0; text-align: center; margin: auto; } .navbar-toggle { z-index:3; } <script src="https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js"></script> <script src="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js"></script> <link href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css" rel="stylesheet"/> <nav class="navbar navbar-default navbar-fixed-top" role="navigation"> <div class="navbar-header"> <button type="button" class="navbar-toggle" data-toggle="collapse" data-target="#navbar-collapse-2"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a class="navbar-brand" href="#">Brand</a> <button type="button" class="navbar-toggle" data-toggle="collapse" data-target="#navbar-collapse-1"><span class="glyphicon glyphicon-search" aria-hidden="true"> </span> </button> </div> <div class="collapse navbar-collapse navbar-left" id="navbar-collapse-1"> <form class="navbar-form navbar-left" role="search"> <div class="form-group"> <input type="text" class="form-control" placeholder="Search"> </div> <button type="submit" class="btn btn-default">Submit</button> </form> </div> <div class="collapse navbar-collapse" id="navbar-collapse-2"> <ul class="nav navbar-nav navbar-right"> <li><a href="#">Link</a></li> <li><a href="#">Link</a></li> <li><a href="#">Link</a></li> </ul> </div> </nav> A: add menu-1 class or call it whatever you want to the button <button type="button" class="navbar-toggle menu-1" data-toggle="collapse" data-target="#navbar-collapse-2"> then add this to your css: .menu-1 { float: left; margin-left: 10px; } Update: to handle search issue remove width: 100 and increase left for .navbar-brand like this: .navbar-brand { position: absolute; /*width: 100%;*/ left: 50%; top: 0; text-align: center; margin: auto; } and add this css also: @media (max-width:767px){ a.navbar-brand { left: 45%; } } check the updated Jsfiddle
{ "pile_set_name": "StackExchange" }
Q: Issue with jquery remove method on IE7? <table class="myCustomers"> <tbody> <tr> <td> <ul id="salesCustomers"> <li title="cust 1"><a id="cust_1" >customer 1</a></li> <li title="cust 2"></li> </ul> </td> </tr> </tbody> when i do on below on IE 7, DOM element corresponding to "customer 1" gets removed from container "salesCustomers" but "salesCustomers" container does get adjusted(i mean IE 7 displays empty space in place of it) after removal of element $('#cust_1').remove(); It works fine on IE8,9,firefox,chrome but not on IE 7? Updated:- CSS part is table.myCustomers li { margin: 8px; } table.myCustomers li a { text-decoration: none; } a { color: #000000; margin: 3px; } A: The empty space may be since the li is still there. (as pointed out by Jayraj) If you want to remove the li corresponding to the #cust_1 as well, You have a couple of ways to do it, $("[title='cust 1']").remove(); $("#cust_1").parents("li").remove(); //this will remove the child element as well Test link
{ "pile_set_name": "StackExchange" }
On January 1, 2018, the most significant overhaul to the Internal Revenue Code in decades took effect. High-income taxpayers stand to benefit from lower tax brackets, higher estate tax exemptions and a less stringent alternative minimum tax. However, high-income earners face new limitations on some favored deductions and notable revisions in charitable write-offs. Some of the most noteworthy changes are…
{ "pile_set_name": "Pile-CC" }
Jake Jones James Murrell "Jake" Jones (November 23, 1920 – December 13, 2000) was a first baseman in Major League Baseball who played between and for the Chicago White Sox (1941–42, 1946–47) and Boston Red Sox (1947–48). Listed at 6'3", 197 lb., Jones batted and threw right-handed. He was born in Epps, Louisiana. Career Jones was a highly decorated World War II veteran. He played 10 games in the American League for Chicago, in part of two seasons, before enlisting in the United States Navy right after Pearl Harbor attack. He joined the service on June 30, 1942, becoming an aviator. In November 1943 he was assigned to the unit on the USS Yorktown (CV-10), flying Grumman F6F Hellcat fighters. Between November and December 1944, Jones destroyed two Japanese A6M Zero and damaged one of them. On February 1, 1945, he shot down another three Zeroes while serving on a mission at northeast of Tokyo, to give him five confirmed victories. A day later, he annihilated other Zero and a Nakajima Ki-43. Then, on February 25 he received a half-share of a probable Ki-43. For his heroic action, Jones was awarded the Silver Star, two Distinguished Flying Cross and four Air Medals. Following his service discharge, Jones returned to play for Chicago in 1946. During the 1947 midseason he was dealt to the Boston Red Sox in exchange for Rudy York, batting a combined .237 with 19 home runs and 96 RBI that season. He hit .200 in 36 games for Boston in 1948, his last major league season, and finished his baseball career in 1949, dividing his playing time between the Texas League and American Association. Jones died in his hometown of Epps, Louisiana at age 80. References Baseball in Wartime Baseball Reference BR Bullpen Category:Boston Red Sox players Category:Chicago White Sox players Category:Major League Baseball first basemen Category:Recipients of the Distinguished Flying Cross (United States) Category:Recipients of the Silver Star Category:Baseball players from Louisiana Category:People from West Carroll Parish, Louisiana Category:1920 births Category:2000 deaths Category:United States Navy pilots of World War II Category:United States Navy officers Category:Recipients of the Air Medal
{ "pile_set_name": "Wikipedia (en)" }
Democrat Andrew Gillum is the first black nominee from any major party for governor of Florida. | Mike Stocker/South Florida Sun-Sentinel via AP elections Gillum hits back at Trump after president calls him ‘a thief’ Tallahassee Mayor and Florida gubernatorial candidate Andrew Gillum hit back at President Donald Trump on Monday, after Trump called Gillum a “thief” in an inflammatory tweet. “In Florida there is a choice between a Harvard/Yale educated man named @RonDeSantisFL who has been a great Congressman and will be a great Governor - and a Dem who is a thief and who is Mayor of poorly run Tallahassee, said to be one of the most corrupt cities in the Country!” Trump tweeted on Monday morning, without providing any evidence of crimes. Soon after, Gillum called out Trump on Twitter. “On Twitter there is a choice between having the courage to @ the person you are trash talking, or not. @realDonaldTrump is howling because he’s weak. Florida, go vote today.” On Twitter there is a choice between having the courage to @ the person you are trash talking, or not. @realDonaldTrump is howling because he's weak. Florida, go vote today. https://t.co/I8uOokptJA — Andrew Gillum (@AndrewGillum) October 29, 2018 The race for Florida’s governor is one of several nationally watched elections this November. Gillum is the first black nominee from any major party for governor of Florida, and discussions of race and corruption have figured prominently in the election. Trump’s tweet comes as a federal corruption probe circles Tallahassee, and DeSantis has frequently accused Gillum of improperly receiving gifts while mayor. Morning Score newsletter Your guide to the permanent campaign — weekday mornings, in your inbox. Email Sign Up By signing up you agree to receive email newsletters or alerts from POLITICO. You can unsubscribe at any time. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. DeSantis has been accused of exploiting coded racist language during his campaign, and Gillum accused Republicans of thinly veiled racist language when tying him to the corruption probe. DeSantis has also been criticized for failing to disclose all records related to more than $145,000 in taxpayer money he used to fund travel as a congressman, the Naples Daily News reported.
{ "pile_set_name": "OpenWebText2" }
1. Field of the Invention The present invention relates to multi-chamber process equipments for fabricating semiconductor devices. 2. Description of the Prior Art In recent years, the advance in device miniaturization and IC complexity is increasing the need for more accurate and more complicated processes, and wafers of larger diameters. Accordingly, much attention is focused on multi-chamber process equipments (or systems) in view of increase of complex precesses, and enhancement of throughput in an individual wafer processing system. FIG. 14 shows one conventional example. A multi-chamber process equipment of this example includes a wafer transfer chamber 1, a plurality of process chambers 3 connected with the transfer chamber 1 through respective gate valves 2, a load lock chamber (preliminary evacuation chamber) 5 connected with the transfer chamber 1 through a gate valve 4, and a wafer load chamber 7 connected with the load lock chamber 5 through a gate valve 6. In the wafer transfer chamber 1 and the load lock chamber 5, there are provided wafer transfer arms 9 and 10 for carrying a wafer 8, as shown in FIG. 14. The transfer arm 10 is designed to take each wafer 8 from wafer cassettes 11, 11 placed in the wafer load chamber 7, through the gate valve 6, and bring the wafer into the wafer transfer chamber 1. The transfer arm 9 is arranged to receive the wafer 8 from the arm 10, and insert the wafer through one of the gate valves 2 into a predetermined one of the process chambers. The wafer 8 is shifted from one process chamber to another by the transfer arm 10 according to the sequence of processes. Another conventional example is shown in "NIKKEI MICRODEVICES", May, 1990, page 47. A multi-chamber process equipment of this example includes a wafer transfer chamber, a plurality of parallel PVD or other process chambers connected with the transfer chamber, a cooling chamber, a preclean chamber, a buffer chamber, and RTP/etching/CVD chamber (or chambers), a load lock chamber, and other chambers. The pressure of each chamber is held at a predetermined degree of vacuum (base pressure) according to the object of the chamber. For example, the wafer transfer chamber is held at 10.sup.-8 Torr (1.3.times.10.sup.-6 Pa), the PVD chamber is held at 10.sup.-9 Torr (1.3.times.10.sup.-7 Pa), and the load lock chamber is held at 10.sup.-5 Torr (1.3.times.10.sup.-3 Pa). Japanese Patent Provisional Publication (TOKKAI) No. 61-55926 shows still another conventional example. In these equipments, the pressures of the different chambers are determined so as to ensure the clean wafer processing environment. In general, the pressures are made closer to the atmospheric pressure in the following order; (Process chamber)&lt;(Wafer transfer chamber)&lt;(Load lock chamber). In the conventional process equipments, however, a wafer is readily affected by dew condensation especially in a low temperature etching chamber which is cooled to -20.degree. C..about.-70.degree. C. if the chamber is not evacuated sufficiently before loading of the wafer. Therefore, it is required to reduce the pressure in the chamber below a base pressure of the chamber (10.sup.-6 Torr, for example). Moreover, the degree of vacuum of the wafer transfer chamber is lower (that is, the pressure is higher) than that of the process chamber. Therefore, when the process chamber is opened, there arises a flow of residual water content from the wafer transfer chamber to the process chamber, resulting in the dew condensation. The conventional equipments cannot prevent condensation satisfactorily even if the pressure of the process chamber is decreased sufficiently below the base pressure. On the other hand, cross contamination is caused by a flow of residual gases from a process chamber for heat treatment or photo-assisted CVD, to the wafer transfer chamber if the degree of vacuum in the wafer transfer chamber is too high. Furthermore, the conventional equipments cannot sufficiently reduce variations of wafer properties such as sheet resistance from wafer to wafer, especially when the wafers are processed in a high temperature silicide CVD chamber. It is possible to reduce the variations of the sheet resistance by decreasing the pressure in the load lock chamber below the above-mentioned level. However, the pumping operation must be continued for three hours or more.
{ "pile_set_name": "USPTO Backgrounds" }
Splendid Superslut Practices A Rock Hard Sausage In Her Gash. A domme of virtuous dt displays all nestling’s were given and will get pummeled through a massive sausage.
{ "pile_set_name": "OpenWebText2" }
.theme-dusk,.theme-midnight { .hljs { display: block; overflow-x: auto; background: #232323; color: #e6e1dc; } .hljs-comment, .hljs-quote { color: #bc9458; font-style: italic; } .hljs-keyword, .hljs-selector-tag { color: #c26230; } .hljs-string, .hljs-number, .hljs-regexp, .hljs-variable, .hljs-template-variable { color: #a5c261; } .hljs-subst { color: #519f50; } .hljs-tag, .hljs-name { color: #e8bf6a; } .hljs-type { color: #da4939; } .hljs-symbol, .hljs-bullet, .hljs-built_in, .hljs-builtin-name, .hljs-attr, .hljs-link { color: #6d9cbe; } .hljs-params { color: #d0d0ff; } .hljs-attribute { color: #cda869; } .hljs-meta { color: #9b859d; } .hljs-title, .hljs-section { color: #ffc66d; } .hljs-addition { background-color: #144212; color: #e6e1dc; display: inline-block; width: 100%; } .hljs-deletion { background-color: #600; color: #e6e1dc; display: inline-block; width: 100%; } .hljs-selector-class { color: #9b703f; } .hljs-selector-id { color: #8b98ab; } .hljs-emphasis { font-style: italic; } .hljs-strong { font-weight: bold; } .hljs-link { text-decoration: underline; } }
{ "pile_set_name": "Github" }
58 Cal.App.3d 439 (1976) 129 Cal. Rptr. 797 L. GENE ALLARD, Plaintiff, Cross-defendant and Respondent, v. CHURCH OF SCIENTOLOGY OF CALIFORNIA, Defendant, Cross-complainant and Appellant. Docket No. 45562. Court of Appeals of California, Second District, Division Two. May 18, 1976. *443 COUNSEL Morgan, Wenzel & McNicholas, John P. McNicholas, Gerald E. Agnew, Jr., and Charles B. O'Reilly for Plaintiff, Cross-defendant and Respondent. Levine & Krom, Meldon E. Levine, Murchison, Cumming, Baker & Velpmen, Murchison, Cumming & Baker, Michael B. Lawler, Tobias C. Tolzmann and Joel Kreiner for Defendant, Cross-complainant and Appellant. OPINION BEACH, J. L. Gene Allard sued the Church of Scientology for malicious prosecution. Defendant cross-complained for conversion. A jury verdict and judgment were entered for Allard on the complaint for $50,000 in compensatory damages and $250,000 in punitive damages. Judgment was entered for Allard and against the Church of Scientology on the cross-complaint. Defendant-cross complainant appeals from the judgment. FACTS: The evidence in the instant case is very conflicting. We relate those facts supporting the successful party and disregard the contrary showing. (Nestle v. City of Santa Monica, 6 Cal.3d 920, 925-926 [101 Cal. Rptr. 568, 496 P.2d 480].) In March 1969, L. Gene Allard became involved with the Church of Scientology in Texas. He joined Sea Org in Los Angeles and was sent to San Diego for training. While there, he signed a billion-year contract agreeing to do anything to help Scientology and to help clear the planet of the "reactive people." During this period he learned about written policy directives that were the "policy" of the church, emanating from L. Ron Hubbard, the founder of the Church of Scientology.[1] After training on the ship, respondent was assigned to the Advanced Organization in Los Angeles, where he became the director of disbursements. He later became the Flag Banking Officer. *444 Alan Boughton, Flag Banking Officer International, was respondent's superior. Only respondent and Boughton knew the combination to the safe kept in respondent's office. Respondent handled foreign currency, American cash, and various travelers' checks as part of his job. In May or June 1969, respondent told Boughton that he wanted to leave the church. Boughton asked him to reconsider. Respondent wrote a memo and later a note; he spoke to the various executive officers. They told him that the only way he could get out of Sea Org was to go through "auditing" and to get direct permission from L. Ron Hubbard. Respondent wrote to Hubbard. A chaplain of the church came to see him. Lawrence Krieger, the highest ranking justice official of the church in California, told respondent that if he left without permission, he would be fair game and "You know we'll come and find you and we'll bring you back, and we'll deal with you in whatever way is necessary." On the night of June 7 or early morning of June 8, 1969, respondent went to his office at the Church of Scientology and took several documents from the safe. These documents were taken by him to the Internal Revenue Service in Kansas City; he used them to allege improper changes in the records of the church. He denies that any Swiss francs were in the safe that night or that he took such Swiss francs. Furthermore, respondent denies the allegation that he stole various travelers' checks from the safe. He admitted that some travelers' checks had his signature as an endorsement, but maintains that he deposited those checks into an open account of the Church of Scientology. There is independent evidence that tends to corroborate that statement. Respondent, having borrowed his roommate's car, drove to the airport and flew to Kansas City, where he turned over the documents to the Internal Revenue Service. Respondent was arrested in Florida upon a charge of grand theft. Boughton had called the Los Angeles Police Department to report that $23,000 in Swiss francs was missing. Respondent was arrested in Florida; he waived extradition and was in jail for 21 days. Eventually, the charge was dismissed. The deputy district attorney in Los Angeles recommended a dismissal in the interests of justice.[2] *445 CONTENTIONS ON APPEAL: 1. Respondent's trial counsel engaged in flagrant misconduct throughout the proceedings below and thereby deprived appellant of a fair trial. 2. The verdict below was reached as a result of (a) counsel's ascription to appellant of a religious belief and practices it did not have and (b) the distortion and disparagement of its religious character, and was not based upon the merits of this case. To allow a judgment thereby achieved to stand would constitute a violation of appellant's free exercise of religion. 3. Respondent failed to prove that appellant maliciously prosecuted him and therefore the judgment notwithstanding the verdict should have been granted. 4. The refusal of the trial court to ask or permit voir dire questions of prospective jurors pertaining to their religious prejudices or attitudes deprived appellant of a fair trial. 5. It was prejudicial error to direct the jury, in its assessment of the malicious prosecution claim, to disregard evidence that respondent stole appellant's Australian and American Express travelers' checks. 6. The order of the trial court in denying to appellant discovery of the factual basis for the obtaining of a dismissal by the district attorney of the criminal case People v. Allard was an abuse of discretion and a new trial should be granted and proper discovery permitted. 7. Respondent presented insufficient evidence to support the award of $50,000 in compensatory damages which must have been awarded because of prejudice against appellant. 8. Respondent failed to establish corporate direction or ratification and also failed to establish knowing falsity and is therefore not entitled to any punitive damages. 9. Even if the award of punitive damages was proper in this case, the size of the instant reward, which would deprive appellant church of more *446 than 40 percent of its net worth, is grossly excessive on the facts of this case. 10. There was lack of proper instruction regarding probable cause.[3] DISCUSSION: 1. There was no prejudicial misconduct by respondent's trial counsel, and appellant was not deprived of a fair trial. Appellant claims that it was denied a fair trial through the statements, questioning, and introduction of certain evidence by respondent's trial counsel. Love v. Wolf, 226 Cal. App.2d 378 [38 Cal. Rptr. 183], is cited as authority. We have reviewed the entire record and find appellant's contentions to be without merit. Several of counsel's individual statements and questions were inappropriate. However, there often were no objections by counsel for appellant where an objection and subsequent admonition would have cured any defect; or there was an objection, and the trial court judiciously admonished the jury to disregard the comment. Except for these minor and infrequent aberrations, the record reveals an exceptionally well-conducted and dispassionate trial based on the evidence presented. As in Stevens v. Parke, Davis & Co., 9 Cal.3d 51, 72 [107 Cal. Rptr. 45, 507 P.2d 653], a motion for a new trial was made, based in part upon the alleged misconduct of opposing counsel at trial. (1) What was said in Stevens applies to the instant case. "`A trial judge is in a better position than an appellate court to determine whether a verdict resulted wholly, or in part, from the asserted misconduct of counsel and his conclusion in the matter will not be disturbed unless, under all the circumstances, it is plainly wrong.' [Citation.] From our review of the instant record, we agree with the trial judge's assessment of the conduct of plaintiff's counsel and for the reasons stated above, we are of the opinion that defendant has failed to demonstrate prejudicial misconduct on the part of such counsel." (Stevens v. Parke, Davis & Co., supra, 9 Cal.3d at p. 72.) 2. The procedure and verdict below does not constitute a violation of appellant's First Amendment free exercise of religion. *447 (2) Appellant contends that various references to practices of the Church of Scientology were not supported by the evidence, were not legally relevant, and were unduly prejudicial. The claim is made that the trial became one of determining the validity of a religion rather than the commission of a tort. The references to which appellant now objects were to such practices as "E-meters," tin cans used as E-meters, the creation of religious doctrine purportedly to "get" dissidents, and insinuations that the Church of Scientology was a great money making business rather than a religion. The principal issue in this trial was one of credibility. If one believed defendant's witnesses, then there was indeed conversion by respondent. However, the opposite result, that reached by the jury, would naturally follow if one believed the evidence introduced by respondent. Appellant repeatedly argues that the introduction of the policy statements of the church was prejudicial error. However, those policy statements went directly to the issue of credibility. Scientologists were allowed to trick, sue, lie to, or destroy "enemies." (Exhibit 1.) If, as he claims, respondent was considered to be an enemy, that policy was indeed relevant to the issues of this case. That evidence well supports the jury's implied conclusion that respondent had not taken the property of the church, that he had merely attempted to leave the church with the documents for the Internal Revenue Service, and that those witnesses who were Scientologists or had been Scientologists were following the policy of the church and lying to, suing and attempting to destroy respondent. Evidence of such policy statements were damaging to appellant, but they were entirely relevant. They were not prejudicial. A party whose reprehensible acts are the cause of harm to another and the reason for the lawsuit by the other cannot be heard to complain that its conduct is so bad that it should not be disclosed. The relevance of appellant's conduct far outweighs any claimed prejudice.[4] We find the introduction of evidence of the policy statements and other peripheral mention of practices of the Church of Scientology not to be error. In the few instances where mention of religious practices may have been slightly less germane than the policy statements regarding fair game, they were nonetheless relevant and there was no prejudice to appellant by the introduction of such evidence. *448 3. The trial court properly denied the motion for judgment notwithstanding the verdict. (3) Appellant claimed that it had probable cause to file suit against respondent. The claim is made that even if Alan Boughton did take the checks from the safe, knowledge of that act should not be imputed to appellant church. Based on the policy statements of appellant that were introduced in evidence, a jury could infer that Boughton was within the scope of his employment when he stole the francs from the safe or lied about respondent's alleged theft. Inferences can be drawn that the church, through its agents, was carrying out its own policy of fair game in its actions against respondent. Given that view of the evidence, which as a reviewing court we must accept, there is substantial evidence proving that appellant maliciously prosecuted respondent. Therefore, the trial court did not err in denying the motion for the judgment notwithstanding the verdict. 4. The trial court performed proper voir dire of prospective jurors. (4) Appellant claims that the trial court refused to ask or permit voir dire questions of prospective jurors pertaining to their religious prejudices or attitudes. The record does not so indicate. Each juror was asked if he or she had any belief or feeling toward any of the parties that might be regarded as a bias or prejudice for or against any of them. Each juror was also asked if he or she had ever heard of the Church of Scientology. If the juror answered affirmatively, he or she was further questioned as to the extent of knowledge regarding Scientology and whether such knowledge would hinder the rendering of an impartial decision. One juror was excused when she explained that her husband is a clergyman and that she knows a couple that was split over the Church of Scientology. (5) The trial court's thorough questioning served the purpose of voir dire, which is to select a fair and impartial jury, not to educate the jurors or to determine the exercise of peremptory challenges. (Rousseau v. West Coast House Movers, 256 Cal. App.2d 878, 882 [64 Cal. Rptr. 655].) 5. It was not prejudicial error to direct the jury, in its assessment of the malicious prosecution claim, to disregard evidence that respondent stole appellant's Australian and American Express travelers' checks. *449 (6) Appellant submits that evidence of respondent's purported theft of the Australian and American Express travelers' checks should have been admitted as to the issue of malicious prosecution as well as the cross-complaint as to conversion. If there were any error in this regard, it could not possibly be prejudicial since the jury found for respondent on the cross-complaint. It is evident that the jury did not believe that respondent stole the travelers' checks; therefore, there could be no prejudice to appellant by the court's ruling. 6. Appellant suffered no prejudice by the trial court's denial of discovery of the factual basis for obtaining of the dismissal by the district attorney. (7) Prior to trial, appellant apparently sought to discover the reasons underlying the dismissal of the criminal charges against respondent. This was relevant to the instant case since one of the elements of a cause of action for malicious prosecution is that the criminal prosecution against the plaintiff shall have been favorably terminated. (Jaffe v. Stone, 18 Cal.2d 146 [114 P.2d 335, 135 A.L.R. 775].) Whether or not the lower court was justified in making such an order, the denial of discovery along these lines could not be prejudicial. During the trial, counsel for all parties stipulated that the criminal proceedings against Allard were terminated in his favor by a dismissal by a judge of that court upon the recommendation of the district attorney. In addition, there was a hearing outside the presence of the jury in which the trial court inquired of the deputy district attorney as to the reasons for the dismissal. It was apparent at that time that the prospective witnesses for the Church of Scientology were considered to be evasive. There was no prejudice to appellant since the deputy district attorney was available at trial. Earlier knowledge of the information produced would not have helped defendant. We find no prejudicial error in the denial of this discovery motion. 7. The award of $50,000 compensatory damages was proper. Appellant contends that based upon the evidence presented at trial, the compensatory damage award is excessive. In addition, appellant contends that the trial court erred in not allowing appellant to introduce evidence of respondent's prior bad reputation. *450 (8a) There was some discussion at trial as to whether respondent was going to claim damaged reputation as part of general damages. The trial court's initial reaction was to allow evidence only of distress or emotional disturbance; in return for no evidence of damaged reputation, appellant would not be able to introduce evidence of prior bad reputation. The court, however, relying on the case of Clay v. Lagiss, 143 Cal. App.2d 441 [299 P.2d 1025], held that lack of damage to reputation is not admissible. Therefore, respondent was allowed to claim damage to reputation without allowing appellant to introduce evidence of his prior bad reputation. In matters of slander that are libelous per se, for example the charging of a crime, general damages have been presumed as a matter of law. (Douglas v. Janis, 43 Cal. App.3d 931, 940 [4] [118 Cal. Rptr. 280], citing Clay v. Lagiss, supra, 143 Cal. App.2d at p. 448. Compare Gertz v. Robert Welch, Inc., 418 U.S. 323 [41 L.Ed.2d 789, 94 S.Ct. 2997].)[5] (9) Damages in malicious prosecution actions are similar to those in defamation. Therefore, damage to one's reputation can be presumed from a charge, such as that in the instant case that a person committed the crime of theft. (8b) In any event, as the trial court in the instant case noted, there was no offer of proof regarding respondent's prior bad reputation; any refusal to allow possible evidence on that subject has not been shown to be error, much less prejudicial error. (10) Appellant further contends that the amount of compensatory damages awarded was excessive and that the jury was improperly instructed regarding compensatory damages. The following modified version of BAJI Nos. 14.00 and 14.13 was given: "If, under the court's instructions, you find that plaintiff is entitled to a verdict against defendant, you must then award plaintiff damages in an amount that will reasonably compensate him for each of the following elements of loss or harm, which in this case are presumed to flow from *451 the defendant's conduct without any proof of such harm or loss: damage to reputation, humiliation and emotional distress. "No definite standard or method of calculation is prescribed by law to fix reasonable compensation for these presumed elements of damage. Nor is the opinion of any witness required as to the amount of such reasonable compensation. Furthermore, the argument of counsel as to the amount of damages is not evidence of reasonable compensation. In making an award for damage to reputation, humiliation and emotional distress, you shall exercise your authority with calm and reasonable judgment, and the damages you find shall be just and reasonable." The following instruction was requested by defendant and was rejected by the trial court: "The amount of compensatory damages should compensate plaintiff for actual injury suffered. The law will not put the plaintiff in a better position than he would be in had the wrong not been done." Accompanying the request for that motion is a citation to Staub v. Muller, 7 Cal.2d 221 [60 P.2d 283], and Basin Oil Co. v. Baash-Ross Tool Co., 125 Cal. App.2d 578 [271 P.2d 122]. The Supreme Court has recognized that "Damages potentially recoverable in a malicious prosecution action are substantial. They include out-of-pocket expenditures, such as attorney's and other legal fees ...; business losses ...; general harm to reputation, social standing and credit ...; mental and bodily harm ...; and exemplary damages where malice is shown...." (Babb v. Superior Court, 3 Cal.3d 841, 848, fn. 4 [92 Cal. Rptr. 179, 479 P.2d 379].) While these damages are compensable, it is the determination of the damages by the jury with which we are concerned. Appellant seems to contend that the jury must have actual evidence of the damages suffered and the monetary amount thereof. "`The determination of the jury on the issue of damages is conclusive on appeal unless the amount thereof is so grossly excessive that it can be reasonably imputed solely to passion or prejudice in the jury. [Citations.]'" (Douglas v. Janis, supra, 43 Cal. App.3d at p. 940.) The presumed damage to respondent's reputation from an unfounded charge of theft, along with imprisonment for 21 days, and the mental and emotional anguish that must have followed are such that we cannot say that the jury's finding of $50,000 in compensatory damages is unjustified. *452 That amount does not alone demonstrate that it was the result of passion and prejudice. 8. Respondent is entitled to punitive damages. (11) Appellant cites the general rule that although an employer may be held liable for an employee's tort under the doctrine of respondeat superior, ordinarily he cannot be made to pay punitive damages where he neither authorized nor ratified the act. (4 Witkin, Summary of Cal. Law. (8th ed.) § 855, p. 3147.)[6] Appellant claims that the Church of Scientology, which is the corporate defendant herein, never either authorized or ratified the malicious prosecution. The finding of authorization may be based on many grounds in the instant case. For example, the fair game policy itself was initiated by L. Ron Hubbard, the founder and chief official in the church. (Exhibit 1.) It was an official authorization to treat "enemies" in the manner in which respondent herein was treated by the Church of Scientology. Furthermore, all the officials of the church to whom respondent relayed his desire to leave were important managerial employees of the corporation. (See 4 Witkin, Summary of Cal. Law (8th ed.) supra, § 857, p. 3148.) The trier of fact certainly could have found authorization by the corporation of the act involved herein. 9. The award of punitive damages. (12) Any party whose tenets include lying and cheating in order to attack its "enemies" deserves the results of the risk which such conduct entails. On the other hand, this conduct may have so enraged the jury that the award of punitive damages may have been more the result of *453 feelings of animosity, rather than a dispassionate determination of an amount necessary to assess defendant in order to deter it from similar conduct in the future. In our view the disparity between the compensatory damages ($50,000) and the punitive damages ($250,000) suggests that animosity was the deciding factor. Our reading of the decisional authority compels us to conclude that we should reduce the punitive damages. We find $50,000 to be a reasonable amount to which the punitive damages should be reduced. We perceive this duty, and have so modified the punitive damages award not with any belief that a reviewing court more ably may perform it.[7] (13) Simply stated the decisional authority seems to indicate that the reviewing court should examine punitive damages and where necessary modify the amount in order to do justice. (Cunningham v. Simpson, 1 Cal.3d 301 [81 Cal. Rptr. 855, 461 P.2d 39]; Forte v. Nolfi, 25 Cal. App.3d 656 [102 Cal. Rptr. 455]; Shroeder v. Auto Driveaway Company, 11 Cal.3d 908 [114 Cal. Rptr. 622, 523 P.2d 662]; Livesey v. Stock, 208 Cal. 315, 322 [281 P. 70].) 10. Instruction on probable cause. Appellant requested an instruction stating: "Where it is proven that a judge has had a preliminary hearing and determined that the facts and evidence show probable cause to believe the plaintiff guilty of the offense charged therefore, ordering the plaintiff to answer a criminal complaint, this is prima facie evidence of the existence of probable cause." The trial court gave the following instruction: "The fact that plaintiff was held to answer the charge of grand theft after a preliminary hearing is evidence tending to show that the initiator of the charge had probable cause. This fact is to be considered by you along with all the other evidence tending to show probable cause or the lack thereof."[8] Appellant claimed for the first time in its reply brief that the trial court's lack of proper instruction regarding probable cause was prejudicial error. Since this issue was raised for the first time in appellant's reply brief, we decline to review the issue.[9] *454 The judgment is modified by reducing the award of punitive damages only, from $250,000 to the sum of $50,000. As modified the judgment is in all other respects affirmed. Costs on appeal are awarded to respondent Allard. Roth, P.J., and Fleming, J., concurred. A petition for a rehearing was denied June 17, 1976, and the petitions of both parties for a hearing by the Supreme Court were denied July 15, 1976. NOTES [1] One such policy, to be enforced against "enemies" or "suppressive persons" was that formerly titled "fair game." That person "[m]ay be deprived of property or injured by any means by any Scientologist without any discipline of the Scientologist. May be tricked, sued or lied to or destroyed." (Exhibit 1.) [2] Leonard J. Shaffer, the deputy district attorney, testified outside the presence of the jury that members of the church were evasive in answering his questions. He testified that the reasons for the dismissal were set forth in his recommendation; the dismissal was not part of a plea bargain or procedural or jurisdictional issue. [3] This issue is raised for the first time in appellant's reply brief. [4] The trial court gave appellant almost the entire trial within which to produce evidence that the fair game policy had been repealed. Appellant failed to do so, and the trial court thereafter permitted the admission of Exhibit 1 into evidence. [5] The Supreme Court held in Gertz v. Robert Welch, Inc., supra, 418 U.S. 323, 349 [41 L.Ed.2d 789, 810], an action for defamation, that "the States may not permit recovery of presumed or punitive damages, at least when liability is not based on a showing of knowledge of falsity or reckless disregard for the truth." (Italics added.) The instant case is distinguishable from Gertz. Initially, the interests protected by a suit for malicious prosecution include misuse of the judicial system itself; a party should not be able to claim First Amendment protection maliciously to prosecute another person. Secondly, the jury in the instant case must have found "knowledge of falsity or reckless disregard for the truth" in order to award punitive damages herein. Therefore, even under Gertz, a finding of presumed damages is not unconstitutional. [6] We again note that Gertz v. Robert Welch, Inc., supra, precludes the award of punitive damages in defamation actions "at least when liability is not based on a showing of knowledge of falsity or reckless disregard for the truth." The facts of the instant case fall within that categorization, so a finding of punitive damages was proper. Moreover, as we noted above, an egregious case of malicious prosecution subjects the judicial system itself to abuse, thereby interfering with the constitutional rights of all litigants. Punitive damages may therefore be more easily justified in cases of malicious prosecution than in cases of defamation. The societal interests competing with First Amendment considerations are more compelling in the former case. [7] See dissent in Cunningham v. Simpson, 1 Cal.3d 301 [81 Cal. Rptr. 855, 461 P.2d 39]. [8] This instruction was given on the court's own motion. [9] We note that given the circumstances of the instant case, the juror could have easily been misled by the requested instruction. If the evidence showed that the agents and employees of appellant were lying, then the preliminary hearing at which they also testified would not be valid. While the jurors may of course consider that the magistrate at the preliminary hearing found probable cause, that should be in no way conclusive in the jury's determination of probable cause.
{ "pile_set_name": "FreeLaw" }
Q: Django ModelForm not showing up in template I've been using django for a couple of days now and I'm trying to create a small app to learn the whole stuff. I've read about the ModelForms and I wanted to use it in my app, but I can't get it to render in my template and I can't find the problem, so I was hoping you guys could help me out. Here's my code: models.py from django.db import models class Kiss(models.Model): latitude = models.FloatField() longitude = models.FloatField() person1 = models.CharField(max_length = 255) person2 = models.CharField(max_length = 255) cdate = models.DateTimeField(auto_now_add=True) def __unicode__(self): return self.person1 views.py from django.views.generic.list import ListView from project.models import Kiss from project.forms import KissForm from django.http import HttpResponseRedirect class KissListView(ListView): template_name = 'project/home.html' model = Kiss form = KissForm urls.py (only the relevant part) urlpatterns += patterns('', url(r'^$', KissListView.as_view(), name='home'), ) forms.py from django import forms from project.models import Kiss class KissForm(forms.ModelForm): class Meta: model = Kiss and the template <form action="" method="POST"> {% csrf_token %} {{form.as_p}} <button>Send</button> </form> Thanks in advance for your help. J A: class KissListView(ListView): ... You are using ListView which does not require form and will not give you form in the template context. You may want to use CreateView instead.
{ "pile_set_name": "StackExchange" }
Komend jaar moet het de Piratenpartij eindelijk lukken om de felbegeerde Tweede Kamerzetel binnen te halen. Dat is het algemene gevoel bij het tweedaagse congres dit weekeinde van de partij. “Er is nu echt meer aandacht voor privacy dan een paar jaar geleden”, zegt Dave Borghuis uit Enschede, die zondag een plekje op de kandidatenlijst hoopt te krijgen. Hij noemt de namen van Edward Snowden en Julian Assange, die op de shirts van menig Piraat langskomen. De partij heeft zich ook verbreed, vindt Borghuis. “Ons programma is inmiddels breder dan dat van de PVV”. Een andere troefkaart: lijsttrekker Ancilla van de Leest. Dit 31-jarige voormalig fotomodel trad de afgelopen maanden al veelvuldig op in de media en “kan ons verhaal goed voor het voetlicht brengen”, aldus Borghuis. Vlak voor aanvang zijn in evenementencentrum NUtrecht de voorbereidingen op het congres van de Piratenpartij Nederland nog in volle gang. Een klein clubje vrijwilligers versiert kraampjes met donkerpaarse Piratenvlaggen. Links in een hoekje zitten een aantal jongens achter hun laptops mee te doen aan een hackathon, een online evenement waarin softwareontwikkelaars ideeën uitwisselen. Het is voor het eerst in haar zesjarige geschiedenis dat de Piratenpartij een heus partijcongres organiseert. De partij, die zich met name profileert op privacy en digitale veiligheid, doet bij de Tweede Kamerverkiezingen van maart aanstaande voor de derde keer een gooi naar een zetel. Bij de verkiezingen van 2010 en 2012 kwam de partij, die internationaal in verschillende (regio)parlementen is vertegenwoordigd, stemmen tekort. De Piraten kregen vier jaar geleden ruim 30.000 stemmen, wat toen bijna de helft was van het aantal stemmen dat nodig was voor een zetel. In 2014 slaagde de partij erin een zetel te winnen in stadsdeel Amsterdam-West en kreeg daarmee voor het eerst een vertegenwoordiger in de Nederlandse politiek. Maar in de huidige landelijke peilingen staat de partij op nul zetels. Rien Zilvold Op het congres komen op deze eerste dag naar schatting zo’n honderd tot honderdvijftig man af. De partij heeft bij aanvang van het congres 917 leden. Onder de aanwezigen zijn allerlei soorten mensen: mannen op leeftijd met brillen en lang haar - types die je wellicht bij de Piratenpartij verwacht - en vooral veel jonge mensen, van hacker tot student. Er zijn allerlei workshops en lezingen over onderwerpen zo divers als het vrijhandelsverdrag TTIP, illegaliteit en het octrooirecht. Verder stelden de leden aan het einde van de zaterdag het verkiezingsprogramma vast, waarna - hoe kan het anders - Piraatbier wordt gedronken. ‘Voor een vrije informatiesamenleving’ Dat programma focust inderdaad sterk op privacy en digitale burgerrechten. De Piratenpartij wil een verbod op de ongevraagde verkoop van persoonlijke informatie, het stopzetten van preventief fouilleren en minder cameratoezicht. Het bestuur moet transparanter worden gemaakt door het openbaar maken van alle overheidsdocumentatie en de partij, die de slogan ‘Voor een vrije informatiesamenleving voert’, wil meer rechtstreekse invloed van de burger op de politiek door online inspraakfora en burgertoppen. De Piraten zijn verder voor het hervormen van het auteursrecht en staan ook voor een zeer liberaal drugsbeleid en willen legalisering van softdrugs en regulering van de productie en handel in andere drugs. Opinieonderzoeker Peter Kanne, werkzaam voor peilingbureau I&O Research, denkt dat de Piratenpartij met hun thema’s “een onderstroom in de samenleving te pakken hebben”. Hij zegt in een telefoongesprek daags voor het congres dat de partij zeker een zetel kan halen, maar denkt dat zij “een digitale ramp nodig hebben om door te breken”. “Mensen voelen de gebrekkige digitale veiligheid te weinig aan den lijve”, aldus de onderzoeker. Dat de partij vooral om één onderwerp draait is juist goed volgens Kanne, die wijst op partijen als 50Plus en de Partij voor de Dieren. Maar een breed thema als digitale veiligheid is niet altijd even makkelijk te politiseren, zegt Kanne. “Je hebt ook een leider nodig die dat in goede soundbites kan vatten”. ‘Crisis achter de rug’ Die taak is de komende maanden weggelegd voor de in juni gekozen lijsttrekker Ancilla van de Leest. Zij kreeg een paar weken geleden haar vuurdoop toen het partijbestuur uit onvrede over haar leiderschapsstijl opstapte en lid werd van Forum voor Democratie, de nieuwe partij van publicist Thierry Baudet. Van de Leest kreeg het verwijt het partijbestuur buitenspel te zetten en alles binnen de partij met haar eigen vertrouwelingen te bepalen. De lijsttrekker wuift de kritiek op het congres weg. “Zij zijn gevraagd te vertrekken, we hebben dit probleem met z’n allen opgelost. Deze crisis is achter de rug”, aldus Van de Leest in een interview op het congres. De lijsttrekker heeft zin in de campagne en denkt dat drie Kamerzetels haalbaar is en gaat uit van minstens één. “Het is vooral zaak onze achterban te mobiliseren en dat we ons verder richten op mensen die nu niet stemmen omdat ze teleurgesteld zijn in de huidige politiek.” Kanne geeft de mediagenieke Van de Leest een goede kans. “Het is wel zaak de Piraten nu de rijen sluiten, je moet niet blijven ruziën. Anders kun je als kleine partij wel inpakken.”
{ "pile_set_name": "OpenWebText2" }
Social deprivation and primary hyperparathyroidism. To investigate the potential relationship between social status or deprivation and the prevalence of primary hyperparathyroidism (PHPT). We retrospectively identified a cohort of patients diagnosed as having PHPT between 1981 and 2007 from the Scottish Morbidity Records database. The Scottish Index of Multiple Deprivation (SIMD) 2006 quintiles were derived for these patients by using the postal codes. The distribution of the SIMD quintiles was examined to determine the possible influence of deprivation on the incidence of PHPT. In Scotland between 1981 and 2007, 3,039 patients were diagnosed as having PHPT, in accordance with the International Classification of Diseases code for PHPT. The distribution of the PHPT cohort across the SIMD 2006 quintiles was significantly different from that expected, with a higher representation (27.2%) among the most deprived and a lower representation (14.5%) in the least deprived quintile, in comparison with the 20% expected in each quintile (P<.0001). The findings in this study suggest that socioeconomic deprivation is associated with an increased risk of developing PHPT.
{ "pile_set_name": "PubMed Abstracts" }
Alexander Bell Donald Alexander Bell Donald (18 August 1842–7 March 1922) was a New Zealand seaman, sailmaker, merchant and ship owner. He was born in Inverkeithing, Fife, Scotland on 18 August 1842. References Category:1842 births Category:1922 deaths Category:Scottish emigrants to New Zealand Category:People from Inverkeithing
{ "pile_set_name": "Wikipedia (en)" }
4 ideas for improving your e-commerce ​website 2019 is here, and the new year provides an excellent opportunity to refresh your e-commerce website, by adding new features and updating content. Adding web banners Web banners are a great way to keep your e-commerce website homepage looking fresh, and making viewers aware of the latest news about products and offers. They can be easily modified to serve a range of purposes, are potentially eye-catching if they are placed in the appropriate area and are a good way of promoting a specific product or offer on a homepage while also retaining the core brand visuals elsewhere. The image below is an example of a web banner in development. We’ve put together a handy guide for creating your banners – click here. Adding new features New features on your e-commerce website can add value through improved functionality, which in turn enhances the usability for customers and users. Features that allow for easy modification to products that they wish to purchase, such as different colours or quantities, or a social login function that enables users to create an account through their Facebook credentials. Such responsive features make the e-commerce process as painless and easy-to-use as possible, limiting the barriers between browsing and purchase, in turn improving conversion rates and the chances of customers returning for more in the future. A positive experience can often leave the customer wanting more, and it’s the websites job to ensure that their features and functionality are kept updated and fit for purpose, in response to the ever-changing demands of the modern e-commerce customer. For example, one of the new features we’ve recently added from Amasty is the Social Login, which allows users to set up their account using login credentials from Facebook. To find out more about this feature, click here. Improve optimisation While you’re reading this, grab a smartphone or tablet and have a browse around your website. How does it look? Are the images stacked or overlapping, or is there text missing? These issues mean your website has not been optimised for mobile devices, making it unusable for a large percentage of potential customers browsing with their iPhones or Samsungs. Users are extremely unlikely to want to fight through images and texts to find the products they want, and will quickly become frustrated and depart for a different site. Don’t neglect these customers! Get your site optimised for different devices to reach as wide an audience as possible. Data from 2018, shown below in the graph, from Statista.com, shows that 52.2% of all browsing online was done on a mobile device, a trend which has grown exponentially year-upon-year. This graph underlines the importance of ensuring that your website is fit for use for all potential users. You’re potentially missing out on reaching these customers if your site doesn’t meet their demands, and, with the trend of mobile browsing only set to rise, optimising your website to ensure it’s fit for use is quickly become a necessity for online retailers. Our Liquidshop e-commerce platform is designed to provide the best user experience for your customers, though responsive e-commerce. Optimisation on devices of all sizes allows your website to be user-friendly for as many potential visitors as possible, expanding your reach and enhancing the user experience, leading to increased sales as part of the smooth and responsive overall e-commerce experience. Keeping branding updated and consistent There are few things more off-putting when navigating onto an e-commerce website that a poorly designed logo at the top of the page, or old, pixilated imagery taking up the homepage. A consistent brand image across the pages improves brand recognition for customers and gives the impression of a modern, well designed and cared for website and business as a whole. You can also create special themed logos for holiday times such as Christmas or winter, like we did with our logo below. What’s most important is too put time and effort into keeping your website updated. Whether that’s imagery, information or branding, putting the time into maintaining an attractive and cohesive e-commerce site means you keep your customers, and new visitors engaged and ensure that there as few barriers as possible between browsing and purchase. Magento is ending support for version 1 in June 2020. After initially announcing that November 2018 would be the cut-off point, this was revised to the later date, to allow for the vast amount of v1 websites around the world to be upgraded and rebuilt in v2. What... We closely monitor all areas of e-commerce, always on the lookout for developments that offer additional functionality and improved performance for our Liquidshop clients and their customers. One development that is a growing concern throughout the industry is... In case you missed the news last week, Liquidshop has become an official partner of Magento feature developer Amasty. Liquidshop has been recognised by Amasty as a company who have significant expertise and skills in Magento web development. This underlines the...
{ "pile_set_name": "Pile-CC" }
Update: Sree Narasimha Jayanthi – May 17th 2019 This day signifies the appearance of Lord Narasimha on the planet. Lord Narasimha is the fourth and the greatest incarnation of Lord Vishnu. He is believed to have appeared to protect his devotee, Prahlada, from his father Hiranyakashyapu . If you listen to the song ” Narashima Nembo davana” posted on youtube, there is a paragraph which explains how Lord Narashima came from the pillar. Hiranyakashyapu pointed out at a pillar in his palace and asked Prahalada whether Lord Vishnu was present in it pillar. Prahalada who was a great devotee said yes. Next, you know Hiranyakashyapu uses his Gadha and broke open the pillar and there emerged our Lord Narasimha who than slained Hiranyakashyapu using his sharp paws. The day signifies the triumph of good over evil and the eagerness of the lord to protect his devotees from evil. When my Parents visited us last year, my Father recited the “Bhagavatha Purana” for three weeks at my place. The way my Dad explained this part of the Purana, brings tears to my eyes every time I listen “Narashima Nembo Devana”. The greatest mistake I made was to not record the purana. Hopefully will record the next time my Father visits us. About Narasimha Jayanthi: Ms. Lakshmi’s write up summary from the book “ಭಾರತೀಯ ಹಬ್ಬ ಹರಿದಿನಗಳು” by ಶ್ರೀ ಶ್ರೀ ರಂಗಪ್ರಿಯ ಮಹಾದೇಷಿಕ ಸ್ವಾಮಿಗಳು. “The pillar in evil Hiranyakashipu’s royal court, signifies the ṃērusthambha, the central backbone system. Through the central nervous system called ṣuśumna, the brilliant light emanated. The energy associated came out in its full fierce glory as Narasimha and later transformed into the peaceful form after the destruction of evil force.” When is Narasimha Jayanthi celebrated? Narasimha Jayanthi is one of the important festivals of Vaiśnavas. It is celebrated in the vaiśāka māsam,on ṣukla pakśa chaturdaśi, after akśhaya thrithēya, svāti nakśatra, siddha Yōga, vanija karanam. The date is determined according to chāndramāna system. Since the inception of this avatāram is in the evening, the worship is done in the evening. It is considered to be more auspicious if this day coincides with sōmavasarē, Monday or ṣanivasarē, Saturday. It is a sacred day to remember Lord Narasimha’s sarva vyāpakatva- all pervading – spiritual knowledge, wealth, strength, valor, splendor, and compassion toward His devotees. Which are the major manifestations of Lord Narasimha? There are three major forms of Lord Narasimha. 1. Ugra-Narasimha – His fierce form: In this form He has conch – ṣanka, discus – chakra, mace – gada, bow – chāpa, bells – ghanta-, trident like – ankuśa, and his two hands ready to chisel the demon heart, as His āyudhams – weapons. This form is worshipped in the evenings. 2. Lakshmi Narasimha: In this form he is very peaceful – ṣanta – with His consort – Sri Lakshmi sitting on his left lap, with ādiseṣa on his head as umbrella, and Prahallāda standing in his front praying with his folded hands. This manifestation is followed after his fierce form– as a result, he is worshipped in the morning. 3. Yoga Narasimha – meditative: Here, He is in his Meditative form for those who aspire for results of Yoga. – Incense, lamplight, flowers and ṣrigandha or perfume.- tuḻasi or Holy Basil — Since he has the element of both viśnu and rudra- kamalam – Lotus, bilva daḻam – leaves of stone apple, japākusumam- red hibiscus can be offered to the Lord. What kinds of food can be offered to Lord Narasimha? Athirasa – fried cake made with jaggery and rice flour. Pāyasa – milk puddings made out of any of moong dal, channa dal, and – – – Pānaka – typically made with jaggery water and pepper, or fruit juice like lemonade. Any sātvik food can be offered with great devotion by chanting the Narasimha Mantra. sātvik food is that food creates an internal calmness and balance, when one consumes it. The lord graciously accepts devotees’ service and reverence. All worship should be followed by distribution of Prasāda or food offered to God. How do we worship Lord Narasimha? Lord Narasimha can be worshipped in two ways. The first is detailed below: Along with firm faith, worship of Narasimha is associated with rigid criteria. This is explained in detail below 1. ācharana ṣuddhi – Requires strict adherence to performance. 2. Cleanliness of ḍravya- physical things like utensils, lamps, ingredients. 3. Inner sanctity of five senses – body, intellect, mind, place, and act of worship 4. Chastity of Mind, speech and deeds unification, compassion, calmness of virtuous soul within. These are to prevent any glitches that might distract the mind while doing the worship. 5. Taking bath and starting with daily routine worship followed by pūja sankalpa-declaration to do worship, and completion without break with little or no food intake till then. 6. Bodily calmness in turn calms the mind. This helps to open up the channel that leads to internal visualization and realization of Narasimha. These are things that keep body, mind and intellect in balance to further the pursuit of (worship til)attaining perfection. 7. Those who seek Salvation, do fasting till worship is over in the evening.Those who seek all types of desire fulfillment do fasting till the next day morning worship and follow with chanting of Narasimha mantra. 8. To do further, people could do hōma – oblation and read “Nrsimhatāpini ” upaniśad. 9. An idol of Narasimha can be donated to someone who has great respect and potential to worship the idol. The second means of worship is detailed for those who find it difficult to adhere to the above strict rules, can do the following steps 1. ḍhyāna or meditation – along with imagining the worship of Narasimha with the above said flowers etc. 2. Acts of mind and soul offered to God is also oblation. This is equivalent to hōmam. 3.Various purifying actions performed during puja a. snānha – ablution, pāna – intake of water and food offered to God b. pādya – chant with clean and clear heart and intellect c. arghya – water offered with respect from the river of faith d. āchamana – water used for sipping same river e. abhiśeka – for the lord f. Mind filled with the flow of thoughts of God from the river of faith, ṣraddha – as the water for cleansing. 4. ātma – Offer sacred soul which is inside the body. 5. bow and perform salutation with state of equanimity 6. ṣaranāgati– self surrender to the Lord With pure mind and internal contemplation there is no need for external rituals to be performed. Pāramārthika or worship of realizing supreme alone with internal purity surpasses all other forms of worship. That is, true worship with internal purity is more powerful than the external rituals. As part of worship, singing, listening to discourse is recommended at the end of the worship. Insight about this incarnation of ṣri mahāviśnu: The brilliant form of Narasimha is described as comprising of three entities. 1. Brahma from feet to naval, 2. Vishnu–naval to neck 3. Rudra–neck unto head., From there onwards– it is the supreme Godhead, Parabrahma. Narasimha is personification of truth–perceived and experienced by those who are in the state of union with divine, and that, which is beyond senses – Yoga Samādhi. The brilliant form of Narasimha is also considered and viewed as an internal phenomenon. Dear Smt.Meera Raghu, Thanks for giving us a very comprehensive information on Narasimha Jayanti. Your efforts are always excellent, perfect and highly useful to all in Madhwa community.Rayaru will keep you and your family always happy hale and healthy to continue this sacred service. I just thought of sharing a very sacred stotra on Narasimha which I learnt from somebody (I dont remeber right now.) and chanting this stotra 5 time at any distressful/critical situation will clear the situation with wonderful solution to the problem causing the distress/crisis. I have reproduced this stotra below for the benefit of everyone Hare Krsna dear Meera Mataji! Dandavat pranaam! Thank you for the wonderful article but the word “Idol” is completely wrong, it is to be mentioned as “Deity”. The word Idol, which means “an object of false worship”, was introduced by the British to destroy our Vedic Culture. Thank you 🙂 About Narasimha Jayanthi: Here is my write up summary from the book “ಭಾರತೀಯ ಹಬ್ಬ ಹರಿದಿನಗಳು” by ಶ್ರೀ ಶ್ರೀ ರಂಗಪ್ರಿಯ ಮಹಾದೇಷಿಕ ಸ್ವಾಮಿಗಳು “The pillar in evil Hiranyakashipu’s royal court, signifies the ṃērusthambha, the central backbone system. Through the central nervous system called ṣuśumna, the brilliant light emanated. The energy associated came out in its full fierce glory as Narasimha and later transformed into the peaceful form after the destruction of evil force.” When is Narasimha Jayanthi celebrated? Narasimha Jayanthi is one of the important festivals of Vaiśnavas. It is celebrated in the vaiśāka māsam,on ṣukla pakśa chaturdaśi, after akśhaya thrithēya, svāti nakśatra, siddha Yōga, vanija karanam. The date is determined according to chāndramāna system. Since the inception of this avatāram is in the evening, the worship is done in the evening. It is considered to be more auspicious if this day coincides with sōmavasarē, Monday or ṣanivasarē, Saturday. It is a sacred day to remember Lord Narasimha’s sarva vyāpakatva- all pervading – spiritual knowledge, wealth, strength, valor, splendor, and compassion toward His devotees. Which are the major manifestations of Lord Narasimha? There are three major forms of Lord Narasimha. 1. Ugra-Narasimha – His fierce form: In this form He has conch – ṣanka, discus – chakra, mace – gada, bow – chāpa, bells – ghanta-, trident like – ankuśa, and his two hands ready to chisel the demon heart, as His āyudhams – weapons. This form is worshipped in the evenings. 2. Lakshmi Narasimha: In this form he is very peaceful – ṣanta – with His consort – Sri Lakshmi sitting on his left lap, with ādiseṣa on his head as umbrella, and Prahallāda standing in his front praying with his folded hands. This manifestation is followed after his fierce form– as a result, he is worshipped in the morning. 3. Yoga Narasimha – meditative: Here, He is in his Meditative form for those who aspire for results of Yoga. – Incense, lamplight, flowers and ṣrigandha or perfume.- tuḻasi or Holy Basil — Since he has the element of both viśnu and rudra- kamalam – Lotus, bilva daḻam – leaves of stone apple, japākusumam- red hibiscus can be offered to the Lord. What kinds of food can be offered to Lord Narasimha? Athirasa – fried cake made with jaggery and rice flour. Pāyasa – milk puddings made out of any of moong dal, channa dal, and – – – Pānaka – typically made with jaggery water and pepper, or fruit juice like lemonade. Any sātvik food can be offered with great devotion by chanting the Narasimha Mantra. sātvik food is that food creates an internal calmness and balance, when one consumes it. The lord graciously accepts devotees’ service and reverence. All worship should be followed by distribution of Prasāda or food offered to God. How do we worship Lord Narasimha? Lord Narasimha can be worshipped in two ways. The first is detailed below: Along with firm faith, worship of Narasimha is associated with rigid criteria. This is explained in detail below 1. ācharana ṣuddhi – Requires strict adherence to performance. 2. Cleanliness of ḍravya- physical things like utensils, lamps, ingredients. 3. Inner sanctity of five senses – body, intellect, mind, place, and act of worship 4. Chastity of Mind, speech and deeds unification, compassion, calmness of virtuous soul within. These are to prevent any glitches that might distract the mind while doing the worship. 5. Taking bath and starting with daily routine worship followed by pūja sankalpa-declaration to do worship, and completion without break with little or no food intake till then. 6. Bodily calmness in turn calms the mind. This helps to open up the channel that leads to internal visualization and realization of Narasimha. These are things that keep body, mind and intellect in balance to further the pursuit of (worship til)attaining perfection. 7. Those who seek Salvation, do fasting till worship is over in the evening.Those who seek all types of desire fulfillment do fasting till the next day morning worship and follow with chanting of Narasimha mantra. 8. To do further, people could do hōma – oblation and read “Nrsimhatāpini ” upaniśad. 9. An idol of Narasimha can be donated to someone who has great respect and potential to worship the idol. The second means of worship is detailed for those who find it difficult to adhere to the above strict rules, can do the following steps 1. ḍhyāna or meditation – along with imagining the worship of Narasimha with the above said flowers etc. 2. Acts of mind and soul offered to God is also oblation. This is equivalent to hōmam. 3.Various purifying actions performed during puja a. snānha – ablution, pāna – intake of water and food offered to God b. pādya – chant with clean and clear heart and intellect c. arghya – water offered with respect from the river of faith d. āchamana – water used for sipping same river e. abhiśeka – for the lord f. Mind filled with the flow of thoughts of God from the river of faith, ṣraddha – as the water for cleansing. 4. ātma – Offer sacred soul which is inside the body. 5. bow and perform salutation with state of equanimity 6. ṣaranāgati– self surrender to the Lord With pure mind and internal contemplation there is no need for external rituals to be performed. Pāramārthika or worship of realizing supreme alone with internal purity surpasses all other forms of worship. That is, true worship with internal purity is more powerful than the external rituals. As part of worship, singing, listening to discourse is recommended at the end of the worship. Insight about this incarnation of ṣri mahāviśnu: The brilliant form of Narasimha is described as comprising of three entities. 1. Brahma from feet to naval, 2. Vishnu–naval to neck 3. Rudra–neck unto head., From there onwards– it is the supreme Godhead, Parabrahma. Narasimha is personification of truth–perceived and experienced by those who are in the state of union with divine, and that, which is beyond senses – Yoga Samādhi. The brilliant form of Narasimha is also considered and viewed as an internal phenomenon.
{ "pile_set_name": "Pile-CC" }
XEMS-AM XEMS (branded as Radio Mexicana) is a Regional Mexican radio station that serves the Brownsville, Texas (United States) / Matamoros, Tamaulipas (Mexico) border area. History XEMS began broadcasting on 1500 kHz in 1952. It soon moved to 1490. External links radioavanzado.com raiostationworld.com; Radio stations in the Rio Grande Valley References Category:Spanish-language radio stations Category:Radio stations in Matamoros
{ "pile_set_name": "Wikipedia (en)" }
Q: Assembly in Visual Studio 2013 not building even after enabling Microsoft Macro Assembler I'm trying to run a pretty basic assembly file to do a little math and print the output, nothing challenging. I've followed the steps given from places such as here but my build still fails and there are errors on every single line about syntax. Errors such as: 1>c:\users\damian\documents\visual studio 2013\projects\test345\test345\source.asm(22): error C2061: syntax error : identifier 'dword' 1>c:\users\damian\documents\visual studio 2013\projects\test345\test345\source.asm(24): error C2061: syntax error : identifier 'add' 1>c:\users\damian\documents\visual studio 2013\projects\test345\test345\source.asm(27): error C2061: syntax error : identifier 'pop' 1>c:\users\damian\documents\visual studio 2013\projects\test345\test345\source.asm(12): error C2061: syntax error : identifier 'main' The code I'm trying to run is here. I've tried changing from cpp to c compiling, I've tried setting an entry point in the linker, and I've tried right clicking on project->Build Dependencies->Build Customizations and checking masm but none of those made any difference at all. Is there something else I'm missing? A: The code you tried to assemble uses NASM syntax. You need to configure Visual Studio to use NASM instead. 1) Install NASM and add it's path to the PATH environment variable. 2) Right click on your asm file and then choose Properties->General and then choose Custom Build Tool for the Item Type field. 3) Click on Apply. 4) On the Custom Build Tool page set nasm -f win32 -o "$(ProjectDir)$(IntDir)%(Filename).obj" "%(FullPath)" for the Command Line field. 5) Set the Outputs field to $(IntermediateOutputPath)%(Filename).obj This will make NASM assemble your assembly source file into visual studio compatible object file. We are not done yet though, you need to make some changes to the assembly file before you can link it using MSVC's linker. 1) MSVC's linker requires your functions to start with an underscore so main becomes _main. 2) The naming convention when declaring imported APIs is different too. So extern printf becomes extern __imp__printf 3) Call instructions to imported APIs are different too. call printf becomes call [__imp__printf]. The address of printf will be stored in an import table entry and our instruction dereferences it to find the address of printf and calls it. Trying to link this will also result in an error (error LNK2001: unresolved external symbol _mainCRTStartup). The way I beat this is including a c file with a dummy function that does nothing. That way, the CRT startup stub gets linked. (If there is a better method, suggest it in the comments).
{ "pile_set_name": "StackExchange" }
Comment by Loreanadruid Arguably Inferior Socket for Paladin PvE Gems for the most part, but Superior for PvP.A side-grade to t6, but an upgrade for almost anything pre-Sunwell. Comment by mikititan Anyone knows if this schematic will be buyable from the trainer or will it drop (raid/heroic)? -thanks Comment by gennym This item, and all the other engineering helm upgrades, are sunwell trash drops. So since people need to start farming the instance to begin with and there will be people in the raids who need it you probably won't see this on the AH for quite some time depending on the server. Comment by mbg98 I wouldn't call this a side grade at all, considering that Sunwell requires paladins to spam Holy Light a lot more than Flash of Light, making their mana regen come mostly from Illumination/holy crit (great for pallies with the 2 piece t6 crit bonus to HL) and being in a group with a Shadow Priest. The upgrades here are where it matters most - a 20 crit increase over t6 (more than 1 % - thats fantastic in a single piece!) and plus 9 healing. Armor? lol - what are you going to do, tank in holy gear in Sunwell? You'll need the stam for the boss fights consdering the dots that Kalecgos does, for starters. Int doesnt matter so much since your mana regen and your +heal are really the major factors in post BT/MH content. Comment by natto My server has pug groups for sunwell trush run. BoP/BoE recipes usually drops from 1 to 5 and lots of epic-stones. You do not have to wear BT/Hyjal geared, Kara/SSC/TK gears are fine for trush run. It usually goes 4k-5k on my server. It is a good resource of money, and you can call ppl when your guild does not have scheduled raid. However, you will need 5-6 mages for trush run. Comment by Altoid Dropped for me tonight on Garithos-US on the last pull before the first stairs in the instance. My guild's been running Sunwell since 2.4 release and the patterns are extremely rare. We've only had 4 patterns drop, ever, and two of them were the Sunfire Robe (both dropped the day before this Schematic). I was seriously beginning to believe I'd never get my hands on this because of its extreme rarity. I'm reasonably certain it's the only Sunwell Schematic to have dropped on my server as of yet. I've been passing on T6 helms for months in hopes of getting this and was going to give in and pick one up this week, then this baby swooped in! Comment by alexiel Can only be learned by Paladins. Comment by DELMistrzu Can I learn this Schematic as a Rogue ? Comment by Entilzha2161 You can only learn this on a pally and it's supposed to only drop for pallies, but it dropped for my DK today (maybe since there were no DKs when Sunwell was released?) My engineer is a druid and cannot use it but I hope some Paladin buys it as the sell price looks pretty high.
{ "pile_set_name": "Pile-CC" }
#ifndef CREATE_EMPTY_DIRECTED_GRAPH_WITH_GRAPH_NAME_H #define CREATE_EMPTY_DIRECTED_GRAPH_WITH_GRAPH_NAME_H #include <boost/graph/adjacency_list.hpp> boost::adjacency_list<boost::vecS, boost::vecS, boost::directedS, boost::no_property, boost::no_property, boost::property<boost::graph_name_t, std::string>> create_empty_directed_graph_with_graph_name() noexcept; #endif // CREATE_EMPTY_DIRECTED_GRAPH_WITH_GRAPH_NAME_H
{ "pile_set_name": "Github" }
Q: Send user to edit page without inserting the record I currently have an Apex class that pulls the data from a record of one custom object 'property__c' and uses it to create a record of another object 'proposal__c' and then redirects the user to this new record's edit view. However, there's a problem with this. On the edit page, if the user hits "cancel," the record is still inserted. This is because in order to direct the user to the edit view of the new record, we have to first insert that record so that we can pull its id. Outside of making a custom edit view for this object, is it possible to send the user to the edit view without inserting the record first? This would ideally behave the same as if the user simply hit the "new" button and then "cancel." The only difference is, we want some of the fields of the record to be pre-populated. Here is the code. You can see where it redirects the user at the bottom of the convert method. public class ControllerCreateProposalView { public Id propertyId; public ControllerCreateProposalView(ApexPages.StandardController stdController){ propertyId = ApexPages.CurrentPage().getParameters().get('id'); } public PageReference convert(){ PageReference pref; Property__c property = [ select Id, Name, OwnerId, Primary_Contact__c, from Property__c where Id = :propertyId limit 1 ]; Proposal__c proposal = new Proposal__c( Name = property.Name, OwnerId = property.ownerid, Property__c = property.Id, Client__c = property.Primary_Contact__c, ); insert proposal; String sServerName = ApexPages.currentPage().getHeaders().get('Host'); sServerName = 'https://'+sServerName+'/'; String editName='/e?retURL=%2F'+proposal.Id; pref = new PageReference(sServerName + proposal.Id+editName); pref.setRedirect(true); return pref; } public PageReference back(){ PageReference pref = new PageReference('/' + propertyId); pref.setRedirect(true); return pref; } } EDIT: I can send the user to the default edit page, which is /xxxx.salesforce.com/a0r/e?retURL=%2Fa0r%2Fo and I can even pass in values for standard fields, such as "name" /xxxx.salesforce.com/a0r/e?name=TEST&retURL=%2Fa0r%2Fo But I cannot pass custom fields. If I could pass custom fields in using this method, I believe I could achieve what I want to do. A: As you've mentioned in your edit, you can pass fields in the URL string, but only if you use the Field ID, a concept known as "Salesforce URL hacking". You can read more about that if wanted on this other Salesforce Stack: How do I prepopulate fields on a Standard layout? Keep in mind that, while it is possible to pre-populate standard and custom fields using this method, the implementation is difficult since there is no guarantee that your field IDs will be identical across different environments (sandboxes, dev orgs, production). If for example my Custom_Field__c has an ID of 00NJ00000022gx0 in my sandbox, it is not guaranteed to have that same ID in production. This could result in your custom links/buttons/logic not inserting the correct data if you accidentally overwrote a 'working' button with a button from another org with different hard coded IDs. You could probably create a custom setting that holds all of the correct IDs for the fields in each org, and then code your button to pull from that custom setting, but depending on how many fields you're pulling it could become a burden to maintain/update. Because of this, I wouldn't recommend this approach. Beyond that hack, I think the answer to your question is ultimately no. You can't edit a record until it has been committed, and you can't roll back the commit on cancel since it has already occurred and no triggers or workflows will fire on the cancel action. As a roundabout alternative, you could consider something like this: Create Boolean field (Default True) on Object being inserted that you want to 'roll back' Create WFR that sets that Boolean to FALSE (if it is currently TRUE) on successful edit of the record Using a relatively simple scheduled Apex job, you could query every hour for all object records that still have the Boolean value set to TRUE that were created more than an hour ago. Then delete all of those records. This approach wouldn't result in an instant delete when pressing cancel, but would provide for a way for the platform to 'clean' itself hour by hour to get rid of the unwanted records.
{ "pile_set_name": "StackExchange" }
Free peritoneal tumour cells are an independent prognostic factor in curatively resected stage IB gastric carcinoma. Several studies have shown that the cytological detection of free peritoneal tumour cells (FPTCs) in patients with gastric cancer indicates the presence of metastatic disease. The immunocytochemical detection of FPTCs, especially in early-stage tumours, has not been examined comprehensively. Peritoneal lavage was performed in 351 patients before curative resection of a gastric carcinoma between 1987 and 2001, and an adequate sample was obtained from 346 patients. FPTCs were detected immunocytochemically using Ber-EP4 antibody. Median follow-up time was 70 months. FPTCs were detected in the lavage fluid of 74 patients (21.4 per cent) and correlated with increasing pathological tumour depth (pT) and lymph node (pN) status (P < 0.001). The 5-year overall survival of patients with FPTCs was significantly worse than that of patients without FPTCs (35 versus 71.9 per cent; P < 0.001). FPTCs were present in 14 (8.5 per cent) of 164 patients with stage IA or IB tumours. Although the detection of FPTCs had no prognostic significance for stage IA tumours, the presence of FPTCs in those with stage IB tumours was associated with a worse prognosis (P < 0.001). Multivariate analysis identified the presence of FPTCs as an independent prognostic factor in the whole cohort and in the stage IB subgroup. Detection of FPTCs is associated with poor prognosis even in patients with early-stage gastric cancer and should be used for risk-group stratification.
{ "pile_set_name": "PubMed Abstracts" }
(a) Field Embodiments of the present system and method relate to a stereoscopic image display device, and more particularly, to a stereoscopic image display device with an enhanced display quality. (b) Description of the Related Art In general, a display device that can display a three-dimensional (3D) image expresses a 3D effect of objects by using binocular parallax. That is, different 2D images are displayed to the left eye and the right eye of a user viewing the display. When the image displayed to the left eye (hereafter referred to as “left-eye image”) and the image displayed to the right eye (hereafter referred to as “right-eye image”) are processed by the user's brain, the brain recognizes the combination of the left-eye image and the right-eye image as a three-dimensional image having depth perception. A display device capable of displaying 3D images using binocular parallax is generally referred to as a stereoscopic 3D image display device. Some stereoscopic 3D image display devices may require the user to wear special headgear or eye glasses (e.g., shutter glasses and polarized glasses). Other stereoscopic 3D image display devices, referred to as autostereoscopic 3D image display devices, however, do not require the user to wear special head gear or eye glasses. An autostereoscopic 3D image display device generally includes an optical system (e.g., a lenticular lens and a parallax barrier having a plurality of openings) in the display device itself that divides a 3D image into several viewpoints so as to realize a 3D image.
{ "pile_set_name": "USPTO Backgrounds" }
Sony Bravia KDL-40HX803 review Summary Our Score 8/10 User Score Review Price £898.95 Sony’s first 3D TV is finally here, in the 40in shape of the KDL-40HX803. And to be honest, we’re not expecting very much. For whenever we’ve seen Sony 3D TVs in action at big shows, they just haven’t looked as good as those of some rivals. So let’s hope the Japanese brand has managed to cram in plenty of last minute improvements! Rather surprisingly, the 40HX803 doesn’t wear Sony’s new and rather stylish Monolith design. Instead you get a straightforward but sleek black bezel for the top, right and left sides, with a slightly proud metallic strip along the bottom edge. The set still looks nice, though, for all its non-Monolithic approach. It doesn’t do the 40HX803‘s aesthetic impact any harm, either, that it employs edge LED lighting to deliver a reasonably slender profile. Though it’s nothing like as slim as Samsung’s edge LED icons. What’s more, its edge LED system is a dynamic one, meaning that sections of the edge lighting can be independently controlled for a hopefully more impressive contrast performance than you usually get with a standard edge LED-lit LCD TV. Slightly surprisingly for such a slim screen, Sony has left most of its connections facing straight out of the TV’s rear, rather than using the side access approach that would suit wall hanging. But at least the number and variety of these connections is pretty prodigious. For instance, it has four HDMIs, all built to the v1.4 specification, so that they’re compatible with 3D sources. Also of note are a USB input, an Ethernet port, and a 3D Sync terminal, which we’ll look at in turn. The USB can play music, video and photo files directly into the TV, but also allows you to add Wi-Fi to the 40HX803 via an optional USB dongle. It’s a touch disappointing that the 40HX803 doesn’t carry built-in Wi-Fi for its money, but it’s hardly alone in preferring the optional upgrade route. The Ethernet socket, meanwhile, has three uses. First, it supports the set’s built-in Freeview HD tuner, to deliver potential future interactive services like the BBC iPlayer. Second, it provides a wired means of importing files stored on a DLNA PC. Finally, it allows you to take the TV online to experience Sony’s Bravia Internet Video platform, which we’ll return to in a minute. But first we’ve got to discuss the 3D Sync terminal. This is there because the 40HX803 doesn’t have a built-in 3D transmitter, unlike the Samsung and Panasonic 3D TVs we’ve tested. In fact, the 40HX803 doesn’t have 3D facilities at all in its standard form. You have to add an optional extra transmitter and optional pairs of active shutter glasses, with the transmitter costing £50 and the glasses setting you back £99 per pair. This effectively makes the 40HX803 £1,887 if you want 3D with two pairs of glasses. We do understand Sony’s idea with this, to be fair. For it helps keep the 40HX803’s up-front price down, allowing people to add 3D later as their finances allow. But there’s no getting round the fact that once you’ve 3Ded it up, the 40HX803 hits a similar price level to Samsung’s 40C8000 integrated 3D TV. In other words, 3D continues to be very much a premium technology.
{ "pile_set_name": "Pile-CC" }
Sequencing of the cholesteryl ester transfer protein 5' regulatory region using artificial transposons. We have isolated and sequenced genomic clones encompassing more than 5 kb of the 5' flanking region of the cholesteryl ester transfer protein gene. This region contains multiple Alu repeats, a Mermaid repeat, and an extensive GA repeat, which made sequencing exceedingly difficult. To circumvent the problems that these repeats posed to traditional sequencing methodologies, we employed a novel transposon-facilitated technique, which greatly simplified sequencing of regions that had been difficult to accomplish otherwise. We utilized the artificial transposon, AT-2, a Bluescript derivative containing the dhfr gene and unique primer sites at both ends of the insertion DNA. Integration of the transposon occurred efficiently and covered the entire region of interest. Analysis of the sequence indicates a number of potential regulatory factor binding sites upstream of the previously characterized minimal promoter. The 5.7-kb regulatory region confers significant transcriptional activation in a conditionally transformed mouse hepatocyte line as compared to a minimal 137-bp promoter fragment. In addition, a tetranucleotide repeat of variable length that may provide a useful genetic marker has been identified 2 kb upstream of the CETP transcriptional start site.
{ "pile_set_name": "PubMed Abstracts" }
Rentz RVs Inc. (RRV) 1. A stock is expected to pay a year-end dividend of $2.00, i.e., D1 = $2.00. The dividend is expected to decline at a rate of 5% a year forever (g = -5%). If the company’s expected and required rate of return is 15%, which of the following statements is CORRECT? a. The company’s current stock price is $20. b. The company’s dividend yield 5 years from now is expected to be 10%. c. The constant growth model cannot be used because the growth rate is negative. d. The company’s expected capital gains yield is 5%. e. The company’s stock price next year is expected to be $9.50. 2. A share of common stock has just paid a dividend of $2.00. If the expected long-run growth rate for this stock is 2.0%, and if investors' required rate of return is 10.5%, what is the stock’s intrinsic value? 3. E. M. Roussakis Inc.'s stock currently sells for $50 per share. The stock’s dividend is projected to increase at a constant rate of 4% per year. The required rate of return on the stock, rs, is 15.50%. What is Roussakis' expected price 5 years from now? 4. Carter's preferred stock pays a dividend of $2.00 per quarter. If the price of the stock is $60.00, what is its nominal (not effective) annual expected rate of return? 5. Schnusenberg Corporation just paid a dividend of $1.25 per share, and that dividend is expected to grow at a constant rate of 7.00% per year in the future. The company's beta is 1.35, the required return on the market is 10.50%, and the risk-free rate is 4.00%. What is the intrinsic value for Schnusenberg’s stock? 6. Rentz RVs Inc. (RRV) is presently enjoying relatively high growth because of a surge in the demand for recreational vehicles. Management expects earnings and dividends to grow at a rate of 30% for the next 4 years, after which high gas prices will probably reduce the growth rate in earnings and dividends to zero, i.e., g = 0. The company’s last dividend, D0, was $1.25. RRV’s beta is 1.20, the market risk premium is 5.25%, and the risk-free rate is 3.00%. What is the intrinsic value of RRV’s common stock? 7. Using the information on Rentz RVs Inc. from problem 6, what is the dividend yield expected for the next year? 8. The Wei Company's last paid dividend was $2.75. The dividend growth rate is expected to be constant at 2.50% for 2 years, after which dividends are expected to grow at a rate of 8.00% forever. Wei’s required return (rs) is 12.00%. What is the intrinsic value of Wei's stock? 9. Using the information on Wei Company from problem 8, what should be the price of Wei’s stock at the end of Year 5 10. You are an analyst studying Beranek Technologies, which was founded 10 years ago. It has been profitable for the last 5 years, but it has needed all of its earnings to support growth and thus has never paid a dividend. Management has indicated that it plans to pay a $0.50 dividend 3 years from today, then to increase it at a relatively rapid rate for 2 years with 50% dividend growth in year 4 and 25% dividend growth in year 5, and then to increase its dividend at a constant growth rate of 6.00% per year thereafter. Assuming a required return of 15.00%, what is your estimate of the intrinsic value of Beranek's stock?
{ "pile_set_name": "Pile-CC" }
Instead of attaching a complete file, could you please create a diff of your changes against the original file? If possible we'd also prefer it submitted as a commit change to our gerrit instance, see https://wiki.documentfoundation.org/Development/gerrit but that's not strictly necessary if you're not familiar with git and develop tools and such. In any case we'll need your license agreement, apparently we don't have it on file, could you please send us a blanket statement that you contribute all your past and future patches under the MPLv2 and LGPLv3+ licenses? Best on the dev mailing list libreoffice@lists.freedesktop.org so we can link to it from https://wiki.documentfoundation.org/Development/Developers Something like this does nicely: All of my past & future contributions to LibreOffice may be licensed under the MPLv2/LGPLv3+ dual license. Best use Subject: <your full name> license statement Sorry for the inconvenience and thank you for cooperating :-) (In reply to kinfe from comment #0) > this is modified VCL.xcu file including my language,Tigrigna, default fonts Hi kinfe/Eike, Any update regarding these files? In the past year have we merged any default fonts for Tigrigna language (these files or others) ? As this bug has been dormant for over a year, I'll toss it into NEEDINFO and await further info. If the underlying issue has been resolved, let's close this bug. Dear Bug Submitter, This bug has been in NEEDINFO status with no change for at least 6 months. Please provide the requested information as soon as possible and mark the bug as UNCONFIRMED. Due to regular bug tracker maintenance, if the bug is still in NEEDINFO status with no change in 30 days the QA team will close the bug as INSUFFICIENTDATA due to lack of needed information. For more information about our NEEDINFO policy please read the wiki located here: https://wiki.documentfoundation.org/QA/Bugzilla/Fields/Status/NEEDINFO If you have already provided the requested information, please mark the bug as UNCONFIRMED so that the QA team knows that the bug is ready to be confirmed. Thank you for helping us make LibreOffice even better for everyone! Warm Regards, QA Team MassPing-NeedInfo-Ping-20170131 Dear Bug Submitter, Please read this message in its entirety before proceeding. Your bug report is being closed as INSUFFICIENTDATA due to inactivity and a lack of information which is needed in order to accurately reproduce and confirm the problem. We encourage you to retest your bug against the latest release. If the issue is still present in the latest stable release, we need the following information (please ignore any that you've already provided): a) Provide details of your system including your operating system and the latest version of LibreOffice that you have confirmed the bug to be present b) Provide easy to reproduce steps – the simpler the better c) Provide any test case(s) which will help us confirm the problem d) Provide screenshots of the problem if you think it might help e) Read all comments and provide any requested information Once all of this is done, please set the bug back to UNCONFIRMED and we will attempt to reproduce the issue. Please do not: a) respond via email b) update the version field in the bug or any of the other details on the top section of our bug tracker Warm Regards, QA Team MassPing-NeedInfo-20170328
{ "pile_set_name": "Pile-CC" }
#1 Free Stationery Download Site Kathy and I would like to formally welcome you to our new free holiday and special occasion stationery website. We are working hard to add as many new stationery papers as we can as quickly as we can. We are adding new paper designs at least weekly when possible. We add them in Microsoft Word, PDF and a JPG format so that you can use them with just about any word processor, office suite or journaling program. Just as a note, our digital stationery papers can also be used as free scrapbook background papers too. Registration is FREE to leave comments (Required to keep out SPAM) and it doesn't put you on any lists of any kind. So, one more time... tell us what you think! What's on The #1 FREE-Stationery Download Site: Here, you'll have access to the best FREE digital computer stationery or scrapbook background paper site around with literally hundreds of free digital downloadable holiday, letter, special occasion, business, newsletter and every other kind of stationeries and templates you can think of. No registration or other info needed... We also NOW have the tutorial for how to create your own stationeries with MS Word. Along with the OpenOffice Suite digital stationery training, that we already had for you, you can now learn to create your own digital stationeries with MS Office (Microsoft Word (TM)) software. Tired of paying high prices for the same stationery that everyone else has? Now you don't have to. Just download any of our high quality stationeries and print as many as you need anytime you like. Try our new revolutionary way to get quality stationery. No storing blank sheets of stationery in a desk drawer or box taking up valuable space. Instead, save it directly onto your computer. You can also use our stationery papers as free scrapbook background papers? You get to download many quality stationeries whenever you want, all for FREE! New stationery added regularly, so book mark and check back often... Printable PDF Stationery Our FREE PDF Stationery formats are perfect for those that want to add that personal touch to letters, notes, flyers or even sales letters. Just pick the file and download it. After you have downloaded the file all you have to do is print it out and start handwriting on the page(s). You can even put it back in the printer and use any text editor or word processor to print your correspondence right on your newly created stationery... just set the margins to stay inside the borders. Save money Save that valuable storage space in the house Never run out of stationery pages Perfect way to personalize and make memorable Print and handwrite your letter Printable on any printer like any pre-printed stationery you get in the stores. Visit our Services Page to see a few examples of our PDF and Word templates. Just select examples to see what we did with a few of them and then try them out for yourself. You can also print our free pdf stationery papers and use them as free background scrapbook papers. Printable Microsoft Word Stationery Our Microsoft Word (MS Word) templates are perfect for those of you that like to type your letters and other correspondence directly on your computer. Simply open the template right inside Microsoft Word (tm) or most other office compatible programs that can read Microsoft Office (tm) files. Then just start typing. The text will automatically stay within the stationery borders and even go around any special graphics on the page. Now all you have to do is to print it out. Save 30% or more over the cost of pre-printed stationery Save that valuable Storage space in the house and office Never run out of stationery pages when you need them most Always legible and ready for the copier See what flyers and letter looks like before you hit print Typo or error, just fix it then reprint - no hassles Visit our Services Page to see a few examples of our PDF and Word templates in action. See some of the things we found to do with them. Just select the example you want to see and then try it out for yourself. OpenOffice Suite Templates FREE-Stationery.com is your first stop to turn those plain boring letters into a fun, personal and memorable way to communicate with friends, family and business relations. Create your own FREE Custom Stationery for use with OpenOffice (OOo) 2.0 and better. FREE Tutorial on how to make that happen is just moments away here on the site.
{ "pile_set_name": "Pile-CC" }
Education Week reporter Ben Herold explores how technology is shaping teaching and learning and the management of schools. Join the discussion as he analyzes the latest developments. Gates Foundation, Chan Zuckerberg Team Up to Seek 'State of the Art' Ideas for Schools By Benjamin Herold on May 8, 2018 1:31 PM The Bill & Melinda Gates Foundation and the Chan Zuckerberg Initiative are teaming up on a new research-and-development initiative aimed at identifying "state-of-the-art" educational strategies and bringing them to the classroom. The focus is on spurring development of new measures, new ways of teaching, and new technologies for tracking and supporting students' writing ability, math skills, and "executive functions," such as self-control and attention. In a new Request for Information released today, the groups wrote that researchers from fields as diverse as education, neuroscience, cognitive psychology, and technology are generating exciting new ideas about how people actually learn—but that information "has not yet been translated effectively into methods and tools for teachers and students to use in the classroom every day." Such "research insights must inform ongoing development of tools and instructional approaches that will enable students to overcome math, literacy, and other learning challenges and at scale, in order to reach millions, if not billions, of students," the document reads. The focus of the new efforts is on identifying promising new developments and ideas in three main areas: Improving students' writing (especially non-fiction)."The skills connected to writing—evaluation of arguments and evidence, critical and creative thinking about solutions and sources, identifying support for a key idea or process, clear and evocative argument-making—are frequently cited as 21st century skills in high demand by employers," the Request for Information states. "Yet, the majority of high school graduates are not prepared for the demands of postsecondary and workplace writing." Among the areas where the groups hope to see improvements: comprehensive writing solutions, new metrics for measuring student progress and proficiency in writing, and new tools to promote more collaboration and better feedback. Improving students' mathematical understanding, application, and related mindsets.Here, the language of the personalized-learning movement (which both organizations support) is clear: There already exist promising approaches that "help teachers to address individual students' needs by mirroring the same personalized approaches used by the best 1:1 tutors," the document states. "Highly personalized learning experiences and tools have the potential to analyze student responses to understand barriers to student learning, provide immediate feedback, and apply immediate and effective remediation to students when needed." Among other things, the organizations are specifically looking for tools that can further personalize math instruction via a focus on the "whole student"—including children's mindsets, beliefs, attention, and "affective" or emotional states. Measuring and improving students' executive function."Student success in academics and in future careers is associated with their ability to wrestle with multiple ideas at once, think flexibly, and regulate their action and thoughts," the Request for Information states. "There is much to be done to track and improve students' progress on [executive function] development and connect it to real-world benefits, especially for those who are most at-risk." Areas of focus here include advances in techniques for tracking children's development of these skills and abilities, interventions (including "technology-enhanced programs in or outside of school") designed to improve desired behaviors, and supports for teachers. The Gates Foundation is a traditional charitable foundation, chaired by Microsoft founder Bill Gates. Over the last decade-plus, the group has dedicated hundreds of millions of dollars a year to such education-related causes as promoting small high schools, changing the way teachers are evaluated, and supporting development of the Common Core State Standards. Last October, the Gates Foundation announced a strategic shift in focus, including a new emphasis on "locally-driven solutions" and "innovative research." The Chan Zuckerberg Initiative, meanwhile, is a newer entity, founded and led by Facebook CEO Mark Zuckerberg and his wife, pediatrician Priscilla Chan. Structured as a limited-liability corporation, CZI is free to make charitable donations, invest in for-profit companies, and engage in political lobbying and advocacy, with minimal disclosure requirements. The venture-philanthropy group has announced that it will give hundreds of millions of dollars annually to support a vision of "whole-child personalized learning" that aims to customize each child's educational experience based on their academic, social, emotional, and physical strengths, needs, and preferences. Last June, the two groups announced their first substantive collaboration: a $12 million joint award to an intermediary organization known as New Profit, which in turns supports organizations working to promote personalized learning. In their new Request for Information, the Gates Foundation and CZI said that technology is not the focus of what they hope to spur, but it is expected to play a role. The groups also emphasized that their new plan is currently in draft stage. Individuals, nonprofit groups, universities, private companies, and government-sponsored labs are invited to respond, with the expectation that those groups' input will in turn shape the foundations' funding plans moving forward. No decision has yet been made as to how much money the groups will ultimately invest in the new R&D effort. Why this new partnership, and why now? "The reason our two philanthropies have decided to join hands in this effort is simple: We believe the scope and importance of this work exceeds what any single organization can or should undertake alone," wrote CZI president of education Jim Shelton and Gates Foundation director of K-12 education Bob Hughes in an op-ed published today by Fast Company. "The purpose of the initiative is not to mandate anything. It's to learn from the work that's currently happening in classrooms, universities, entrepreneurial efforts, and research centers throughout the country." Photos: Bill Gates, Microsoft co-founder and director at Berkshire Hathaway, is interviewed by Liz Claman of the Fox Business Network in Omaha, Neb., May 8. Photo by Nati Harnik/AP Facebook CEO and Harvard dropout Mark Zuckerberg delivers the commencement address at Harvard University commencement exercises on May 25, in Cambridge, Mass. Photo by Steven Senne/AP Categories: Tags: Notice: We recently upgraded our comments. (Learn more here.) If you are logged in as a subscriber or registered user and already have a Display Name on edweek.org, you can post comments. If you do not already have a Display Name, please create one here. Ground Rules for Posting We encourage lively debate, but please be respectful of others. Profanity and personal attacks are prohibited. By commenting, you are agreeing to abide by our user agreement. All comments are public.
{ "pile_set_name": "Pile-CC" }
Oh lawd oh lawd! I'm tired and weary of pain Please lawd! please lawd! forgive me if I complain Up in the mornin' out on the job work like the devil for my pay But that lucky old sun has nothin' to do but roll around heaven all day Fuss with my woman toil for my kids Sweat 'til I'm wrinkled and gray While that lucky old sun has nothin' to do But roll around heaven all day Good lawd above, can't you know I'm pinin', tears all in my eyes; Send down that cloud with a silver linin', lift me to paradise Show me that river take me across and wash all my trou-bles away. Like that lucky old sun, give me nothin' to do But roll around heaven all day
{ "pile_set_name": "Pile-CC" }
Q: Query returns wrong result Possible Duplicate: Why are my SEDE results inaccurate/obsolete/incorrect/outdated? I've run the following query, just to see if it actually works, but I'm getting no results even though I have dozens of posts: select q.Id from Posts q where q.OwnerUserId = 1525840 What's going wrong? I'm executing the query here. A: SEDE data isn't live, it comes from periodic data dumps. You can see on the homepage that the most recent data is from June 26th; your first post wasn't made until July 14th
{ "pile_set_name": "StackExchange" }
Senior Precision Rotary Microtome (latest Spencer 320 Type) which we trade, supply, export and manufacture is used for precise sectioning of tissues up to the thickness of 1 micron. Its interior mechanism rests on a heavy cast iron base that is covered with a full swing protective cover for easy cleaning and lubrication.Senior Precision Rotary Microtome (latest Spencer 320 Type) is known for independent feed mechanism with automatic safety device, universal knife holder with lateral movements permitting use of the entire knife edge and universal vice type object holder for accurate centering of the specimer. It is fabricated using fine grain steel tested for micro-structure, heat treated for optimum rigidity and sharpness and has a long service life.
{ "pile_set_name": "Pile-CC" }
No other appliance company has a wider scope of solutions, nor the experience to back them up, than Electrolux. Our long presence in people’s homes around the world means that no other appliance company ... Read more ... Easy-Flo vacuums including parts and bags. Findlay's also offers sales and service for all makes and models of sewing machines and vacuums. Please contact us for more information about our products and services. Read more ... house. The value of a property increases with the addition of a hydraulic elevator, electric home elevator, vacuum elevator or high end wheelchair lift. Hybrid Elevator Inc. makes residential elevators that look amazing in an ... Read more
{ "pile_set_name": "Pile-CC" }
Modulatory effects of PLG and its peptidomimetics on haloperidol-induced catalepsy in rats. A behavioral model of dopaminergic function in the rat was used to examine the anticataleptic effects of L-prolyl-L-leucyl-glycinamide (PLG) and peptidomimetic analogs of PLG. Administration of 1 mg/kg PLG intraperitoneally significantly attenuated haloperidol (1 mg/kg)-induced catalepsy (as measured by the standard horizontal bar test), whereas doses of 0.1 and 10 mg/kg PLG did not. Eight synthetic PLG peptidomimetics (Calpha, alpha-dialkylated glycyl residues with lactam bridge constraint [1-4] and without [5-8]) were tested in the same manner (at a dose of 1 microg/kg) and categorized according to their activity, i.e. very active (5), moderately active (2, 3, 4, and 6), and inactive (1, 7, and 8). The catalepsy-reversal action of the diethylglycine-substituted peptidomimetic 5 was examined further and found to exhibit a U-shaped dose-response effect with an optimal dose of 1 microg/kg. The similarity between the effects of PLG and the synthetic peptidomimetics suggests a common mechanism of action. Finally, the synthetic peptidomimetics examined here, particularly peptidomimetic 5, were more effective than PLG in attenuating haloperidol-induced catalepsy.
{ "pile_set_name": "PubMed Abstracts" }
Save on the full suite 65% discount 10 engines 22 expansions Arm yourself with the full arsenal. Buy or upgrade to all of our non-subscription engines, effects, and expansions and SAVE MORE THAN 65%
{ "pile_set_name": "OpenWebText2" }
Check out our new site Makeup Addiction add your own caption add your own caption add your own caption add your own caption add your own caption add your own caption add your own caption add your own caption add your own caption add your own caption add your own caption Sees city government tweet about dui checkpoint Sends out mass text alerting stoner friends
{ "pile_set_name": "OpenWebText2" }
/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.stanbol.entityhub.web.reader; import java.io.IOException; import java.io.InputStream; import java.lang.annotation.Annotation; import java.lang.reflect.Type; import java.util.Arrays; import java.util.Collections; import java.util.HashMap; import java.util.HashSet; import java.util.Iterator; import java.util.List; import java.util.Map; import java.util.Set; import javax.servlet.ServletContext; import javax.ws.rs.Consumes; import javax.ws.rs.WebApplicationException; import javax.ws.rs.core.Context; import javax.ws.rs.core.HttpHeaders; import javax.ws.rs.core.MediaType; import javax.ws.rs.core.MultivaluedMap; import javax.ws.rs.core.Response; import javax.ws.rs.core.Response.Status; import javax.ws.rs.ext.MessageBodyReader; import javax.ws.rs.ext.Provider; import org.apache.clerezza.commons.rdf.Graph; import org.apache.clerezza.commons.rdf.BlankNodeOrIRI; import org.apache.clerezza.commons.rdf.Triple; import org.apache.clerezza.commons.rdf.IRI; import org.apache.clerezza.rdf.core.serializedform.Parser; import org.apache.clerezza.rdf.core.serializedform.SupportedFormat; import org.apache.clerezza.rdf.core.serializedform.UnsupportedParsingFormatException; import org.apache.felix.scr.annotations.Component; import org.apache.felix.scr.annotations.Property; import org.apache.felix.scr.annotations.Reference; import org.apache.felix.scr.annotations.Service; import org.apache.stanbol.commons.indexedgraph.IndexedGraph; import org.apache.stanbol.entityhub.jersey.utils.JerseyUtils; import org.apache.stanbol.entityhub.jersey.utils.MessageBodyReaderUtils; import org.apache.stanbol.entityhub.jersey.utils.MessageBodyReaderUtils.RequestData; import org.apache.stanbol.entityhub.model.clerezza.RdfValueFactory; import org.apache.stanbol.entityhub.servicesapi.model.Representation; import org.slf4j.Logger; import org.slf4j.LoggerFactory; /** * Provides support for reading Representation form Requests. This implementation * supports all RDF supports as well as {@link MediaType#APPLICATION_FORM_URLENCODED} * - in case the data are sent from an HTML form - and * {@link MediaType#MULTIPART_FORM_DATA} - mime encoded data. * In case of an HTML form the encoding need to be specified by the parameter * "encoding" for the entity data the parameters "entity" or "content" can be * used. * @author Rupert Westenthaler * */ @Component @Service(Object.class) @Property(name="javax.ws.rs", boolValue=true) @Provider @Consumes({ //First the data types directly supported for parsing representations MediaType.APPLICATION_JSON, SupportedFormat.N3, SupportedFormat.N_TRIPLE, SupportedFormat.RDF_XML, SupportedFormat.TURTLE, SupportedFormat.X_TURTLE, SupportedFormat.RDF_JSON, //finally this also supports sending the data as form and mime multipart MediaType.APPLICATION_FORM_URLENCODED, MediaType.MULTIPART_FORM_DATA}) public class RepresentationReader implements MessageBodyReader<Map<String,Representation>> { private static final Logger log = LoggerFactory.getLogger(RepresentationReader.class); public static final Set<String> supportedMediaTypes; private static final MediaType DEFAULT_ACCEPTED_MEDIA_TYPE = MediaType.TEXT_PLAIN_TYPE; static { Set<String> types = new HashSet<String>(); //ensure everything is lower case types.add(MediaType.APPLICATION_JSON.toLowerCase()); types.add(SupportedFormat.N3.toLowerCase()); types.add(SupportedFormat.N_TRIPLE.toLowerCase()); types.add(SupportedFormat.RDF_JSON.toLowerCase()); types.add(SupportedFormat.RDF_XML.toLowerCase()); types.add(SupportedFormat.TURTLE.toLowerCase()); types.add(SupportedFormat.X_TURTLE.toLowerCase()); supportedMediaTypes = Collections.unmodifiableSet(types); } @Reference private Parser parser; @Override public boolean isReadable(Class<?> type, Type genericType, Annotation[] annotations, MediaType mediaType) { String mediaTypeWithoutParameter = mediaType.getType().toLowerCase()+'/'+ mediaType.getSubtype().toLowerCase(); log.debug("isreadable: [genericType: {}| mediaType {}]", genericType,mediaTypeWithoutParameter); //second the media type boolean mediaTypeOK = (//the MimeTypes of Representations supportedMediaTypes.contains(mediaTypeWithoutParameter) || //as well as URL encoded MediaType.APPLICATION_FORM_URLENCODED.equals(mediaTypeWithoutParameter) || //and mime multipart MediaType.MULTIPART_FORM_DATA.equals(mediaTypeWithoutParameter)); boolean typeOk = JerseyUtils.testParameterizedType(Map.class, new Class[]{String.class,Representation.class}, genericType); log.debug("type is {} for {} against Map<String,Representation>", typeOk ? "compatible" : "incompatible" ,genericType); return typeOk && mediaTypeOK; } @Override public Map<String,Representation> readFrom(Class<Map<String,Representation>> type, Type genericType, Annotation[] annotations, MediaType mediaType, MultivaluedMap<String,String> httpHeaders, InputStream entityStream) throws IOException, WebApplicationException { log.info("Read Representations from Request Data"); long start = System.currentTimeMillis(); //(1) get the charset and the acceptedMediaType String charset = "UTF-8"; if(mediaType.getParameters().containsKey("charset")){ charset = mediaType.getParameters().get("charset"); } MediaType acceptedMediaType = getAcceptedMediaType(httpHeaders); log.info("readFrom: mediaType {} | accepted {} | charset {}", new Object[]{mediaType,acceptedMediaType,charset}); // (2) read the Content from the request (this needs to deal with // MediaType.APPLICATION_FORM_URLENCODED_TYPE and // MediaType.MULTIPART_FORM_DATA_TYPE requests! RequestData content; if(mediaType.isCompatible(MediaType.APPLICATION_FORM_URLENCODED_TYPE)) { try { content = MessageBodyReaderUtils.formForm(entityStream, charset, "encoding",Arrays.asList("entity","content")); } catch (IllegalArgumentException e) { log.info("Bad Request: {}",e); throw new WebApplicationException( Response.status(Status.BAD_REQUEST).entity(e.toString()). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } if(content.getMediaType() == null){ String message = String.format( "Missing parameter %s used to specify the media type" + "(supported values: %s", "encoding",supportedMediaTypes); log.info("Bad Request: {}",message); throw new WebApplicationException( Response.status(Status.BAD_REQUEST).entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } if(!isSupported(content.getMediaType())){ String message = String.format( "Unsupported Content-Type specified by parameter " + "encoding=%s (supported: %s)", content.getMediaType().toString(),supportedMediaTypes); log.info("Bad Request: {}",message); throw new WebApplicationException( Response.status(Status.BAD_REQUEST). entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } } else if(mediaType.isCompatible(MediaType.MULTIPART_FORM_DATA_TYPE)){ log.info("read from MimeMultipart"); List<RequestData> contents; try { contents = MessageBodyReaderUtils.fromMultipart(entityStream, mediaType); } catch (IllegalArgumentException e) { log.info("Bad Request: {}",e.toString()); throw new WebApplicationException( Response.status(Status.BAD_REQUEST).entity(e.toString()). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } if(contents.isEmpty()){ String message = "Request does not contain any Mime BodyParts."; log.info("Bad Request: {}",message); throw new WebApplicationException( Response.status(Status.BAD_REQUEST).entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } else if(contents.size()>1){ //print warnings about ignored parts log.warn("{} Request contains more than one Parts: others than " + "the first will be ignored", MediaType.MULTIPART_FORM_DATA_TYPE); for(int i=1;i<contents.size();i++){ RequestData ignored = contents.get(i); log.warn(" ignore Content {}: Name {}| MediaType {}", new Object[] {i+1,ignored.getName(),ignored.getMediaType()}); } } content = contents.get(0); if(content.getMediaType() == null){ String message = String.format( "MediaType not specified for mime body part for file %s. " + "The media type must be one of the supported values: %s", content.getName(), supportedMediaTypes); log.info("Bad Request: {}",message); throw new WebApplicationException( Response.status(Status.BAD_REQUEST).entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } if(!isSupported(content.getMediaType())){ String message = String.format( "Unsupported Content-Type %s specified for mime body part " + "for file %s (supported: %s)", content.getMediaType(),content.getName(),supportedMediaTypes); log.info("Bad Request: {}",message); throw new WebApplicationException( Response.status(Status.BAD_REQUEST). entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } } else { content = new RequestData(mediaType, null, entityStream); } long readingCompleted = System.currentTimeMillis(); log.info(" ... reading request data {}ms",readingCompleted-start); Map<String,Representation> parsed = parseFromContent(content,acceptedMediaType); long parsingCompleted = System.currentTimeMillis(); log.info(" ... parsing data {}ms",parsingCompleted-readingCompleted); return parsed; } public Map<String,Representation> parseFromContent(RequestData content, MediaType acceptedMediaType){ // (3) Parse the Representtion(s) form the entity stream if(content.getMediaType().isCompatible(MediaType.APPLICATION_JSON_TYPE)){ //parse from json throw new UnsupportedOperationException("Parsing of JSON not yet implemented :("); } else if(isSupported(content.getMediaType())){ //from RDF serialisation RdfValueFactory valueFactory = RdfValueFactory.getInstance(); Map<String,Representation> representations = new HashMap<String,Representation>(); Set<BlankNodeOrIRI> processed = new HashSet<BlankNodeOrIRI>(); Graph graph = new IndexedGraph(); try { parser.parse(graph,content.getEntityStream(), content.getMediaType().toString()); } catch (UnsupportedParsingFormatException e) { //String acceptedMediaType = httpHeaders.getFirst("Accept"); //throw an internal server Error, because we check in //isReadable(..) for supported types and still we get here a //unsupported format -> therefore it looks like an configuration //error the server (e.g. a missing Bundle with the required bundle) String message = "Unable to create the Parser for the supported format" +content.getMediaType()+" ("+e+")"; log.error(message,e); throw new WebApplicationException( Response.status(Status.INTERNAL_SERVER_ERROR). entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } catch (RuntimeException e){ //NOTE: Clerezza seams not to provide specific exceptions on // parsing errors. Hence the catch for all RuntimeException String message = "Unable to parse the provided RDF data (format: " +content.getMediaType()+", message: "+e.getMessage()+")"; log.error(message,e); throw new WebApplicationException( Response.status(Status.BAD_REQUEST). entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } for(Iterator<Triple> st = graph.iterator();st.hasNext();){ BlankNodeOrIRI resource = st.next().getSubject(); if(resource instanceof IRI && processed.add(resource)){ //build a new representation representations.put(((IRI)resource).getUnicodeString(), valueFactory.createRdfRepresentation((IRI)resource, graph)); } } return representations; } else { //unsupported media type String message = String.format( "Parsed Content-Type '%s' is not one of the supported %s", content.getMediaType(),supportedMediaTypes); log.info("Bad Request: {}",message); throw new WebApplicationException( Response.status(Status.BAD_REQUEST). entity(message). header(HttpHeaders.ACCEPT, acceptedMediaType).build()); } } /** * Internally used to get the accepted media type used when returning * {@link WebApplicationException}s. * @param httpHeaders * @param acceptedMediaType * @return */ private static MediaType getAcceptedMediaType(MultivaluedMap<String,String> httpHeaders) { MediaType acceptedMediaType; String acceptedMediaTypeString = httpHeaders.getFirst("Accept"); if(acceptedMediaTypeString != null){ try { acceptedMediaType = MediaType.valueOf(acceptedMediaTypeString); if(acceptedMediaType.isWildcardType()){ acceptedMediaType = DEFAULT_ACCEPTED_MEDIA_TYPE; } } catch (IllegalArgumentException e) { acceptedMediaType = DEFAULT_ACCEPTED_MEDIA_TYPE; } } else { acceptedMediaType = DEFAULT_ACCEPTED_MEDIA_TYPE; } return acceptedMediaType; } /** * Converts the type and the subtype of the parsed media type to the * string representation as stored in {@link #supportedMediaTypes} and than * checks if the parsed media type is contained in this list. * @param mediaType the MediaType instance to check * @return <code>true</code> if the parsed media type is not * <code>null</code> and supported. */ private boolean isSupported(MediaType mediaType){ return mediaType == null ? false : supportedMediaTypes.contains( mediaType.getType().toLowerCase()+'/'+ mediaType.getSubtype().toLowerCase()); } }
{ "pile_set_name": "Github" }
Q: Listbox returns System.Data.DataRowView instead of values I am doing a project for my school, where I have to make a C# Windows Forms application that lets me interact with my PostgreSQL database. I have made a listbox, which is supposed to get the names of the tables from my database, and when I select these names, data from that table is show in the datagridview object in the form. The problem is, however, all my listbox values are System.Data.DataRowView, and datagridview only displays values from the first table in the list. The code: DataTable tabulusaraksts = new DataTable(); DataTable tabula = new DataTable(); NpgsqlDataAdapter adapter = new NpgsqlDataAdapter(); NpgsqlDataAdapter adapter2 = new NpgsqlDataAdapter(); string tab; public datubaze() { InitializeComponent(); string connectionstring = "Server=localhost;Port=5432;UserId=postgres;Password=students;Database=retrospeles;"; //string connectionstring = String.Format("Server={0};Port={1};" + // "User Id={2};Password={3};Database={4};", // serveris.ToString(), port.ToString(), user.ToString(), // password.ToString(), database.ToString()); NpgsqlConnection ncon = new NpgsqlConnection(connectionstring); NpgsqlCommand listfill = new NpgsqlCommand("select table_name from INFORMATION_SCHEMA.tables WHERE table_schema = ANY (current_schemas(false));", ncon); adapter.SelectCommand = listfill; adapter.Fill(tabulusaraksts); listBox1.DataSource = tabulusaraksts; listBox1.DisplayMember = "table_name"; NpgsqlCommand showtable = new NpgsqlCommand("select * from " + tab +";" , ncon); adapter2.SelectCommand = showtable; } public void listBox1_SelectedIndexChanged(object sender, EventArgs e) { tab = listBox1.GetItemText(listBox1.SelectedItem); adapter2.Fill(tabula); dataGridView1.DataSource = tabula; } A: That code should work. I tried it with some test data and ListBox was filled with correct values. To be sure, try to also set ValueMember like listBox1.DisplayMember = "table_name"; I think the best approach is to add DataTable rows to your ListBox using loop or Linq list. After filling tabulusaraksts iterate through DataRows and add them as items to ListBox, without setting DataSource Something like this (Linq): adapter.SelectCommand = listfill; adapter.Fill(tabulusaraksts); listBox1.Items.AddRange(tabulusaraksts.AsEnumerable().Select(row => row[0].ToString()).ToArray()); NpgsqlCommand showtable = new NpgsqlCommand("select * from " + tab +";" , ncon); adapter2.SelectCommand = showtable; or, using foreach loop adapter.SelectCommand = listfill; adapter.Fill(tabulusaraksts); listBox1.Items.Clear(); foreach (DataRow row in tabulusaraksts.Rows) { listBox1.Items.add(tabulusaraksts[0].ToString()); } NpgsqlCommand showtable = new NpgsqlCommand("select * from " + tab +";" , ncon); adapter2.SelectCommand = showtable;
{ "pile_set_name": "StackExchange" }
Friday, June 1, 2012 Song Story: 'Glory Hallelujah' Unity is huge. It's not just huge in sports teams and in successful businesses. It's not just huge in committees or even families. Unity is huge to God. It's huge in churches, from the leadership all the way to the last attender and even more it's huge in terms of the Church with a big 'C'... the collective Christ-followers and the churches in which they worship throughout our nation and world. The verses in God's Word that discuss the importance of unity are prolific and the urgency with which the concept is discussed is palpable. All that said, I wanted to write a worship song that, at it's core, could help unify the congregation singing it. I used 'we' language on this one--something I haven't used a ton in the past--because the lyric and theme begged for it, and I searched for words that could articulate the depth of unity that I believe God desires from us. I think the lyric I'm most proud of in this particular song kicks off the second verse: All of our brothers and sisters through time have sung of the blood of the same sacrifice This lyrics speaks to the beautiful truth that singing of His love and sacrifice for us binds believers together in a way that transcends even time. No matter what melody is being sung, no matter what chords are being played by what instruments, believers have been uniting together for centuries singing about the truths of Christ's glorious death and resurrection and all that they imply. To me that's an amazing reality, and one worth giving some serious real estate in our church services! As for the song-writing fodder I promised... this one was fun to play around with as I wrote it. I used a hemiola passage in the verse (played quietly with a wurlitzer) and bridge (a little more apparent from an electric guitar) with three notes being repeated all the way through large 4/4 phrases. I also truncated all of the phrases in the bridge--all of them 3 bars instead of four--just to add to the urgency of the concept sung there. One of the things I think is most fun, though, about this tune is that the chords in the second verse are quite different than in the first even though the melody is identical... capped off with a 2sus chord replacing the typical 5 in the first verse. Yup... theory geek stuff for sure! Hope that gives you some insight into the first song on the project! Come back and visit soon as I'll be discussing my first single next time... track #2, entitled 'Here With You.' AVAILABLE NOW!!! Subscribe To who's Mark Roach? I'm a Christ-following husband, father, songwriter, worship leader and St. Louis Blues fan. It's worth noting that, while I am the Worship Arts Director at MSC, all the stuff found here is me... just me... and shouldn't be taken to represent MSC or any other entity, really... beyond just me. :)
{ "pile_set_name": "Pile-CC" }
Q: ssh authentication failure with public/private keys I'm setting up a Continuous Deployment pipeline on gitlab. Unfortunately, when trying to ssh from the pipeline to the target server, the authentication fails. I am asking the question here because I am fairly sure the problem is unix related and not gitlab. Here is the setup: Using ssh-keygen I created a key pair. I added the public key in ~/.ssh/authorized_keys on the server. The private key is export in an env var 'SSH_PRIVATE_KEY' on the client server. permissions on the server: ~/.ssh 700, ~/.ssh/authorized_keys 600 sshd configs on the server are all defaults. On commit, gitlab spins up a docker executor (docker image node:11.2). Then, those commands are executed inside the container: 'which ssh-agent || ( apt-get update -y && apt-get install openssh-client -y )' eval $(ssh-agent -s) ## ## Add the SSH key stored in SSH_PRIVATE_KEY variable to the agent store ## We're using tr to fix line endings which makes ed25519 keys work ## without extra base64 encoding. ## https://gitlab.com/gitlab-examples/ssh-private-key/issues/1#note_48526556 ## echo "$SSH_PRIVATE_KEY" | tr -d '\r' | ssh-add - > /dev/null mkdir -p ~/.ssh chmod 700 ~/.ssh echo "$SSH_PRIVATE_KEY" > ~/.ssh/known_hosts chmod 644 ~/.ssh/known_hosts ssh -vvv user@server I followed the instructions here: https://docs.gitlab.com/ce/ci/ssh_keys/ Here is the output of my execution: Running with gitlab-runner 11.5.0 (3afdaba6) on Runner2 7eb17b67 Using Docker executor with image node:11.2 ... Pulling docker image node:11.2 ... Using docker image sha256:e9737a5f718d8364a4bde8d82751bf0d2bace3d1b6492f6c16f1526b6e73cfa4 for node:11.2 ... Running on runner-7eb17b67-project-40-concurrent-0 via server... Fetching changes... Removing node_modules/ HEAD is now at aa4a605 removing bugged command line Checking out aa4a6054 as integrate_cd... Skipping Git submodules setup Checking cache for default... No URL provided, cache will be not downloaded from shared cache server. Instead a local version of cache will be extracted. Successfully extracted cache $ which ssh-agent || ( apt-get update -y && apt-get install openssh-client -y ) /usr/bin/ssh-agent $ eval $(ssh-agent -s) Agent pid 14 $ echo "$SSH_PRIV_KEY" | ssh-add - > /dev/null Identity added: (stdin) ((stdin)) $ mkdir -p ~/.ssh $ chmod 700 ~/.ssh $ echo "$SSH_KNOWNHOST_KEY" > ~/.ssh/known_hosts $ chmod 644 ~/.ssh/known_hosts $ ssh -p 5555 -vvv user@server OpenSSH_7.4p1 Debian-10+deb9u4, OpenSSL 1.0.2l 25 May 2017 debug1: Reading configuration data /etc/ssh/ssh_config debug1: /etc/ssh/ssh_config line 19: Applying options for * Pseudo-terminal will not be allocated because stdin is not a terminal. debug2: resolving "server" port 22 debug2: ssh_connect_direct: needpriv 0 debug1: Connecting to servee[x.x.x.x] port 22 debug1: Connection established. debug1: permanently_set_uid: 0/0 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_rsa type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_rsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_dsa type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_dsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_ecdsa type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_ecdsa-cert type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_ed25519 type -1 debug1: key_load_public: No such file or directory debug1: identity file /root/.ssh/id_ed25519-cert type -1 debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u4 debug1: Remote protocol version 2.0, remote software version OpenSSH_7.2 debug1: match: OpenSSH_7.2 pat OpenSSH* compat 0x04000000 debug2: fd 3 setting O_NONBLOCK debug1: Authenticating to server:22 as 'user' debug3: put_host_port: [server]:22 debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts" debug3: record_hostkey: found key type RSA in file /root/.ssh/known_hosts:2 debug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:4 debug3: record_hostkey: found key type ED25519 in file /root/.ssh/known_hosts:6 debug3: load_hostkeys: loaded 3 keys from [server]:22 debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa debug3: send packet: type 20 debug1: SSH2_MSG_KEXINIT sent debug3: receive packet: type 20 debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,zlib@openssh.com,zlib debug2: compression stoc: none,zlib@openssh.com,zlib debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposal debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1 debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 debug2: compression ctos: none,zlib@openssh.com debug2: compression stoc: none,zlib@openssh.com debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: curve25519-sha256@libssh.org debug1: kex: host key algorithm: ecdsa-sha2-nistp256 debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none debug3: send packet: type 30 debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug3: receive packet: type 31 debug1: Server host key: ecdsa-sha2-nistp256 SHA256:1MfReEPXf/ResuMnmG/nEgimB5TxF1AcA2j4LBHBbTU debug3: put_host_port: [x.x.x.x]:22 debug3: put_host_port: [server]:22 debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts" debug3: record_hostkey: found key type RSA in file /root/.ssh/known_hosts:2 debug3: record_hostkey: found key type ECDSA in file /root/.ssh/known_hosts:4 debug3: record_hostkey: found key type ED25519 in file /root/.ssh/known_hosts:6 debug3: load_hostkeys: loaded 3 keys from [server]:22 debug3: hostkeys_foreach: reading file "/root/.ssh/known_hosts" debug1: Host '[server]:22' is known and matches the ECDSA host key. debug1: Found key in /root/.ssh/known_hosts:4 Warning: Permanently added the ECDSA host key for IP address '[x.x.x.x]:22' to the list of known hosts. debug3: send packet: type 21 debug2: set_newkeys: mode 1 debug1: rekey after 134217728 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug3: receive packet: type 21 debug1: SSH2_MSG_NEWKEYS received debug2: set_newkeys: mode 0 debug1: rekey after 134217728 blocks debug2: key: (stdin) (0x55ff2d56d630), agent debug2: key: /root/.ssh/id_rsa ((nil)) debug2: key: /root/.ssh/id_dsa ((nil)) debug2: key: /root/.ssh/id_ecdsa ((nil)) debug2: key: /root/.ssh/id_ed25519 ((nil)) debug3: send packet: type 5 debug3: receive packet: type 7 debug1: SSH2_MSG_EXT_INFO received debug1: kex_input_ext_info: server-sig-algs=<rsa-sha2-256,rsa-sha2-512> debug3: receive packet: type 6 debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug3: send packet: type 50 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,keyboard-interactive debug3: start over, passed a different list publickey,keyboard-interactive debug3: preferred gssapi-keyex,gssapi-with-mic,publickey,keyboard-interactive,password debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering RSA public key: (stdin) debug3: send_pubkey_test debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,keyboard-interactive debug1: Trying private key: /root/.ssh/id_rsa debug3: no such identity: /root/.ssh/id_rsa: No such file or directory debug1: Trying private key: /root/.ssh/id_dsa debug3: no such identity: /root/.ssh/id_dsa: No such file or directory debug1: Trying private key: /root/.ssh/id_ecdsa debug3: no such identity: /root/.ssh/id_ecdsa: No such file or directory debug1: Trying private key: /root/.ssh/id_ed25519 debug3: no such identity: /root/.ssh/id_ed25519: No such file or directory debug2: we did not send a packet, disable method debug3: authmethod_lookup keyboard-interactive debug3: remaining preferred: password debug3: authmethod_is_enabled keyboard-interactive debug1: Next authentication method: keyboard-interactive debug2: userauth_kbdint debug3: send packet: type 50 debug2: we sent a keyboard-interactive packet, wait for reply debug3: receive packet: type 60 debug2: input_userauth_info_req debug2: input_userauth_info_req: num_prompts 1 debug1: read_passphrase: can't open /dev/tty: No such device or address debug3: send packet: type 61 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,keyboard-interactive debug2: userauth_kbdint debug3: send packet: type 50 debug2: we sent a keyboard-interactive packet, wait for reply debug3: receive packet: type 60 debug2: input_userauth_info_req debug2: input_userauth_info_req: num_prompts 1 debug1: read_passphrase: can't open /dev/tty: No such device or address debug3: send packet: type 61 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,keyboard-interactive debug2: userauth_kbdint debug3: send packet: type 50 debug2: we sent a keyboard-interactive packet, wait for reply debug3: receive packet: type 60 debug2: input_userauth_info_req debug2: input_userauth_info_req: num_prompts 1 debug1: read_passphrase: can't open /dev/tty: No such device or address debug3: send packet: type 61 debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,keyboard-interactive debug2: we did not send a packet, disable method debug1: No more authentication methods to try. Permission denied (publickey,keyboard-interactive). ERROR: Job failed: exit code 1 I think the ssh interesting part is this: debug3: authmethod_lookup publickey debug3: remaining preferred: keyboard-interactive,password debug3: authmethod_is_enabled publickey debug1: Next authentication method: publickey debug1: Offering RSA public key: (stdin) debug3: send_pubkey_test debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 51 debug1: Authentications that can continue: publickey,keyboard-interactive debug1: Trying private key: /root/.ssh/id_rsa debug3: no such identity: /root/.ssh/id_rsa: No such file or directory debug1: Trying private key: /root/.ssh/id_dsa debug3: no such identity: /root/.ssh/id_dsa: No such file or directory debug1: Trying private key: /root/.ssh/id_ecdsa debug3: no such identity: /root/.ssh/id_ecdsa: No such file or directory debug1: Trying private key: /root/.ssh/id_ed25519 debug3: no such identity: /root/.ssh/id_ed25519: No such file or directory debug2: we did not send a packet, disable method debug3: authmethod_lookup keyboard-interactive debug3: remaining preferred: password It tries to authenticate debug2: we sent a publickey packet, wait for reply But failed with SSH_MSG_USERAUTH_FAILURE right after debug3: receive packet: type 51 Then it tries a couple public keys that do not exists on the runner. What is happening? What can cause SSH_MSG_USERAUTH_FAILURE? Thank you. A: Found the answer. I got my hand on the logs from the server I was trying to connect too: sshd[40354]: Authentication refused: bad ownership or modes for directory /web Turns out the user had more rights that supposed on his home repository. Fixed it to drwxr-xr-x resolved the issue. So it seems that ssh validates the modes for .ssh/ .ssh/authorized_keys the user HOME repository
{ "pile_set_name": "StackExchange" }
[Plantar-palmar erythrodysesthesia. A new and relatively frequent side effect in antineoplastic treatment]. Palmar-plantar erythrodysesthesia (PPE, hand-foot syndrome) is a relatively frequent cutaneous toxicity related to antineoplastic treatment with e.g. fluorouracil, capecitabine, and liposomal doxorubicin. It usually presents as paresthesia and painful erythema of the palms and soles and may lead to ulceration of the skin. The symptoms are dose-dependent, and the condition may be dose-limiting. Two cases of chemotherapy-associated PPE are presented.
{ "pile_set_name": "PubMed Abstracts" }
San Francisco is a city of rich history and culture, and as anyone planning a visit to the City by the Bay realizes, it can be difficult to narrow down all the places to visit and thing to do while there. Aside from the usual tourist spots like the Golden Gate Bridge, Alcatraz, and Fisherman's Wharf, San Francisco also offers historic architecture on nearly every corner, a serene Japanese Tea Gardens, the glorious Golden Gate Park, alongside countless cultural and artistic institutions. Need help fitting it all into one vacation? You might need an app for your smartphone (or tablet) to serve as your guide. Getting Around & Accommodations Left: MobileMuni - Right: TripAdvisor MobileMuni What's a trip to San Francisco that doesn't include a ride on the infamous cable car going down Powell Street? MobileMuni is a complete guide to getting around San Franciscos transit service that lets you know when busses or street cars will be arriving as well as assisting you in getting around the city. Free Available for iOS ($2) / Android / Windows Phone TripAdvisorWhen researching your vacation, Trip Advisor has probably appeared multiple times. This popular service is an all in one guide for flights, restaurants, points of interests and most helpful, hotel reviews. TripAdvisor delivers intuitive options to take the stress out of finding a hotel room in any given city with reviews, prices, detail breakdowns and photos. FreeAvailable for iOS / Android / Windows Phone City Maps & Shopping Guide Left: Tourist Eye - Right: ShopNear.me Tourist EyeThose who plan out their trips beforehand will more than likely get the most out of their time, for those Tourist Eye is an absolute must download. Featuring offline map download ability, you can also pin point places you want to visit beforehand, journal every part of your day and flawlessly execute a preplanned itinerary. For those occasions when the unforeseeable gets in the way Tourist Eye will help find restaurants, tourist sites and more on the fly. FreeAlso available for Android ShopNear.meThis app was designed for trendy shoppers and at the moment features the best places to get your shop on in the city by the bay with promise for more cities in the future. You can search either by item (shoes, blouses, dresses and more) or by shop and use the sale tab to find savings nearby. Fashionistas who live or are visiting San Francisco will find ShopNear.me an essential part of their app library. Free Tourist Attractions Left: San Francisco Guide - Right: San Francisco Travel Guide San Francisco GuideSan Francisco Guide from mTrips gives us an app with an incredible UI. Although the priciest on this list, it manages to fit in a trip planner, offline map, nightlife guide as well but most incredible is the offline augmented reality function. You can see shops, restaurants, hotels and more around you by holding up your smartphone like a camera and seeing points of interest closest to you. $6Also available for iOS San Francisco Travel GuideAn app that neatly wraps up the must see locations of San Francisco is Triposos own travel guide. Although it has an offline map, weather info, nightlife and restaurant locales like some of the others on this list, it's the rich background information behind sites, museums and San Francisco itself that makes it fantastic for sightseeing. A unique ability SFTG possesses is a mini guide for day trips to optimize the full potential of a 24 hour vacation. FreeAlso available for iOS Wine and Dine Left: MenuPages - Right: Top 100 Bay Area Restaurants MenuPagesAre you in the mood for Japanese? Or maybe you'd like to try something vegan? Are you looking for a kid friendly place to eat? MenuPages will help find the perfect eatery for any meals of the day whatever the situation. Armed with menus for 30,000 restaurants in 8 major cities, it's easy to pick and choose your next meal with broad search criteria, user reviews, prices, hours of operation and current location at your fingertips. FreeAlso available for Android Top 100 Bay Area RestaurantsWhen travelling it's understandable to try the best of what a new location has to offer. The San Francisco Chronicler has compiled 100 of the best of eateries in San Francisco. Each restaurant entry includes a brief synopsis, prices, specialities, parking and noise level to tantalize your taste buds. FreeAlso available for iOS City Guides, Nightlife, and Traveling Necessities The Bold Italic: the most difficult task in visiting a city so rich in culture like San Francisco is cutting through the layers of tourist-y spots and experiencing the SF the locals enjoy on a day to day basis. The Bold Italic is all about local discovery...for locals, written by locals (Bold Locals), spotlighting the best and most relevant people and spots in San Francisco on a daily basis. This app is like having a good friend who lives in SF to guide you to all the best spots all the others might overlook or miss.iOS (Free) Left: San Francisco Hot List - Right: WeatherBug San Francisco Hot List Whether you're looking for a night of dancing or are looking to soak in the evenings atmosphere over drinks, San Francisco Hot List has your number. Supporting a robust list of 150 of the best bars, nightclubs, restaurants and handouts, you're guaranteed nothing but the creme de la creme of San Franciscan nightlife. Additional features include search criteria based on tidbits such as the best Bloody Mary in town or best Rooftop bar and up to date guides on weekly special events. $3 Also available for iOS WeatherbugWhat's worse than getting caught in the rain? Getting caught in the rain while on vacation. While we can't control the weather we can at least anticipate it's ups and downs before leaving the sanctuary of our hotel rooms. Weatherbug is a fantastic lightweight weather app that neatly wraps up daily weather forecasts so you'll know weather or not to dress warm or to take that umbrella along just in case. FreeAvailable for iOS / Android / Windows Phone
{ "pile_set_name": "Pile-CC" }
Sultan Abdulhamid II by kirbydog13 | March 27th, 2012 I was searching for a photo Sultan Abdulhamid II and recognized he was wearing a Fez on his head. Compared to the headpiece of the Qizilbash, it is similar. Perhaps it has a historical purpose or perhaps it is just a coincidence.
{ "pile_set_name": "Pile-CC" }
Perinatal outcome with the modified biophysical profile. Our purpose was to evaluate perinatal outcomes in high-risk pregnancies monitored with a modified biophysical profile. All non-insulin-dependent patients referred for antepartum fetal surveillance received a modified biophysical profile biweekly. A modified biophysical profile is a combination of a nonstress test and an amniotic fluid index. Patients with a singleton gestation and intact membranes were entered into a protocol of randomized backup testing for an abnormal modified biophysical profile. Those patients having a nonreactive fetal heart rate, significant variable decelerations, late decelerations, or an amniotic fluid index < or = 5.0 cm received either a contraction stress test or a biophysical profile immediately. Once randomized, a patient received the same backup test, when indicated, with subsequent testing. A total of 2774 patients had 17,429 tests with an uncorrected perinatal mortality rate of 2.9 per 1000. The overall incidence of an adverse perinatal outcome (i.e., perinatal death or nursery death before infant hospital discharge, cesarean delivery for fetal distress within the first 2 hours of labor, 5-minute Apgar score < 7, neonatal seizures or grade III or IV central nervous system hemorrhage) was 7.0%. When compared with patients having persistently normal modified biophysical profile, patients requiring a backup test had a significantly greater incidence of adverse perinatal outcome (9.3% vs 4.9%, p < 0.001, odds ratio 2.0, 95% confidence interval 1.5 to 2.7) and small-for-gestational-age infants (5.2% vs 2.4%, p < 0.001, odds ratio 2.2, 95% confidence interval 1.5 to 3.5). No differences in outcomes between patients randomized to a contraction stress test versus a biophysical profile could be identified either overall or in limiting the analysis to outcome after a negative last test. However, patients having contraction stress test as a backup test had a significantly higher rate of intervention for an abnormal test result than did those having a biophysical profile backup test (23.7% vs 16.6%, p < 0.002, odds ratio 1.6, 95% confidence interval 1.2 to 2.1). The modified biophysical profile is an excellent means of fetal surveillance and identifies a group of patients at increased risk for adverse perinatal outcome and small-for-gestational-age infants. There does not appear to be a significant benefit with the contraction stress test compared with the biophysical profile as a backup test. Further, the contraction stress test is associated with a higher rate of intervention for an abnormal test than is the biophysical profile.
{ "pile_set_name": "PubMed Abstracts" }
The Ghosts of Flight 191 Judith and Sheldon Wax were local literary figures — she an author, he a top editor at Playboy. Forty years ago this month, they and 269 other people boarded a plane to Los Angeles. What happened next haunts Chicago to this day. As the plane plunged downward, it kept rotating — past the point of perpendicular, 112 degrees now — toward a sickening almost belly-up position. Twenty seconds into the flight, Dillard’s earlier decision to decrease speed — as called for in such emergencies — had unintentionally put the plane into a stall. Slowly, the plane began to rotate to the left 60 degrees, then a full 90 degrees, as the seat-belted passengers tilted atop one another. In the tower, Rucker was less understated. “Look at this! Look at this!” he shouted to others in the control room, his voice captured on his headset radio. “He blew up an engine! Equipment. We need equipment. He blew an engine.” Knowing he’d lost one of his three engines but unable to see precisely what had happened, Dillard slowed the aircraft and put it into a steep climb. For a few moments, the wings leveled, and then … Watching from an O’Hare tower, Edward Rucker, the air traffic controller charged with tracking 191’s departure, had noticed something both extraordinary and terrifying just before takeoff: The jet’s left engine had broken loose, tumbled over one of the wings, then smashed onto the runway with a bounce and a skid. A failure analyst for Standard Oil, Warke was also a shutterbug. He had his 35 mm camera on his lap, figuring he might snap a few photos of planes taking off. Spotting Flight 191 starting its run, he brought the camera to his eye. As the jumbo jet accelerated, he saw a flash, followed by a trail of white smoke pouring from the plane as it neared liftoff. What was that? he wondered. Did that jet just hit a vehicle? Something had happened. The jet, now almost 7,000 feet down the runway, heaved itself sluggishly into the air. Warke started clicking his camera. For a few moments, it looked like everything was OK. The jet’s wings leveled as it climbed to a few hundred feet. But when it began to bank severely, Warke knew the plane was damaged and in trouble. He could barely speak. Almost simultaneously, on a runway nearby, William Warke’s flight was touching down. From his window seat, he watched the landscape spool by: the crisscrossing runways and darting luggage trucks, the beacon-waving ground crew, earmuffs clamped to their heads. At 3:01 p.m., the DC-10 paused for an incoming plane. A minute later, Walter Lux, the 52-year-old captain, got the go-ahead to take off: The DC-10’s engines whined to life, the metallic shriek rising and falling like the revving of an enormous dental drill. Eleven minutes behind schedule for a 2:45 p.m. departure, the plane pushed back from the gate, then bumped across the bridge spanning O’Hare’s access road. The plane nosed its way to the end of its assigned runway, 32 Right, and there stood trembling with restrained power. In addition to Shel and Judy, two other Playboy staffers had decided to take American Flight 191 that afternoon. One was Mary Sheridan, a director with the company’s international publications division. The other was fiction editor Vicky Chen Haider. It would be one of first times she’d be away from her 1-year-old son, Sean, who was with her husband, Syed, visiting family in Texas. Also on the flight: music manager Leonard Stogel, who handled the Cowsills and Tommy James and the Shondells, among other groups; scientist Itzhak “Ben” Bentov, inventor of the steerable cardiac catheter; and Francis Gemme, president of Children’s Press in Chicago. And so it was on a clear, bright Friday that the couple arrived at O’Hare International Airport. They checked their bags, walked together to Gate K-5, and, along with 256 other passengers, buckled into their bucket seats, which were arranged mostly in rows of nine, broken up by two aisles, in the wide-bodied jumbo jet. “Watch,” he replied. “It just makes me nervous. I think this is an invention we could do without.” Shel wasn’t as nervous about flying as his wife, but he wasn’t entirely comfortable either, despite having frequently made the trip from Chicago to L.A. to huddle with Hef and scout new writing talent. He confessed as much to Tribune columnist Bob Greene, whom Shel once ran into on a flight home. When the captain would click on his mic and invite passengers to watch the takeoff on a closed-circuit screen at the front of the cabin, as American Airlines did in those days, Shel would look away. Ensconced in a Victorian townhouse on North Cleveland Avenue, they were not a socialite couple. The closest they came was Judy’s lunches at the Brewery on Broadway with a group of friends who called themselves — “with conscious irony” — the Old Girls’ Network. Nor did the Waxes consider themselves a literary power couple — though Shel saw his position as managing editor at Playboy, where “he was a traffic cop over a bunch of very talented, unruly editors” as his dream job, says Barbara Nellis, one of those editors. He had joined the magazine in 1960, at the start of its heyday, working as an associate editor before becoming managing editor in 1972. The day of the L.A. flight, Shel, ever scrupulous, called one of the Playboy staffers, David Standish, just before leaving for the airport, a last-second prodding of the articles editor to make deadline on a story. They were married within two years. He was cerebral: “His idea of passionate declaration is, ‘I like you more than life itself,’ ” wrote Judy. She, on the other hand, ran hot, given at times to “virulent attacks of sentimentality.” For one of the couple’s annual Valentine’s Day parties, she dressed their dog as Cupid. For herself, she created a red-and-white ruffle-necked dress, complete with an “under-the-bosom sash that cries out for Tricia Nixon.” Shel (“my wise-ass valentine”) suggested hanging her in the window so guests could play “Guess Which Is the Hostess and Which Are the Draperies.” They had met in 1949 when Judy was an 18-year-old freshman at Syracuse University and Shel was a senior, a 22-year-old ex-GI from Brooklyn “whose eyebrows,” Judy marveled, “looked just like Tyrone Power’s.” They were in love from the start, partly because of their shared intellectual tastes. (“Went out with someone WONDERFUL! His name is Sheldon Wax, and we talked about Khafke all evening!” Judy wrote on a postcard to her mother, apparently too excited to spell the absurdist novelist’s name correctly.) Judith Wax, snooper, mother, dreamer, wore a bob with bangs that framed a face bearing a resemblance to one of her contemporaries, Jane Fonda. “Voracious, greedy, insatiable, in the best sense of those words” is how one friend characterized her. And no doubt those qualities drew Sheldon to her. His silvered hair was habitually combed to the side, and his thick eyebrows and plump mustache contributed to his perpetual expression of wry amusement, which matched his buttoned-up, old-school, Elements of Style inclination. Shel, 51, could not have been more delighted by his wife’s late-blooming success as a writer. She scored big with her very first effort: a Chaucerian send-up of the Watergate scandal called “The Waterbury Tales.” Original and cleverly cutting, the piece was published in both Time and the New Republic, as well as newspapers around the country. She suddenly found herself in demand as an essayist, writing for publications ranging from the New York Times to Newsweek. The month before her trip to Los Angeles, she’d published the second of two articles for Chicago about her adventures as a serial eavesdropper, showcasing her witty, dexterous prose. “You’d hate dining out with me,” she wrote. “I am, it seems, consigned by an obsessional neurosis to go through life with my ear as the next table’s centerpiece.” Not to worry. Judy would go, despite feeling sick and despite suffering from a fear of flying so bad that her “head trembled,” as she described it, from takeoff to landing. This was too important. For the better part of two decades, she had longed to be a writer. Being a “hearthkeeper” (Judy’s word) and raising her two children, Claudia and Paul, had consumed much of her time. But it was her self-doubt that had kept her from doing, she stated in Starting in the Middle, “what I most feared, desperately wanted, and never had the nerve to try.” It had been only five years since she’d taken the leap: At age 42, when her son joined the Hare Krishna movement and her daughter went to college, Judy “went to the typewriter,” as she put it. Thus, the gentle encouragement of her friend Christine Newman over the phone that Thursday night: “You should go.” Newman would be there. A fact-checker at Playboy who would later work as a literary editor at Chicago magazine, Newman had booked a morning flight from Chicago to L.A. to beat the long registration lines and get the lay of the land before the conference started in the afternoon. Judith Wax felt under the weather. It was an unfortunate bit of timing, given her plans for the following afternoon, Friday, May 25, 1979. Along with her husband, Sheldon, she was taking a trip to Los Angeles for the American Booksellers Association convention, one of the biggest publishing events of the year. More important to her, she was not going as a plus-one of her beloved Shel, who, as managing editor of Playboy magazine, made the trip each year. At 47, she was going as a bona fide author with a bona fide hit of her own. Her first book, the memoir Starting in the Middle (a rumination on middle age that “polishes the pearls of anxiety,” as Kirkus Reviews described it), had been published just a few weeks earlier and had already earned a measure of commercial and critical success. Having ascended the local bestsellers list, it was beginning to attract national attention. Bidding for paperback rights had begun. In a frozen corner of a park at an intersection in Des Plaines, he stood blowing into his hands before a knee-high wall made of bricks, each of which bore a name — his friends, some of them. In the distance, blue-gray against the gauzy white of a February day, the long body of a passenger jet floated up like a phantom, nosing its way into the pale sky, climbing, climbing, and vanishing. But the man, hands in his pockets now, was looking down and didn’t notice. He was a ghost, in a way, the walking dead. Only he wasn’t dead, though he should have been, or would have been but for his own prescience. Laurence Gonzales was part of a new breed hired at Playboy — young, brash, aggressive. He wore bell-bottoms and open shirts, long hair and sideburns, a look that nettled Sheldon Wax — he of the crisply ironed white shirt and tie and the by-the-book grammar and the original “men’s entertainment” ethos that had formed the foundation of Hugh Hefner’s empire — but also amused him. “We all smoked dope and wore jeans,” recalls Standish, another in that group. “We were pushing for harder stories and pushing against Vietnam and [pressing for articles about] the sexual revolution and a lot of social and cultural issues that all of us in our early to mid-20s believed in.” Shel, he says, “would just look at us like, Oh God. But we were performing well enough that he liked our work. He just didn’t love our style.” Gonzales arrived as a 24-year-old staff writer in 1972, the year Shel became managing editor, and climbed the ladder to become articles editor. He left Playboy in 1978 to pursue writing full-time but still had a close relationship with the magazine and continued to write for it. In fact, it was Shel who urged Gonzales, who was 31 by now, to join him at the L.A. book conference. And Gonzales had good reason: His first book, Jambeaux, a novel loosely based on his experiences as a musician, was coming out that fall. Before Gonzales committed, however, he did what he always did: He looked up what type of jet they’d be flying. While at Playboy, Gonzales had become fascinated with airplane disasters — in particular, two involving McDonnell Douglas’s DC-10. One, just outside Paris in 1974, killed all 346 on board after a cargo door blew out, collapsing the cabin floor and severing the hydraulics that allowed the pilots to steer. A similar blowout had happened two years earlier, though that crippled plane was able to land. Gonzales’s interest stemmed from his father, Federico, the son of a Mexican immigrant who served as a B-17 bomber pilot during World War II. When the wing of his plane was shot off by German antiaircraft fire, 27,000 feet up in the air, he miraculously survived the crash, though most of his bones were broken and he was taken prisoner. His son was nevertheless drawn to the cockpit and started flying in 1973 — two years before he wrote his first piece on aviation safety for Playboy. He even trained as an instructor but never bothered to take the certification test. So the de facto expert’s response to Shel when he learned that Flight 191 was a DC-10? “I’m not going to get on that plane.” “You’ve been reading too much crap,” Shel said. What Gonzales had been reading about the DC-10 was not crap. Specifically, he’d learned how McDonnell Douglas was in dire financial straits and had set up an incentive program to save money at virtually any cost. No thanks. He’d stay home. That Friday afternoon in May 1979, Gonzales was giving a former Playboy colleague a lift when the first news report came over the radio: A plane had crashed not far from O’Hare. Gonzales raced home and turned on the television to discover that it was an American Airlines flight bound for Los Angeles. The fire was still raging at the crash site, a field in Des Plaines just behind a trailer park. “Holy shit,” Gonzales blurted to his wife. And then: “Was that the flight that Shel and Judy and Vicky and Mary were on?” Gonzales grabbed his car keys. Christine Newman, already in Los Angeles, was oblivious to the crash for much of the day — so much so that she didn’t notice that conference organizers had quietly taken down a poster for Judy’s book. When she finally made it to her hotel room, she turned on the TV. The images flickered by in an unending stream of horror: firefighters and rescue workers walking through a hellscape of smoking rubble, small red, yellow, and black flags flapping from four-foot-high metal stakes marking bodies and pieces of bodies. She felt a wave of shock, panic, disbelief, nausea, “like I was going insane,” she says. “When they started rolling the list of victims on TV, I just went berserk.” Judy. Shel. Dead. It just couldn’t be. The next thought: her parents. They would be wondering if she was on the flight. She picked up the hotel phone and dialed them in Tennessee. No, she told them, she had taken an earlier flight. She was alive. Flags marked the location of crash victims as firefighters searched the wreckage. Photo: Jay Needleman/Chicago Tribune Rushing to the scene in his BMW, Gonzales went first to the trailer park. News helicopters hovered overhead while rescue workers stood helplessly and ambulances waited for the nonexistent injured. Metal shards and flames had leveled one of the trailers, and Gonzales spotted a massive piece of the fuselage, taller than he was, in the middle of the street. A police car pulled up near him. Gonzales produced a press pass. “I’m here to report on this,” he told the officers. It was the truth. Already he knew he would be writing about the disaster. “Well, get in,” one of the officers said. “We’ll take you over to the crash site.” Soon, Gonzales was gazing out at what had once been a verdant field of grass and scrub oak and cornflowers, now a 100-yard-wide swath of scorched earth that looked like it had been leveled by a napalm strike. He spotted the half-collapsed husk of one of Flight 191’s engines, the silver and white of the turbine charred black. He saw the wheel assembly, likewise seared and smoldering. Mayor Jane Byrne described the crash scene as “probably the worst thing I’ve ever seen.” The smell of burning jet fuel and flesh, “like ancient lamp oil and burned insulation,” he would later write, filled his nostrils. Fire engines, their hoses deployed, appeared and vanished like giant red ghosts in the smoke. Every emergency vehicle within 50 miles must be here, he thought. By now, the fire was under control. He stayed just on the fringe, looking in disbelief and wondering, for the first time, how many had died on this spot. Hundreds. Including his friends. All there. In newsrooms around the country, the numbers coming in were grim: The crash had killed all 258 passengers and 13 crew members on board and two more people on the ground. It was the worst aviation accident in U.S. history and remains so today. Three months later, long after investigators had recovered the fragments they needed, Gonzales returned to the crash site. No grass had grown there. Thousands of pounds of kerosene will do that. “If you look closely,” he wrote in Playboy, “you can see that thousands upon thousands of pieces of white wire are embedded in the rich, black mud that sticks to your shoes as you walk along. The strands are buried deeply, as if by unimaginable force, and when you pull on them, bits of metal come out of the ground. … There are rivets and bolts, nuts and doublers and a few hefty remnants as big as a man’s hand. Suddenly, it dawns on you that this is not merely a bald, scarred patch of mud.” It was a gravesite. Gonzales collected a few pieces. Not for himself. For Syed Haider, the husband of his friend Vicky, one of those bodies marked by a stake topped with a little flag. With all the horrors and tragedies that befall cities around the world, few such events remain seared in our memories. And so for many, the crash of Flight 191 may not be as indelible as, say, the Oklahoma City bombing or Hurricane Katrina. But for Chicagoans who were here then, it was traumatizing — and still haunts those directly affected. Jane Byrne, Chicago’s mayor at the time and one of the first officials on the scene, described it as “probably the worst thing I’ve ever seen.” “Sometimes you scream in silence,” Greene wrote in the Tribune three days after the crash. “Sheldon Wax … was a nice man, and I am trying not to think about the fact that he is not a living man anymore, but a collection of wretched, anonymous body parts sealed in a bag in a hangar at O’Hare that is serving as a temporary morgue.” In the days and weeks that followed, the city mourned. Memorial services were held. At one of them, five days after the crash, more than 300 people packed the Arts Club of Chicago, then housed at 109 East Ontario Street, to honor Judy and Sheldon Wax. Among them, Arthur Kretchmer, Playboy’s editorial director, paid tribute to Shel’s quirks, including how he was always singing the first stanza — and only the first stanza — to the jazz standard “The Carioca” at work: Say, have you seen a Carioca? It’s not a foxtrot or a polka It has a little bit of new rhythm, a blue rhythm that sighs Stanley J. Hallet, a Methodist minister who was friends with the couple, read a memo penned by Shel, subject line “Bureau of Missing Persons,” that seemed to perfectly capture his wryness: “Gee willikers, gang, here I am being beaten about the head because of the mountain of overtime charges the magazine has piled up due to lateness and when I look around in the morning for someone to discuss them with, I wind up talking to myself. Not that I don’t find the conversation brilliant, but I’d much prefer other voices in the room.” The memo ends: “You’d be surprised to discover how clean the air is at that hour.” A friend of Judy’s, Pat Rahmann, recalled her love of writing and a line she wrote that particularly struck Rahmann: “You can’t catch a disease worse than loneliness.” And then, closing the ceremony, a poem by Judy’s daughter, Claudia — “To My Mother and Father” — was read: In one unutterable second you have vanished and left me with more than I could want to have when knowing that I look a bit like both of you is suddenly enough Over the next few months, investigators pieced together what went wrong with Flight 191, including why the jet, capable of being flown with only two of its three engines, nonetheless went down after just 31 seconds in the air. The investigation culminated with the release of an accident report by the National Transportation Safety Board four days before Christmas of that year. Sabotage was ruled out. As was pilot error. Lux and Dillard had followed emergency procedures to the letter. As Gonzales would describe in his piece for Playboy, NTSB investigators concluded that the cause was a shortcut by American Airlines mechanics. Specifically, after an across-the-fleet replacement of a faulty engine pylon, they had used a forklift to reconnect engines to their wings, when a more precise crane was needed. The forklift, however, was faster and therefore cheaper. NTSB investigators concluded that the cause was a shortcut American Airlines mechanics had taken reattaching an engine. Eight weeks before the crash, workers had used a forklift on Flight 191’s left engine. Over time, with the vibrations of each flight, the extra stress from the procedural shortcut caused a small crack in the flange securing the engine to the wing. The crack eventually grew to nearly 13 inches. When the plane reached takeoff speed that day, the engine simply snapped off, rolling up and over the left wing. In the process, it ripped away part of the leading edge of the wing, cutting the hydraulic lines and power to vital instruments in the cockpit, including communications with the control tower and, most crucially, the stall warning. Had Lux and Dillard known the plane was stalling, they could have increased its speed the moment it began to roll, rather than following standard protocol, which called for them to slow the aircraft. During subsequent NTSB testing, not one of 13 pilots in simulations re-creating the circumstances was able to save the plane. In the aftermath, all U.S. DC-10 jets were grounded until the issues could be addressed. Eventually, McDonnell Douglas, which merged with Boeing in 1997, ended production of the jets because of a lack of demand. Laurence Gonzales at the memorial wall near the crash site Photo: Lucy Hewett The man, breath smoking, crunched through the snow to the northwest corner of Lee Street and Touhy Avenue. His hair was white now, and he wasn’t quite sure he was in the right place, but the longtime investigative journalist would not be discouraged. He wound up finding what he was looking for: the low wall of bricks bearing the names of the dead from Flight 191. It had been nearly 40 years since he’d stood on the edge of the field northwest of Runway 32R, driven the streets of the trailer park, noted the place where the grass no longer grew. But scarcely a day had gone by that he had not given thought to what happened here. The brick wall — half hidden by trees, the plaque at its center reading “We Remember Flight 191” — had appeared only relatively recently. It had taken more than 30 years for someone to come up with the idea, then two years of lobbying by an assistant principal and students in the 2010 sixth-grade class at Decatur Classical School in West Rogers Park to get the memorial approved. The assistant principal’s parents had been on the flight. The man, now 71, tried to find the bricks bearing the names of Judith and Sheldon Wax, but they were hidden by frozen snow. It was enough for him to be near the site. Feel it. Again. Still, it hit him. His name could easily have been on a brick. But he wasn’t thinking about that now, nor the flight that moved past overhead, just south of him, big enough, it seemed, to reach out and touch. The plane kept rising and then vanished.
{ "pile_set_name": "OpenWebText2" }
Tag Archive for interact Question by Jon: What is the best way to interact with or select job recruiters? I work primarily as a front end web developer and get calls from multiple recruitment firms. I do a fair bit of project work, so this is a recurring thing for me. Currently, if they have a position that I’m a fit for I reflexively ask them to present me for that position. Is that an optimal strategy? If one company submits me, another cannot, so I want to be submitted by the best company. Should I therefore be taking steps to identify which recruiting firms are the most effective, give preference to local firms, find which firms ask the target employer for a smaller fee, select (somehow) for firms that have a better relationship with the target client, check out a firm’s reputation online before submittal, etc. Or is all of that wasted work? I’m looking for things that are efficient yet effective. Thanks for any tips! Yes, I know I can work with several agencies for different jobs. However I CAN’T work with several agencies for the SAME JOB. Not in California, in any case. Double submissions get thrown out, or else the second agency to submit is rejected. Best answer: Answer by BillAs a freelancer you can usually work “through” several agencies. This creates competition between them to find you more work. Good Luck
{ "pile_set_name": "Pile-CC" }
CIA bought an encryption company and used it to spy on clients and countries - edu https://www.businessinsider.com/cia-secretly-bought-encryption-company-crypto-ag-spy-countries-report-2020-2 ====== ekimekim Original Washington Post article discussed here: [https://news.ycombinator.com/item?id=22297963](https://news.ycombinator.com/item?id=22297963) ------ cryptos The same could happen with Threema. As much as I like and want to trust Threema, but the story could be repeated, even if I think, that it is not used by governments or military large-scale. Essentially every closed source crypto application isn't trustworthy. Same is true for operating systems. ~~~ bangboombang Exactly my first thought. I like Threema and one of the reasons I was an early adopter is that the founder worked on m0n0wall before, an OSS firewall that I used for a long time, in contrast to it being just some guy I never heard of. It made me accept the closed source nature. Another big factor was that I indeed consider Switzerland to be a more trustworthy/neutral party in general when it comes to global politics, but this obviously doesn't have to apply to every single individual in that country. ~~~ _-___________-_ Why use Threema when there are alternatives that are not closed-source? You had to begin to use Threema, which presumably carries the same difficulty as beginning to use something which isn't as questionable. ~~~ mmPzf A big plus for me was the option of using it without mapping the user account to a phone number, something that e.g. Signal doesn't allow. ------ fit2rule The free world needs to realise that no matter what systems of enormous value to the world we build, others will attempt to usurp that power for their own needs. It happens with all technology. The reason is, all technology can be weaponised. Some simple facts .. The institutions covered by Crypto AG's technology products, were attempting to maintain their own secrecy. They were, thus, usurped by their own technology - and the CIA merely exploited this fact. This case with the CIA directly addresses the lynchpin in the military- industrial-surveillance states' armour - the ability to keep secrets. From a certain perspective, one might say that .. the Vaticans .. inability to keep secrets is a blessing and a curse. This is also true of many of the other clients. Would that we had access to all the things the CIA knows, as a world people, mmm.. These groups weaponised their own technology, against themselves, by using it to keep secrets. It also happens to be the spooks' biggest weakness too: the light of truth melts any and all justification for these peoples existence, and it whither them. Let us try a thought experiment: If the Vatican applied its vast resources to providing a "Peoples Internet" a la Starlink, instead of using its billions to hide heinous secrets, would the technology of communication have been so easily weaponised? All secrets are weapons, because you cannot have a secret without technology - and all technology can be weaponised. So this is a foot-bullet on the part of Crypto AG, the Vatican et al., and a big win for the CIA - because it means these institutions will now be making _more_ commitment, alas not less - to the keeping of secrets. ------ jo-m A lot of this has been known for 25 years: [https://www.spiegel.de/spiegel/print/d-9088423.html](https://www.spiegel.de/spiegel/print/d-9088423.html) ------ lallysingh Is this why US export encryption had to be 40 bits? To push countries to a vendor that was compromised? ------ jokoon Is the leak coming from wikileaks? I've heard Assange will soon go to trial. I was still wondering about that "dead's man switch", although I'm not sure it will activate if he get convicted. ~~~ _-___________-_ I read about this quite a while ago, and while it's a revelation, it doesn't seem big enough to be Assange's dead man's switch. Most people are just going to shrug at this. ~~~ fit2rule I have heard it from the crypto cognoscenti circles I know, that this is the calm before the storm and that there will be many, many more leaks to come during the actual trial period. The idea is to point out to the world that Julian isn't the only leaker. This terrifies the spook establishment, and they are therefore preparing for their own campaign of controlled releases, designed to dull the general publics' appetite for the subject. I mean, this is all conjecture and hearsay, but it sure is an interesting time to be watching the show. I do believe we are seeing a cyberwar, like legitimately, underneath all the battle reports ..
{ "pile_set_name": "HackerNews" }
798 So.2d 646 (2001) Charles SHARRIEF and Millie Sharrief as personal representatives of Quanetta M. Buchannon, deceased v. Rebecca GERLACH, M.D. 1991732. Supreme Court of Alabama. April 20, 2001. *648 Sherryl Snodgrass Caffey, Huntsville, for appellants. John S. Key and Jenny L. McLeroy of Eyster, Key, Tubb, Weaver & Roth, L.L.P., Decatur, for appellee. HARWOOD, Justice. Charles Sharrief and Millie Sharrief, as administrators of the estate of Quanetta M. Buchannon, deceased, sued Dr. Rebecca Gerlach, Dr. Charles Giddens, and Jackson County Hospital, seeking compensatory and punitive damages on allegations of a wrongful death, in the defendants' providing medical care to Buchannon. The trial court entered an "Order of Referral to Mediation." During mediation, the plaintiffs' settled their claims against Dr. Giddens and Jackson County Hospital; the court dismissed those defendants pursuant to a motion and joint stipulation for *649 dismissal. Although he was no longer a party to this case, Dr. Giddens was later a witness at trial. Trial of the plaintiffs' claims against Dr. Gerlach began on September 27, 1999. When Dr. Gerlach was called by the plaintiffs as their first witness, she ran out of the courtroom. The trial judge offered the plaintiffs the option of continuing the trial in Dr. Gerlach's absence, but they declined to do so. The trial court then declared a mistrial. The plaintiffs then made a motion to tax costs to the defendant, but the trial court denied the motion, on the rationale that the plaintiffs had refused to proceed with the trial in the defendant's absence. A second trial began on January 24, 2000. On January 27, 2000, the jury returned a verdict for Dr. Gerlach. The trial court entered a judgment based on that verdict. The plaintiffs, without first informing the trial court, subpoenaed the jurors for depositions, based on a suspicion that juror misconduct had occurred during the trial. When the trial court became aware of the subpoenas, it entered an order quashing them. The plaintiffs then filed a "Motion to Alter, Amend, or Vacate" the order quashing the subpoenas, or in the alternative, a "Motion to Take Depositions of Jurors" and a "Motion for Enlargement of Time." The plaintiffs also filed a "Motion to Vacate the Judgment," a "Motion for a New Trial," a "Motion for Post Judgment Hearing," and a "Renewal of Motion to Take Deposition Testimony of Jurors." In response, Dr. Gerlach filed a "Motion for Protective Order" and a "Motion to Strike Affidavits of Mr. Sharrief and Jurors." The trial court heard arguments on all the motions at the same time; it denied all of the plaintiffs' motions, and granted all of Dr. Gerlach's motions. The plaintiffs appealed. They make a number of disparate arguments; we summarize them into four basic arguments: (1) that the trial court erred in denying their motion to vacate the judgment, or, in the alternative, for a new trial, because, they contend, the jury verdict was plainly and palpably wrong; (2) that the trial court committed reversible error by denying the plaintiffs' posttrial motions concerning discovery regarding jury deliberations; (3) that the trial court committed reversible errors during the trial; and (4) that the trial court erred in denying their motion to tax costs to Dr. Gerlach after the first trial had ended.[1] The record shows that Buchannon, age 19, was brought to the Jackson County Hospital emergency room at 9:05 p.m. on July 2, 1993. She had been suffering from vomiting, nausea, and diarrhea for three days. Dr. Gerlach, an emergency-room physician, obtained Buchannon's medical history and examined her. Buchannon's medical history showed that she had delivered a child by cesarean section on June 27, 1993, at Hellen Keller Hospital in Muscle Shoals. The baby had been delivered by Dr. Jenny Gapultoes. (Dr. Gapultoes and Hellen Keller Hospital were not involved in this case.) Dr. Gerlach's examination indicated that Buchannon was suffering from endometritis, an infection of the uterus, resulting from the cesarean section performed five days earlier. Dr. Gerlach then telephoned Dr. Giddens, the obstetrician-gynecologist ("Ob/Gyn") on call for Jackson County Hospital that *650 night, to discuss the case. Dr. Giddens had also been Buchannon's Ob/Gyn up until two weeks before the delivery, but because Dr. Gapultoes had delivered Buchannon's baby, Dr. Giddens was no longer considered her attending physician. Dr. Gerlach informed Dr. Giddens of Buchannon's condition and of her test results, informed him that Buchannon had requested that he be present, and asked him to come in on Buchannon's behalf. Dr. Giddens declined to come to the emergency room. Dr. Gerlach then advised Dr. Giddens that her recommended course of treatment would include a shot of Rocephin,[2] 1 gram, by intramuscular injection, and a prescription of Doxycycline.[3] Dr. Giddens concurred with the recommended course of treatment. Dr. Gerlach further proposed that Buchannon be released and that she follow up with an Ob/Gyn within a few days. Dr. Gerlach then asked Dr. Giddens to do a "follow-up" examination with Buchannon in 2-4 days, but he declined that request, recommending instead that Buchannon be instructed to return to the physician who had delivered her baby. Dr. Giddens then approved Dr. Gerlach's recommendations for treatment, and that treatment was administered. Buchannon was released from the hospital at 10:45 p.m. The next morning, Buchannon became unconscious and unresponsive; she was rushed by ambulance to Scottsboro Medical Center. On July 3, 1993 at 7:17 a.m., Buchannon was pronounced dead. The official cause of her death was septic shock due to endometritis due to cesarean section. I. The Verdict and the Denial of the Plaintiffs' Postjudgment Motions We first consider whether the trial court erred in denying the plaintiffs' motion for a new trial. The plaintiffs based that motion on the argument that the jury's verdict was not supported by the evidence. "[W]hen the evidence meets the `sufficiency' test, jury verdicts are presumed correct, and this presumption is strengthened by the trial court's denial of a motion for new trial. Therefore, a judgment based upon a jury verdict and sustained by the denial of a post-judgment motion for a new trial, will not be reversed on a weight-of-the-evidence ground unless it is `plainly and palpably' wrong. Ashbee v. Brock, 510 So.2d 214 (Ala.1987). See, also, Jawad v. Granade, 497 So.2d 471 (Ala.1986)." Alpine Bay Resorts, Inc. v. Wyatt, 539 So.2d 160, 162-63 (Ala.1988). Thus, this Court will reverse the trial court's denial of the plaintiffs' motion for a new trial only if this Court concludes that the verdict was plainly and palpably wrong. Generally, in order to prove liability in a medical-malpractice case, the plaintiff must show (1) the appropriate standard of care for the treatment supplied by the defendant health-care provider, (2) a deviation from that standard of care by the defendant, and (3) a proximate causal connection between the injury alleged by the plaintiff and the defendant's breach of the standard of care. Looney v. Davis, 721 So.2d 152 (Ala.1998). The plaintiffs presented the testimony of Dr. William E. Garrett, assistant professor of surgery at Meharry Medical College. Dr. Garrett testified that Dr. Gerlach's examination and treatment of Buchannon was below the standard of care. However, Dr. Sherry *651 Squires, associate medical director of the emergency department at Huntsville Hospital, testifying as an expert on behalf of Dr. Gerlach, stated that Dr. Gerlach's treatment of Buchannon met the standard of care. The resolution of conflicts in the evidence rests solely with the trier of fact, in this case, the jury. Jones v. Baltazar, 658 So.2d 420 (Ala.1995); James v. Woolley, 523 So.2d 110, 112 (Ala.1988). The record contains substantial evidence to support the jury verdict; thus, we must conclude that the verdict was not plainly and palpably wrong. Stokes v. Long-Lewis Ford, Inc., 549 So.2d 51, 52 (Ala.1989); Merrell v. Joe Bullard Oldsmobile, Inc., 529 So.2d 943, 946 (Ala.1988). The trial court did not err in denying the plaintiffs' motion for a new trial. II. Posttrial Motions Concerning Discovery Regarding Jury Deliberations We next consider the plaintiffs' argument that the trial court erred in denying their posttrial motions seeking discovery regarding the jury's deliberations. These motions included a motion to subpoena jurors, a motion to vacate the order quashing the juror subpoenas, a motion to take juror depositions, a motion for enlargement of time to take juror depositions, and a motion renewing the plaintiffs' motion to take depositions, affidavits, and oral testimony of jurors. Matters concerning discovery pending appeal are within the trial court's discretion. Rule 27(b), Ala. R. Civ. P. "[R]elief under Rule 27 is discretionary with the trial court, and a trial court's ruling on a Rule 27 petition will not be reversed in the absence of an abuse of discretion." Ex parte Anderson, 644 So.2d 961, 964 (Ala.1994). Even if this Court viewed these subpoena requests as coming within the ambit of Rule 30, Ala. R. Civ. P., the abuse-of-discretion standard would still apply. Home Ins. Co. v. Rice, 585 So.2d 859, 862 (Ala.1991). After the trial, the plaintiffs had the trial-court clerk issue subpoenas to the jurors, without having gotten the approval of the trial court. In pertinent part, the trial court's order quashing the subpoenas stated: "The plaintiffs' attorney failed to comply with Rule 27 of the Alabama Rules of Civil Procedure for the taking of the depositions of witnesses pending appeal or before the taking of an appeal if the time therefor has not expired. The plaintiffs filed no motion with the court for authorization to take the depositions. Furthermore, the witnesses subpoenaed by the plaintiffs were jurors and the court is mindful of the special rules of law that apply to the testimony of jurors and policy considerations for these rules of law." All of the plaintiffs' arguments concerning posttrial discovery regarding the jury's deliberations are based on three affidavits that had been taken before the trial court quashed the subpoenas. The first was the affidavit of Charles Sharrief, Buchannon's father (who also is one of the plaintiffs). Sharrief's affidavit contains a list of statements made to him by some of the jurors after the trial. The trial court found that Mr. Sharrief's affidavit was comprised completely of "hearsay," as that term is defined by Rule 802, Ala. R. Evid. The Court notes that the plaintiffs have not directly challenged, by citation to any authority, the propriety of the trial court's order striking the affidavit of Sharrief on the basis that it contained nothing but hearsay. See Rule 28(a)(5) Ala. R.App. P. Hearsay evidence is not admissible in support of a motion for a new trial, and a new trial will not be granted on the basis of such evidence. Jefferson County v. Kellum, 630 So.2d 426, 427 (Ala.1993). We *652 conclude that the trial court did not abuse its discretion by refusing to allow Charles Sharrief's affidavit to support the issuance of subpoenas to individual jurors. Affidavits were also obtained from two of the jurors, S. and H. Their affidavits contain accounts of some jurors' discussions during deliberations. Rule 606(b), Ala. R. Evid., reads: "(b) Inquiry Into Validity of Verdict or Indictment. Upon an inquiry into the validity of a verdict or indictment, a juror may not testify in impeachment of the verdict or indictment as to any matter or statement occurring during the course of the jury's deliberations or to the effect of anything upon that or any other juror's mind or emotions as influencing the juror to assent to or dissent from the verdict or indictment or concerning the juror's mental processes in connection therewith, except that a juror may testify on the question whether extraneous prejudicial information was improperly brought to the jury's attention or whether any outside influence was improperly brought to bear upon any juror. Nor may a juror's affidavit or evidence of any statement by the juror concerning a matter about which the juror would be precluded from testifying be received for these purposes. Nothing herein precludes a juror from testifying in support of a verdict or indictment." This Court has stated: "Generally, affidavits are inadmissible to impeach a jury's verdict. An affidavit showing that extraneous facts influenced the jury's deliberations is admissible; however, affidavits concerning `the debates and discussions of the case by the jury while deliberating thereon' do not fall with this exception." HealthTrust, Inc. v. Cantrell, 689 So.2d 822, 828 (Ala.1997). See also Ala. R. Evid. 606(b); this rule is substantially similar to Rule 606(b), Fed.R.Evid. In Peveto v. Sears, Roebuck & Co., 807 F.2d 486, 489 (5th Cir.1987), the United States Court of Appeals for the Fifth Circuit held that "by implementing Rule 606(b), Congress has made the policy decision that the social costs of such error are outweighed by the need for finality to litigation." The Seventh Circuit has held that Rule 606(b) is designed "to protect the judicial process from efforts to undermine verdicts by scrutinizing the jurors' thoughts and deliberations." United States v. Ford, 840 F.2d 460, 465 (7th Cir.1988). Other courts of appeals for the federal circuits have stated that Rule 606(b) promotes "free and uninhibited discourse during deliberations." Attridge v. Cencorp Div. of Dover Techs. Int'l, Inc., 836 F.2d 113, 116 (2d Cir.1987); Maldonado v. Missouri Pac. Ry., 798 F.2d 764 (5th Cir.1986). The plaintiffs misconceive the distinction, under Alabama law, between "extraneous facts," the consideration of which by a jury or jurors may be sufficient to impeach a verdict, and the "debates and discussions of the jury," which are protected from inquiry. This Court's cases provide examples of extraneous facts. This Court has determined that it is impermissible for jurors to define terms, particularly legal terms, by using a dictionary or encyclopedia. See Fulton v. Callahan, 621 So.2d 1235 (Ala.1993); Pearson v. Fomby, 688 So.2d 239 (Ala.1997). Another example of juror misconduct leading to the introduction of extraneous facts sufficient to impeach a jury verdict is an unauthorized visit by jurors to the scene of an automobile accident, Whitten v. Allstate Ins. Co., 447 So.2d 655 (Ala.1984), or to the scene of a crime, Dawson v. State, 710 So.2d 472 (Ala.1997). The problem characteristic in each of these cases is the extraneous nature *653 of the fact introduced to or considered by the jury. The improper matter someone argues the jury considered must have been obtained by the jury or introduced to it by some process outside the scope of the trial. Otherwise, matters that the jurors bring up in their deliberations are simply not improper under Alabama law, because the law protects debates and discussions of jurors and statements they make while deliberating their decision. CSX Transp. v. Dansby, 659 So.2d 35 (Ala.1995). This Court has also noted that the debates and discussions of the jury, without regard to their propriety or lack thereof, are not extraneous facts that would provide an exception to the general rule of exclusion of juror affidavits to impeach the verdict. Weekley v. Horn, 263 Ala. 364, 82 So.2d 341 (1955). Nothing contained in the affidavits indicates the jury considered any extraneous facts. All the statements in the affidavits relate to evidence that was presented at trial or to information that was otherwise brought to the attention of the jury during the trial. The affidavits provide no evidence that the jury consulted any outside sources of information regarding the definition of "standard of care," or regarding any other matter. Nothing in either of the affidavits indicates that the jury, or any particular juror, was influenced by any outside source. The trial court did not abuse its discretion in denying the plaintiffs' posttrial motions seeking discovery regarding the jury's deliberations. HealthTrust, Inc. v. Cantrell, 689 So.2d 822 (Ala.1997). III. Alleged Errors During Trial The plaintiffs argue that the trial court erred in overruling their objection made pursuant to Batson v. Kentucky, 476 U.S. 79, 106 S.Ct. 1712, 90 L.Ed.2d 69, (1986), to the defendant's striking all but three of the women on the venire. The plaintiffs' also argue that they made an objection to the composition of the jury and a Batson objection to the striking of the one black member of the venire, but we have found no such objections in the record. We first address the plaintiffs' claim that Dr. Gerlach violated the principles of Batson by using 7 of her 10 peremptory strikes against women. Because the plaintiffs did not object to the striking of the sole black juror, no other Batson argument has been preserved for our review. Cone Bldrs., Inc. v. Kulesus, 585 So.2d 1284 (Ala.1991); Bruner v. Cawthon, 681 So.2d 161 (Ala.Civ.App.1995). A trial court's ruling on a Batson objection is entitled to great deference, and we will not reverse a judgment because of such a ruling unless it is clearly erroneous. Ex parte Branch, 526 So.2d 609 (Ala.1987). In Batson, the United States Supreme Court held that the Equal Protection Clause of the Fourteenth Amendment to the United States Constitution prohibits a prosecutor in a criminal case from exercising peremptory strikes to remove black potential jurors from a black defendant's jury solely on the basis of their race. In Edmonson v. Leesville Concrete Co., 500 U.S. 614, 111 S.Ct. 2077, 114 L.Ed.2d 660 (1991), the United States Supreme Court extended the Batson principles to civil cases. "The burden of persuasion is initially on the party alleging a discriminatory use of peremptory challenges to establish a prima facie case of discrimination." Thomas v. Diversified Contractors, Inc., 578 So.2d 1254, 1255 (Ala.1991). In J.E.B. v. Alabama, 511 U.S. 127, 114 S.Ct. 1419, 128 L.Ed.2d 89 (1994), the United States Supreme Court further extended Batson to gender-based strikes. "Only after a prima facie showing of discrimination has been established is a trial court under a duty to require an opposing party to provide *654 [gender-]neutral reasons for his peremptory strikes. Thomas at 1255. The following exchange took place at trial: MS. CAFFEY: "Your Honor, according to my calculations of the thirty-six potential jurors, Plaintiffs are left with either two or three women; and we would submit for the Court's consideration that three female jurors—that the striking of the women was done in a sexually biased manner in order to exclude mothers from the jury, and they struck some women but was based upon responses that were given during the jury voir dire [sic]; and we showed that they might be biased in the case, such as, the inability to award a large sum of money, and two or three of them indicated—well, one indicated that she would not be able to follow the Court's jury instructions and other indications like that. And, also, the Plaintiffs struck two jurors who indicated a knowledge and relationship with Dr. Gerlach as a result of their employment with the Jackson County Hospital, and considering that there would be some information involving the Jackson County Hospital and the fact that they were a Defendant in this case, those jurors were struck because of their potential bias. And that would be jurors V. and M. Juror W. indicated—well, we didn't strike M., that would be V., but Juror W. indicated that—I believe she indicated that she did not believe that she could be unbiased in this case, and we contend that the three jurors—well, first of all, that women are a representative group in the Jackson County community and that three female jurors out of a potential thirty-six would certainly constitute less than the percentage of women in the community, and also, it's less than a reasonable percentage of jurors that are left on the jury; and that's one-third of the jury. MR. KEY [defense attorney]: "Is that a prima facie case, Your Honor? THE COURT: "Are you saying it is? MR. KEY: "I'm saying it is not. THE COURT: "Well, what are your grounds in that regard? MR. KEY: "Judge, we can give a reason for every strike that we made, but the point is that we had ten strikes, and how many women are left on the jury? THE COURT: "Three. MR. KEY: "Well, I'll say this. It's very unusual because it seems like that the last forty cases that I've tried, it's been about eight to three female; but, you know, there's no—I just don't see that there's any prima facie case here based on—you do have three women on the jury; and unless we're called to show gender-neutral reasons, then that's as far as I can go because I just don't see it. MS. CAFFEY: "Well, you struck seven of the female jurors, none of whom gave any indication of being connected with any of the parties. MR. KEY: "Well, for instance, the last strike, she indicated that she had been treated for diarrhea and vomiting and throwing up and had been put on IVs within four hours; and that's what they're saying that we should've done, and we've got reasons. And if we're forced to go back and reconstruct them, then we can, but— THE COURT: "Well, the Court rules that the Plaintiff [sic] has not made a prima facie case of discrimination in regard to gender. All right; anything further? MS. CAFFEY: "Your honor, my understanding of the law is that I would have to show that the group would be a representative *655 group in the community and that the defendants abused strikes in a manner ... which left the number of jurors on the jury in this representative group less than the percentage of that group in the community; and I've clearly shown that. I have also offered the Court an explanation insofar as the striking of female jurors by the Plaintiffs and have shown sex-neutral reasons; and the Defendant has indicated that they would have to put together some reasons for the striking, and— THE COURT: "Well, that was not my understanding of the statement made by defense counsel. All right; that's my ruling. Do you have anything further? MS. CAFFEY: "No, Your Honor." The plaintiffs' only objection regarding the defendant's strikes of women, if it can be characterized as an objection, was to the fact that only three women were left on the jury. However, "`"[I]t is important that the defendant come forward with facts, not just numbers alone, when asking the [trial] court to find a prima facie case"' of ... discrimination." McElemore v. State, 798 So.2d 693, 696 (Ala.Crim.App. 2000) (quoting Mitchell v. State, 579 So.2d 45, 48 (Ala.Crim.App.1991), in turn quoting United States v. Moore, 895 F.2d 484, 485 (8th Cir.1990)). Based on the record, we conclude that the plaintiffs did not present a prima facie case of improper strikes on the basis of gender. In Ex parte Trawick, 698 So.2d 162 (Ala.1997), this Court reasoned: "Trawick has offered no evidence that the female veniremembers shared only the characteristics of gender, that anything in the type or manner of the prosecutor's statements or questions during the extensive voir dire indicated an intent to discriminate against female jurors, that there was a lack of meaningful voir dire directed at the female jurors, or that female jurors and male jurors were treated differently. He has offered no evidence that the prosecutor had a history of using peremptory challenges in a manner that discriminated against veniremembers of either gender. Instead, Trawick has merely emphasized that the State used many of its strikes to remove women from the venire. Without more, we do not find that the number of strikes this prosecutor used to remove women from the venire is sufficient to establish a prima facie case of gender discrimination." 698 So.2d at 168. The reasoning of Trawick applies here. We have reviewed the trial transcript, and our review indicates the plaintiffs presented nothing to show a prima facie case of gender discrimination. Therefore, the trial court was not required to have the defense provide gender-neutral reasons for its peremptory strikes. We conclude that the trial court acted within its discretion in denying the plaintiffs' Batson motion. The plaintiffs also argue that the trial court erred in excluding their Exhibit 5 ("Defendant's Medical Record" annotated by Dr. William Garrett during trial) and their Exhibit 7 (pamphlets on Rocephin and Doxycycline). However, the plaintiffs made no objections at trial to the exclusion of these exhibits, and this Court will not consider objections to the exclusion of evidence that were not raised at trial. Zielke v. AmSouth Bank, N.A., 703 So.2d 354, 361 (Ala.Civ.App.1996); Bolen v. Hoven, 143 Ala. 652, 39 So. 379 (1905). We note further that the plaintiffs' brief contains no citations to authority supporting their contentions. See Rule 28(a)(5), Ala. R.App. P.; McLemore v. Fleming, 604 So.2d 353 (Ala.1992). *656 The judgment of the trial court is affirmed. AFFIRMED. MOORE, C.J., and SEE, BROWN, and STUART, JJ., concur. NOTES [1] The Court will not address this fourth issue, because the plaintiffs' brief contains no citations to authority supporting their contentions. Rule 28(a)(5), Ala.R.App.P., specifically requires an appellant to present the appellate court with citations to authorities supporting the appellant's contentions. When an appellant fails to comply with Rule 28(a)(5), Ala. R.App. P., this Court may affirm the ruling the appellant is complaining of. McLemore v. Fleming, 604 So.2d 353 (Ala.1992). [2] Rocephin is a sterile, semisynthetic, broadspectrum cephalosporin antibiotic for intravenous or intramuscular administration. Physicians' Desk Reference 2765 (55th ed.2001). [3] Doxycycline is a broad-spectrum tetracycline antibiotic used against a wide variety of bacterial infections. Physicians' Desk Reference 2254 (55th ed.2001).
{ "pile_set_name": "FreeLaw" }
Taraboura Taraboura (Greek: Ταραμπούρα) is a neighbourhood in the city of Patras. It is named after one of the Albanians in which he lived and had his house in his area. Until 1990, it had a tall for the entrance and exit for carriage wheels and vehicles in Patras. Residential housing arrived in 1980. Taraboura features a closed arena where Olympiada Patras plays. It is located at 24 Tisonas Street with the postcode 26623. Its capacity is 2,500 people. References ''The first version of the article is translated and is based from the article at the Greek Wikipedia (el:Main Page) Category:Neighborhoods in Patras
{ "pile_set_name": "Wikipedia (en)" }
Bareback BF Videos Pay Pal Get your discount membership to Bareback BF Videos using the image above…or try the free Bareback BF Videos logins below, and get member access to Barebackbfvideos without paying. Download tons of quality Unreleased Footage and Really High Resolution Pics. This barebackbfvideos.com deal is a limited offer, Don’t miss out!
{ "pile_set_name": "Pile-CC" }
29656? 337 Calculate the greatest common divisor of 83361 and 16095. 111 What is the highest common factor of 25494 and 1806? 42 What is the highest common factor of 117741 and 39? 39 Calculate the highest common factor of 609 and 6069. 21 Calculate the greatest common factor of 29154 and 678. 678 Calculate the greatest common divisor of 13864 and 2504. 8 Calculate the highest common factor of 17670 and 190. 190 Calculate the greatest common factor of 1368789 and 51. 51 What is the highest common factor of 15621 and 615? 123 What is the greatest common divisor of 383 and 3893961? 383 Calculate the greatest common factor of 168 and 560. 56 Calculate the highest common divisor of 3347 and 7. 1 What is the highest common factor of 268 and 338752? 268 Calculate the highest common factor of 690 and 32545. 115 What is the highest common divisor of 82242 and 576? 18 What is the highest common factor of 480555 and 156645? 2655 What is the highest common divisor of 99676 and 20? 4 What is the greatest common factor of 21684 and 3588? 156 What is the greatest common factor of 21952 and 1064? 56 Calculate the highest common divisor of 78678 and 4836. 186 What is the greatest common factor of 756 and 13860? 252 What is the highest common divisor of 1275 and 493? 17 What is the highest common divisor of 23343 and 651? 93 What is the highest common factor of 8141 and 28? 7 Calculate the highest common divisor of 19 and 109117. 19 What is the highest common factor of 43763 and 7362? 409 Calculate the greatest common factor of 112495 and 20385. 755 Calculate the highest common divisor of 4346 and 12349. 53 Calculate the greatest common divisor of 2180 and 237838. 218 Calculate the highest common divisor of 11748 and 2508. 132 What is the greatest common divisor of 3625 and 8555? 145 Calculate the greatest common factor of 1242 and 4374. 54 Calculate the highest common divisor of 289445 and 2379. 793 Calculate the highest common factor of 1657113 and 669. 669 Calculate the greatest common factor of 205040 and 45. 5 What is the highest common divisor of 7472 and 1600? 16 Calculate the greatest common factor of 44 and 61402. 22 What is the highest common divisor of 421 and 2032167? 421 Calculate the greatest common factor of 1290 and 18570. 30 Calculate the highest common divisor of 110398 and 382. 382 Calculate the highest common divisor of 80414 and 6696. 62 Calculate the greatest common factor of 14701 and 4331. 61 Calculate the greatest common factor of 181443 and 93. 93 Calculate the greatest common factor of 49293 and 630. 9 What is the greatest common factor of 5181 and 528? 33 Calculate the greatest common divisor of 819 and 14976. 117 Calculate the greatest common factor of 75 and 3584150. 25 Calculate the greatest common factor of 203 and 2807. 7 What is the greatest common factor of 174985 and 1580? 395 What is the greatest common divisor of 4114 and 60379? 121 What is the highest common factor of 603140 and 159? 53 Calculate the greatest common factor of 31700 and 30. 10 What is the greatest common divisor of 1022044 and 4? 4 Calculate the highest common factor of 92 and 467708. 4 Calculate the greatest common factor of 15240 and 10287. 381 What is the greatest common factor of 204 and 38454? 102 What is the highest common divisor of 294 and 190659? 147 What is the greatest common divisor of 17999 and 151016? 439 What is the highest common factor of 80869 and 103649? 1139 Calculate the highest common divisor of 12376 and 1071. 119 Calculate the greatest common divisor of 368 and 309764. 92 What is the highest common divisor of 878 and 1456163? 439 What is the highest common factor of 798 and 6042? 114 What is the highest common factor of 57656 and 224? 8 What is the highest common divisor of 2520 and 5985? 315 Calculate the greatest common divisor of 119600 and 500. 100 Calculate the greatest common factor of 10 and 5862. 2 Calculate the highest common divisor of 168 and 2031. 3 What is the greatest common divisor of 134 and 321734? 134 Calculate the highest common factor of 1329731 and 156. 13 Calculate the highest common factor of 9200 and 1800. 200 What is the greatest common divisor of 76 and 29280? 4 Calculate the greatest common divisor of 399 and 4503. 57 Calculate the highest common factor of 674272 and 608. 608 Calculate the greatest common divisor of 15 and 46335. 15 What is the highest common divisor of 291920 and 86920? 1640 Calculate the highest common factor of 7879 and 2. 1 Calculate the highest common divisor of 29 and 1752905. 29 What is the highest common factor of 189937 and 3751? 341 Calculate the greatest common divisor of 86 and 149167. 43 What is the highest common divisor of 272251 and 665? 133 What is the highest common divisor of 59 and 3127? 59 Calculate the greatest common factor of 510 and 2690. 10 What is the greatest common factor of 9 and 179919? 9 What is the greatest common divisor of 3 and 2111? 1 Calculate the highest common factor of 142584 and 936. 312 Calculate the highest common factor of 960133 and 213. 71 What is the highest common divisor of 3455491 and 13? 13 Calculate the greatest common divisor of 102 and 5423034. 102 What is the greatest common divisor of 43368 and 7800? 312 What is the greatest common factor of 59 and 179537? 59 What is the greatest common factor of 4977 and 2142? 63 What is the greatest common factor of 191233 and 4821? 1607 Calculate the greatest common divisor of 1473 and 440918. 491 What is the greatest common divisor of 70 and 9205? 35 Calculate the highest common factor of 247 and 5694091. 247 Calculate the greatest common divisor of 62196 and 18176. 284 What is the highest common factor of 13 and 25336909? 13 Calculate the highest common divisor of 5549 and 8153. 31 Calculate the greatest common factor of 4650 and 2238. 6 Calculate the highest common divisor of 2 and 1774. 2 What is the highest common factor of 51894 and 351? 27 Calculate the greatest common factor of 5609252 and 1496. 748 Calculate the highest common factor of 20 and 36494. 2 Calculate the greatest common factor of 56 and 952. 56 What is the highest common factor of 1014 and 375687? 507 Calculate the greatest common factor of 100 and 302940. 20 What is the highest common factor of 12 and 202155? 3 Calculate the greatest common divisor of 2502 and 1386. 18 What is the highest common divisor of 17721 and 165? 33 Calculate the highest common divisor of 6 and 6019110. 6 What is the greatest common divisor of 58280 and 1175? 235 Calculate the highest common divisor of 619844 and 249. 83 Calculate the highest common divisor of 89262 and 2755. 551 Calculate the greatest common factor of 1443275 and 25. 25 Calculate the greatest common divisor of 1980 and 2645610. 330 What is the greatest common factor of 2468 and 215333? 617 Calculate the greatest common factor of 1596 and 20622. 42 What is the greatest common factor of 55 and 150755? 55 Calculate the greatest common factor of 7936 and 6882. 62 What is the greatest common divisor of 24320 and 280? 40 What is the greatest common divisor of 23037 and 2667? 21 What is the highest common factor of 8092 and 1836? 68 What is the greatest common factor of 28 and 140966? 14 What is the highest common divisor of 110 and 916322? 22 What is the highest common factor of 28448 and 448? 224 Calculate the greatest common factor of 383 and 340487. 383 What is the highest common factor of 357 and 217770? 357 What is the highest common factor of 2149161 and 3045? 609 What is the greatest common divisor of 1303472 and 246? 82 What is the highest common divisor of 92 and 434838? 46 What is the highest common divisor of 686 and 182? 14 Calculate the highest common factor of 21879 and 76687. 221 What is the highest common divisor of 1196 and 243776? 52 Calculate the highest common divisor of 1818118 and 734. 734 What is the highest common divisor of 3232 and 1120? 32 What is the greatest common factor of 206 and 897439? 103 What is the greatest common divisor of 34936 and 11264? 88 What is the greatest common divisor of 81326 and 518? 518 What is the highest common factor of 15488 and 15246? 242 What is the greatest common factor of 496 and 54529? 31 Calculate the greatest common divi
{ "pile_set_name": "DM Mathematics" }
The effect of a traditional dance training program on the physical fitness of adults with hearing loss. The purpose of this study was to evaluate the effect of a traditional dance training program on aerobic capacity and muscle strength of adults with hearing loss. Twenty-three adults with hearing loss were separated into 2 groups. Thirteen subjects (6 men, 7 women, mean age, 25.7 +/- 3.9 years) constituted the intervention group, whereas 10 subjects (5 men, 5 women, mean age, 26.4 +/- 5.9 years) formed the control group. Pretraining and posttraining treadmill tests were performed to determine heart rate (HR peak), peak minute ventilation (VE peak), peak oxygen consumption (VO2 peak, absolute and relative), and time to exhaustion (min). Peak torque of hamstring and quadriceps muscles at angular velocities of 60 degrees /s, 180 degrees /s, and 300 degrees /s was also measured. The intervention group followed a 12-week traditional dance training program, whereas the control group received no training during this period. Repeated measures of multiple analyses of variance were used to test mean differences between the values of both groups. A paired t-test was used to compare the values within each group prior and after program participation. A significance level of 0.05 was used for all tests. Following the 12-week training program, significant improvements in peak physiological parameters were seen for the intervention group for peak minute ventilation, peak oxygen consumption (both absolute and relative), time to exhaustion, and peak torque values between the 2 measurements (initial and final). No significant improvements in peak physiological parameters and peak torque were noticed in the control group. In conclusion, adults with hearing loss can improve their physical fitness levels with the application of a systematic and well-designed traditional dance training program.
{ "pile_set_name": "PubMed Abstracts" }
Delhi metro services on Blue line briefly disrupted after girl jumps in front of approaching train: DMRC india Updated: Mar 22, 2019 14:36 IST Metro services on the Blue line was briefly disrupted on Friday after a girl allegedly jumped in front of an approaching train at Noida sector 16 station, Delhi Metro Rail Corporation (DMRC) said. “Delay in service between Noida Electronic City and Dwarka Sector 21 after a girl jumped in front of an approaching train at Noida sector-16 heading towards Dwarka at around 10.45 am,” a DMRC spokesperson said. Services on all other lines remained unaffected, he said. “I could not make it to office on time since the metro services on my route was delayed for about 20 minutes,” said a commuter.
{ "pile_set_name": "OpenWebText2" }
"Kids, on my first day as a college professor, there re two things I didn't know that I wish did." "The first thing was that your mother was in that classroom." "The second thing?" "Well, to explain tt, we have to go back to the beginning of the summer, when, after a year of wrestling with their feelings for each other," "Barney and Robin finally, well..." "Whoo!" "Lily, volume." "Use your indoor "whoo. "" "Sorry, whoo!" "It's jt they kissed!" "They're finally a couple." "Oh, my God, you guys!" "This is our first double date!" "First of millions!" "What if our kids get married?" "!" "Oh, I love this!" "Yeah..." "Lily, listen." "Barney's awesome." "Ron's more than just awe-"some. "" "She's awe-"quite a bit. "" "She's awe-"a whole darn lot. "" "Wait, what are you saying?" "We're just not feeling it right now." "But we'll totally still be friends." "Oh, yeah." "Is it something I did?" "Oh, no, no, no, no, God, no." "No, no, no." "Uh-uh." "Lily, it's not you." "It'ss." "Yeah." "It's us." "You understand, right?" "Sure, of course." "As long as you're happy, I'm happy." "We were gonna take cooking lessons together and we were gonna go on camping trips together and then we were gonna sit around telling funny stories about our cooking lessons and our camping trips." "I know, I know." "(sobbing" "So, has the boat sailed onex tonight or..." "After that, the summer went by way too fast." "Until all of a sudden, it was the Friday before my firsday as a college professor." "Whoa, what's this?" "Oh, boy." "It's just a little something that we got for you that used to belong to my favorite professor of all time." "A fedora." "I'm Indiana Jones!" "That, my friend, is the Dominator 8000, the best bullwhip on the market, according to my whip guy." "Yeah, I have a whip guy." "You know what we should do?" "We should..." "Finish ourd rinks, go out in the alley, and whip stuff." "God, you just get me." "Okay, I should get going." "I got a date." "Oh, are you still seeing that guy?" "Uh, even better, seeing him naked." "What!" "Oh!" "I should go, too." "I hooked up with this Chinese girl last night, and I don't know, it's weird." "I already feel like seconds." "Okay, Ted, you got first whip!" "All right." "(imitating Clint Eastwood) Hey, dummy." "What did tell you about smoking in here?" "Make him whip the habit!" "I'so excited about this whip!" "I got whip fever!" "Just whip him, Ted!" "Don't even aim!" "Just whip him!" "I am so sorry." "No, it's just the whip's not a toy, Ted." "There's such a thing as common sense, you know." "Hey, you can whip me if you want." "I will, some other time." "Whoo!" "So, how long has this been going on?" "All summer." "I knew it!" "I knew it!" "I knew it!" "You guys are boyfriend and girlfriend." "Whoa, hey." "Whoa." "Wow, no." "Whoa..." "Whoa, whoa, whoaLily." "Girlfriend?" "Slow your roll there, Lilypad." "Yeah, yeah." "You've been together all summer." "I dot get it." "Okay, it's like this." "After we kissed, we sat down to have the talk." "We should figure out what this is." "Yes, we should." "Or." "Okay, now, we have to figure this out." "Yes, we do." "Or." "Or..." "Whoa!" "We kept trying to have the talk and then we realized we hate the talk." "Yeah, the talk sucks." "You have to, like, talk." "And be all, "I don't know." ""It's not that I don't like you." ""It'sust that I haven't had a girlfriend" ""in a really ng time." "I hope it doesn't make you mad. "" "Who needs it?" "You needs it." "Guys, you can't just keep hooking up and not at least try and fire out what you mean to each other." "Yeah, we knew you would say that." "That's why we kept it a secret." "We, that and the fact that elaborate lies really turn us on." "No, no, no." "No." "You need tdefine the relationship." "You ne to have the talk." "Or." "Or.." "I know what you're all thinking." ""Who's this cool peer of mine up in front the class?"" "Well, I know the board says" ""Professor Mosby," but to you" "I'm Ted, huh?" "Question." "Awesome." "Hit it." "Yeah, here's my question." ""Ted," who the hell do you think you are?" "Yeah, "Ted. "" "We're supposed to learn from you?" "You failed as an architect." "Well..." "And if you're a professor, where's your h and your whip?" "They're at home." "I didn't think I'd need..." "And where are your pants?" "Oh!" "(gasps" "Oh, God." "Barney, it was awful." "I was teaching..." "Shh, Ted, now's not a good time." "Whe do you keep your condoms?" "Okay, look, mistake #1 was taking that girl's question." "You don't take questions on the first day." "It shows weakness." "Mistake #2 was you should've hit that." "Dude, your pants were already off, u had a classroom full of people to cheer you on, and you n't knock her up 'cause it's a dream." "Class dismissed." "Mistake #3:" "dude, where was the hat?" "Because if y're not going to wear it, I'm taking it back." "I think what Barney's saying is that definitions are important." "You're their teacher, not their friend." "Exactly." "If people don't know their place, nobody's happy." "Amen." "You have to make things clear." "Run tell dat." "Define the relationship." "Yes!" "No!" "Lily, private convo time." "Lily, can't you just let us be happy?" "You're not happy." "You just think you're happy because you feel happy." "And that's not happy?" "Of course not." "You and Robin need to have the talk." "Why?" "Give me one good reason." "I'll give you 20..." "Wow, you can't even think of one." "Headlights." "Deer." "Lily, for the last time, things with me and Robin are as good as they can possibly be." "Oh, hey, look, Brad's here." "I've got two tickets to the Rangers/Canucksame tomorrow night." "I know you're a hockey fan, so I was tnking..." "Uh, oh, um..." "Uh..." "What do I have to do?" "Put a gun to your head?" "Buy you a six pack?" "Oh, come on, Brad, that's..." "Wow, there's really six of them." "Uh, t, uh, I can't." "Why not?" "You have a boyfriend?" "No." "No, no boyfriend." "Great!" "It's a date." "Hey, Barn." "Hey, Brad..." "Eventually, Robin and Brad went to a hockey game." "You're probably wondering why I've been quiet all night." "Um..." "Damn it, Hordichuk!" "You miss another gimme like that," "I'm gonna come down there and put a slapper right up ur beerhole!" "Come on!" "Not really." "The truth is," "I" " I feel kind of weird being out with you." "Oh, man." "Is this the talk?" "What?" "No, this is good." "Let's get it all out of the way." "Robin, I'm looking for something serious." "No, Brad, no, it's..." "But before we go any further, you should know something about my stuff below the belt." "I was born a little different." "God, no, uh," "Brad, no, um..." "This iabout me and Barney." "You and Barn..." "Oh, oh, so you, you guys are..." "Well, we-we-we don't know what we are." "I mean, my heart says "leap into it. "" "My brain says "it's a bad idea. "" "Sounds like you guys need to have the talk." "We're not gonna have the talk!" "Would you just have the talk, okay?" "It's a five-minute conversation, and then you get to have sex afterwards." "It's great!" "Back me up, Ted." "I don't think the talk is necessary." "What?" "!" "Thank you, Ted." "Because Robin is already his girlfriend." "What?" "!" "MacLaren's Bar, four years ago..." "How do you keep a girl from becoming your girlfriend" "Simple: the rules for girls are the same as the rulesfor gremlin" ""Gremlins"?" "Gremlins." "Rule #1:" "never get them wet." "In other words, don't let her take a shower at your place." "#2: keep them away from sunlight-- i. e. don't ever see them during the day." "And rule # never feed them after midnight." "Meaning she doesn't sleep over and you don't have breakfast with her ever." "What about brunch?" "Is brunch cool?" "No, Ted." "unch is not cool." "Ok, new topic." "How do I pick a tie?" "Simple: remember in the movie Predator..." "I've done all three of those things with Robin." "Is she my girlfriend?" "Just once, I wish you guys would call me on Tuxedo Night." "ANNOUNCER Ladies and gentlemen, time to pucker up for the New York Rangers Kiss Cam!" "CROWD Kiss!" "Kiss!" "Kiss!" "Kiss!" "Kiss!" "Okayhow about this?" "If you kiss me and you feel bad about it, you're meant to be with Barney." "Why not?" "Lay it on me." "Kiss!" "Kiss!" "Kiss!" "Kiss!" "Kiss!" "Kiss!" "Kiss!" "Kiss!" "Kiss!" "Kiss!" "Kiss!" "Kiss!" "Kiss!" "Hey, Bd." "Brad, we can't fight like this all night!" "We both got some good shots in." "Let's call a truce!" "It's oy, dude." "I shouldn't go kissing some other guy's girlfriend." "Whoa, whoa, whoa, whoa, girlfriend?" "He come on." "That's putting it a bit strongly." "A bit strongly." "She's no Okay, yeah." "A gifriend's a bit much, Brad, okay?" "Okay, seriously." "We're at the point of physical violence." "Now, will you ease have the talk?" "Because of that?" "Come on." "That's thing." "I'm always punching guys." "Mm-hmm." "Girls" " I'll punch a baby." "I don't care." "Finally, my first clas had arrived." "For real this time." "I knew I had to make a strong impression." "I had thought of everything." "Except..." "Wait." "Does professor have one "F" or two?" "Oh, my God." "Oh, my God." "Professor." "Pro-fess-or." "They're all staring at me." "Professor." "Uh, I don't know." "Ju do something!" "Two "F's. " That looks right." "I think that's right." "Hey, sorry I went little too far last night." "Oh, look, we've been over this." "Unless I say "flugelhorn," you haven't gone too far." "No, meant punching Brad." "Oh, right." "Look, don't even worry about it." "It's... oh." "God." "The doorknob's broken off." "We're locked in here." "Did, did you do this?" "No." "Flugelhorn." "Did you do this?" "No." "Ted?" "Ted, are you out there?" "Ted's not here, Robin." "Lily, let us out of here." "I'd be glad to." "Just as soon as you and Barney have the talk." "Lily!" "Come on." "Let us out!" "No." "Sit down, define the relationship, write down that definition on a piece of paper, slip it under the door, and if I like what I read, you can go." "We are not having the talk!" "Then you'll die in there." "You're gonna lock us in here?" "Well, guess what?" "Maybe we'll spend the whole day having sex!" "Well, guess what?" "I brought Marshall with me, so maybe we'll do the same." "Hey, guys." "I still hadn't decided what kind of professor I wanted to be- authoritative or cool guy." "I thought I would decide in the moment." "And I did." "About 20 times." "Good morning." "'Sup, dudes?" "Silence!" "This is Architecture 101." "I am Professor Mosby." "But you can call me Ted." "Professor Mosby." "T" " Dawg." "Do not call me T-Dawg." "Ner take questions on the first day." "It shows weakness." "Also, don't look right here." "Okay, good luck." "Byesies." "This was it:" "my crossroads moment." "What kind of professor was I gonna be" "I had to decide." "Please save all your qstions until the end of the lecture." "Thank you!" "Now..." "Professor Mosby d arrived." "Of course, if I had taken that girl's question- who, by the way,was not your mo" "Your mom was sitting..." "Wait, let me finish this story al quick." "Here's what that girl wod have said." "I'm sorry to bother you,Professor Mo but this isn't Architecture 101." "This is Economics 305." "You're in the wrong classroom." "Yes, I was in the wrong classroom." "And thus began the most humiliating seven minutes of my life." "Here's your ink-about-it for the day." "Every single person in this room is already an architect." "Architect?" "Hmm." "Ooh." ""We're just hanging out. "" "Just hanging out?" "Not good enough." "Not good enough!" "Can anyone here tell me what this class is really all about?" "Economics?" "No." "No, no." "Don't laugh." "He's not..." "He's not entirely wrong." "An architect must be economical in his use of space, so, well done." "Looks like somone's building towards an A, huh?" ""We're seeing where things are going. "" "I'll tell you where things aren't going- out of that bedroom." "Not good enough." "Not good eugh!" "You- why do you want to be an architect?" "I don't want to be an architect." "Yes." "Yes, exactly." "It-It's not something you want to be." "It's something you need to be." "You dot have a choice, right?" "None of you has a choice" "No questions!" ""We're Barnman and Robin. "" "Oh, come on, you got to admit, that's kind of funny, Lily." "Not good enough." "Not good enough!" "So if any of you have even the slightest inclination to do anything with your life other than become an architect, you're wasting my time and yours." "There's the door" "You can go." "Whoa." "Whoa." "Whoa." "Whoa, whoa, whoa." "Wait, wait, wait." "Don't-Don't all leave!" "Architecture's fun!" "Look!" "I brought a hacky sack!" "Sorry, I'm late, everyone." "My name is Professor Calzonetti." "This is Economics 305." "You may return to your seats." "Uh, sorry, sir." "This is, uh, Architecture 101." "Who invited their dad, right?" "Young man, for the last 28 years," "Economics 305 has been taught right here in building 14, room 7." "Uh, yeah." "Buddy, I'm sure 200 architecture students and their professor all got the room wrong." "T" " Dawg, you're in the wrong room, bro." "Sorry." "Coming through." "Excuse me." "Whoa." "20 minutes late on your first day?" "That's rough." "Mm." "Yeah, but here's the funny thing." "By that point, I didn't have time to think about what kind of teacher I was going to be." "I just got up there and talked about architecture." "And it was kind of great." "That's awesome, Ted." "Yeah." "Congratulations, buddy." "Thanks." "Nice job, Ted." "Hey, Ted, door five!" "Were you there?" "Yeah, I got you, buddy." "They still haven't had the talk, huh?" "I think I know how to speed things up" "Oh, not cool!" "Pancakes, fresh bacon." "It is so yummy." "Uh, dude, I'm starving." "Let's..." "Let's just have the stupid talk." "Come on." "Fine." "But how do these this even work?" "What do we say?" "Huh." "Where do you see this relationship going?" "Oh, my God, that sounds so cheesy." "(laughing I know, right?" "Totally." "But, um, where-where do you see this relationship going?" "I don't know." "I mean, it's not like I don't like you." "I just haven't had a girlfriend for a long time." "I hope that doesn't make you mad." "Mad?" "I feel the same way." "I suck at relationshs." "I mean, except with Ted." "Man, he really got it right." "I know it's a cliche but he really ruined me for other men." "Of course, I wasn't in the room for this conversation, but I have to imagine Robin said something like that." "Hmm." "Maybe we should go back to being jt friends." "Maybe." "But, um," "I don't want to stop having sex." "Oh, good." "Me, neither." "Yeah." "Friends isn't gonna work." "Nope." "Oh, we're not good at being friends." "We're nogood at being in a relationship." "Wh are we good at?" "I know something we're good at." "I don't know." "If we're gonna do it again," "I'm gonna need some Gatorade, or..." "No!" "No, t that." "Lying." "Okay, think about it." "We spent the whole summer lying about being just friends." "Why not just keep lying?" "Really?" "ROBIN:" "Yeah." "Really." "We sat down." "We had the talk." "Barney's my boyfriend now." "And Robin's my girlfriend." "I know it sounds nuts, but it feels good to say." "We're both afraid of commitment, but, the fact is, we also can't live without each other." "And if the alternative is not being together, then it's worth taking this risk 'cause she's awesome." "And he's awesome." "He looks nice in a suit." "She can handle her Scotch." "He's my boyfriend." "And she's my girlfriend." "Oh!" "Good enough!" "We are good." "She bought it." "Hook, line, and sinker." "are good." "Oh, totally." "Mm." "So, you want to get some breakfast?" "You know, brunch actuall does sound kind of good." "Hmm." "Well, lead the way, sweetie pie." "Wow!" "Flugelhorn." "Yeah, that felt wrong." "Mm." "Mm." "You do realize they were lying, right?" "No, Ted." "They don't realize they weren't lying." "And that's the story of how Barney and Robin became boyfriend and girlfriend." "Oh, hello." "Hello." "Good evening." "Hello." "Don't get up." "Didn't we meet on a yacht?" "Hello." "What?" "Oh, no!" "Did I not tell you guys that it was Tuxedo Night?" "Doesn't feel very good, does it?"
{ "pile_set_name": "OpenSubtitles" }