Search is not available for this dataset
text
string
meta
dict
Q: Help with Dual problem in SDP I'm having a problem to find the Dual of a Semidefinite programing problem: $$\min\;\;(tr(U)+tr(V))/2$$ $$s.t.\;\; \left[ \begin{array}{cc} U & X \\ X^T & V \end{array} \right]\succeq0$$ $$X_{ij}=M_{ij}\;\;(i,j)\in\Omega$$ Where $tr()$ is the trace operator, $U, V$ and $X$ are the matrix variables of the problem and $M$ is a given matrix. It is known that a general SDP has the followind Primal Dual pair: $$P) \;\; \min \;\; tr(C^TX)$$ $$s.t.\;\; tr(A_{i}^TX)=b_i\;\;i=1,...,m$$ $$X\succeq 0$$ $$D)\;\; \max b^Ty$$ $$s.t.\;\; \sum_{i=1}^{m}A_iy_i + S = C $$ $$S\succeq0$$ But i can't find the way to modify my problem to this form. A: You just need to transform everything into the standard form. Writing the primal problem in the standard form is easy. In fact, we can set $$ C = \left[ \begin{array}{cc} I/2 & 0 \\ 0 & I/2 \end{array} \right], A_k = \left[ \begin{array}{cc} 0 & 1_{ij}/2 \\ 1_{ji}/2 & 0 \end{array} \right], b_k = M_{ij}, \forall (i,j) \in \Omega.$$ Therefore, the dual will be $$ \max ~ tr(Y, M) $$ $$ s.t. ~ \left[ \begin{array}{cc} I/2 & -Y/2 \\ -Y^\top/2 & I/2 \end{array} \right] \succeq 0$$ where $M$ is a matrix whose elements are zero if $(i,j) \notin \Omega$ otherwise $M_{ij}$.
{ "pile_set_name": "StackExchange" }
Nuclear Factor Kappa B: A Potential Target to Persecute Head and Neck Cancer. Despite the consistent and significant advancements made in the treatment of head and neck cancer (HNSCC), it remains one of the most devastating cancers globally killing approximately 350,000 people every year. Both clinical and basic research revealed that the transcription factor NF-κB, is constitutively expressed in HNSCC and this persistent expression of NF-κB is the root cause of this disease resulting in cancer cell proliferation, survival, invasion, metastases and poor survival of patients. Activation of NF-κB is pragmatic in most of the premalignant dysplastic lesions indicating it as an early episode in malignant transformation of this disease. Therefore, therapies designed to inhibit or block the activity of NF-κB, would result in downregulation of key cellular processes involved in tumor growth and its dissemination to metastatic sites. In addition, substantial evidences have revealed that NF-κB plays an indispensable role in the development of both chemo and radiation resistance in HNSCC which is identified to be a primary cause for the failure of therapies. This shows the potential of targeting NF- κB in developing therapies against this disease. This review summarises the role of NF-κB in the development of HNSCC and the potential of using NF-κB as a target to develop novel highly effective therapies for this disease.
{ "pile_set_name": "PubMed Abstracts" }
Suspending systems for suspending solid particles in liquid compositions have been employed in specific types of cleaning and personal care compositions in the past. For example, suspending systems comprising surfactant phases and/or surfactant structuring liquids have been incorporated into liquid detergent compositions. Examples of such surfactant-based suspending systems are described in EP 442 549 B1, U.S. Pat. No. 4,828,747, EP 160 342 B2, EP 386 566 A1, U.S. Pat. No. 5,391,324, EP 668 903 and 5,409,632, which all deal with the suspension of preformed poorly water soluble peracids using surfactant phases. Such surfactant phases are made using (i) one or more nonionic surfactants (low electrolyte) or (ii) combinations of anionic and/or nonionic surfactants with fatty acids and/or electrolytes. GB 2279660 describes the use of xanthan gum as a suspending agent for solid particles in a liquid detergent product. More specifically, GB 2279660 discloses a stable, pourable aqueous liquid laundry detergent composition comprising xanthan gum (a polysaccharide polymer) for phase stability, along with a specific pH jump system for cleaning performance and product bleach stability, in a peroxyacid-containing suspension. This is accomplished without the use of a stability enhancing polymer which is a copolymer of a hydrophobic and a hydrophilic monomer. U.S. Pat. Nos. 4,992,194 and 5,073,285, both Liberati et al, issued Feb. 12, 1991 and Dec. 17, 1991, respectively, describe aqueous structured heavy duty liquid detergent formulations which contain solid, particulate, substantially water-insoluble organic peroxyacid, surfactant combinations, pH adjusting systems, and selected decoupling polymers. U.S. Pat. No. 4,879,057 to Dankowski et al, issued Nov. 7, 1989 discloses aqueous bleaching suspensions including peroxycarboxylic acid suspended in a carrier liquid in the presence of an organic thickening agent and of an acidifying agent. The suspensions contain agar or xanthan polysaccharide as a thickening agent, and a hydrate-forming neutral salt. It is well known that aqueous liquid laundry detergent products which contain suspended solids such as solid, substantially water-insoluble peroxyacid can have phase stability problems, particulary across the varying environmental temperatures to which such products may be exposed. A further problem is product and wash pH, since low product pH is required for bleach stability while alkaline wash pH is advantageous for cleaning and bleaching efficacy (see U.S. Pat. No. 4,259,201, Cockrell). Additionally, when product detergent surfactant levels are increased in such compositions for better cleaning and bleaching performance, product viscosity often increases to unacceptable levels. Lastly, suspensions of solid particulates, especially peroxycarboxylic acids, often times are plagued by eye irritation problems. However, the use of polymeric stabilization systems of the present invention, especially ethoxylated polymers and/or low levels (<1%) of ethoxylated nonionics in aqueous liquid detergent compositions to stabilize solid particles, such as substantially water-insoluble peroxycarboxylic acids and/or to reduce eye irritation of the compositions is not known, nor has it been suggested in the prior art. Accordingly, there is a need for an aqueous liquid detergent composition comprising one or more particulate solids such as peroxycarboxylic acids (“peracid”) and a polymeric stabilization system, and a method for laundering fabrics using such a composition.
{ "pile_set_name": "USPTO Backgrounds" }
The background description provided herein is for the purpose of generally presenting the context of the disclosure. Work of the presently named inventors, to the extent it is described in this background section, as well as aspects of the description that may not otherwise qualify as prior art at the time of filing, are neither expressly nor impliedly admitted as prior art against the present disclosure. Throughout the world, military and homeland security forces face an increasing need to provide safety and security to troops and high-value assets. Wireless surveillance systems are emerging as a way of meeting this need. However, when developing a communications system for military application, a variety of obstacles need to be overcome. For example, remotely located wireless surveillance systems often include video recording devices that may rapidly consume limited power resources. Generally, however, remotely located portions of wireless surveillance systems should be configured to operate in a manner that conserves power resources.
{ "pile_set_name": "USPTO Backgrounds" }
Q: r8168 not negotiating gigabit speeds in 18.04 I just upgraded from 16.04 to 18.04 on my main desktop machine. I've got an r8168 network card. I got gigabit speeds in 16.04 and now am now only getting 100Mbps in 18.04. I've tried both the r8169 and r8168-dkms drivers. After doing the upgrade, I've swapped network cables and switches to ensure this isn't a hardware problem. The NIC is the on-board NIC for an MSI x370 Gaming Plus motherboard. Unfortunately, I don't have this debug information from 16.04; the below is from after the upgrade to 18.04. $ sudo lshw -C network *-network description: Ethernet interface product: RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller vendor: Realtek Semiconductor Co., Ltd. physical id: 0 bus info: pci@0000:1e:00.0 logical name: eth0 version: 15 serial: 30:9c:23:0c:9a:94 size: 100Mbit/s capacity: 1Gbit/s width: 64 bits clock: 33MHz capabilities: pm msi pciexpress msix bus_master cap_list ethernet physical tp 10bt 10bt-fd 100bt 100bt-fd 1000bt-fd autonegotiation configuration: autonegotiation=on broadcast=yes driver=r8168 driverversion=8.045.08-NAPI duplex=full ip=192.168.1.2 latency=0 link=yes multicast=yes port=twisted pair speed=100Mbit/s resources: irq:46 ioport:f000(size=256) memory:fd604000-fd604fff memory:fd600000-fd603fff $ sudo ethtool eth0 Settings for eth0: Supported ports: [ TP ] Supported link modes: 10baseT/Half 10baseT/Full 100baseT/Half 100baseT/Full 1000baseT/Full Supported pause frame use: No Supports auto-negotiation: Yes Supported FEC modes: Not reported Advertised link modes: 10baseT/Half 10baseT/Full 100baseT/Half 100baseT/Full 1000baseT/Full Advertised pause frame use: No Advertised auto-negotiation: Yes Advertised FEC modes: Not reported Speed: 100Mb/s Duplex: Full Port: Twisted Pair PHYAD: 0 Transceiver: internal Auto-negotiation: on MDI-X: Unknown Supports Wake-on: pumbg Wake-on: g Current message level: 0x00000033 (51) drv probe ifdown ifup Link detected: yes $ lsmod | grep r816 r8168 524288 0 $ dmesg | egrep '(eth0)|(r816)' [ 1.036881] r8168: loading out-of-tree module taints kernel. [ 1.037195] r8168: module verification failed: signature and/or required key missing - tainting kernel [ 1.037822] r8168 Gigabit Ethernet driver 8.045.08-NAPI loaded [ 1.052489] r8168: This product is covered by one or more of the following patents: US6,570,884, US6,115,776, and US6,327,625. [ 1.052496] r8168 Copyright (C) 2017 Realtek NIC software team <nicfae@realtek.com> [ 42.034465] eth0: 0xffffa7790007d000, 30:9c:23:0c:9a:94, IRQ 46 [ 42.087610] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready [ 47.210737] r8168: eth0: link up [ 47.210752] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready # note: did ethtool -r eth0 here [ 180.421766] r8168: eth0: link down [ 185.588203] r8168: eth0: link up A: This has just happened to me, too. I suspect this could be caused by bad NIC drivers that sometimes Ubuntu loads by default, which trap the hardware in states it can't get out of alone. According to this troubleshooting forum, doing a cold reboot of your PC (plugging off the AC cable for 5 minutes and then turning it on back again) clears possible bad states of your network card and could fix this issue. Keep in mind that with faulty drivers this issue could happen again randomly, or forever. You should always use the most appropiate drivers for your NIC. In your case, as your motherboard manufacturer says, you have a Realtek® 8111H chip, so downloading the specific drivers from the Realtek website and using them seems worth trying.
{ "pile_set_name": "StackExchange" }
Introducing... Your Bed Bath We created a new page on our site that provides product recommendations for Login/Cache Customer activity based upon your recent activity. For a non logged in user Bed Bath curates an array of recently trending content. We hope it becomes your favorite destination on Bed Bath & Beyond. Create a beautiful outdoors getaway in your home with the Winter's Air duvet cover. This luxuriously soft 300-thread-count 100% cotton bed features an allover nature-inspired print in a beautiful teal/grey color palette with metallic accents throughout. This Winter's Air Beaded Square Toss Pillow features a beautiful metallic feather motif with beaded accents that coordinates perfectly with the soft, nature-inspired look of the Winter's Air duvet cover collection.
{ "pile_set_name": "Pile-CC" }
Q: How do I get DependencyProperty to work in Silverlight? I'm trying to bind using a DependencyProperty, but I can't even get the DependencyProperty to work let alone try to bind to it. I'm following a silverlight guide and up to this point I'm supposed to be able to set the property using XAML. Here is the code I have so far: MainPage.xaml: <UserControl xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" xmlns:d="http://schemas.microsoft.com/expression/blend/2008" xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006" xmlns:local="clr-namespace:UserControlSample" x:Class="UserControlSample.MainPage" mc:Ignorable="d" d:DesignHeight="300" d:DesignWidth="400"> <Grid x:Name="LayoutRoot" Background="White"> <local:InfoRectangle Margin="32,36,0,0" HorizontalAlignment="Left" Height="70" VerticalAlignment="Top" Width="122" InfoText="New Text"/> <local:InfoRectangle Margin="105,139,188,97" InfoText="some text" /> </Grid> InfoRectangle.xaml: <UserControl xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" xmlns:d="http://schemas.microsoft.com/expression/blend/2008" xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006" xmlns:sdk="http://schemas.microsoft.com/winfx/2006/xaml/presentation/sdk" mc:Ignorable="d" x:Class="UserControlSample.InfoRectangle" d:DesignWidth="122" d:DesignHeight="70"> <Grid x:Name="LayoutRoot"> <Rectangle Fill="#FFABABE9" Stroke="Black" RadiusY="4" RadiusX="4"/> <TextBlock Name="InfoLabel" Text="Text block" Margin="5" /> </Grid> InfoRectangle.xaml.cs: using System; using System.Windows; using System.Windows.Controls; using System.Windows.Documents; using System.Windows.Ink; using System.Windows.Input; using System.Windows.Media; using System.Windows.Media.Animation; using System.Windows.Shapes; namespace UserControlSample { public partial class InfoRectangle : UserControl { public InfoRectangle() { // Required to initialize variables InitializeComponent(); } public string InfoText { get { return (string)GetValue(InfoTextProperty); } set { SetValue(InfoTextProperty, value); } } public static readonly DependencyProperty InfoTextProperty = DependencyProperty.Register( "InfoText", typeof(string), typeof(InfoRectangle), new PropertyMetadata("something", InfoTextChanged)); private static void InfoTextChanged(DependencyObject d, DependencyPropertyChangedEventArgs e) { } } } When I run the solution the two rectangles show up but they display just "Text block" which is neither the default set or the value set in the MainPage XAML for the user controls. A: Here is the solution; It seems the callback method has to be completed. private static void InfoTextChanged(DependencyObject d, DependencyPropertyChangedEventArgs e) { ((InfoRectangle)d).InfoLabel.Text = e.NewValue.ToString(); }
{ "pile_set_name": "StackExchange" }
The ability to detect the “shift in the phase” of consecutive pulses of electromagnetic energy allows a Doppler radar to detect motion. The phase of the returning signal changes based upon the motion of targets with respect to the radar. A radar processor measures the phase change of the reflected pulses of energy and then converts that change to a velocity of the object, either toward or from the radar. Doppler processing requires pulse-to-pulse phase coherency over a series of many pulses to make this measurement. Most radar designs co-locate the transmit and receive functions so they can share a timing reference to maintain coherency. In some radars, the transmit and receive functions are distributed functions. Successful radar ranging and motion detection typically requires the sharing of high bandwidth timing signals using coaxial cables which can be very sensitive to small variations and difficult to maintain. Doppler radar generally has employed shared clocks in a transmitter and receiver in addition to a timing pulse, generally denoted as T0, which simultaneously triggers the transmission of a pulse and the start of radar echo signal collection. All pulse radars require precise knowledge of the transmit time, T0, and the target echo receive time to determine the target range. This requires that the T0 signal itself and the transmit and receive processes that follow must be accurate and repeatable to within 1 cycle of the shared reference clock. Any deviation from an identical interval degrades the ability to detect small phase shifts in the received echoes from pulse to pulse. For example, a 64 MHz shared clock this means a precision of better than 15.625 nanoseconds. Clock jitter, i.e. timing variations caused by phase noise, on an analog-to-digital, or A/D, clock signal in a Doppler radar has a direct effect on the performance of the Doppler radar due to phase errors in the received signal. For example, a sampled 48 MHz intermediate frequency signal will have phase errors of 1 degree if the A/D sample jitter is as small as a variation of 58 picoseconds. The effect of clock jitter on a sample is to degrade the signal-to-noise ratio commonly denoted as SNR of the A/D converter. For many systems, clock jitter is the largest portion of the A/D SNR budget and if controlled, has a great influence on performance of a Doppler radar. There is a need for removing clock jitter in synchronizing a receiver and transmitter for a radar installation. Traditionally, a timing signal of sufficient resolution must include a very steep onset of the timing pulse to render a very precise timing. Including many of the high harmonics is necessary to lend precision to the signal and therefore high bandwidth is necessary to convey a suitable timing signal. The high bandwidth requires either that the design of the radar collocates the transmit and receive functions or increases the system cost with a high bandwidth communication link between the transmitter and receiver functions. Thus, there is an unmet need in the art for a synchronization system that removes the need for a timing signal with a very steep onset.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Django: Sum on an date attribute grouped by month/year I'd like to put this query from SQL to Django: "select date_format(date, '%Y-%m') as month, sum(quantity) as hours from hourentries group by date_format(date, '%Y-%m') order by date;" The part that causes problem is to group by month when aggregating. I tried this (which seemed logical), but it didn't work : HourEntries.objects.order_by("date").values("date__month").aggregate(Sum("quantity")) A: aggregate can only generate one aggregate value. You can get the aggregate sum of Hours of the current month by the following query. from datetime import datetime this_month = datetime.now().month HourEntries.objects.filter(date__month=this_month).aggregate(Sum("quantity")) So, to obtain the aggregate values of HourEntry's all the months, you can loop over the queryset for all the months in the db. But it is better to use the raw sql. HourEntries.objects.raw("select date_format(date, '%Y-%m') as month, sum(quantity) as hours from hourentries group by date_format(date, '%Y-%m') order by date;")
{ "pile_set_name": "StackExchange" }
Aerides, Athens Aerides ( ) is a small neighborhood of Athens, Greece surrounding the Tower of the Winds, from where it takes its name. It is a subdivision of Plaka. History Aerides was considered the centre of Athens during the reign of King Otto (1832-62). A market was located here and the so-called 'Plane Tree Square' (πλατεία του πλατάνου) which was a barracks in which the Bavarian Army camped. Aiolou Street starts at the small park in which the Tower of the Winds is located and at the crossroads with Ermou Street was where most of the city's commercial traffic gathered. To the north, a market called Abatzidika opened, dealing in coarse fabrics. The Madrasa of Athens (Μεντρεσές Αθηνών) is found on the north side of the park in which the Tower is located. This Islamic holy school became a prison during Otto's reign. Those who were being executed used to greet the plane tree in the adjacent square named after it. This is the origin of the Greek phrase "Greet the plane tree for us" (χαιρέτα μας τον πλάτανο), said when someone doesn't believe what the speaker has said will happen. With the move of military quarters elsewhere, over time this once busy neighbourhood became quiet. On 1 May 1965, Aerides became part of Plaka, which it remains to the present day. Aerides Bath The Aerides Bath (Λουτρό των Αέρηδων) is a Turkish bath left over from the Ottoman rule. The bath remained opened until 1965. Transport Monastiraki metro station on Line 1 and Line 3 is the nearest station of the Athens Metro. References Category:Neighbourhoods in Athens
{ "pile_set_name": "Wikipedia (en)" }
A Swiss asset manager, who allegedly helped move secret bank accounts from the Swiss bank UBS to a smaller Swiss bank when UBS came under IRS scrutiny, was indicted on Tuesday in south Florida on charges of conspiring to defraud the US government. Martin Lack of Lack & Partner Asset Management AG in Zurich was charged with conspiring with his America-based clients to defraud the US government by helping his customers hide assets and evade paying federal taxes. He allegedly agreed to open and maintain secret bank accounts at a regional bank in Switzerland for US-citizen customers seeking to avoid the IRS. Mr. Lack worked at the Swiss banking giant UBS until 2003 when he opened his firm. The indictment says that Lack solicited US customers to open undeclared accounts at UBS and, later, at Cantonal Bank in Basel. When US officials began an intense investigation of secret banking at UBS, he helped some clients move their accounts to Cantonal Bank, the indictment says. Later, as the investigation of UBS intensified, Lack encouraged his customers not to cooperate with US investigators. He also urged them not to take advantage of a voluntary disclosure program offered by the IRS in 2009. Lack provided some of his clients with a pre-paid cell phone and instructed them to only use that phone to contact him. The move was an apparent effort to avoid law enforcement surveillance and monitoring of telephone lines. One client was advised in November 2010 that he had nothing to worry about since the client’s former UBS account was being held as cash in Lack’s office safe. “There is no paper trail because the money [was] put [in] cash,” a Lack associate, Renzo Gadola, told a Mississippi-based customer, according to the indictment. “You have no link to UBS whatsoever, so 99.9 percent you have nothing to worry about,” Mr. Gadola told the client. What Gadola did not know was that federal agents were monitoring his activities. Gadola was arrested two days later. He pled guilty in December 2010 to conspiring to defraud the US government. He is scheduled to be sentenced in November. The 22-page indictment recounts Lack’s alleged involvement with nine US-based customers. They were from Mississippi, Texas, two from Illinois, two from Florida, New Mexico, Massachusetts, and California. Lack is the only defendant listed in the indictment. His banking contact at Cantonal Bank is identified as an unindicted co-conspirator. If convicted, Lack faces a sentence of up to five years in prison and a $250,000 fine.
{ "pile_set_name": "OpenWebText2" }
Low Milk Production What causes low milk production? Occasionally, a delay in the time when milk "comes in" turns into an ongoing problem with low milk production. Sometimes, a mother has been producing sufficient amounts of milk, and then milk production slowly, or quite suddenly, decreases. Some of the conditions associated with a delay may also have an ongoing effect on milk production, including, but not limited to, the following: severe postpartum hemorrhage (excessive bleeding) retained placental fragments thyroid conditions Mothers with previous breast surgery that cut some of the nerves, milk-making tissue, or milk ducts, may have difficulty producing enough milk to fully feed a baby. Other factors can also lead to insufficient milk production. Maternal smoking has been shown to result in less milk. Some medications and herbal preparations have a negative effect on the amount of milk produced. Hormonal forms of birth control, especially any containing estrogen, have been found to have a big impact on milk production. However, some mothers report a drop in milk production after receiving/taking a progestin-only contraceptive during the first four to eight weeks after delivery (postpartum). Milk production may also decrease if you become pregnant again. If insufficient milk production seems to be a problem, yet the baby seems to be sucking effectively, your physician or certified lactation consultant (IBCLC) may recommend the following: Increase the number of breastfeedings to 10 to 12 in 24 hours. Increase the amount of skin-to-skin contact you have with your baby. Take off your shirt and baby's shirt and place your baby on your chest with a sheet or shirt over both of you. A review of your health history with you to discover if there may be a health condition, treatment, or medication interfering with milk production. You also may want to: pump your breasts for several minutes after breastfeeding, using a hospital-grade electric breast pump. ask your physician or a certified lactation consultant (IBCLC) about taking a galactogogue, which is a medication or an herbal preparation found to have a positive effect on milk production. Think positive. Although insufficient milk production usually can be reversed, any amount of milk you produce is valuable for your baby. Try to remember that your baby is 25 to 90 percent breastfed rather than feel discouraged that he/she is also receiving a breast milk substitute.
{ "pile_set_name": "Pile-CC" }
<configuration> <property name="LOG_DIR" value="${LOG_DIR:- /tmp/datahub/logs}"/> <timestamp key="bySecond" datePattern="yyyy-MM-dd'_'HH-mm-ss"/> <timestamp key="byDate" datePattern="yyyy-MM-dd"/> <appender name="STDOUT" class="ch.qos.logback.core.ConsoleAppender"> <layout class="ch.qos.logback.classic.PatternLayout"> <pattern>%d{HH:mm:ss} [%thread] %-5level %logger{36} - %msg%n</pattern> </layout> </appender> <appender name="FILE" class="ch.qos.logback.core.rolling.RollingFileAppender"> <file>${LOG_DIR}/datahub-frontend-${bySecond}.log</file> <append>true</append> <encoder> <pattern>%d{HH:mm:ss} [%thread] %-5level %logger{36} - %msg%n</pattern> </encoder> <rollingPolicy class="ch.qos.logback.core.rolling.FixedWindowRollingPolicy"> <maxIndex>10</maxIndex> <FileNamePattern>${LOG_DIR}/${byDate}.log.%i</FileNamePattern> </rollingPolicy> <triggeringPolicy class="ch.qos.logback.core.rolling.SizeBasedTriggeringPolicy"> <MaxFileSize>20MB</MaxFileSize> </triggeringPolicy> </appender> <root level="info"> <appender-ref ref="STDOUT"/> <appender-ref ref="FILE"/> </root> </configuration>
{ "pile_set_name": "Github" }
Information integration is a leading aim for many supply-chain managers. Although the benefits of successful information integration are desirable, the barriers are quite daunting. Our study benchmarks the current status of information integration in supply chain management using indepth case study methodology at five channel positions. The study reveals two main dimensions to information integration: connectivity and willingness. We discuss both of these dimensions’ implications for managers and academics and provide prescriptive direction where research and development should be channeled to facilitate information integration success.
{ "pile_set_name": "Pile-CC" }
Ray Allen is listed as probable for the Miami Heat on Wednesday however Dwyane Wade remains listed as doubtful Receive the latest sports updates in your inbox Ray Allen and Dwyane Wade have missed four straight games for the Heat The Miami Heat will likely have one more weapon at their disposal on Wednesday night, as Ray Allen is listed as probable to play, according to the team. Allen has missed four straight games with a stomach virus and did not travel with the team on its recent road trip. During that span, the Heat have gone 3-1 while having to rely more on James Jones and Norris Cole. Despite Miami's success without Allen, his return should be noticeable as he leads the team in bench scoring, per Basketball-Reference.com. Allen also gives the Heat a reliable perimeter shooter that changes the inside game for the team. Miami Heat Opening Night in Photos While Allen should be on the court, it appears that Dwyane Wade will not be. It will be the fifth straight game missed for Wade if he's unable to suit up. As of now, the team has stated that Wade is doubtful for the game and only participated lightly in the morning shoot-around. The Heat mentioned that Greg Oden is doubtful as well with continuing back spasms. The center has missed five straight games after playing limited minutes against the Indiana Pacers. If Oden and Wade are unable to start, the Heat will likely turn to Toney Douglas and Udonis Haslem to begin the game. Haslem has done a fine job since being given extra playing time, and could potentially find himself in the rotation come playoff time. The veteran has only played in 39 games this year but has started five of the last seven games for the Heat. As for Douglas, he has started six of the last seven for Miami but has failed to make much of an impact. The Party Inside the AAA Wednesday's game against the Milwaukee Bucks is set for 7:30 p.m. and is the second game in a five-game homestand.
{ "pile_set_name": "Pile-CC" }
Also Available at RSS Feeds I got into anime years back though, believe it or not, Pokémon. I had recently become a big fan of console RPGs, which led me to play Pokémon Red back on the Gameboy. I quickly got addicted to the game and decided to check out the anime as well. Deciding that it was a whole lot better than most of the other stuff on TV at the time, I ended up trying out a lot of similar shows, such as Digimon. Before long I was hooked on nearly every anime on WB and Fox. Then I found out that Cartoon Network had anime too... Add a ton of different anime and manga, a deep hatred of 4Kids, a bunch of DVDs and fansubs, and one college anime club, and that's where I am now. An avid, though mostly self taught, fan.
{ "pile_set_name": "Pile-CC" }
Q: 7 speed freewheel I have 7 speed freewheel on Carrera Zelos. I want to upgrade to 8 speed but can t find any freewheel. How do I do it? Its my first road bike as I normally ride downhills and wanted to mix it up especially commuting to and from work and feel it needs better gears/ brakes. It has the shimano tourney set with a TZ500 freewheel. A: Long story - freewheels died off, with the 7 speed freehweel being about the last you could get. 6 and 7 speed freewheels still exist because they're cheap and suit low-price bikes. However as cassettes got wider, the 7 speed was more likely to bend its rear axle on an impact like a pothole or a driveway ramp. The 8 speed design with a freewheel would be worse. from https://en.wikipedia.org/wiki/Bicycle_wheel In the second image, notice how far inboard the bearings are on the drive side. Whereas a more modern freehub has the load spread across the bearings more evenly, with less leverage on the axle. Your only real option to get more gears are to replace almost the entire transmission. That could cost more than a new bike, so not recommended. You will need: cassette chain freehub-based back wheel hub + rebuild of your wheel onto this new hub OR a complete new back wheel replacement right-hand shifter inner and outer cables for rear shifter Additionally you might need: rear derailleur that matches the number of gears bartape Probably you won't need to replace the chainrings or front mech, though some people can't stand having unmatched brake/shift levers on their bike. Add all that up, and it could easily exceed the cost of your bike... consider that your bike retailed last at Halfords for £275 - and even if you spent that much, other parts would still not be new. I would suggest you ride the Carrera as it is, and look to buy an entire new bike. Keep this as your N+1 spare bike, or sell it on to the next person as-is. The only time this kind of upgrade is financially reasonable, is if you have a donor bike with adequate components already. Then you have to make sure the donor has the same OverLocknut Dimension as your existing frame, and so on. It starts getting quite complex.
{ "pile_set_name": "StackExchange" }
Q: Has the spontaneous forming of matter been observed? If I understood the accepted answer here correctly,then matter can spontaneously form. But has this ever been observed? A: The answer you cite is somewhat simplified to suit the level of the question. The vacuum does not consist of pairs of particles and anti-particles popping into existence and then disappearing again. When calculating the properties of the vacuum it's true that we use Feynman diagrams showing the creation of particle/antiparticle pairs, but these are virtual (anti)particles that are a computational device. They do not mean particles are literally appearing from nothing. Virtual particles cannot be observed but their effects can. For the vacuum the obvious evidence is the Casimir effect. Since this has been experimentally measured you could regard it as an observation of virtual particles appearing and disappearing, however I must emphasise that the virtual particles are not really particles in the common sense of the word.
{ "pile_set_name": "StackExchange" }
Q: How do I get people to stop typing the state into the city field? I have a form with city, state and country fields. The design makes the user select the country, then state, and then if the item is not found, they type the name of the organization, followed by city. Roughly 5% of people type "City Name, ST". e.g. "Boulder, CO" or "Boulder, Colorado". There are cases where a comma makes sense, such as "Brooklyn, New York". Is there any good solution to this problem? Edit: We have 30% international addresses, so zip code tricks don't really work. Update: I like Keno's idea of validating post comma text... show a soft error when there is a comma. A: Try using autocomplete where the user starts typing and gets a list of cities and their corresponding states. Pros: Users never have to type the full name. Users can never misspell a name. Less need of error messages and error handling. Found an API that might help you. A: You can automate the city (and state) field by asking for the user’s ZIP code first. Every code correlates with a specific state and a developer can use a tool / API that will put the right city and state into the fields after the user types in the ZIP code. Automating the city field prevents user mistakes and the time spent to complete the form is shorter. Update: Some comments suggest the automation can fail. Even a lot sites make the user enter their zip code first (see Apple), and then auto-populate the city and state based on it, you can have some issues developing this. Some zip codes can generate a result with multiple cities/towns/etc within them. This means you may need a select/ dropdown with the options from the array of cities and allow the user to select the correct city. Anyway, the country is already selected in this step, so the format for the zip code is known. Also, provide a way for someone to successfully complete this form without the zip code. The suggestion dropdown can have more problems in development, but the idea is good too (an automatic suggestion dropdown as you type your state). This requires more interactions than the first method and this method requires a database of all possible city names. Resources (this is just to see there are a lot of great tools there): 35 zip code APIs Get City Name from Zip Code google geocoding Google Maps APIs A: I would validate everything after a comma in that field and advice:
{ "pile_set_name": "StackExchange" }
Q: Averaging BigDecimals using Streams API Collectors Current approach based on double type of product prize. public Map<String, BigDecimal> averageProductPriceInCategory() { return shopping.entrySet() .stream() .flatMap(e -> e.getValue().keySet().stream()) .collect(Collectors.groupingBy(Product::getCategory, Collectors.averagingDouble(Product::getPrize))); } shopping is basically a map: Map<Client, Map<Product,Integer>>, The outer Key represents the Client The inner Key represents the Product. Product class members are name, category, price (previously of double type) - want to refactor the provided code into one using price as a type of BigDecimal the inner maps value (Integer) reprents the number of specified product which belong to a specific client Below snippet can be used only for calculating the total prize of products which belong to a specified category. Not sure, how to calculate the average products prize in regards to category with using BigDecimals Map<String, BigDecimal> totalProductPriceInEachCategory = shopping.entrySet().stream() .flatMap(e -> e.getValue().keySet().stream()) .collect(Collectors.groupingBy(Product::getCategory, Collectors.mapping(Product::getPrize, Collectors.reducing(BigDecimal.ZERO, BigDecimal::add)))); A: Take a look at how Collectors.averagingDouble or Collectors.averagingInt is implemented. public static <T> Collector<T, ?, Double> averagingInt(ToIntFunction<? super T> mapper) { return new CollectorImpl<>( () -> new long[2], (a, t) -> { a[0] += mapper.applyAsInt(t); a[1]++; }, (a, b) -> { a[0] += b[0]; a[1] += b[1]; return a; }, a -> (a[1] == 0) ? 0.0d : (double) a[0] / a[1], CH_NOID); } Essentially, you need a mutable accumulation type that would hold a BigDecimal which is a sum of product prices, and an int which is a number of products processed. Having that, the problem boils down to writing a simple Collector<Product, AccumulationType, BigDecimal>. I simplified an example and removed getters/setters and an all-args constructor. Instead of a nested class ProductPriceSummary, you might use any mutable holder class for 2 elements. class AverageProductPriceCollector implements Collector<Product, AverageProductPriceCollector.ProductPriceSummary, BigDecimal> { static class ProductPriceSummary { private BigDecimal sum = BigDecimal.ZERO; private int n; } @Override public Supplier<ProductPriceSummary> supplier() { return ProductPriceSummary::new; } @Override public BiConsumer<ProductPriceSummary, Product> accumulator() { return (a, p) -> { // if getPrize() still returns double // a.sum = a.sum.add(BigDecimal.valueOf(p.getPrize())); a.sum = a.sum.add(p.getPrize()); a.n += 1; }; } @Override public BinaryOperator<ProductPriceSummary> combiner() { return (a, b) -> { ProductPriceSummary s = new ProductPriceSummary(); s.sum = a.sum.add(b.sum); s.n = a.n + b.n; return s; }; } @Override public Function<ProductPriceSummary, BigDecimal> finisher() { return s -> s.n == 0 ? BigDecimal.ZERO : s.sum.divide(BigDecimal.valueOf(s.n), RoundingMode.CEILING); } @Override public Set<Characteristics> characteristics() { return Collections.emptySet(); } }
{ "pile_set_name": "StackExchange" }
A rapid and sensitive immunosorbent assay for urinary albumin. We describe a fast, simple and sensitive microtiter scale competitive ELISA for the determination of urinary albumin. All reagents are commercially available. In the standard procedure, a minimum concentration of 0.8 mg albumin/L can be measured, although, applying another dilution, 0.04 mg/L can be detected. Within-batch coefficient of variation was 6.9% and 5.6% (at 1:20 and 1:50 dilution, respectively); between-batch variation was 8.6% and 5.6% respectively. The influence of urine pH and other urine components is minimised in the assay diluting with a casein-containing buffer.
{ "pile_set_name": "PubMed Abstracts" }
[Analytical microelectrophoresis of cells and the means for using it in oncological research]. Analysis of data on the study of electrophoretic cell mobility in the field of oncology is reviewed. Much attention is paid to the application of cell surface phenomena for the development of different diagnostic methods, especially for immunological diagnosis of cancer.
{ "pile_set_name": "PubMed Abstracts" }
Clostridium difficile infections (CDI) have become more difficult to treat due to the rise of hypervirulent strains that have increased morbidity as well as mortality and the likelihood of persistence and relapse in infected patients. To address the dire need for new anti-difficile agents, we explored the premise that nature utilizes good bacteria (i.e. probiotics), including Lactobacillus spp., to suppress gut pathogens such as C. difficile by producing novel antimicrobials, which were optimized by evolution to the microenvironment of the gut. In this regard, we explored the potential for developing reutericyclin from Lactobacillus reuteri as a natural anti- difficile agent. Probiotics are emerging as alternate treatments for CDI. However, there is ongoing debate on whether live probiotics may be used treat severe CDI, especially in immunocompromised patients. We therefore hypothesize that developing the antimicrobial produced by the probiotic specie would harness one of its natural therapeutic properties for localized killing of C. difficile in the gut, providing a more reliable and efficacious treatment strategy. Application of this concept to our studies on reutericyclin revealed that it has impressive antimicrobial and pharmacological properties for treating CDI. These include: rapid killing of nongrowing, toxin- producing stationary phase C. difficile;a novel mechanism of action specific to the bacterial membrane;a narrow spectrum of activity;lack of cytotoxicity against gut epithelia;stability to proteolysis;ability to achieve high non- absorbed concentrations in gut for killing;a low molecular weight and ease of synthesis that will allow advanced chemical optimization. Importantly, the killing of toxin-producing stationary phase cells is not shown by currently prescribed antibiotics vancomycin and metronidazole, which only kill actively growing C. difficile. We believe that this proposal for developing probiotic-derived reutericylcin derivatives to treat CDI is highly innovative and will be achieved through three iterative aims: (i) Synthesis of an expanded sets of reutericyclin analogs to optimize anti-difficile activity and increase affinity for the membrane target site;(ii) Lead development and characterization involving the stepwise progression of compounds through three stages of tests that include antimicrobial assessment, pharmacokinetic testing, toxicologic and in vivo efficacy experiments. Compounds meeting the selection criteria of the tests will move onto the next stage such that a lead candidate is obtained with potent in vivo efficacy and excellent safety profile;(iii) Mode of action studies to explore the fundamental antibacterial effects of targeting the clostridial membrane. The long-term goal of this project is to develop optimized lead analogs of probiotic derived reutericyclin that exhibit novel modes of action at the membrane target and have characterized antibiotic properties that would allow their progression into advanced preclinical studies as candidates for treating CDI. PUBLIC HEALTH RELEVANCE: There is a need for novel treatments for Clostridium difficile infections, which are now a major cause of morbidity and mortality among elderly patients in hospital settings in the United States. To address this need, we propose to optimize and develop derivatives of the probiotic-derived reutericyclin that is obtained from Lactobacillus reuteri. Because these agents rapidly kill C. difficile they may prevent the relapse of infection.
{ "pile_set_name": "NIH ExPorter" }
Q: VB.NET excel deleting multiple columns at the same time I am trying to delete more than one column in my excel sheet. For Each lvi In ListView1.Items If lvi.Checked = True Then arrayLetters = lvi.SubItems(1).Text & ":" & lvi.SubItems(1).Text & "," & arrayLetters End If Next arrayLetters = arrayLetters.Substring(0, arrayLetters.Length - 1) Dim rg As Excel.Range = xlSheet.Columns(arrayLetters) rg.Select() rg.Delete() The value of arrayLetters is "G:G,F:F". For some reason that doesn't seem to work once it gets there to delete them! Only reason i am doing it this way is so that it doesn't update the table and loop to the other one. In other words, if i delete each one individually then the column moves and the letter will not be the same the next go around. The error is on the Dim rg As Excel.Range = xlSheet.Columns(arrayLetters) line and it says: Type mismatch. (Exception from HRESULT: 0x80020005 (DISP_E_TYPEMISMATCH)) Any help would be great! David SOLVED For Each lvi In ListView1.Items If lvi.Checked = False Then arrayLetters = lvi.SubItems(2).Text & "," & arrayLetters 'Puts numbers in BACKWORDS End If Next arrayLetters = arrayLetters.Substring(0, arrayLetters.Length - 1) Dim theNumbers As String() = arrayLetters.Split(",") Dim num As Integer = 0 xlApp.ScreenUpdating = False For Each num In theNumbers xlSheet.Columns(num).delete() 'Deletes columns in reverse order (7,5,4...) Next A: Just delete the lowest numbered column N number of times to reflect how many columns in a row you want to delete. It's better to go off of column numbers rather than letters when dealing with Excel programatically. If you need a code example, let me know and I'll post one. Edit: Here is a code example that does what you want: xlSheet.Columns(i).delete
{ "pile_set_name": "StackExchange" }
Synthesis and properties of oligodeoxyribonucleotides bearing a polyamino group at the 2' position via 2'-O-carbamoylmethyl and 2'-S-carbamoylmethyl groups. An oligodeoxyribonucleotide containing 2 '-O-methoxycarbonylmethyluridine was synthesized and converted into several 2 '-modified oligodeoxyribonucleotides by a postsynthetic modification method. Using this method, oligodeoxyribonucleotides bearing a polyamine at the 2 ' position were easily prepared, which could form duplexes with either complementary DNA or RNA.
{ "pile_set_name": "PubMed Abstracts" }
Q: deadlock and mutual exclusion Two processes X and Y need to access a critical section. Consider the following synchronization construct used by both the processes. http://d18khu5s3lkxd9.cloudfront.net//wp-content/uploads/2015/02/Q20.png In the link given above, varP and varQ are shared variables and both are initialized to false. Which one of the following statements is true? 1.The proposed solution prevents deadlock but fails to guarantee mutual exclusion 2.The proposed solution guarantees mutual exclusion but fails to prevent deadlock 3.The proposed solution guarantees mutual exclusion and prevents deadlock 4.The proposed solution fails to prevent deadlock and fails to guarantee mutual exclusion According to the question setter 4th answer is the correct answer. I have figured that it fails to guarantee mutual exclusion but how does it fails to prevent deadlock? A: I came up with this after studying the algo carefully. Say process Y has used the Critical Section.Therefore,it must have set VarQ variable as false. Now if Process X tries to enter Critical Section.It can never enter unless Process Y also tries to enter.Reason being the condition while(varQ == true) will remain false unless Process Y tries to enter Critical Section and in doing so sets VarQ to true which before leaving Critical Section(CS) it had set to false. So as we can see if Process Y does not tries to enter CS,Process X is indefinitely blocked and also the Critical Section is lying unused. But the question still remains that how is lack of starvation freedom leading to lack of deadlock freedom.In deadlock every process is blocked,but if Process Y indeed tried to enter CS again,Process X could have been successful in its attempt to enter CS.
{ "pile_set_name": "StackExchange" }
Q: Some Swing Components not showing on JFrame I've got a serious problem. When I try to add 2 JRadioButtons and a JLabel on my JFrame, it doesn't work. They are not showing, but other elements do. The funny thing is, that other components which I added before (also JLabels) are visible on the JFrame. All swing components are added over a container 'panel' which is the content pane of the JFrame. I'm using Java DK 7 u67. Here's the code: (Scroll down to /*This code doesn't work */) public class UDP_FileTransfer implements KeyListener, Runnable { JFrame fenster; Container panel; JButton startBt, setPathBt; JTextField portFeld, ipFeld, savePathFeld; JLabel infoLbl, serverLbl, clientLbl; JRadioButton server, client; boolean typeIsServer = true; int port = 4444; long size = 0; boolean serverStarted; public static void main(String[] args){ new UDP_FileTransfer(); } public UDP_FileTransfer(){ fenster = new JFrame(); fenster.setLayout(null); fenster.addKeyListener(this); fenster.setTitle("UDP File Transfer - Server"); fenster.setLocationRelativeTo(null); fenster.setResizable(false); fenster.setSize(400,150); panel = fenster.getContentPane(); panel.setLayout(null); panel.addKeyListener(this); JLabel portLbl = new JLabel("Port: "); portLbl.setBounds(10,10, 50,20); panel.add(portLbl); ... ... ... infoLbl = new JLabel("Status: Starten Sie den Server zuerst!"); infoLbl.setBounds(10, 70, 371,20); infoLbl.setBorder(new LineBorder(Color.black, 1)); panel.add(infoLbl); /* This code doesn't work */ JLabel typeLbl = new JLabel("Wählen Sie den Typ aus:"); typeLbl.setBounds(10,125,200,20); panel.add(typeLbl); client = new JRadioButton("Client"); client.setBounds(230,125,70,20); panel.add(client); client = new JRadioButton("Server"); client.setBounds(320,125,70,20); panel.add(client); /* End of non-working code */ fenster.setVisible(true); fenster.setDefaultCloseOperation(WindowConstants.EXIT_ON_CLOSE); The GUI looks like this: Click me The JRadioButtons client & server and the JLabel typeLbl should appear under the box with the border. I hope one of you can help me ... A: Firstly, you should change your latter variable to server. client = new JRadioButton("Client"); client.setBounds(230,125,70,20); panel.add(client); server = new JRadioButton("Server"); server.setBounds(320,125,70,20); panel.add(server); and change your frame size frame.setSize(450, 175);
{ "pile_set_name": "StackExchange" }
Hello everyone. For those who don't know me I am Majoria in the game and always happy to help anyone. I've been Here since Nov 2013 rallying for this game. The last two months though I've been away from the game helping my sisters take care of my ailing mom and spending time with her. So I am back to rally one more time hard for this game. Now for any who take my rant/discussion as it being about fishing or any particular game feature instead of all of them you would be wrong. That is not the point of this thread. IT'S NOT ABOUT FISHING. ITS ABOUT QUALITY AND FOCUS TO GET THESE SYSTEMS DONE. ITS ABOUT PROOF THAT THIS IS GOING TO HAPPEN. THE TIME IS NOW. The announcement for fishing will come on the September 7th Livestream and I want to hear that it will be a full featured update deserving of this game and that the next update could be cooking, agriculture, taming, bosses would be announced and that it will also be completed and deserving of this game. Rally communinty with me for all systems in this game. Say it now, say it loud. Please. Some may not agree and may think it is ok to just have so so systems in the game and get excuse after excuse for this but I am not one of them and I am tired truly from years and years of this and hearing we are now at the last 20 percent and now is the time, well prove it Devs without sensationalized distractions from that focus. So here is perhaps a last push from me for updates that have been let go of year after year. @DarkStarr, @Undone, @Chris, @Lord British, @Chaox, @Scottie, @dallas, @oneandonly, @Sannio, @Ikas, @BurningToad @Menja. @anyone still here to listen and who will listen. Come on Put fishing updates back on the standup notes listing work being done. There is much to do. Get er done. Ok So lets continue. The fishing update I will expect will include: -MANY TYPES OF FISH ALL OVER THE MAPS REQUIRING DIFFERENT BAIT TYPES, TYPES OF WATER, AND FISH WILL HAVE DIFFERENT WEIGHTS and THEY REQUIRE DIFFERENT LURES AND POLES AND POLES HAVE DIFFERENT LINE WEIGHT TO CATCH BIGGER FISH. -NEW FISHING ANIMATIONS. I would expect a full update to give the system its features and get it done with and I am expecting that as we tick off each game system one by one. REWARDS FROM THE MERCHANTS COULD BE SOME RARER FISH BAIT, SPECIAL POLES THAT COULD CATCH A HEAVIER FISH, LURES, BOBBERS, ETC. FISHING THINGS. THIS QUEST COULD BE RANDOMIZED TO CHANGE OUT BUT ALWAYS BE AVAILABLE TO ENTICE FISHERMAN TO FISH. WE GET NEW RECIPES FOR FISH OF A HIGHER TIER AND FISHING MERCHANTS OFFER A DAILY QUEST TO ENTICE PLAYERS TO SEARCH OUT ALL THESE NEW FISH and cook them(hint hint for in game achievements)REWARDS FROM THE MERCHANTS COULD BE SOME RARER FISH BAIT, SPECIAL POLES THAT COULD CATCH A HEAVIER FISH, LURES, BOBBERS, ETC. FISHING THINGS.THIS QUEST COULD BE RANDOMIZED TO CHANGE OUT BUT ALWAYS BE AVAILABLE TO ENTICE FISHERMAN TO FISH.
{ "pile_set_name": "OpenWebText2" }
MathLink is a Math enrichment program at Carleton University, which started in 2006. MathLink will give an opportunity for the high school students to explore mathematics beyond the school program. The target age group is grades 9 and 10, but anyone with interest in mathematics may participate. We will explore various topics in mathematics including: Sequences Combinatorics Probability Geometry Logic Mathematical games Each session will begin with a lecture, followed by a problem-solving session. The problems we consider will be on the topic of the lecture. Once in a while, there will be special lectures given by professors at Carleton's School of Mathematics and Statistics. We will also be working on olympiad-style problems (at appropriate level). Why should you participate? This program is oriented towards the students who already do well in high school math. Its goal is to ensure that these students succeed and excel in mathematics courses at the University level. If you plan to enter a University to study mathematics, science or engineering, MathLink will be beneficial for you. And finally, we do math because we like it!
{ "pile_set_name": "Pile-CC" }
---------------------- Forwarded by Phillip M Love/HOU/ECT on 06/07/2000 06:35 PM --------------------------- Enron Capital Management From: David Baumbach 05/03/2000 07:30 AM To: Frank Cernosek/HOU/ECT@ECT, Phillip M Love/HOU/ECT@ECT, Bryan Hull/HOU/ECT@ECT cc: Troy Klussmann/HOU/ECT@ECT Subject: Intra Texas 0400 Liquidations Price 771947 Basis 771948 GD 771976
{ "pile_set_name": "Enron Emails" }
Ticks on pastures and on two breeds of cattle in the Eastern Cape province, South Africa. Many studies on the population dynamics of questing ticks on pastures and of parasitic ticks on cattle have been conducted. Few, however, have attempted to link the two in a single study. This study aimed to assess the population dynamics of questing ixodid ticks on pastures and of adult ticks on two breeds of cattle with different levels of susceptibility to tick infestation on the same pastures. Between January 2005 and December 2009 questing ixodid ticks were collected monthly from natural pastures at the Döhne Agricultural Development Institute and at the adjacent Campagna Production System in the Amahlathi District, Eastern Cape province, South Africa. Between February 2007 and January 2010 adult ticks were collected monthly from Bonsmara and Nguni cattle grazing these pastures. Ten tick species were collected from the pastures and 12 from the cattle. Significantly more questing larvae of Rhipicephalus appendiculatus, Rhipicephalus decoloratus, Rhipicephalus evertsi evertsi and Rhipicephalus microplus were recovered from the pastures grazed by Bonsmara cattle than from those grazed by Nguni cattle (p ≤ 0.05). Significantly more adult Hyalomma rufipes, Rhipicephalus follis, R. appendiculatus, R. decoloratus, R. evertsi evertsi and R. microplus were collected from the Bonsmara cattle than from the Nguni cattle (p ≤ 0.05). The study showed that Nguni cattle are less susceptible to tick infestation than are Bonsmara cattle and fewer questing ticks are collected from pastures grazed by Nguni cattle than by Bonsmara cattle.
{ "pile_set_name": "PubMed Abstracts" }
import { Trans } from "@lingui/macro"; import * as React from "react"; import ConfigurationMap from "#SRC/js/components/ConfigurationMap"; import ConfigurationMapHeading from "#SRC/js/components/ConfigurationMapHeading"; import ConfigurationMapLabel from "#SRC/js/components/ConfigurationMapLabel"; import ConfigurationMapRow from "#SRC/js/components/ConfigurationMapRow"; import ConfigurationMapSection from "#SRC/js/components/ConfigurationMapSection"; import ConfigurationMapValue from "#SRC/js/components/ConfigurationMapValue"; import Loader from "#SRC/js/components/Loader"; import StringUtil from "../../../../../src/js/utils/StringUtil"; const Loading = () => <Loader size="small" type="ballBeat" />; const ConfigurationRow = ({ keyValue, title, value }) => ( <ConfigurationMapRow key={keyValue}> <ConfigurationMapLabel>{title}</ConfigurationMapLabel> <ConfigurationMapValue> <span className={value.classNames}> {StringUtil.capitalize(value.title)} </span> </ConfigurationMapValue> </ConfigurationMapRow> ); const NonLeader = ({ master }) => ( <ConfigurationRow keyValue={master.host_ip} title={master.host_ip} value={master.healthDescription} /> ); const EmptyLeaderList = () => ( <Trans render="div" id="There are no more known masters in this cluster." /> ); const NonLeaderList = ({ masters }) => { if (masters.length === 0) { return <EmptyLeaderList />; } return ( <ConfigurationMapSection> {masters.map((master) => ( <NonLeader key={master.host_ip} master={master} /> ))} </ConfigurationMapSection> ); }; export default function NonLeaderGrid({ masters }) { const hasMasters = Array.isArray(masters); const content = hasMasters ? ( <NonLeaderList masters={masters} /> ) : ( <Loading /> ); return ( <div className="container"> <ConfigurationMap> <ConfigurationMapHeading className="flush-top"> <Trans render="span" id="Non-Leaders" /> </ConfigurationMapHeading> {content} </ConfigurationMap> </div> ); }
{ "pile_set_name": "Github" }
Post navigation New Times Article: Performance Atheist I would like to encourage all of our readers in Phoenix to pick up a New Times this week. It’s got great pictures and an overall good story, but I would also like to give a little bit of a response and clarification on a few issues. I do understand that they took a particular interest in Omar. He is an interesting, well spoken and good looking guy with a good story to tell, so the fact that the rest of us are a bit buried in the article is alright. What I don’t like is the Secular Free Thought Society (and me in particular) being painted as the villains and unwanted hangers-on who followed Omar down to Mill like lost puppies. As Omar knows, but apparently Niki forgot, the Mill Avenue Resistance started when I started visiting Mill on a regular basis and arguing with preachers by myself. I believe it was the first night of doing that when I met a former street preacher named Emmanuel who was also having one on one discussions with preachers, and the initial group was formed. Shortly after that I started making tracts to pass out and Emmanuel and I started talking to passers-by as well as the preachers, but it wasn’t until about two months later when Omar showed up with his megaphone that we were really able to make a difference in what the preachers were doing. Omar and Jim have played an important part in the development of the Mill Avenue Resistance, intentionally or not, but we are not his groupies. We are out there every week, whether or not Omar is around. Just to be clear, Emmanuel and I started going out there individually at first, and Omar and Jim showed up independently as well. None of us followed any of the others down there, and in fact with Emmanuel and I not having a speaker yet, Omar and Jim didn’t even notice that we were there the first night they came out. We definitely noticed the megaphone though. Since then we have developed in parallel. I have always considered Omar and Jim to be somewhat peripheral members of the group, but they have seen themselves as more independent. Either way you look at it though, although I respect them and value their contributions to what I see as the betterment of Mill Avenue, I am not and never have been either following or intentionally interfering with Omar and Jim. Historically, the Mill Avenue Resistance goes where the preachers go, and it is generally the same for Omar and Jim. For the most part this has not been a problem, particularly since most of us were using similar methods most of the time, but as we have more and more people wanting to speak, and as some of us begin to change our ideas about the most effective ways of accomplishing our goals, there is some friction. We are doing our best to resolve these issues and get everyone back on the same page again though. It is not a situation where one brilliant man must shake off the chaff and let his singular glory shine through, it is a situation where many people with similar goals are attempting to do similar things in the same place, but not everything is meshing as well as it could at times. As far as I can tell though, there is no animosity between any of us, and I am confident that the issues which we have will be resolved to the satisfaction of nearly everyone involved. Another problem I saw in the article was that I am not the founder of the Secular Free Thought Society of ASU. I do have a strong connection with the group, and I did help bring together the people who re-formed it (although Brother Jed deserves more credit for that than I do), but betterthanfaith.com and the Mill Avenue Resistance are the only things I can claim credit for starting myself. Finally I would like to clarify (or un-clarify) what my intention is on Mill. Jim sees it more as an art project, and Omar may see it that way too. To an extent I see it that way, but I don’t have a singular reason for being there or one way of looking at it. If I have to pick something though, I see it mostly as an educational exercise. I want to share what I know about the world and religion in particular, and I want to add to that knowledge by learning from anyone who wants to talk to me. I do want people to know the whole truth about the Bible and the things the preachers are saying, and I do hope that the things I tell them will make them think and do more research, but after that it is up to them. I am only trying to convert people to atheism inasmuch as I am trying to present the facts and opinions that have led me to my own disbelief. There are some other minor mistakes related to me, the SFTS and the preachers in the article, but they’re probably not worth mentioning. Basically I see it as a good article about Omar and a somewhat less accurate and fair article about the rest of us. I understand though that the author can only report it the way she sees it, and conflict helps the story, so we get stuck playing the villains a bit. If it helps with what we’re doing though, then I’m willing to take the hit, and Niki, you’re still welcome to come hang out with us any time. Congratulations on the overall good article and very amusing pictures Omar! About Kazz My name is Shawn Esplin and I am an advocate of Free Thought and general good sense and thought in general. To that end, I encourage people to seriously question the things that they have been taught, especially as children, because many of these things - religious and secular - are taken on faith until we actively choose to seriously examine them for ourselves. This is a pretty good article about Omar and yes, I definitely see glimmers of hero worship here. Omar’s performances are definitely creative and thought provoking. Amerist: I think the shots are from a professional studio session specifically for the article. Other than some minor issues of not getting the who, what, when, where, why and how facts straight, I guess my biggest grievance is her portrayal the SFTS. As he states here, Shawn is not the leader of this group, but the Mill Ave Resistance and BetterThanFaith.com were his creations. He would hesitate to call himself the leader even of the Resistance; but apparently there is a lack of leadership here that he or someone needs to step up and deal with. The reporter tries hard to reinforce the differences in appearances and associate them with intent. SFTS is shown as a bunch of in-your-face douchebags who love death metal and dress like hobos; therefor they’re a rude and anarchistic bunch of thugs to those to whom they “preach”. I find it funny that she mentions Dunkin’ Donuts so much…. especially since she brought the donuts in the first place. Describing the resistance as a “chaotic club party” where things get “out of control” and “disintegrate into anarchy” may be a fair assessment from her point of view and that is something to think about. Putting Shawn as the “leader” of this rag-tag group she describes really pisses me off and I’m not sure if it was because Shawn was the willing patsy she was looking for or if nobody else would talk to her. Maybe she just wanted to use him to show conflict between the artist and the rabble “wanna bes”. I know he put a lot of time and effort into putting things together for her for this story, and to be characterized so unflatteringly is really insulting. It’s especially infuriating because I don’t think Shawn is out there trying to convert people to atheism and the way she portrays him as a gigantic wiener who has no control over “his” group infuriates me. The way it’s written it makes it look like Omar is embarrassed by the SFTS and does not want to be associated with them. With the way the group is described in the article, I wouldn’t want to either. So I guess enough bitching about the slant in the article. What needs to be done straight away is make changes that put SFTS in a much better light. I don’t think this means suits and ties, but it probably means not screaming at the preachers and turning things into a circus sideshow. Maybe put a damper on the death metal. Maybe be better organized. Maybe do something positive and support some local charities. Do SOMETHING besides showing up on Friday and Saturday nights to shout at the preachers.
{ "pile_set_name": "Pile-CC" }
Reading from Warwick moves to Szechwan Szechwan Publishing is proud to announce that Kevin Reading, Professor of Cybernetics and Self-Publicity at Warwick University, has joined the Register's elite team of writers as resident futurologist. Prof Reading needs no introduction to those who know him. For the benefit of those who have yet to experience the clarity, incisiveness, intelligence and above all space-filling qualities of his work, here are a few highlights: 150 AD Prof Reading presents the keynote address at the Ptolemy Astrological Academy in Alexandria. He asserts that the world is flat and that in less than two thousand years, machines will be built with the power to rearrange playing cards, provide musical entertainment without payment of dues to the Guild of Minstrels, and to make elementary errors in calculation - a prediction that he dubs the 'FDIV' effect. He also claims to have invented a time machine and advised aliens on how to build the pyramids. 1066 Kevin advises King Harold Godwinson of England to keep his eye on the growing threat of invasion by William the Bastard of Normandy. Harold takes his advice all too literally. Kevin also acts as consultant to aliens from the planet Tharg who plan to set up twin universities at the great cities of Warwick and Reading. 1584 A 20-year-old playwright called William Shakespeare is advised by Reading to undertake perhaps his greatest work - Kevin, Prince of Cybernautia. Sadly this masterpiece is lost when Shakespeare, in a moment of madness, burns the folio and threatens Kevin with death should he ever bother him again. 1933 In February, Reading is invited to dinner at the Reichstag in Berlin to demonstrate his latest electronic creation, the artificial ego. This now legendary device has the capacity to increase the size of an ordinary human ego by over 2000 times. Unfortunately the prototype overheats and the building is burned to the ground. 1963 On a visit to Dallas, Kevin is shocked to hear that thousands of unsold copies of his definitive study of genius Bloody Hell, is that Kevin Reading a clever bloke or what?, lie unsold in the Texas State Book Depository. A misunderstanding leads to a scuffle with an armed security guard and a stray shot hits the occupant of a passing car. 1971 Kevin meets Bob Noyce in a sleazy bar in California. As a result of the conversation, Noyce sketches out the basic design for the 4004 microprocessor on the back of a waitress using a ballpoint pen. The waitress contracts blood poisoning and sues Intel for damages. With the substantial sum awarded by the court, the waitress sets up Advanced Micro Devices. ®
{ "pile_set_name": "Pile-CC" }
Q: Preventing intersections in graphics from cancelling eachother out - Actionscript When drawing multiple shapes on a Graphics object in Actionscript intersections cancel eachother out. Is there any way to disable this default behaviour? I could simple use the beginFill() and endFill() methods in between drawing shapes. The problem with this approach for me would be that each of the shapes will 'blend together' whenever i set the value of the alpha property to anything other then 1. Basically what I want is 1 solid drawing consisting of different shapes (circles for example), so that when the alpha value is changed the different parts of this drawing should not become visible. The following approaches did not work: -2 circles are drawn but the intersection is cancelled out var solidShape = new Sprite(); solidShape.graphics.beginFill(0xFF0000) solidShape.graphics.drawCircle(0,0,100) solidShape.graphics.drawCircle(0,50,100) solidShape.graphics.endFill() -2 circles are drawn correctly, but they become visible when i change the alpha value var solidShape = new Sprite(); solidShape.graphics.beginFill(0xFF0000) solidShape.graphics.drawCircle(0,0,100) solidShape.graphics.endFill() solidShape.graphics.beginFill(0xFF0000) solidShape.graphics.drawCircle(0,50,100) solidShape.graphics.endFill() solidShape.alpa = 0.5 A: Easiest way would be to draw each shape in a separate DisplayObject, like so: var shapes:Sprite = new Sprite(); var shape:Shape = new Shape(); shape.graphics.beginFill(0xFF0000); shape.graphics.drawCircle(0,0,100); shapes.addChild(shape); shape = new Shape(); shape.graphics.beginFill(0xFF0000); shape.graphics.drawCircle(0,50,100); shapes.addChild(shape); shapes.alpha = 0.5; shapes.blendMode = "layer"; If you're trying to do it with a single object (like a user drawn shape that intersects itself), RC's answer will suit your needs much better.
{ "pile_set_name": "StackExchange" }
a factor of j(2)? True Let c(x) = 6*x + 6. Let u be c(8). Suppose w - 4*n = -w + 100, -2*n = w - u. Does 13 divide w? True Let s(q) = -q**2 - q + 44. Let g(w) = 5*w**2 + 5*w - 175. Let r(a) = 2*g(a) + 9*s(a). Let i be r(0). Suppose -5*u = i - 176. Is 13 a factor of u? True Let u = 25 - 21. Suppose -u*j + 48 = -8. Is j a multiple of 14? True Let f be (-1)/2 - 1/2. Is (-81)/(f - 2) - -1 a multiple of 14? True Suppose -3*t = -0*t - 5*u + 8, 4*u = -4*t. Let y(k) = -22*k**3 + k**2 + k. Does 11 divide y(t)? True Suppose 0 = 3*i - 0*i + 96. Let n = i + 45. Is 5 a factor of n? False Let h(k) = -k**3 - k**2 - k + 22. Let z(l) = l - 4. Let o be z(4). Is h(o) a multiple of 22? True Let l be -3*(-2 + (-16)/(-6)). Let g be -2 + 1*1*-1. Does 3 divide g/(l - 3/(-2))? True Suppose -14*r + 1334 = 354. Does 13 divide r? False Let o(i) = -i**2 + 14*i - 3. Is 12 a factor of o(5)? False Suppose -4*q + 0*q = -3*a + 65, 4*a - 35 = -5*q. Let p = a - 5. Does 10 divide p? True Let p(h) = -h**2 + 7*h + 2. Suppose 0 = 3*m + c + 4, 2*m + 2*m - 16 = 4*c. Suppose m - 16 = -4*k. Does 7 divide p(k)? True Let c = -1 - -6. Suppose -b - 4*o = -4, -c = -3*b - o - 4*o. Suppose 0 = 2*u - y - 22 - 12, -u + 2*y + 17 = b. Does 17 divide u? True Suppose 0 = -3*b + 5*a + 37, b = 3*b + 4*a + 12. Let o be 492/156 - (-4)/(-26). Suppose -p + b - 19 = -2*y, -o*p + 9 = 0. Does 9 divide y? True Suppose -10 - 22 = 4*m. Suppose 3*y + 215 = 3*x + 2*x, 4*x - 2*y = 170. Let w = x + m. Does 14 divide w? False Let p(f) = f**2 - 12*f + 12. Let s be p(10). Let y(n) = -n**2 + 0 - 10*n - 5 + 1. Does 6 divide y(s)? True Suppose 15*b + 292 = 19*b. Is b a multiple of 13? False Let s(i) = i**3 - 5*i**2 - 2*i - 5. Let l be s(6). Let c = 11 + l. Is 10 a factor of c? True Is (-2)/(-5) - (-456)/10 a multiple of 18? False Suppose -3*a + 189 + 294 = 0. Is 23 a factor of a? True Let o be 0/(-5 + 3 + 3). Suppose o*j = 3*j - 75. Is j a multiple of 12? False Let y be ((-9)/4)/(3/(-12)). Does 12 divide (180/25)/(y/60)? True Let g = -10 - 2. Let b = g + 17. Is 2 a factor of b? False Let x(l) be the first derivative of l**4/4 - 10*l**3/3 + 14*l - 6. Does 3 divide x(10)? False Let u be (17/(-2))/(1/(-2)). Suppose 2*q = -4*g + 21 + 5, q + 3*g - u = 0. Suppose -5*k = -2*k - 3*h - 51, 2*k - q*h = 28. Is k a multiple of 9? False Let u = -4 + -17. Let b be ((-1)/(-3))/((-1)/u). Let t = b + -4. Does 3 divide t? True Suppose 4*g = 463 + 353. Is g a multiple of 34? True Let r(d) = -15*d + 4. Let x be r(-4). Suppose -4*u + x = 240. Let m = -27 - u. Does 7 divide m? False Suppose -190 = -h - 2*h + m, 4*m = -5*h + 328. Does 16 divide h? True Suppose -h = 4*y - 23, 3*h - 8 - 1 = 0. Let i(b) be the first derivative of b**4/4 - 2*b**3 + 7*b**2/2 - 5*b + 5. Is 2 a factor of i(y)? False Let m(u) = -u**3 + 2*u**2 - 4*u. Is m(-3) a multiple of 18? False Let d = 93 - 57. Is 4 a factor of d? True Is -3 - (0 + (-1 - 218)) a multiple of 29? False Suppose 5*l + 15 = -3*p, 2*l + 5*p + 25 = -l. Suppose l*f + f + 5*c = 30, -3*c = f - 20. Is f a multiple of 4? False Let s be -30*-1*(-2)/(-6). Suppose -3*o + s = -o. Is 5 a factor of o? True Suppose -4*z = y - 80, -z + 4*z = y + 53. Suppose 1 = -t + 3. Suppose -r + t + z = 0. Is 15 a factor of r? False Let d be (-2)/7 + 191/7. Suppose 4 = -p + s, -15 = 2*p - 3*s + 8*s. Is 8 a factor of (p - -3)*d/(-6)? False Suppose 2*z + 9 = -z, -4*z = -o - 10. Let f = 33 + o. Is f a multiple of 8? False Let s = -263 - -413. Is s a multiple of 10? True Let w(j) = 5*j**3 - j**2 + 2*j - 1. Let p be w(1). Let o = 12 - 12. Suppose -z + o = -p. Is z even? False Does 9 divide 4/10*(172 + 5 + 3)? True Let j(c) = 7*c**2 - 1 + 6 + 9*c + c**3 + 6*c**2. Is 13 a factor of j(-12)? False Suppose 2*m + 3*m - 15 = 0. Suppose -4*h + 60 = 5*s, -h = m*s - 3*h - 36. Is 6 a factor of s? True Suppose -5*s - 2 = 18, 4*g - 5*s = 448. Does 6 divide g? False Is 6 - (3 + 0) - -153 a multiple of 26? True Suppose w - 12 + 2 = 0. Let m = w + 14. Is m a multiple of 10? False Suppose 5*r - 5*l - 450 = 0, -r + 3*l = l - 90. Does 10 divide r? True Suppose 0*h + 3*h + 4*m - 463 = 0, 0 = -4*m - 20. Suppose -7*y = -2*p - 2*y + 151, h = 2*p - 3*y. Suppose p + 84 = 4*b. Does 16 divide b? False Suppose -4*i + 156 = 4*l, -4*i + 0*l + 147 = l. Does 16 divide i? False Let n be 173/(-7) - (-4)/(-14). Suppose -2*r = 5*f - r - 204, -161 = -4*f - 3*r. Let q = n + f. Is q a multiple of 8? True Let r(l) = l**2 - 4*l + 2. Let k = -1 - -3. Suppose 8 = -4*z, 7*f = k*f + 5*z + 40. Is 14 a factor of r(f)? True Let w = 7 + 14. Is w a multiple of 16? False Let h = -25 - -76. Is 9 a factor of h? False Let o(q) = q**3 - 5*q**2 + 3*q - 14. Is 7 a factor of o(7)? True Let f be (5 - (-1 + 1))*1. Suppose -f*v = -148 - 117. Does 25 divide v? False Let f(i) = i**2 - 15*i + 14. Let l be f(14). Suppose -5*a - 4*z = -2*z - 48, -4*a - 2*z = -38. Suppose -j = -l*j - a. Does 4 divide j? False Let h(j) = -j**3 + 8*j**2 - 7*j - 2. Is 7 a factor of h(6)? True Let m = -26 - 24. Let k = m + 14. Let s = -23 - k. Does 9 divide s? False Suppose -p = -2*d - 86, -4*p + 140 = 5*d - 243. Let m = p + -42. Is 25 a factor of m? True Let w(n) = -3*n - 4. Let v be w(-3). Suppose 5 = v*x, 2*c - 1 - 6 = -x. Is c even? False Let r = -2 - 9. Let u(l) = l + 26. Does 9 divide u(r)? False Is (-21 - 1)*(0 + (-3)/3) a multiple of 7? False Suppose -o + 12 = -9. Is 3 a factor of o? True Let o(c) = 30*c**2 - 3*c + 1. Does 28 divide o(1)? True Let m(z) = z**2 + z + 4. Is 19 a factor of m(8)? True Let i(d) be the first derivative of -d**2/2 + 3*d - 1. Let g be i(4). Let o = g + 15. Does 5 divide o? False Suppose 2*x = -8, -3*t = -0*t - 5*x - 38. Does 6 divide t? True Let z(b) = -12*b + 2. Let f(m) be the second derivative of -10*m**3 + 11*m**2/2 - 3*m. Let r(j) = -2*f(j) + 11*z(j). Is r(-2) a multiple of 8? True Suppose -k - 5*j + 0*j + 250 = 0, -5*k + 4*j + 1134 = 0. Let d = -149 + k. Does 27 divide d? True Let p be (-3)/3*(-1 + 5). Let b(j) = -7*j - 4. Is 12 a factor of b(p)? True Suppose -18 = 5*s - 3*a - 1232, 3*a = -3*s + 714. Is 21 a factor of s? False Let n(f) = -f**2 - 16*f - 11. Does 17 divide n(-14)? True Suppose -4*d - 3 = 5. Is (-61 + 5)*1/d a multiple of 14? True Suppose -2*u + 80 = -0*u. Does 19 divide u? False Let h(u) be the third derivative of -u**5/60 - 2*u**4/3 + u**3/6 - 10*u**2. Is h(-11) a multiple of 20? False Suppose 5*w = 7*d - 3*d - 16, 4*d - w - 16 = 0. Is d a multiple of 4? True Suppose 4*d - q - 13 = 0, 5*d + 2*q + 15 = -3*q. Suppose d*k - 22 = k. Is 7 a factor of k? False Is 2/(-3) + 282/18 a multiple of 15? True Let y be (-94)/(-18) + 6/(-27). Suppose 15 = -0*z - y*z. Let a = 11 - z. Does 14 divide a? True Let k(t) = -2*t**3 - t**2 + 2. Let c be ((-3)/(-6))/((-2)/8). Is k(c) a multiple of 7? True Let d = 21 + -8. Let w = d - 1. Does 4 divide w? True Suppose 0 = -3*h + 130 + 23. Does 5 divide h? False Suppose 2*z = k - 18, 5*k - 19 = 3*z + 36. Suppose k = 5*a - 7. Suppose -16 = a*d - 5*d. Is 4 a factor of d? True Suppose m - b = -m + 11, -9 = -3*b. Is 2 a factor of m? False Let y(l) = l**2 - 4*l + 4. Let x be (8/10)/((-2)/(-5)). Suppose 5*j = -2*k + 4 + 1, -x*j - 22 = -4*k. Is 9 a factor of y(k)? True Let r = -1 + 2. Let i be 2/(2/(-4) + r). Suppose -80 = -4*o - i*v, -2*o + v = -0*v - 28. Is o a multiple of 14? False Suppose 4*w + 3 - 8 = 5*j, -2*w + 3*j + 1 = 0. Suppose -t - g - g + 18 = 0, 5*t - 90 = -w*g. Is 14 a factor of t? False Let l(q) = 310*q + 279. Let p(z) = z + 1. Let w(o) = -2*l(o) + 558*p(o). Let u be w(-1). Suppose -4*t + 35 + 21 = 4*j, 5*t = 3*j + u. Is 13 a factor of t? True Let v(u) = 6*u + u + 8 - 5 - u**3 - u**2 + 7*u**2. Let w be v(7). Suppose -5*i + 3*i + 26 = w*a, -2*a + 2*i = -34. Does 4 divide a? True Suppose 275 = 7*x - 2*x. Does 23 divide x? False Let r(f) = f**2 - 7*f + 6. Let n be r(4). Let p be -1*(n + 3 + 2). Let i = p + 2. Is i a multiple of 2? False Let a = -5 - -5. Suppose 5*l - 2*y - 58 = a, 2*y = -5*l + 5*y + 57. Suppose -3 - l = -t + 2*j, -3*t - j + 24 = 0. Does 9 divide t? True Suppose 5*z = -31 - 14. Is z/(3/(-24)*6) a multiple of 12? True Let y(k) = k**3 - 17*k**2 + 11*k - 13. Is 29 a factor of y(17)? True Let o = -184 + -166. Let x be (o/6)/((-7)/21). Suppose -5*g + 4*j + 135 = -0*g, -4*j = 5*g - x. Does 14 divide g? False Let u(f) = -30*f
{ "pile_set_name": "DM Mathematics" }
National Popular Vote The national popular vote proposal is an interesting approach to changing the 222 year old way we elect US Presidents.The idea is to have a compact between states totally more than 50% of the electoral college. We would all agree that we would allocate all of our electoral votes to… Share this: Secretary, Washington State Department of Children, Youth, and Families. Formerly Director, WA State Dept. of Early Learning, State Representative for the 48th legislative district and a long-ago Microsoft exec.
{ "pile_set_name": "Pile-CC" }
Q: Output of array as comma separated BASH I'm trying to pull variables from an API in json format and then put them back together with one variable changed and fire them back as a put. Only issue is that every value has quote marks in it and must go back to the API separated by commas only. example of what it should see with redacted information, variables inside the **'s: curl -skv -u redacted:redacted -H Content-Type: application/json -X PUT -d'{properties:{basic:{request_rules:[**"/(req) testrule","/test-body","/(req) test - Admin","test-Caching"**]}}}' https://x.x.x.x:9070/api/tm/1.0/config/active/vservers/xxx-xx Obviously if I fire them as a plain array I get spaces instead of commas. However I tried outputting it as a plain string longstr=$(echo ${valuez[@]}) output=$(echo $longstr |sed -e 's/" /",/g') And due to the way bash is interpreted it seems to either interpret the quotes wrong or something else. I guess it might well be the single ticks encapsulating after the PUT -d as well but I'm not sure how I can throw a variable into something that has single ticks. If I put the raw data in manually it works so it's either the way the variable is being sent or the single ticks. I don't get an error and when I echo the line out it looks perfect. Any ideas? A: valuez=( "/(req) testrule" "/test-body" "/(req) test - Admin" "test-Caching" ) # Temporarily set IFS to some character which is known not to appear in the array. oifs=$IFS IFS=$'\014' # Flatten the array with the * expansion giving a string containing the array's elements separated by the first character of $IFS. d_arg="${valuez[*]}" IFS=$oifs # If necessary, quote or escape embedded quotation marks. (Implementation-specific, using doubled double quotes as an example.) d_arg="${d_arg//\"/\"\"}" # Substitute the known-to-be-absent character for the desired quote+separator+quote. d_arg="${d_arg//$'\014'/\",\"}" # Prepend and append quotes. d_arg="\"$d_arg\"" # insert the prepared arg into the final string. d_arg="{properties:{basic:{request_rules:[${d_arg}]}}}" curl ... -d"$d_arg" ...
{ "pile_set_name": "StackExchange" }
Q: where can i find python tutorials for doing linux tasks I want to learn python to do some linux system administartion but on internet i find basic python tutorials . they don't teach anything with linux in mind but general python. is there any pdf which can teach me how do linux things like backup , restore , mysql backups , log files processing in python A: I like the O'Reilly book Python for Unix and Linux System Administration A: take a look at Popular recipes tagged "sysadmin" on ActiveState. They are not tutorials in PDF but once you know Python you can learn a lot reading the source of recipes.
{ "pile_set_name": "StackExchange" }
Fereydoon Moshiri Fereydoon Moshiri (; September 21, 1926 – October 24, 2000) was one of the prominent contemporary Persian poets who wrote poems in both modern and classic styles of the Persian poem. A selection of his poems has been translated into English entitled With All my Tears by Ali Salami. Some of his other published works are as follows: 1957, Gonah-e Darya (The Sin of the Sea) 1958, Nayafteh (Undiscovered) 1960, Abr (The Cloud) 1970, Parvaz Ba Khorshid (Flying With the Sun) 1978, Bahar ra Bavar Kon (Believe the Spring) 1988, Ah Baran (Oh, the Rain) 2001, Ta Sobh-e Tabnak-e Ahura'ii (Until the Bright of Ahuric Dawn) Last years Moshiri had been suffering from leukaemia and renal failure for five years and died in "Tehran Clinic" hospital on October 24, 2000 at the age of 74. References External links Fereydoon Moshiri at Iran Chamber Society Fereydoon Moshiri's life Kooche by Darya Dadvar Koucheh (Alley), a poem written and read by Fereydoon Moshiri, (4 min 6 sec). Text: Koucheh. Category:Iranian poets Category:Persian-language poets Category:People from Tehran Category:1926 births Category:2000 deaths Category:Burials at artist's block of Behesht-e Zahra Category:20th-century poets Category:Iranian male poets Category:20th-century male writers Category:Deaths from cancer in Iran Category:Deaths from leukemia
{ "pile_set_name": "Wikipedia (en)" }
Genetic testing in young women with breast cancer: results from a Web-based survey. Young women with breast cancer have an increased risk for harboring a BRCA1 or BRCA2 mutation. Frequency of genetic testing and factors associated with testing have not been well described in this population. We evaluated the rate of genetic testing among young breast cancer survivors identified through the Young Survival Coalition (YSC), an advocacy group for young women with breast cancer. Items regarding family history and genetic testing were included in a Web-based cross-sectional survey. A total of 701 women were eligible based on a history of breast cancer diagnosed < or =40 years. Mean age at diagnosis was 32.9 years and mean age at survey 35.7 years. About 41% reported a first- or second-degree relative with breast or ovarian cancer. About 24% had undergone genetic testing, and 26% of those tested reported that a mutation was found. By multivariate logistic regression, likelihood of having undergone testing was higher in women who were younger at diagnosis, were more educated, had a first- or second-degree relative with breast or ovarian cancer, had a mastectomy rather than breast conservation, and considered themselves at high risk for a cancer-predisposing mutation. Most women diagnosed with breast cancer < or =40 years do not undergo genetic testing.
{ "pile_set_name": "PubMed Abstracts" }
Chilli is dating who We originally made this page before we knew the author of the story. JUDGE TWO: Exciting BBQ flavor, needs more peppers to be taken seriously. I'm not sure what I am supposed to taste besides pain. JUDGE TWO: A beanless chili, a bit salty, good use of red peppers. She said her friends call her "Sally." Probably behind her back they call her "Forklift." JUDGE ONE: Black bean chili with almost no spice. CAMERON: I felt something scraping across my tongue but was unable to taste it.On April 29, 2002, we received an E-mail from Kathy who gave us the author's name so we could give the proper credit. I had to wave off two people who wanted to give me the Heimlich maneuver. The barmaid looks like a professional wrestler after a bad night. Sally was standing behind me with fresh refills so I wouldn't have to dash over to see her.Cameron, in the mean time, slumped off the back edge of the stand spattering the pot of Chili #8 on himself, on Sally, and over the growing herd of wannabe rescuers of Sally, who was desperately fending off any number of helping hands.All the other Frisbee Contest dogs bounded over for the sudden chili feast adding further fuel and confusion to what would soon grow into utter pandemonium."Frank the Chili Tester was originally written by W. He is a humor columnist and writes the Cameron Column for the Rocky Mountain News in Denver, Colorado. She was so irritated over my gagging sounds that the snake tattoo under her eye started to twitch. When she winked at me her snake sort of coiled and uncoiled--it's kinda cute. Cayenne peppers freshly ground adding considerable kick. JUDGE TWO: Chili using shredded beef; could use more tomato.Please feel free to visit his website at: you'll find many more columns, though his personal favorite is "The Chili Taster."We wrote to Mr. She has arms like Popeye and a face like Winston Churchill. Must admit the cayenne peppers make a strong statement. Several spectators were injured in the gentlemanly rush to provide assistance. Barmaid pounded me on the back; now my backbone is in the front part of my chest. Good side dish for fish or other mild foods, not much of a chili. Everyone knows the routine by now and got out of my way so I could make it to the beer wagon. Staggering back toward the edge of the stand, Frank suffered what witnesses later described as a severe internal reaction to the combined chili and beer he had consumed with such gusto. With a sonic boom like sound, according to many observers, Cameron sustained an eruption of incendiary intestinal gas, which ignited one of the dogs still licking beer from the prostrate form of Sally. Search for chilli is dating who: Adding to the confusion, the fleeing horde hampered and impeded the arrival of various emergency and law enforcement personnel, who were therefore too late to prevent the most serious of Cameron's injuries as Sally thrashed him soundly about the head and shoulders.
{ "pile_set_name": "Pile-CC" }
Rat During my time with Tattoodo, I lost count of how many animal themed tattoo posts I managed to get published. I’d just think of any animal and scroll through Instagram to find the best tattoos of that animal. I’ve… Continue Reading →
{ "pile_set_name": "Pile-CC" }
Updated: 5:25 p.m. A Philadelphia judge has denied an emergency petition to postpone home foreclosure sales, despite pleas from legal advocates that the ongoing shutdown of the court system’s essential online services could put struggling homeowners at risk. Housing advocates argued people could unnecessarily lose their properties at sheriff’s sale due to the ongoing blackout of the First Judicial District’s e-filing system and website. But Court of Common Pleas Judge Arnold L. New denied their request for relief Monday without explanation, they told Billy Penn. The ruling means Tuesday’s auction for some 500 properties pending mortgage foreclosure remains on schedule. Nearly 1,000 other properties are also slated to hit the auction block for tax delinquency in the coming weeks. “We felt that our ask was reasonable in light of the extraordinary circumstances that the court is experiencing right now,” said Rachel Gallegos, a Community Legal Services attorney who filed the petition on behalf of the nonprofit Philadelphia Unemployment Project. The injunction sought to postpone all sales for the month of June, to give time for the system to be restored. As is, homeowners can not easily access their own court records or seek a postponement on foreclosure. “Everything is being done by paper and we’re worried people are going to lose their homes when they shouldn’t,” said John Dodds, executive director of the Philadelphia Unemployment Project, the nonprofit advocacy group that filed the petition. “Losing your home is one of the worst things that can happen to a family,” he said, adding, “There’s not going to be any great loss [to the sheriff] to postpone a month.” Last week, the sheriff’s department originally announced the June 4 sale would be postponed, but quickly reversed course. The department now says it must forge ahead with the sale until it hears otherwise from the courts. “Unless and until the Sheriff’s Office receives a court order to postpone any sales, they will be held as scheduled,” department spokesperson Dan Gross wrote in an email. When ‘don’t worry’ doesn’t cut it Gallegos said people are given 30 days notice of impending sheriff’s sale. Federal law guarantees homeowners an opportunity to petition to postpone the sale — but that process has been complicated by the complete shutdown of the court system over an alleged virus in some First Judicial District computers. At-risk homeowners can’t readily access their court records or file requests for postponement. Gallegos said she’s received promises that no properties will go to sale unless the legal notice processes have followed. Those verbal pledges mean little, she said. “We’re just being told ‘don’t worry, it will be taken care of,'” Gallegos added. “But that’s not a sufficient assurance when you’re talking about losing somebody’s home.” Vulnerable homeowners may reach out to Community Legal Services to seek a postponement, but some may not be aware of the option. In the two weeks since the courts’ electronic system went down, advocates have already found examples of orders that should have been signed and delivered to the sheriff in person, but were not, Gallegos added. Dodds, of the Philadelphia Unemployment Project, said it is not unprecedented for the courts to halt sheriff’s sales out of concern for homeowners.
{ "pile_set_name": "OpenWebText2" }
1. Field of the Invention The present invention relates to a storage medium storing a game program, a game apparatus and a game controlling method. More specifically, the present invention relates to a storage medium storing a game program, a game apparatus and a game controlling method capable of recognizing the entire or a part of the imaged face of the user, and executing game processing on the basis of the recognition result. 2. Description of the Related Art One example of a related art is disclosed in Japanese Patent Application Laid-Open No. 2006-202181 [G06F 3/033, A63F 13/00, G06T 1/00, G06T 7/60] laid-open on Aug. 3, 2006. Image output device of this related art images a face of a user with two cameras, specifies a movement of the eyes by detecting the eyeballs and the iris from the facial image obtained by imaging, and changes a display region of an output image in correspondence with the specified movement of the eyes. However, in the image output device of this related art, since it is assumed that the face of the user is imaged, there is a possibility that due to detection of parts other than the eyes of the user, it is determined that the movement of the eyes are specified, and the display region of the output image may be changed. Accordingly, in a case that the related art is applied to a game played by operating the imaged image of the user, there is a problem that an operation with the imaged image of the user cannot be reflected on the game processing just as the user intended.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Pulse effect using vanilla JavaScript Trying to create a pulse effect with a canvas object with plain vanilla javascript. Each function seems to be calling properly and all my values are logging right, but for some reason when the drawBall() function is called in the ballShrink() function nothing happens. I am expecting it to animate to shrink but it doesn't. ballRadius is reducing but no animation occurs. I have my code here and a JSFiddle here https://jsfiddle.net/96hthyw0/ function draw() { ctx.clearRect(0, 0, canvas.width, canvas.height); drawBall(); } function ballGrow() { ballRadius += 1; drawBall(); if (ballRadius === 20) { clearInterval(ballGrowInterval); ballShrinkInterval = setInterval(ballShrink, 100); } } function ballShrink() { ballRadius -= 1; drawBall(); if (ballRadius === 0) { clearInterval(ballShrinkInterval); } } function testInterval() { ballGrowInterval = setInterval(ballGrow, 100); } testInterval(); draw(); A: The problem is you're not clearing your last drawing but just adding new drawings on top of the existing one. Here is an updated fiddle: https://jsfiddle.net/96hthyw0/1/ but in short all I did was change your ballShrink function to this: function ballShrink() { ballRadius -= 1; draw(); // clear canvas - note you could add this to ball grow too drawBall(); if (ballRadius === 0) { clearInterval(ballShrinkInterval); } }
{ "pile_set_name": "StackExchange" }
/* LIBGIMP - The GIMP Library * Copyright (C) 1995-1997 Peter Mattis and Spencer Kimball * * gimpoffsetarea.h * Copyright (C) 2001 Sven Neumann <sven@gimp.org> * * This library is free software: you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 3 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library. If not, see * <https://www.gnu.org/licenses/>. */ #if !defined (__GIMP_WIDGETS_H_INSIDE__) && !defined (GIMP_WIDGETS_COMPILATION) #error "Only <libgimpwidgets/gimpwidgets.h> can be included directly." #endif #ifndef __GIMP_OFFSET_AREA_H__ #define __GIMP_OFFSET_AREA_H__ G_BEGIN_DECLS /* For information look into the C source or the html documentation */ #define GIMP_TYPE_OFFSET_AREA (gimp_offset_area_get_type ()) #define GIMP_OFFSET_AREA(obj) (G_TYPE_CHECK_INSTANCE_CAST ((obj), GIMP_TYPE_OFFSET_AREA, GimpOffsetArea)) #define GIMP_OFFSET_AREA_CLASS(klass) (G_TYPE_CHECK_CLASS_CAST ((klass), GIMP_TYPE_OFFSET_AREA, GimpOffsetAreaClass)) #define GIMP_IS_OFFSET_AREA(obj) (G_TYPE_CHECK_INSTANCE_TYPE ((obj), GIMP_TYPE_OFFSET_AREA)) #define GIMP_IS_OFFSET_AREA_CLASS(klass) (G_TYPE_CHECK_CLASS_TYPE ((klass), GIMP_TYPE_OFFSET_AREA)) #define GIMP_OFFSET_AREA_GET_CLASS(obj) (G_TYPE_INSTANCE_GET_CLASS ((obj), GIMP_TYPE_OFFSET_AREA, GimpOffsetAreaClass)) typedef struct _GimpOffsetAreaClass GimpOffsetAreaClass; struct _GimpOffsetArea { GtkDrawingArea parent_instance; gint orig_width; gint orig_height; gint width; gint height; gint offset_x; gint offset_y; gdouble display_ratio_x; gdouble display_ratio_y; }; struct _GimpOffsetAreaClass { GtkDrawingAreaClass parent_class; void (* offsets_changed) (GimpOffsetArea *offset_area, gint offset_x, gint offset_y); /* Padding for future expansion */ void (* _gimp_reserved1) (void); void (* _gimp_reserved2) (void); void (* _gimp_reserved3) (void); void (* _gimp_reserved4) (void); }; GType gimp_offset_area_get_type (void) G_GNUC_CONST; GtkWidget * gimp_offset_area_new (gint orig_width, gint orig_height); void gimp_offset_area_set_pixbuf (GimpOffsetArea *offset_area, GdkPixbuf *pixbuf); void gimp_offset_area_set_size (GimpOffsetArea *offset_area, gint width, gint height); void gimp_offset_area_set_offsets (GimpOffsetArea *offset_area, gint offset_x, gint offset_y); G_END_DECLS #endif /* __GIMP_OFFSET_AREA_H__ */
{ "pile_set_name": "Github" }
n base 7, what is -122 + 4? -115 In base 6, what is 432 - 1? 431 In base 7, what is 132 + -5? 124 In base 14, what is 9 - 20? -15 In base 9, what is -47 + -5? -53 In base 16, what is 3 - -9e? a1 In base 4, what is 12321 - -3? 12330 In base 16, what is -18 - 0? -18 In base 16, what is -105 - -1? -104 In base 11, what is 130 - 2? 129 In base 3, what is -12210201 - 1? -12210202 In base 13, what is -7 - -504? 4ca In base 4, what is -1202 + -10310? -12112 In base 9, what is 1 + -2212? -2211 In base 5, what is 22 - -134? 211 In base 7, what is -14 + 22? 5 In base 5, what is -22 - 432? -1004 In base 13, what is -7 + -c7? -101 In base 16, what is b7 - 4? b3 In base 3, what is -120021 - 0? -120021 In base 6, what is -42410 - -1? -42405 In base 2, what is -10 - 10110100011? -10110100101 In base 8, what is 5 + -66? -61 In base 4, what is -22013 + 12? -22001 In base 14, what is -6c - -3? -69 In base 12, what is -6 - -8? 2 In base 13, what is 0 + 53? 53 In base 3, what is 221 + 122? 1120 In base 9, what is -33 - -54? 21 In base 8, what is 55 - -3? 60 In base 7, what is -4 - 604? -611 In base 8, what is -267 + 74? -173 In base 6, what is -53 + 4? -45 In base 11, what is -11 + -38? -49 In base 7, what is -15426 - -2? -15424 In base 3, what is 1010 + 20? 1100 In base 7, what is 3 - 555? -552 In base 2, what is -1100 - -10111110001? 10111100101 In base 13, what is -35 - 5? -3a In base 16, what is 21d3 + 3? 21d6 In base 5, what is -441 - -2? -434 In base 12, what is 59 + -6? 53 In base 12, what is 18 - -3a? 56 In base 13, what is ac + -3? a9 In base 4, what is 2 - 2310? -2302 In base 13, what is 466 - 7? 45c In base 3, what is 1022222100 - -12? 1022222112 In base 16, what is -27 + 19? -e In base 14, what is 7c07 + 1? 7c08 In base 8, what is 614 + -2? 612 In base 4, what is 12221 - -10? 12231 In base 13, what is 3 - -255c? 2562 In base 16, what is 0 - 71? -71 In base 9, what is -4 + -72? -76 In base 13, what is 142b + -4? 1427 In base 2, what is -100001 - 101010101? -101110110 In base 7, what is -14 + -3403? -3420 In base 6, what is 1 + -2240? -2235 In base 12, what is -5 - -30? 27 In base 11, what is 900 + 3? 903 In base 14, what is 2b6 - -4? 2ba In base 13, what is -226 - -2? -224 In base 9, what is -4 - -35? 31 In base 4, what is 22 + -133? -111 In base 5, what is 0 + -1043? -1043 In base 14, what is 1 + -17? -16 In base 2, what is -100 - 1111001010? -1111001110 In base 8, what is -10240 + -3? -10243 In base 16, what is -a + a0? 96 In base 15, what is -180 - 1? -181 In base 9, what is -3 + -344? -347 In base 7, what is 111 - 4? 104 In base 7, what is -2 + -133? -135 In base 8, what is 6 - -2477? 2505 In base 10, what is -32 - -3? -29 In base 9, what is 55 - 408? -343 In base 11, what is -1031 - 2? -1033 In base 6, what is -3 + -35? -42 In base 8, what is -3454 + 5? -3447 In base 15, what is -b6 + 2a? -8b In base 7, what is -120 - 1? -121 In base 2, what is -110001000111 + 101? -110001000010 In base 6, what is -325 + 103? -222 In base 7, what is -5352 - -2? -5350 In base 3, what is -10 - -2222? 2212 In base 3, what is 12121 - 12? 12102 In base 6, what is 1303 + -24? 1235 In base 13, what is -83 - 54? -107 In base 12, what is 3a9 + b? 3b8 In base 12, what is 0 - -876? 876 In base 15, what is 63 + 5? 68 In base 9, what is -366 + -6? -373 In base 4, what is 32313 - 3? 32310 In base 14, what is -6a - 46? -b2 In base 7, what is 5 - 14121? -14113 In base 3, what is 2 - -1001110? 1001112 In base 14, what is -3 - 129a? -129d In base 11, what is 2 - a9? -a7 In base 2, what is -101100110111 - -101? -101100110010 In base 9, what is 4 + 3247? 3252 In base 8, what is 25 - -4? 31 In base 10, what is 3 + -259? -256 In base 3, what is -120 + 122? 2 In base 7, what is 2153 + 16? 2202 In base 9, what is 21 + 4? 25 In base 14, what is 6ab9 - 2? 6ab7 In base 8, what is -716 - 1? -717 In base 4, what is -2020 + -2? -2022 In base 13, what is 452 + -7? 448 In base 4, what is 3321 - 12? 3303 In base 2, what is -1101100011 - 1? -1101100100 In base 7, what is 4 - 103? -66 In base 9, what is -183 + -5? -188 In base 15, what is -4e + -6? -55 In base 4, what is 2 + 11131? 11133 In base 4, what is -3333031 - -1? -3333030 In base 14, what is -4 - 4a? -50 In base 7, what is -253 - 1? -254 In base 16, what is -174c - -1? -174b In base 5, what is -311 - 0? -311 In base 10, what is 7563 + 0? 7563 In base 8, what is 0 - 1745? -1745 In base 7, what is -11 - 245? -256 In base 3, what is -100112 - -1022? -22020 In base 16, what is -28e - 0? -28e In base 3, what is 20 + -20011? -12221 In base 7, what is -45 - 3? -51 In base 9, what is 5 + 3712? 3717 In base 13, what is 1 - -17bb? 17bc In base 14, what is 23 - 3? 20 In base 16, what is 3 + -a5? -a2 In base 16, what is -1 - 3c? -3d In base 7, what is 523 + -101? 422 In base 10, what is 15 - 19? -4 In base 11, what is 134 - -32? 166 In base 11, what is -1 + 376? 375 In base 11, what is 845 - 1? 844 In base 14, what is -5 - 42? -47 In base 10, what is -49 - 0? -49 In base 2, what is 11000110 - -101? 11001011 In base 10, what is 3 - 414? -411 In base 4, what is -2213 + 11? -2202 In base 7, what is 6 - 220? -211 In base 4, what is -1230001 + -11? -1230012 In base 7, what is 0 + -4520? -4520 In base 5, what is 10 - -44021? 44031 In base 9, what is -2780 + -5? -2785 In base 3, what is -11222 + 11? -11211 In base 16, what is -9 - 3b? -44 In base 8, what is 5 + 3230? 3235 In base 12, what is -20 + 1a? -2 In base 11, what is 560a + 4? 5613 In base 12, what is -9 - -366? 359 In base 2, what is 10101000011101 + 10? 10101000011111 In base 11, what is 135 - -5? 13a In base 3, what is -1 - 101? -102 In base 15, what is 69 + 5? 6e In base 9, what is -244 + -11? -255 In base 5, what is 4 + 2432? 2441 In base 15, what is -69 + -4? -6d In base 15, what is -1e - 0? -1e In base 16, what is d8 - -2? da In base 3, what is -12012 + 1111? -10201 In base 11, what is -952 + -5? -957 In base 14, what is 0 + 6b? 6b In base 2, what is -1001001 - -11? -1000110 In base 6, what is 21321 - -5? 21330 In base 4, what is 1330020 - 10? 1330010 In base 6, what is -153 - -1? -152 In base 4, what is 2012 + 2? 2020 In base 16, what is 13 - -b? 1e In base 10, what is -187 + -4? -191 In base 6, what is 11 - -253? 304 In base 14, what is 7ba - 5? 7b5 In base 9, what is 3 - 201? -187 In base 3, what is -22021 + 2? -22012 In base 15, what is -8 + -1e8? -201 In base 4, what is 12 + -2? 10 In base 10, what is -1 + 68? 67 In base 12, what is 47 + -2? 45 In base 12, what is 5 - 1? 4 In base 2, what is -111 - -1001110010? 1001101011 In base 3, what is -200 - -101201? 101001 In base 14, what is -99a + 8? -992 In base 10, what is 9 - 538? -529 In base 15, what is 29 + 1a? 44 In base 4, what is -2110 - -200? -1310 In base 11, what is 0 - 2896? -2896 In base 2, what is 11 + 100010111? 100011010 In base 13, what is 4 + -c2? -bb In base 13, what is 2 + -266? -264 In base 3, what is 11100 - -10? 11110 In base 8, what is 360 - -3? 363 In base 14, what is 5 - 71? -6a In base 15, what is 4ba - -4? 4be In base 16, what is 138 + 4? 13c In base 7, what is 242 - 2? 240 In base 8, what is -177 - -7? -170 In base 16, what is 4 + cd? d1 In base 15, what is 3 - -65? 68 In base 10, what is 3 - -42? 45 In base 4, what is -311 + 1301? 330 In base 6, what is -553 - 0? -553 In base 14, what is -d9 + -2? -db In base 3, what is 12022 + -1122? 10200 In base 10, what is -149 - -3? -146 In base 8, what is -1 - -365? 364 In base 13, what is 920 - -5? 925 In base 11, what is 4 - -3? 7 In base 4, what is -302 - -110? -132 In base 7, what is 3100 + -4? 3063 In base 4, what is -301223 + 2? -301221 In base 11, what is 4 + 2? 6 In base 11, what is 328 + -3? 325 In base 14, what is 1 - -d8? d9 In base 16, what is -1 - 68a? -68b In base 16, what is -14 - -1? -13 In base 13, what is 2 - 18a? -188 In base 6, what is 11 - -23? 34 In base 11, what is -10 - -180? 170 In base 13, what is 343 - 4? 33c In base 8, what is -2223 - -2? -2221 In base 16, what is 310 - 5? 30b In base 12, what is -9 - -19? 10 In base 3, what is 202011 - -22? 202110 In base 15, what is e3 + 3? e6 In base 3, what is 12 + 102001? 102020 In base 15, what is -1 - 16? -17 In base 7, what is 461 + 5? 466 In base 10, what is 7 - -418? 425 In base 7, what is 10520 - 4? 10
{ "pile_set_name": "DM Mathematics" }
// The MIT License (MIT) // // Copyright (c) 2015, 2016 Arian Fornaris // // Permission is hereby granted, free of charge, to any person obtaining a // copy of this software and associated documentation files (the // "Software"), to deal in the Software without restriction, including // without limitation the rights to use, copy, modify, merge, publish, // distribute, sublicense, and/or sell copies of the Software, and to permit // persons to whom the Software is furnished to do so, subject to the // following conditions: The above copyright notice and this permission // notice shall be included in all copies or substantial portions of the // Software. // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS // OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN // NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, // DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR // OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE // USE OR OTHER DEALINGS IN THE SOFTWARE. package phasereditor.canvas.ui.editors.grid; import java.util.ArrayList; import java.util.Collection; import java.util.HashMap; import java.util.Map; /** * @author arian * */ public class PGridSection extends ArrayList<PGridProperty<?>> { private static final long serialVersionUID = 1L; private String _name; private boolean _active; private Map<String, PGridProperty<?>> _map; public PGridSection(String name) { super(); _name = name; _active = true; _map = new HashMap<>(); } @Override public boolean add(PGridProperty<?> e) { e.setSection(this); _map.put(e.getName(), e); return super.add(e); } @Override public void add(int index, PGridProperty<?> e) { e.setSection(this); _map.put(e.getName(), e); super.add(index, e); } @Override public boolean addAll(Collection<? extends PGridProperty<?>> c) { for(PGridProperty<?> e : c) { e.setSection(this); _map.put(e.getName(), e); } return super.addAll(c); } public boolean isActive() { return _active; } public void setActive(boolean active) { _active = active; } public String getName() { return _name; } public void setName(String name) { _name = name; } @SuppressWarnings("static-method") public boolean isReadOnly() { return false; } }
{ "pile_set_name": "Github" }
Q: Can I use ConfigSlurper to reference a config file in the classpath? I want to use the contents of a config file in several ways, including in integration tests and in my BootStrap. If my config file is under src/groovy and is called "com.corp.MyConfig.groovy", what should I pass to the ConfigSlurper parse method? A: I guess what happens is that your Groovy file gets compiled and ends up being a class in your binary directory (classpath). Instead of trying to load it via the URL try to load the script class. Class scriptClass = getClass().classLoader.loadClass('com.corp.MyConfig') ConfigObject config = new ConfigSlurper().parse(scriptClass)
{ "pile_set_name": "StackExchange" }
Kevin Appel Kevin Appel (born 1967) is an American artist based in Los Angeles. Life and work Appel was born in Los Angeles. He received his BFA from Parsons School of Design, New York City in 1990 and his MFA from the University of California in 1995. He is a Professor and Associate Chair of Graduate Studies at the University of California Irvine. Appel's artwork relates to both abstract painting and architecture. It describes the slow and messy breakdown of the house and home and the psychological effects of that. Appel's abstract painted surfaces include approximations of architectural surfaces, and pure paint. His current paintings are large abstractions painted on large scale printed photographs. Catalogues Descripcion sin lugar: Una seleccion de obras de Kevin Appel, Museo Rufino Tamayo (Tobias Ostrander, Elizabeth Smith, ed.); Drawing Now: Eight Propositions, Museum of Modern Art (Laura Hoptman, ed.) Trespassing: Houses x Artists, Hatje Cantz (Alan Koch, et al., ed.) 01.01.01: Art in Technological Times, San Francisco Museum of Modern Art, San Francisco (David A Ross, et al., ed.) Painting at the Edge of the World, Walker Art Center (Douglas Fogle, ed.) Kevin Appel, Museum of Contemporary Art, Los Angeles (Jeremy Strick, Paul Schimmel, Jan Tumlir, ed.) External links Kevin Appel Studio Kevin Appel at Susanne Vielmetter Los Angeles Projects Figure/Ground interview with Kevin Appel. June 20th, 2013 Category:Parsons School of Design alumni Category:1967 births Category:Living people Category:20th-century American painters Category:American male painters Category:21st-century American painters
{ "pile_set_name": "Wikipedia (en)" }
/*! * Stylus - Evaluator * Copyright(c) 2010 LearnBoost <dev@learnboost.com> * MIT Licensed */ /** * Module dependencies. */ var Visitor = require('./') , units = require('../units') , nodes = require('../nodes') , Stack = require('../stack') , Frame = require('../stack/frame') , Scope = require('../stack/scope') , utils = require('../utils') , bifs = require('../functions') , dirname = require('path').dirname , join = require('path').join , colors = require('../colors') , debug = require('debug')('stylus:evaluator') , fs = require('fs'); /** * Initialize a new `Evaluator` with the given `root` Node * and the following `options`. * * Options: * * - `compress` Compress the css output, defaults to false * - `warn` Warn the user of duplicate function definitions etc * * @param {Node} root * @api private */ var Evaluator = module.exports = function Evaluator(root, options) { options = options || {}; Visitor.call(this, root); this.stack = new Stack; this.imports = options.imports || []; this.functions = options.functions || {}; this.globals = options.globals || {}; this.paths = options.paths || []; this.filename = options.filename; this.includeCSS = options['include css']; this.paths.push(dirname(options.filename || '.')); this.stack.push(this.global = new Frame(root)); this.warnings = options.warn; this.options = options; this.calling = []; // TODO: remove, use stack this.importStack = []; this.return = 0; }; /** * Inherit from `Visitor.prototype`. */ Evaluator.prototype.__proto__ = Visitor.prototype; /** * Proxy visit to expose node line numbers. * * @param {Node} node * @return {Node} * @api private */ var visit = Visitor.prototype.visit; Evaluator.prototype.visit = function(node){ try { return visit.call(this, node); } catch (err) { if (err.filename) throw err; err.lineno = node.lineno; err.filename = node.filename; err.stylusStack = this.stack.toString(); try { err.input = fs.readFileSync(err.filename, 'utf8'); } catch (err) { // ignore } throw err; } }; /** * Perform evaluation setup: * * - populate global scope * - iterate imports * * @api private */ Evaluator.prototype.setup = function(){ var root = this.root; var imports = []; this.populateGlobalScope(); this.imports.forEach(function(file){ var expr = new nodes.Expression; expr.push(new nodes.String(file)); imports.push(new nodes.Import(expr)); }, this); root.nodes = imports.concat(root.nodes); }; /** * Populate the global scope with: * * - css colors * - user-defined globals * * @api private */ Evaluator.prototype.populateGlobalScope = function(){ var scope = this.global.scope; // colors Object.keys(colors).forEach(function(name){ var rgb = colors[name] , rgba = new nodes.RGBA(rgb[0], rgb[1], rgb[2], 1) , node = new nodes.Ident(name, rgba); scope.add(node); }); // user-defined globals var globals = this.globals; Object.keys(globals).forEach(function(name){ scope.add(new nodes.Ident(name, globals[name])); }); }; /** * Evaluate the tree. * * @return {Node} * @api private */ Evaluator.prototype.evaluate = function(){ debug('eval %s', this.filename); this.setup(); return this.visit(this.root); }; /** * Visit Group. */ Evaluator.prototype.visitGroup = function(group){ group.nodes = group.nodes.map(function(selector){ selector.val = this.interpolate(selector); debug('ruleset %s', selector.val); return selector; }, this); group.block = this.visit(group.block); return group; }; /** * Visit Charset. */ Evaluator.prototype.visitCharset = function(charset){ return charset; }; /** * Visit Return. */ Evaluator.prototype.visitReturn = function(ret){ ret.expr = this.visit(ret.expr); throw ret; }; /** * Visit Media. */ Evaluator.prototype.visitMedia = function(media){ media.block = this.visit(media.block); var query = this.lookup(media.val); if (query) media.val = new nodes.Literal(query.first.string); return media; }; /** * Visit FontFace. */ Evaluator.prototype.visitFontFace = function(face){ face.block = this.visit(face.block); return face; }; /** * Visit FontFace. */ Evaluator.prototype.visitPage = function(page){ page.block = this.visit(page.block); return page; }; /** * Visit Keyframes. */ Evaluator.prototype.visitKeyframes = function(keyframes){ if (keyframes.fabricated) return keyframes; keyframes.name = this.visit(keyframes.name).first.name; keyframes.frames = keyframes.frames.map(function(frame){ frame.block = this.visit(frame.block); return frame; }, this); if ('official' != keyframes.prefix) return keyframes; this.vendors.forEach(function(prefix){ var node = keyframes.clone(); node.prefix = prefix; node.fabricated = true; this.currentBlock.push(node); }, this); return nodes.null; }; /** * Visit Function. */ Evaluator.prototype.visitFunction = function(fn){ // check local var local = this.stack.currentFrame.scope.lookup(fn.name); if (local) this.warn('local ' + local.nodeName + ' "' + fn.name + '" previously defined in this scope'); // user-defined var user = this.functions[fn.name]; if (user) this.warn('user-defined function "' + fn.name + '" is already defined'); // BIF var bif = bifs[fn.name]; if (bif) this.warn('built-in function "' + fn.name + '" is already defined'); return fn; }; /** * Visit Each. */ Evaluator.prototype.visitEach = function(each){ this.return++; var expr = utils.unwrap(this.visit(utils.unwrap(each.expr))) , len = expr.nodes.length , val = new nodes.Ident(each.val) , key = new nodes.Ident(each.key || '__index__') , scope = this.currentScope , block = this.currentBlock , vals = [] , body; this.return--; each.block.scope = false; for (var i = 0; i < len; ++i) { val.val = expr.nodes[i]; key.val = new nodes.Unit(i); scope.add(val); scope.add(key); body = this.visit(each.block.clone()); vals = vals.concat(body.nodes); } this.mixin(vals, block); return vals[vals.length - 1] || nodes.null; }; /** * Visit Call. */ Evaluator.prototype.visitCall = function(call){ debug('call %s', call); var fn = this.lookup(call.name) , ret; // url() this.ignoreColors = 'url' == call.name; // Variable function if (fn && 'expression' == fn.nodeName) { fn = fn.nodes[0]; } // Not a function? try user-defined or built-ins if (fn && 'function' != fn.nodeName) { fn = this.lookupFunction(call.name); } // Undefined function, render literal css if (!fn || fn.nodeName != 'function') { debug('%s is undefined', call); var ret = this.literalCall(call); this.ignoreColors = false; return ret; } this.calling.push(call.name); // Massive stack if (this.calling.length > 200) { throw new RangeError('Maximum stylus call stack size exceeded'); } // First node in expression if ('expression' == fn.nodeName) fn = fn.first; // Evaluate arguments this.return++; var args = this.visit(call.args) , mapCopy = {}; for (var key in args.map) { mapCopy[key] = args.map[key]; args.map[key] = this.visit(mapCopy[key].clone()); } this.return--; // Built-in if (fn.fn) { debug('%s is built-in', call); ret = this.invokeBuiltin(fn.fn, args); // User-defined } else if ('function' == fn.nodeName) { debug('%s is user-defined', call); ret = this.invokeFunction(fn, args); } // restore kwargs for (key in mapCopy) { args.map[key] = mapCopy[key]; } this.calling.pop(); this.ignoreColors = false; return ret; }; /** * Visit Ident. */ Evaluator.prototype.visitIdent = function(ident){ var prop; // Property lookup if (ident.property) { if (prop = this.lookupProperty(ident.name)) { return this.visit(prop.expr.clone()); } return nodes.null; // Lookup } else if (ident.val.isNull) { var val = this.lookup(ident.name); return val ? this.visit(val) : ident; // Assign } else { this.return++; ident.val = this.visit(ident.val); this.return--; this.currentScope.add(ident); return ident.val; } }; /** * Visit BinOp. */ Evaluator.prototype.visitBinOp = function(binop){ // Special-case "is defined" pseudo binop if ('is defined' == binop.op) return this.isDefined(binop.left); this.return++; // Visit operands var op = binop.op , left = this.visit(binop.left) , right = this.visit(binop.right); this.return--; // HACK: ternary var val = binop.val ? this.visit(binop.val) : null; // Operate try { return this.visit(left.operate(op, right, val)); } catch (err) { // disregard coercion issues in equality // checks, and simply return false if ('CoercionError' == err.name) { switch (op) { case '==': return nodes.false; case '!=': return nodes.true; } } throw err; } }; /** * Visit UnaryOp. */ Evaluator.prototype.visitUnaryOp = function(unary){ var op = unary.op , node = this.visit(unary.expr); if ('!' != op) { node = node.first.clone(); utils.assertType(node, 'unit'); } switch (op) { case '-': node.val = -node.val; break; case '+': node.val = +node.val; break; case '~': node.val = ~node.val; break; case '!': return node.toBoolean().negate(); } return node; }; /** * Visit TernaryOp. */ Evaluator.prototype.visitTernary = function(ternary){ var ok = this.visit(ternary.cond).toBoolean(); return ok.isTrue ? this.visit(ternary.trueExpr) : this.visit(ternary.falseExpr); }; /** * Visit Expression. */ Evaluator.prototype.visitExpression = function(expr){ for (var i = 0, len = expr.nodes.length; i < len; ++i) { expr.nodes[i] = this.visit(expr.nodes[i]); } // support (n * 5)px etc if (this.castable(expr)) expr = this.cast(expr); return expr; }; /** * Visit Arguments. */ Evaluator.prototype.visitArguments = Evaluator.prototype.visitExpression; /** * Visit Property. */ Evaluator.prototype.visitProperty = function(prop){ var name = this.interpolate(prop) , fn = this.lookup(name) , call = fn && 'function' == fn.nodeName , literal = ~this.calling.indexOf(name); // Function of the same name if (call && !literal && !prop.literal) { this.calling.push(name); var args = nodes.Arguments.fromExpression(utils.unwrap(prop.expr)); var ret = this.visit(new nodes.Call(name, args)); this.calling.pop(); return ret; // Regular property } else { this.return++; prop.name = name; prop.literal = true; this.property = prop; prop.expr = this.visit(prop.expr); delete this.property; this.return--; return prop; } }; /** * Visit Root. */ Evaluator.prototype.visitRoot = function(block){ for (var i = 0; i < block.nodes.length; ++i) { block.index = this.rootIndex = i; block.nodes[i] = this.visit(block.nodes[i]); } return block; }; /** * Visit Block. */ Evaluator.prototype.visitBlock = function(block){ this.stack.push(new Frame(block)); for (block.index = 0; block.index < block.nodes.length; ++block.index) { try { block.nodes[block.index] = this.visit(block.nodes[block.index]); } catch (err) { if ('return' == err.nodeName) { if (this.return) { this.stack.pop(); throw err; } else { block.nodes[block.index] = err; break; } } else { throw err; } } } this.stack.pop(); return block; }; /** * Visit If. */ Evaluator.prototype.visitIf = function(node){ var ret , block = this.currentBlock , negate = node.negate; this.return++; var ok = this.visit(node.cond).first.toBoolean(); this.return--; // Evaluate body if (negate) { // unless if (ok.isFalse) { ret = this.visit(node.block); } } else { // if if (ok.isTrue) { ret = this.visit(node.block); // else } else if (node.elses.length) { var elses = node.elses , len = elses.length; for (var i = 0; i < len; ++i) { // else if if (elses[i].cond) { if (this.visit(elses[i].cond).first.toBoolean().isTrue) { ret = this.visit(elses[i].block); break; } // else } else { ret = this.visit(elses[i]); } } } } // mixin conditional statements within a selector group if (ret && !node.postfix && block.node && 'group' == block.node.nodeName) { this.mixin(ret.nodes, block); return nodes.null; } return ret || nodes.null; }; /** * Visit Extend. */ Evaluator.prototype.visitExtend = function(extend){ var selector = extend.selector; var block = !this.currentBlock.node.extends && this.targetBlock.node.extends ? this.targetBlock : this.currentBlock; block.node.extends.push(selector); return nodes.null; }; /** * Visit Import. */ Evaluator.prototype.visitImport = function(imported){ this.return++; var root = this.root , Parser = require('../parser') , path = this.visit(imported.path).first , includeCSS = this.includeCSS , found , literal; this.return--; debug('import %s', path); // url() passed if ('url' == path.name) return imported; // Enusre string if (!path.string) throw new Error('@import string expected'); var name = path = path.string; // Literal if (~path.indexOf('.css')) { literal = true; if (!includeCSS) return imported; } // support optional .styl if (!literal && !~path.indexOf('.styl')) path += '.styl'; // Lookup found = utils.lookup(path, this.paths, this.filename); found = found || utils.lookup(join(name, 'index.styl'), this.paths, this.filename); // Expose imports imported.path = found; imported.dirname = dirname(found); this.paths.push(imported.dirname); if (this.options._imports) this.options._imports.push(imported); // Throw if import failed if (!found) throw new Error('failed to locate @import file ' + path); // Parse the file this.importStack.push(found); nodes.filename = found; var str = fs.readFileSync(found, 'utf8'); if (literal) return new nodes.Literal(str.replace(/\r\n?/g, "\n")); // parse var block = new nodes.Block , parser = new Parser(str, utils.merge({ root: block }, this.options)); try { block = parser.parse(); } catch (err) { err.filename = found; err.lineno = parser.lexer.lineno; err.input = str; throw err; } // Store the modified time fs.stat(found, function(err, stat){ if (err) return; imported.mtime = stat.mtime; }); // Evaluate imported "root" block.parent = root; block.scope = false; var ret = this.visit(block); this.paths.pop(); this.importStack.pop(); return ret; }; /** * Invoke `fn` with `args`. * * @param {Function} fn * @param {Array} args * @return {Node} * @api private */ Evaluator.prototype.invokeFunction = function(fn, args){ var block = new nodes.Block(fn.block.parent); fn.block.parent = block; // Clone the function body // to prevent mutation of subsequent calls var body = fn.block.clone(); // mixin block var mixinBlock = this.stack.currentFrame.block; // new block scope this.stack.push(new Frame(block)); var scope = this.currentScope; // arguments local scope.add(new nodes.Ident('arguments', args)); // mixin scope introspection scope.add(new nodes.Ident('mixin', this.return ? nodes.false : new nodes.String(mixinBlock.nodeName))); // current property if (this.property) { var prop = this.propertyExpression(this.property, fn.name); scope.add(new nodes.Ident('current-property', prop)); } else { scope.add(new nodes.Ident('current-property', nodes.null)); } // inject arguments as locals var i = 0 , len = args.nodes.length; fn.params.nodes.forEach(function(node){ // rest param support if (node.rest) { node.val = new nodes.Expression; for (; i < len; ++i) node.val.push(args.nodes[i]); node.val.preserve = true; // argument default support } else { var arg = args.map[node.name] || args.nodes[i++]; node = node.clone(); if (arg) { if (!arg.isEmpty) node.val = arg; } else { args.push(node.val); } // required argument not satisfied if (node.val.isNull) { throw new Error('argument "' + node + '" required for ' + fn); } } scope.add(node); }); // invoke return this.invoke(body, true); }; /** * Invoke built-in `fn` with `args`. * * @param {Function} fn * @param {Array} args * @return {Node} * @api private */ Evaluator.prototype.invokeBuiltin = function(fn, args){ // Map arguments to first node // providing a nicer js api for // BIFs. Functions may specify that // they wish to accept full expressions // via .raw if (fn.raw) { args = args.nodes; } else { args = utils.params(fn).reduce(function(ret, param){ var arg = args.map[param] || args.nodes.shift(); if (arg) ret.push(arg.first); return ret; }, []); } // Invoke the BIF var body = utils.coerce(fn.apply(this, args)); // Always wrapping allows js functions // to return several values with a single // Expression node var expr = new nodes.Expression; expr.push(body); body = expr; // Invoke return this.invoke(body); }; /** * Invoke the given function `body`. * * @param {Block} body * @return {Node} * @api private */ Evaluator.prototype.invoke = function(body, stack){ var self = this , ret; // Return if (this.return) { ret = this.eval(body.nodes); if (stack) this.stack.pop(); // Mixin } else { var targetFrame = this.stack[this.stack.length - 2]; if (targetFrame) this.targetBlock = targetFrame.block; body = this.visit(body); if (stack) this.stack.pop(); this.mixin(body.nodes, this.currentBlock); ret = nodes.null; } return ret; }; /** * Mixin the given `nodes` to the given `block`. * * @param {Array} nodes * @param {Block} block * @api private */ Evaluator.prototype.mixin = function(nodes, block){ var len = block.nodes.length , head = block.nodes.slice(0, block.index) , tail = block.nodes.slice(block.index + 1, len); this._mixin(nodes, head); block.nodes = head.concat(tail); }; /** * Mixin the given `nodes` to the `dest` array. * * @param {Array} nodes * @param {Array} dest * @api private */ Evaluator.prototype._mixin = function(nodes, dest){ var node , len = nodes.length; for (var i = 0; i < len; ++i) { switch ((node = nodes[i]).nodeName) { case 'return': return; case 'block': this._mixin(node.nodes, dest); break; default: dest.push(node); } } }; /** * Evaluate the given `vals`. * * @param {Array} vals * @return {Node} * @api private */ Evaluator.prototype.eval = function(vals){ if (!vals) return nodes.null; var len = vals.length , node = nodes.null; try { for (var i = 0; i < len; ++i) { node = vals[i]; switch (node.nodeName) { case 'if': if ('block' != node.block.nodeName) { node = this.visit(node); break; } case 'each': case 'block': node = this.visit(node); if (node.nodes) node = this.eval(node.nodes); break; default: node = this.visit(node); } } } catch (err) { if ('return' == err.nodeName) { return err.expr; } else { throw err; } } return node; }; /** * Literal function `call`. * * @param {Call} call * @return {call} * @api private */ Evaluator.prototype.literalCall = function(call){ call.args = this.visit(call.args); return call; }; /** * Lookup property `name`. * * @param {String} name * @return {Property} * @api private */ Evaluator.prototype.lookupProperty = function(name){ var i = this.stack.length , prop = this.property , curr = prop && prop.name , index = this.currentBlock.index , top = i , nodes , block , other; while (i--) { block = this.stack[i].block; if (!block.node) continue; switch (block.node.nodeName) { case 'group': case 'function': nodes = block.nodes; // scan siblings from the property index up if (i + 1 == top) { while (index--) { other = this.interpolate(nodes[index]); if (name == other) return nodes[index].clone(); } // sequential lookup for non-siblings (for now) } else { for (var j = 0, len = nodes.length; j < len; ++j) { if ('property' != nodes[j].nodeName) continue; other = this.interpolate(nodes[j]); if (name == other) return nodes[j].clone(); } } break; } } return nodes.null; }; /** * Return the closest mixin-able `Block`. * * @return {Block} * @api private */ Evaluator.prototype.__defineGetter__('closestBlock', function(){ var i = this.stack.length , block; while (i--) { block = this.stack[i].block; if (block.node) { switch (block.node.nodeName) { case 'group': case 'function': return block; } } } }); /** * Lookup `name`, with support for JavaScript * functions, and BIFs. * * @param {String} name * @return {Node} * @api private */ Evaluator.prototype.lookup = function(name){ var val; if (this.ignoreColors && name in colors) return; if (val = this.stack.lookup(name)) { return utils.unwrap(val); } else { return this.lookupFunction(name); } }; /** * Map segments in `node` returning a string. * * @param {Node} node * @return {String} * @api private */ Evaluator.prototype.interpolate = function(node){ var self = this; return node.segments.map(function(node){ function toString(node) { switch (node.nodeName) { case 'function': case 'ident': return node.name; case 'literal': case 'string': case 'unit': return node.val; case 'expression': self.return++; var ret = toString(self.visit(node).first); self.return--; return ret; } } return toString(node); }).join(''); }; /** * Lookup JavaScript user-defined or built-in function. * * @param {String} name * @return {Function} * @api private */ Evaluator.prototype.lookupFunction = function(name){ var fn = this.functions[name] || bifs[name]; if (fn) return new nodes.Function(name, fn); }; /** * Check if the given `node` is an ident, and if it is defined. * * @param {Node} node * @return {Boolean} * @api private */ Evaluator.prototype.isDefined = function(node){ if ('ident' == node.nodeName) { return nodes.Boolean(this.lookup(node.name)); } else { throw new Error('invalid "is defined" check on non-variable ' + node); } }; /** * Return `Expression` based on the given `prop`, * replacing cyclic calls to the given function `name` * with "__CALL__". * * @param {Property} prop * @param {String} name * @return {Expression} * @api private */ Evaluator.prototype.propertyExpression = function(prop, name){ var expr = new nodes.Expression , val = prop.expr.clone(); // name expr.push(new nodes.String(prop.name)); // replace cyclic call with __CALL__ function replace(node) { if ('call' == node.nodeName && name == node.name) { return new nodes.Literal('__CALL__'); } if (node.nodes) node.nodes = node.nodes.map(replace); return node; } replace(val); expr.push(val); return expr; }; /** * Cast `expr` to the trailing ident. * * @param {Expression} expr * @return {Unit} * @api private */ Evaluator.prototype.cast = function(expr){ return new nodes.Unit(expr.first.val, expr.nodes[1].name); }; /** * Check if `expr` is castable. * * @param {Expression} expr * @return {Boolean} * @api private */ Evaluator.prototype.castable = function(expr){ return 2 == expr.nodes.length && 'unit' == expr.first.nodeName && ~units.indexOf(expr.nodes[1].name); }; /** * Warn with the given `msg`. * * @param {String} msg * @api private */ Evaluator.prototype.warn = function(msg){ if (!this.warnings) return; console.warn('\033[33mWarning:\033[0m ' + msg); }; /** * Return the current `Block`. * * @return {Block} * @api private */ Evaluator.prototype.__defineGetter__('currentBlock', function(){ return this.stack.currentFrame.block; }); /** * Return an array of vendor names. * * @return {Array} * @api private */ Evaluator.prototype.__defineGetter__('vendors', function(){ return this.lookup('vendors').nodes.map(function(node){ return node.string; }); }); /** * Return the current frame `Scope`. * * @return {Scope} * @api private */ Evaluator.prototype.__defineGetter__('currentScope', function(){ return this.stack.currentFrame.scope; }); /** * Return the current `Frame`. * * @return {Frame} * @api private */ Evaluator.prototype.__defineGetter__('currentFrame', function(){ return this.stack.currentFrame; });
{ "pile_set_name": "Github" }
Biodiversity and monitoring of colorless filamentous bacteria in sulfide aquatic systems of North Caucasus region. Bacterial mats in sulfide aquatic systems of North Caucasus are basically composed by the species of genera Thiothrix and Sphaerotilus. Additionally, several non-filamentous sulfur-oxidizing bacteria were isolated from the mats and several minor 16S rRNA phylotypes were found in clone libraries from these mats. The minor components were affiliated with Proteobacteria, Chlorobia, Cyanobacteria and Firmicutes. Even in an individual mat population heterogeneity of Thiothrix spp. was revealed by analysis of 16S rRNA gene and RAPD-PCR. Five Thiothrix isolates were described as new species Thiothrix caldifontis sp. nov. and Thiothrix lacustris sp. nov. In the Thiothrix-Sphaerotilus type of bacterial mat the proportion of dominant organisms might be influenced by sulfide concentration in the spring water. The higher sulfide concentration (more than 10 mg/l) in the spring water is more favorable for the development of bacterial mats with dominant Thiothrix organisms than for Thiothrix-Sphaerotilus type of sulfur mat.
{ "pile_set_name": "PubMed Abstracts" }
Mamonty Yugry Mamonty Yugry (; ) is a junior ice hockey team from Khanty-Mansiysk, which contains players from the Yugra Khanty-Mansiysk school. They are members of the Junior Hockey League (MHL), the top tier of junior hockey in the country. External links Official Page Category:2011 establishments in Russia Category:HC Yugra Category:Ice hockey clubs established in 2011 Category:Ice hockey teams in Russia Category:Junior Hockey League (Russia) teams
{ "pile_set_name": "Wikipedia (en)" }
620 So.2d 122 (1993) Bruce Wade COVINGTON v. STATE. CR 91-1580. Court of Criminal Appeals of Alabama. January 22, 1993. Rehearing Denied March 5, 1993. Certiorari Denied May 14, 1993. *123 Robert Clark and W. Lloyd Copeland, Mobile, for appellant. James H. Evans, Atty. Gen., and Gilda Williams, Asst. Atty. Gen., for appellee. Alabama Supreme Court 1920876. BOWEN, Presiding Judge. The appellant, Bruce Wade Covington, was convicted of burglary in the second degree and rape in the first degree. He was given concurrent sentences of 10 years' and 20 years' imprisonment, respectively. On this appeal from those convictions the appellant argues that he was entitled to a mistrial because "[t]he prosecutor's questions, and statements made in the presence of the jury, constituted blatant assertions that there was evidence not before the jury of an extremely damning fact: that threats made by Covington and his brother had induced [defense witness David] Smith to give false exculpatory testimony." Appellant's brief at 30. THE FACTS The victim in this case was a 20-year-old Korean female. She knew the appellant, having met him on two prior occasions, and positively identified him as her assailant. The appellant's defense was alibi. He claimed that he was at home at the time of the burglary and rape. It is undisputed *124 that shortly before the rape, the appellant was in the company of David Quinley and David Smith. The appellant also claimed that he had shaved his pubic hair at that time "in order to get rid of the crabs." R. 236. The victim testified that she saw the appellant's pubic hair at the time of the rape. Quinley was a witness for the prosecution and testified that shortly before the rape, the appellant made statements to him and Smith indicating his desire to have sexual intercourse with an oriental female. At trial, Smith testified as a defense witness that he, Quinley, and the appellant were at his sister's house prior to the rape. He testified that "sex" was not a subject of their conversation. However, Smith admitted on direct examination that he had previously told a Mobile County sheriff's detective that the appellant had made some remarks that night "about getting some oriental stuff that night." R. 289. At trial, Smith claimed that he had lied to the detective and that the appellant "did not tell [him] that. David Quinley told [him] that. And [he] told the detective that because [he] was mad because [he] thought [the appellant] had done that to Kim." R. 290. Later, on cross-examination, Smith stated, "I don't know if I believe that he did it or not. So I ain't going to sit up here and lie and that is why I'm saying this now." R. 297. Smith also testified that Quinley was "known to lie." R. 303. However, when asked, "And you are saying that David Quinley is just making this up?" Smith responded, "I ain't saying that one bit." R. 303. During her cross-examination of the appellant, the assistant district attorney sought to establish that Smith's trial testimony was false and that either the appellant or the appellant's brother had coerced or threatened Smith into giving false testimony. On cross-examination of the appellant, the following occurred in the presence and hearing of the jury: "Q. Have either you or your brother Brian made threats against David Smith or— "MR. POWERS [defense counsel]: Object to the question as insulting. "THE COURT: I sustain the objection unless you are prepared to offer evidence to that effect, Ms. Murphree [assistant district attorney]. "MS. MURPHREE: I can put on David Smith's mother. "THE COURT: I mean if you tell me that you have evidence to this effect then I am going to allow the question to be asked and answered. If you tell me you do not then I will not let him answer. "MS. MURPHREE: Your Honor, I can represent to you that I do not have David Smith's mother subpoenaed but I can represent to the Court and I will do it outside the presence of the jury if you want me to, what she has personally told me regarding threats— "THE COURT: If she is not a witness to testify then you can't prove it unless you represent to me that you will get her. "MS. MURPHREE: May I take—I will do my best to. If I— "THE COURT: Well, then I will not allow the question. "MS. MURPHREE: She may be out in the hall. "THE COURT: All right. I will let you check on that before I will allow the question to be asked. But unless you are able to substantiate such a question then the question is an improper question." R. 250-51. The prosecutor then questioned the appellant about another matter and established that the appellant did intend to call Smith as a defense witness. R. 255 On cross-examination of defense witness Smith, the following occurred: "Q. [by the prosecutor]: Mr. Smith, isn't it a fact that shortly after this happened you told the truth when you talked to David Hill and you have talked to Bruce [the appellant] since then haven't you? "A. On and off. ". . . . "Q. Okay. Have you talked to Bruce [the appellant] about your testimony in this case? *125 "A. No, I haven't. "Q. Has Bruce threatened you? "A. No, he hasn't. "Q. Has his brother Brian threatened you? "A. No, he hasn't. "Q. Are you aware that your mother called me last night to tell me— "MR. POWERS: I am going to object to that your Honor. "THE COURT: I have already sustained the objection— "MS. MURPHREE: He had indicated that he could get his mother to Court. "THE COURT: I have already sustained the objection previously unless you make the proper representation to this Court. "MS. MURPHREE: The representation I am making is that he said he could get his mother to Court.[1] "Q. Is that correct Mr. Smith? "THE COURT: No, that's not your question though, is it, Ms. Murphree? "MS. MURHPREE: It is now. "THE COURT: I am not going to allow you to go into that matter unless you can show the Court that you can go ahead and back up any question that you ask this witness. Not whether or not you can get his mother to Court but whether or not you can back up anything that is said. "MR. POWERS: Your Honor, I move for a mistrial. "THE COURT: Only proper evidence. "MR. POWERS: I move for a mistrial. "THE COURT: The Court will deny the motion. Go ahead Ms. Murphree. "Q. David Smith, i[s] your mother available to come to Court today? "MR. POWERS: Your Honor, I am going to object to this line of questioning. It's getting back to what Your Honor has already ruled on. "THE COURT: I will let him answer that question if he knows the answer. "A. No, she is not available today. "Q. Do you see that lady sitting back there in the back of the Court? Stand up for me. Did you initially tell her when I sent her out to— "THE COURT: Ms. Murphree, you are beating a dead horse. I have already ruled on that issue. "MS. MURPHREE: I'm sorry then, Your Honor. I am missing your point. "THE COURT: Proceed to another matter. "MS. MURPHREE: If I can— "THE COURT: Proceed to another matter. "MS. MURPHREE: May I just ask one other— "THE COURT: Proceed to another matter. Well, we will take a recess. May I see the lawyers in my office?" R. 297-300 (footnote added). There is no record of what occurred in the judge's office. When the trial resumed, the following occurred: "MR. POWERS: I renew at this time my motion for a mistrial. "THE COURT: I deny the motion. You may proceed Ms. Murphree." R. 300. Shortly after this exchange, the defense rested its case. The prosecution presented no rebuttal. THE IMPROPRIETY OF THE PROSECUTOR'S COMMENTS We find the prosecutor's conduct highly improper. Statements made by the prosecution that imply or suggest that there exists additional evidence, which has not been introduced and which could prove the defendant's guilt are "intolerable" and highly prejudicial. Ex parte Washington, 507 So.2d 1360, 1362 (Ala.1986). "It has long been the rule in Alabama that, although counsel should be given considerable latitude in drawing reasonable inferences from the evidence, they may not argue as a fact that which is not *126 supported by the evidence.... This has been the rule since it was first stated in McAdory v. State, 62 Ala. 154[, 163] (1878): "`[C]ounsel should not be permitted to comment upon facts not proved before the jury as true, and not legally competent and admissible as evidence. However reluctant an appellate court may be to interfere with the discretion of a primary court in regulating the trial of cases, if it should appear that it had refused, to the prejudice of a party, to compel counsel to confine their arguments and comments to the jury, to the law and evidence of the case under consideration—if it had permitted them to refer to and comment upon facts not in evidence, or which would not be admissible as evidence, it would be a fatal error....'" Washington, 507 So.2d at 1361-62. See also King v. State, 518 So.2d 191, 194 ((Ala.Cr.App.1987). "[F]or the state's attorney to ask a question which implies the existence of a factual predicate which the examiner knows he [or she] cannot support by the evidence is unprofessional conduct." Daniel v. State, 534 So.2d 1122, 1126 (Ala. Cr.App.1988). "The alleged prosecutorial misconduct consisted of making prejudicial allegations without being able to prove them by lawful evidence. The `lawful evidence' standard applies in Alabama and the good faith of [the] prosecutor or lack thereof is not the test. ". . . . "`Laying prejudicial allegations before the jury "by dint of cross-examination without being prepared to prove them is generally regarded as reversible error." United States v. Brown, 519 F.2d 1368, 1370 (6th Cir.1975). It is improper for the prosecutor "to ask a question which implies a factual predicate which the examiner knows he cannot support by evidence or for which he has no reason to believe that there is a foundation of truth." United States v. Harris, 542 F.2d 1283, 1307 (7th Cir.1976).'" Daniel v. State, 534 So.2d 1122, 1126 (Ala. Cr.App.1988). See also Hooper v. State, 585 So.2d 142, 151 (Ala.Cr.App.1991), cert. denied, ___ U.S. ___, 112 S.Ct. 1295, 117 L.Ed.2d 517 (1992); Gillespie v. State, 549 So.2d 640, 645 (Ala.Cr.App.1989). In Ex parte Peagler, 516 So.2d 1369, 1371 (Ala. 1987), the Alabama Supreme Court held that in attempting to impeach a hostile witness by questioning the witness about a prior conviction, a prosecutor must be prepared to rebut a negative answer with proper proof of the prior conviction: "`When a witness denies that he has been convicted of the crime, it becomes incumbent upon the impeaching party to prove the conviction.'" Here, the comments of the prosecutor imply that the prosecutor had personal knowledge of the incriminating evidence, which she could not prove because of a missing witness. The prosecutor, through her comments, attempted to assume the role of a witness. See Waldrop v. State, 424 So.2d 1345, 1347-48 (Ala.Cr.App.1982). THE MOTION FOR MISTRIAL The general rule is stated in Ex parte Marek, 556 So.2d 375, 379 (Ala.1989): "If a litigant points out an alleged error and asks for such drastic relief as a mistrial, then the litigant is certainly `objecting' to the question or line of questioning made the basis of the motion for the mistrial.... "... [W]hen a litigant makes a motion for a mistrial immediately after the question or questions are asked that are the grounds made the basis of the motion for the mistrial, and the grounds for the motion are clear and definite, then the motion for mistrial will preserve for review lesser prayers for relief, such as an objection or motion to strike. We make this holding because, as we stated earlier, a litigant who requests such drastic relief as a mistrial implicitly requests lesser relief that is proper, in case the greater relief is denied or is found to be improper." "Marek indicates that a motion for mistrial compensates for the lack of an objection or *127 motion to strike as long as the motion for mistrial follows immediately after the offending question." Robinson v. State, 584 So.2d 533, 538 (Ala.Cr.App.) (emphasis in original), cert. quashed, 584 So.2d 542 (Ala. 1991). There is no requirement that in making a motion for a mistrial, defense counsel include a request for instructions to disregard. "Furthermore, it should be noted that a requirement that the defendant requests the Court to instruct the jury to disregard the prosecutor's statement could be construed to constitute a waiver of his motion for a mistrial because of the antithesis of the two conflicting requests. The motion for a mistrial proceeds on the premise of the ineradicable nature of the remarks. A request for instructions, on the other hand, concedes that the trial [c]ourt, by appropriate charge, may disabuse the jurors' minds of any prejudicial effect of such statements and allow the defendant to receive a fair trial. It is at least arguable that unless alternatively made, or so separated by time as to constitute separate motions, a request for the latter (instruction to disregard) could be said to waive the former (motion for mistrial)." Stennett v. State, 340 So.2d 65, 67 (Ala. 1976). However, here defense counsel made only two objections and two requests for a mistrial. Defense counsel's only grounds of objection were that the "question [was] insulting" and that the assistant district attorney was "getting back to what Your Honor has already ruled on." Defense counsel never stated any ground for his motion for a mistrial. Defense counsel never stated a ground for his requests for a mistrial. Although defense counsel never stated the ground of objection raised on appeal, it is obvious that the trial court perceived the impropriety of the comments of the prosecutor. Indeed, it was the trial court that initially and repeatedly informed the prosecutor that she must confine her questions to matters that she could prove. "`Specific objection or motions are generally necessary before the ruling of the trial judge is subject to review, unless the ground is so obvious that the trial court's failure to act constitutes prejudicial error.'" Ex parte Purser, 607 So.2d 301 (Ala.1992). "An objection, of course, should fairly and specifically point out the particular grounds on which an alleged error occurred in order to inform the trial judge of the legal basis of the objection, thereby affording the trial judge an opportunity to reevaluate his or her initial ruling in light of the grounds alleged and to change it, if deemed necessary." Ex parte Webb, 586 So.2d 954, 957 (Ala.1991). It is clear that the trial court understood the basis for the objection. See Felder v. State, 593 So.2d 121, 122-23 (Ala.Cr.App. 1991); Marshall v. State, 570 So.2d 832, 834 (Ala.Cr.App.1990). "[T]he record clearly shows that the trial judge was aware of the objection and the reason counsel was requesting it." Ex parte McCall, 594 So.2d 628, 631 (Ala.1991). See also Ex parte Pettway, 594 So.2d 1196, 1200 (Ala. 1991) ("[i]t is apparent from the colloquy between Pettway's counsel and the court that the court was aware of the substance of the instructions that counsel was requesting, and the reasons why such instructions should be given under the particular facts of his case"). In this case, it was the trial court who aggressively confined the prosecutor to questions for which she could properly establish a factual basis. The trial court sustained defense counsel objections to the prosecutor's improper comments, although it denied the two general motions for mistrial. Defense counsel never requested any curative action. We do not think that the comments of the prosecutor mandated the granting of a mistrial because the remarks of the prosecutor could have been eradicated by the prompt action of the trial court. "`A motion for a mistrial should not be granted where the prejudicial qualities of the comment can be eradicated by action of the trial court.'" Henry v. State, 468 So.2d 896, 901 (Ala.Cr.App.1984), cert. denied, *128 468 So.2d 902 (Ala.1985). Even an improper comment on a defendant's exercise of the right against self-incrimination does not warrant a mistrial "if the trial court sustains an objection to improper remarks and promptly and appropriately instructs the jury of the impropriety of those remarks." Ex parte Wilson, 571 So.2d 1251, 1265 (Ala.1990) (emphasis in original). "[A] motion [for a mistrial] is addressed to the sound discretion of the trial court, and its ruling will not be reversed in the absence of a clear showing of abuse of discretion." Ex parte Jefferson, 473 So.2d 1110, 1114 (Ala.1985), cert. denied, 479 U.S. 922, 107 S.Ct. 328, 93 L.Ed.2d 300 (1986). "A trial judge is allowed the exercise of broad discretion in deciding whether th[e] high degree of necessity [for the granting of a mistrial] is present." Woods v. State, 367 So.2d 982, 984 (Ala.1978). Here, defense counsel never requested curative instructions. Defense counsel never made a motion to exclude or a motion to strike the prosecutor's improper remarks. Even on this appeal it is not argued that the trial court committed reversible error in failing to give curative instructions. The appellant takes an "all or nothing" approach; he was entitled to a mistrial and nothing less. Indeed, had the trial court instructed the jury to disregard the prosecutor's remarks and denied the requested mistrial, the argument on appeal, in all probability, would be that in giving those instructions to disregard the trial court only exacerbated and emphasized the prejudicial effect of the prosecutor's comments. In this case, the real question is not whether the trial court erred in denying the motion for a mistrial, but whether the trial court erred in failing, on its own and without request, to instruct the jury to disregard the improper statements of the prosecutor after sustaining the appellant's objection but denying the request for a mistrial. Without question, instructions to disregard would have been the better practice and are highly encouraged by this Court. "In considering a motion for a mistrial, the trial judge has much discretion. On review, this Court will not reverse the trial court's denial of a motion for a mistrial based on a party's improper statements `unless it affirmatively appears from the entire record that the statements involved were probably prejudicial to the [complaining party]...." Georgia Cas. and Sur. Co. v. White, 582 So.2d 487, 495 (Ala.1991) (emphasis in original). Under the circumstances of this case, the appellant's conviction is not due to be reversed because the trial court, in denying the request for a mistrial, did not, on its own motion, give curative instructions to the jury to disregard the comments of the prosecutor. The trial court sustained the appellant's objections and actively intervened during the course of the trial to prevent the prosecutor from commenting on facts which she could not prove. Although we affirm the judgment of the circuit court we find applicable the comments of the Alabama Supreme Court in Ex parte Farley, 406 So.2d 1050, 1051 (Ala. 1981): "Trial courts are possessed of ample powers to deal with conduct of attorneys who fail to conduct themselves according to high standards of courteous and correct behavior in the trial of cases; the trial courts should not hesitate, in proper instances, to exercise those powers." The judgment of the circuit court is affirmed. AFFIRMED. All Judges concur. NOTES [1] On cross-examination, the appellant testified that he intended to call Smith as a defense witness. There is no indication in the record, other than this statement of the prosecutor, that Smith ever testified that he "could get his mother to Court."
{ "pile_set_name": "FreeLaw" }
Identification of the gene(s) and protein product(s) responsible for Golgi casein kinase activity. Phosphorylation is an important and ubiquitous way for cells to regulate a multitude of functions. The protein Golgi casein kinase (GCK) has been implicated in the phosphorylation of numerous secreted proteins at S-X- E/pS motifs but yet, the gene or genes that give origin to this enzyme is(are) not known. It is speculated that this enzyme is important for the phosphorylation of several enamel extracellular matrix (ECM) proteins such as amelogenin (AMEL), enamelin (ENAM), and ameloblastin (AMBN) which all contain this unique SXE motif. Mutations in these proteins, with the exception of ameloblastin, have been shown to cause amelogenesis imperfecta (AI), or malformation of the enamel. To date only about 50% of the known AI cases have a confirmed genetic cause. This study may demonstrate that GCK is another causative gene of AI, which would increase our understanding of this genetic disease and the formation of dental enamel in general. To date, GCK has only been characterized biochemically. Therefore, the purpose of this study is to identify the primary protein sequence(s) and gene(s) responsible for GCK. This study will also try to determine whether GCK activity preferentially correlates with Golgi membrane or its soluble components as this will affect how the protein could function. Therefore, I hypothesized that GCK activity is localized to the Golgi membrane and that it is responsible for phosphorylating amelogenin. To study this hypothesis the study has two aims: 1) to identify the primary protein sequence(s) and gene(s) responsible for GCK and 2) to determine if GCK activity is membrane associated or a content enzyme activity. This study plans to use rat liver homogenates to purify Golgi fractions using an ultracentrifuge technique and solutions of variable sucrose density. These fractions will be further separated into the Golgi membrane portion and soluble components, which will be analyzed separately. The Golgi fractions will be further purified using high performance liquid chromatography (HPLC) and positive fractions containing GCK will be identified using a radiolabeling assay with 32P and short custom peptides that only GCK can phosphorylate. Active peaks from HPLC will be further fractionated using a PF2D fractionation system and each resulting fraction will be tested phosphorylative capability. Active fractions will be subjected to 2D-gel analysis and resulting spots will be isolated and sequenced. Sequences will be checked using BLAST to identify similar protein and nucleotide sequences among various species, and then the percent sequence identity will be determined. Protein functional domain analyses will be conducted and the GCK unique sequence will be used to generate two anti-peptide antibodies. These antibodies will be used for immunohistochemistry to determine GCK expression patterns in liver sections.
{ "pile_set_name": "NIH ExPorter" }
Country's second 'electropreneur' park to come up in Bhubaneswar The Software Technology Parks of India (STPI) has entered into a pact with India Electronics and Semiconductor Association (IESA), the premier trade body representing the Indian electronic system design and manufacturing (ESDM) sector and International Institute of Information Technology, Bhubaneswar for setting up an electropreneur park in Bhubaneswar. Related Stories No Related Stories Found Widgets Magazine The park, akin to the electropreneur park which has come up in Delhi University, will incubate startups in the ESDM space. The incubation centre will be set up within the premises of STPI's new facility in Bhubaneswar. It aims at achieving the objectives of the ESDM vision outlined in the National Policy on Electronics and other policies. “The park will incubate about 40 start-ups in the ESDM space and will see an investment of Rs 22 crore equally shared by the state and the Centre. STPI is the nodal agency for implementing the project", said an official. A memorandum of understanding (MoU) for the new park was signed by Omkar Rai, director general at STPI, Gopal Krishna Nayak, Director of IIIT, Bhubaneswar and Jitendra Chaddah, vice president of IESA. “This is the second of its kind in the country after the first electropreneur park in University of Delhi. The electropreneur park is aimed at creating products in ESDM sector to meet the requirement indigenously and create products for further exports. With a view to create synergy between both the electrorpeneur parks , we have decided that both the parks will work in a complimentary manner. They will capitalize on the smart lab that we have in Bangalore and another we are going to establish in Bhubaneswar itself", said Rai. Start-ups under verticals- energy, education and industrial automation and process control will be given focus at the centre. To promote the successful startups or incubatees of the proposed ESDM incubation centre, it is envisaged to offer preferential allotment in Electronic Manufacturing Cluster on the outskirts of Bhubaneswar. The Odisha government has taken a host of measures- preparation of road map for the hardware industry and characterization lab for chip testing to attract investments in the ESDM sector. The ESDM sector, as per a strategic roadmap, is poised to generate cumulative revenue of Rs 18,800 crore in Odisha by 2024. The report said, investments of Rs 7,340 crore need to be pumped into the sector in three phases to realise the projected revenue and employment generation for around 60,000 people. Khurda, Rayagada, Sundergarh, Balasore and Ganjam districts are identified as the potential areas for setting up of ESDM projects. In addition, the Information and Communication Technology Policy-2014, promises sops for the promotion of ESDM units.
{ "pile_set_name": "Pile-CC" }
Robert W. MacVicar Robert William MacVicar (1918–1998) was a professor of chemistry, the chancellor of Southern Illinois University, and the president of Oregon State University between 1970 and 1984. Biography Early years Robert W. MacVicar was born in Princeton, Minnesota, on September 28, 1918. Academic career MacVicar was a student of chemistry at the University of Wyoming, graduating from there in 1939. Upon graduation, MacVicar was awarded a Rhodes scholarship, but it proved impossible for him to attend due to the outbreak of World War II in Europe. Instead, MacVicar enrolled and Oklahoma State University in Stillwater, Oklahoma, where he continued his chemistry studies. MacVicar obtained his Master of Science in 1940 from Oklahoma State, authoring a thesis entitled "The Effect of Adrenaline Injections on the Chloride and Phosphorus Distribution of the Blood" en route to obtaining his degree. MacVicar spent the duration of the war as an officer in the United States Army. He left military service as a colonel in the U.S. Army Air Corps. Following the conclusion of the war, MacVicar moved to Madison to attend the University of Wisconsin–Madison, from which he obtained a PhD in biochemistry in 1946. MacVicar's dissertation was entitled "The Boron Metabolism of Plants" and included material which he had been able to publish in the American Potato Journal and Botanical Gazette. With degree in hand, MacVicar returned to Stillwater to take a position as an assistant professor of agricultural chemistry research and chemistry, later gaining promotion to a full professorship. He remained at Oklahoma State until 1964. Administrative career Concurrently with his professorship at Oklahoma State, MacVicar became involved in school administration, taking on the role of dean of the graduate school in 1953. He continued to serve in that capacity until his departure from Stillwater in 1964. From 1957 he also served as vice president for academic affairs. In 1968, MacVicar was named chancellor of Southern Illinois University, located in the town of Carbondale in the state's downstate coal mining country. MacVicar remained there until 1970, when he came west to Corvallis, Oregon, to assume a post as the 15th president of Oregon State University. MacVicar remained as head of Oregon State until his retirement in 1984, during which time the campus was expanded with the addition of 23 new buildings. Under MacVicar's watch the total number of faculty at OSU expanded from 1,766 to 2,247, while the school's budget tripled. After his retirement, he was named professor emeritus of chemistry and president emeritus, special assistant to the chancellor. He also served as acting president of the College of Ganado, a small college in Arizona, for seven months in 1985. Death and legacy Following his retirement, MacVicar was awarded the title professor emeritus of chemistry as well as president emeritus and special assistant to the chancellor. MacVicar remained active in the Corvallis community and put his networking skills to use establishing a fund-raising program on behalf of the College of Ganado, located on a Navajo reservation in northeastern Arizona. MacVicar died on December 26, 1998. He was 80 years old at the time of his death. Over the course of his career, MacVicar published over 135 papers, reports and articles. His papers are held by Oregon State University Archives in Corvallis. Footnotes Works Feeding Trials with Mineral and Protein Supplements for Two-and Three-Year-Old Steers Wintering on Dry Grass. With Oscar Burr Ross and D.F. Stephens. Stillwater, OK: Oklahoma Agricultural Experiment Station, 1950. Science is Everybody's Business. Oklahoma City, OK: United Founders Life Insurance Co., n.d. [1960]. Vitamin A Studies with Beef Cattle: A Summary of Experimental Studies Conducted at Oklahoma State University, 1946–1959. With L.S. Pope and Frank H. Baker. Stillwater, OK: Oklahoma Agricultural Experiment Station, 1961. External links "Guide to the Robert W. MacVicar Papers 1942-1995," Oregon State University Archives, Valley Library, Corvallis, OR. "Guide to the President's Office Photographs, 1923-1998," Oregon State University Archives, Valley Library, Corvallis, OR. Category:1918 births Category:1998 deaths Category:University of Wyoming alumni Category:Oklahoma State University alumni Category:University of Wisconsin–Madison alumni Category:Southern Illinois University Carbondale faculty Category:Presidents of Oregon State University Category:People from Princeton, Minnesota
{ "pile_set_name": "Wikipedia (en)" }
Background {#Sec1} ========== Along with high proportions of other fatty acids from plants, polyunsaturated fatty acids (PUFAs) such as cis-9,12-octadecadienoic acid (linoleic acid; LA) and cis-9,12,15-octadecatrienoic acid (α-linolenic acid; ALA) are essential to human health. These PUFAs are used to produce cis-6,9,12-octadecatrienoic acid (γ-linolenic acid; GLA) and cis-6,9,12,15-octadecatrienoic acid (stearidonic acid; SDA), which are health-promoting molecules as well as serving as precursors for the very long chain polyunsaturated fatty acids (VLCPUFAs) found in algae, fungi and vertebrates, including fish and human. GLA is an omega-6 fatty acid that acts as an anti-inflammatory agent and relieves skin problems, such as atopy \[[@CR1], [@CR2]\]. SDA is an omega-3 fatty acid that serves a precursor for other omega-3 fatty acids such as cis-5,8,11,14,17-eicosapentaenoic acid (EPA) and cis-4,7,10,13,16,19-docosahexaenoic acid (DHA), a representative ω-3 VLCPUFAs. In humans, dietary SDA is more efficiently converted to EPA compared to ALA \[[@CR3]\], and SDA therefore provides similar health benefits to humans as ω-3 VLCPUFAs \[[@CR4]\]. In addition, SDA has been characterized as a potent inhibitor of cancer cell growth and an effective molecule against skin inflammation and atopic dermatitis that also prevents hypertriglyceridemia \[[@CR5]\]. As humans can synthesize DHA from either ALA or SDA, it may be beneficial for humans to take in high levels of ALA and/or SDA through their diet. GLA and/or SDA are present in the seed oils of several plant species, such as evening primrose (*Oenothera biennis*) \[[@CR6]\], blackcurrant (*Ribes nigrum*) \[[@CR7]\], *Primula* spp. \[[@CR8]\], *Echium* spp. \[[@CR9]\], hemp (*Cannabis sativa*) \[[@CR10]\] and Boraginaceae plants \[[@CR11]\], including borage (*Borago officinalis*). However, these wild plants do not produce large amounts of oil, and they produce only low levels of GLA and SDA. Consequentially, GLA- and SDA-containing health foods are rather expensive. GLA and SDA are converted from LA and ALA, respectively, through desaturation at the sixth carbon, a process catalyzed by Δ6 desaturase (D6DES). Fungal D6DES can also convert oleic acid to C18:2Δ^6,9^ \[[@CR12], [@CR13]\], and ALA-specific D6DES from *Primula* spp. synthesizes only SDA \[[@CR14], [@CR15]\]. The *D6DES* gene, which was first identified in a cyanobacterium \[[@CR16]\], encodes a divergent form of the sphingolipid Δ8-desaturase \[[@CR17]\]. Subsequently, *D6DES* genes have been identified in bacteria, algae, fungi, mosses, vertebrates and several plant species \[[@CR18]\]. Fatty acid desaturases involved in the synthesis of VLCPUFA, including D6DES, are "front-end" desaturases that contain a cytochrome *b5* (cyb5) domain at their N-termini, which is essential for fatty acid desaturation \[[@CR19]--[@CR21]\]. Perilla (*Perilla frutescens var. frutescens*) is an annual herbaceous plant belonging to the mint family, Lamiaceae. Perilla has been widely cultivated as an oilseed crop and leaf vegetable in East Asia. Perilla seed oil is used as both an edible and an industrial crop in products such as paint, varnish and ink \[[@CR22]\]. Perilla seeds comprise 35--45% oil and accumulate one of the highest proportions of ALA (54--64%) in the plant kingdom \[[@CR22]\]. The mechanism underlying the production of high levels of ALA is of interest, and thus, transcriptome analysis has been performed to identify perilla genes involved in ALA bisoynthesis and accumulation \[[@CR23]\]. PUFAs represent approximately 80% of the total fatty acid composition in perilla seeds, which could confer health benefits for humans \[[@CR24]\]. We therefore hypothesized that if perilla were transformed with the *D6DES* gene, it would produce high amounts of GLA and/or SDA and serve as a feasible resource for large-scale GLA and/or SDA production. Furthermore, the seeds from these transgenic crops could potentially be used for effective, large-scale production of EPA or DHA. In this study, we confirmed that D6DES from the fungus *Phytophthora citrophthora* synthesizes GLA and SDA from LA and ALA, respectively, in budding yeast. We further revealed that transgenic perilla seeds expressing *PcD6DES* produced very high levels of GLA and SDA, with each accounting for over 20% of the seed oil content. Our results indicate that *PcD6DES* and perilla are an effective gene and host combination that could be utilized to efficiently produce GLA and SDA. Methods {#Sec2} ======= Plant material {#Sec3} -------------- *Perilla frutescens var. frutescens* cv. Yeobsil was grown in a greenhouse and the seeds were harvested for transformation. The seeds were surface sterilized in 70% (*v*/v) ethanol for 1 min, followed by 4-fold diluted commercial bleach for 20 min, washed three times with sterile distilled water and immersed in sterile distilled water for 2 h at room temperature. After brief drying on sterile filter paper, the seeds were placed on Murashige and Skoog (MS) basal medium \[[@CR25]\] supplemented with 30 g/L sucrose and 0.4% (*w*/*v*) Phytagel (Sigma, USA) with the pH adjusted to 5.8 before autoclaving. Surface sterilized seeds were germinated in a culture room at 28 °C under a 16 h:8 h (light: dark) photoperiod. Gene cloning {#Sec4} ------------ The *D6DES* gene was cloned from *P. citrophthora* (KACC 40188), which was obtained from the National Agrobiodiversity Center, National Institute of Agricultural Science, RDA, Republic of Korea. Total RNA was extracted from *P. citrophthora* for *D6DES* gene cloning. First-strand cDNA was synthesized from total RNA using a PrimeScript™ 1st strand cDNA Synthesis Kit (Takara, Japan) following the manufacturer's protocol. Degenerate PCR and 5′−/3′-RACE PCR were used for cloning. Primer sequences for degenerate PCR were designed based on consensus sequences of *D6DES* from the fungus *Mucor circinelloides* and *Rhizopus stolonifera* var. *stolonifer*. Degenerate PCR was performed at 94 °C for 5 min, followed by 30 cycles of 94 °C for 20 s, 54 °C for 30 s and 72 °C for 1 min, with an additional extension at 72 °C for 5 min. PCR amplification was performed with the degenerate primers using Ex Taq polymerase (Takara, Japan). RACE PCR was performed using a SMART RACE cDNA Amplification Kit (Clontech, USA) following the manufacturer's protocol. The *D6DES* gene from *P. citrophthora* (*PcD6DES*) was registered in GenBank NCBI under Accession No. DQ836059. Primers used in these procedures are listed in Additional file [1](#MOESM1){ref-type="media"}: Table S1. Vector construction {#Sec5} ------------------- To confirm the function of *PcD6DES* in budding yeast (*Saccharomyces cerevisiae*), the *PcD6DES* gene was subcloned in between the *Hin*dIII and *Bam*HI sites of the pYES2/CT vector (Invitrogen, USA) harboring the galactose-inducible *GAL1* promoter and *URA3* gene. The complete vector was named pYES2-*PcD6DES*. The process used to transform and express the *PcD6DES* gene in perilla was as follows: the pVicOCS vector containing the seed-specific *vicilin* promoter and *octopine synthase III* (*OCSIII*) terminator was digested with *Bam*HI and *Hin*dIII, and the ORF of *PcD6DES* was inserted between the *vicilin* promoter and *OCSIII* terminator. The vicilin promoter-*PcD6DES*-OCSIII terminator cassette was inserted into the multiple cloning site of pCAMBIA3300. The complete vector was named pCAMBIA-*PcD6DES*. The destination vectors used in this study are shown in Additional file [2](#MOESM2){ref-type="media"}: Figure S1. Phylogenetic and transmembrane domain analysis {#Sec6} ---------------------------------------------- The sequences of *D6DES* genes registered in GenBank were collected by carrying out BLASTN with the *PcD6DES* gene sequence as a query. The phylogenetic relationship of these *D6DES* genes was analyzed using DNASTAR MegAlign (Ver. 7.2.1) via the ClustalW method. A phylogenetic tree was constructed from the alignment data using TreeView (Ver. 1.6.6). The transmembrane domain was predicted with TOPCONS (<http://topcons.cbr.su.se/>). Yeast transformation and culture {#Sec7} -------------------------------- *Saccharomyces cerevisiae* INVSc1 (Invitrogen, USA) was used for the expression of *PcD6DES* and subsequent production of GLA and SDA. Yeast transformation was carried out in accordance with the manufacturer's protocol. Yeast culture and induction of *PcD6DES* were performed as follows: Yeast cells containing pYES2-*PcD6DES* were cultured in uracil-deficient medium containing with 2% raffinose and 1% Tergitol NP-40 at 30 °C. At O.D~600~ = 0.5--0.6, 0.5 mM of the substrates LA and ALA with 2% galactose as an inducer were added to the culture, followed incubation for 3 days at 20 °C. Perilla transformation {#Sec8} ---------------------- Perilla transformation was performed as described by Kim et al. \[[@CR26]\] with slight modifications. *Agrobacterium tumefaciens* strain EHA105 harboring pCAMBIA-*PcD6DES* was inoculated in Luria Bertani broth containing 50 mg/L kanamycin and 50 mg/L rifampicin and cultured at 28 °C overnight. The cells were harvested and resuspended in liquid MS basal medium. Hypocotyl pieces 0.5 to 1 cm in length were excised from in vitro-grown seedlings and inoculated with *Agrobacterium* solution for 1 h. After brief blotting with sterile filter paper, the explants were transferred to MS basal medium supplemented with 30 g/L sucrose and 0.4% Phytagel and co-cultured for 2 days at 26 °C in the dark. After co-culture, the explants were transferred to fresh MS medium supplemented with 30 g/L sucrose, 3.0 mg/L benzyladenine, 0.01 mg/L naphthaleneacetic acid, 2 mg/L phosphinothricin, 400 mg/L carbenicillin and 0.4% Phytagel. The explants were subcultured every two weeks for 8 weeks. The shoots that regenerated on the explants were excised and transferred to fresh selective MS basal medium for shoot elongation. The elongated shoots were transferred to half-strength MS basal medium for rooting. When whole plants had formed, they were acclimated on commercial soil in an airtight container for 1 week and transferred to the greenhouse. Fatty acid composition analysis and the determination of seed oil content {#Sec9} ------------------------------------------------------------------------- Fatty acid extraction and FAME preparation in yeast cells were followed slightly modified version of method by Kim et al. \[[@CR27]\]. Yeast cells were centrifuged, resuspended in 1 volume of distilled water to remove residual fatty acids (LA and ALA), harvested and lyophilized for 48 h. Lipids of freeze-dried yeast cells with 0.5 mg pentadecanoic acid were extracted with 5 mL extraction solution (chloroform: methanol = 2:1, *v*/v) via sonication at room temperature. Five milliliters of 0.58% NaCl solution was added to the mixture and centrifuged at 2000 rpm for 10 min. The supernatant was discarded and the lower phase was dried under a flow of nitrogen. Toluene (0.5 mL) and 0.5 N NaOH in methanol were added to the dried samples, and the transmethylation mixture was reacted in boiling water for 3 min. After cooling, 2 N BF~3~ in methanol was added to the mixture, which was reacted once more for 5 min. Ten milliliters of distilled water and 10 mL petroleum ether were added to the sample, followed by centrifugation. The supernatant containing fatty acid methyl esters (FAMEs) was collected for gas chromatography (GC) analysis performed on a HP 5890 (Agilent, USA) with flame ionization detector (FID) and 25 m × 0.2 mm (inner diameter) HP 20 M from 180 °C to 200 °C at 1 °C/min. Perilla seeds were weighed and crushed with a metal stick in a glass tube. A mixture of LA (Sigma, St. Louis, MO, USA), GLA (Matreya, PA, USA), ALA (Sigma, St. Louis, MO, USA) and SDA (Santa Cruz Biotechnology, CA, USA) was used as an external standard. Seed samples and the external standard were transmethylated at 85 °C for 90 min in 0.3 mL of toluene and 1 mL of 5% H~2~SO~4~ (*v*/v) in methanol. Pentadecanoic acid (100 μg) was added to each sample as an internal standard. After transmethylation, 1.5 mL of 0.9% NaCl solution was added to the sample and the FAMEs were transferred to a new tube after extracting the sample three times with 1.5 mL of n-hexane. The FAMEs were analyzed by GC-2010 plus (Shimadzu, Japan) GC with FID and a 30 m × 0.25 mm (inner diameter) HP-FFAP column (Agilent, USA) while increasing the oven temperature from 190 °C to 230 °C at 3 °C/min. Nitrogen was used as the carrier gas in both cases for fatty acid analysis. Seed oil contents were determined based on the results by fatty acid analyses. The formula for seed oil content is as follows. Seed oil content = (Total peak area of all seed fatty acids except internal standard)\*(mass of internal standard)/(peak area of internal standard). GC-TOF MS analysis {#Sec10} ------------------ Each FAME sample (1 μL) was injected into the Agilent 7890A GC with an Agilent 7683B autosampler (Agilent, Atlanta, GA, USA) with a split ratio of 25 and separated in a 30 m × 0.25 mm I.D. fused-silica capillary column coated with 0.25 μm CP-SIL 8 CB Low Bleed (Varian Inc., Palo Alto, CA, USA). The injector temperature was 230 °C. The helium gas flow rate through the column was 1.0 mL/min. The temperature program was as follows: starting temperature 80 °C, maintained for 2 min, followed by an increase to 320 °C at 15 °C/min and a 10 min hold at 320 °C. The transfer line and ion-source temperatures were 250 and 200 °C, respectively. The scanned mass range was 85--600 *m/z*, and the detector voltage was set at 1700 V. Thin layer chromatography (TLC) {#Sec11} ------------------------------- Lipid extraction and TLC were performed based on Kim et al. \[[@CR28]\]. Briefly, lipids were extracted with extraction solution (chloroform: methanol = 2:1, *v*/v) from ground perilla seeds and spotted onto silica gel G60 plates (Merck Millipore, USA). Lipid samples were separated using developing solvent (hexane: diethylether: acetic acid = 70:30:1, v/v/v) in a TLC developing tank for 50 min at room temperature. The silica gel plate was removed from the TLC developing tank and sprayed with 0.1% primuline (Sigma, St. Louis, MO, USA) in 80% acetone. Lipid spots were visualized on an ultraviolet transilluminator. A large spot at the top (TAG), two small spots in the middle (diacylglycerol) and two small spots around the baseline (polar lipids) were scraped off the TLC plate with a scalpel and subjected to fatty acid analysis. RT-PCR and quantitative RT-PCR {#Sec12} ------------------------------ Total RNAs of yeast cells and perilla tissues were extracted with RNeasy Mini kit and RNeasy Plant Mini kit (Qiagen, USA), respectively. First-strand cDNA was synthesized using RNA to cDNA EcoDry Premix (Clontech, USA) following the manufacturer's protocol. RT-PCR was carried out using ExTaq DNA polymerase (Takara, Japan) and 1 μg first-strand cDNA from yeast RNA as a template. The PCR conditions were as follows: 94 °C for 3 min, 30 cycles of 94 °C for 20 s, 55 °C for 20 s and 72 °C for 80 s, and additional extension at 72 °C for 5 min. Quantitative RT-PCR was carried out with SYBR premix Ex Taq II (Tli RNaseH plus; Takara, Japan), and first-strand cDNA diluted 20-fold was used as template for PCR on a StepOnePlus Real-Time PCR System (Applied Biosystems, USA). The PCR conditions were as follows: 94 °C for 30 s, 40 cycles of 94 °C for 5 s, 55 °C for 20 s and 72 °C for 20 s, and an additional cycle of 94 °C for 15 s, 55 °C for 1 min, and finally, after increasing the temperature at 0.5 °C/min, 94 °C for 15 s. Quantitation was performed using StepOne software ver. 2.3 (Applied Biosystems, USA), employing perilla *β-actin* as a reference gene. Primers were designed with the GenScript website for real-time PCR primer design to generate approximately 200 bp amplicons with a 55 °C melting temperature (<https://www.genscript.com/ssl-bin/app/primer>). Primers for qRT-PCR are listed in Additional file [1](#MOESM1){ref-type="media"}: Table S1. Results {#Sec13} ======= *PcD6DES* gene cloning and sequence analysis {#Sec14} -------------------------------------------- We began by cloning the full-length *PcD6DES* mRNA, which was 1529 bp with a 1371 bp sequence encoding 456 aa. Residues 11 to 81 were predicted to form a cyb5 domain, which is characteristic of front-end desaturases (Fig. [1](#Fig1){ref-type="fig"}) \[[@CR20]\]. In addition to the cyb5 domain, fatty acid desaturases contain the heme-binding motif HPGG-X~8~-G-X~6~-F-X~3--6~-H known as HPGG \[[@CR19]\]. *PcD6DES* encodes a protein with an HPGG motif at 42--45 aa, with the sequence HPGG-X~7~-G-X~6~-F-X~3~-H, in the cyb5 domain. In addition, PcD6DES has three histidine boxes (His boxes): HDVLHH, HNFHH and QIEHH. His boxes are the most important characteristics of fatty acid desaturases, as they determine their desaturase function \[[@CR29], [@CR30]\]. The His boxes of common fatty acid desaturases have the sequences HXXXH, HXXHH and HXXHH. Importantly, the third His box of the front end desaturase has the sequence QXXHH, and it appears that the Q residue mediates desaturase function \[[@CR30]\]. The sequences of the His boxes of PcD6DES (HDVLHH, HNFHH and QIEHH) are consistent with the conserved His box motifs HXXXH, HXXHH and QXXHH of D6DES (Fig. [1](#Fig1){ref-type="fig"}) \[[@CR30]\]. Finally, most membrane-bound fatty acid desaturases have four to six transmembrane domains (TMs) \[[@CR31]--[@CR33]\], and PcD6DES was predicted to have six TM domains (Fig. [1](#Fig1){ref-type="fig"}, Additional file [2](#MOESM2){ref-type="media"}: Figure S2). TM1 to TM6 were predicted to be located sequentially at 128--148 aa, 153--173 aa, 191--211 aa, 267--287 aa, 305--325 aa and 328--348 aa (Fig. [1](#Fig1){ref-type="fig"}, Additional file [2](#MOESM2){ref-type="media"}: Figure S2).The TMs patterns of of PcD6DES, evening primrose D6DES, perilla FAD2 are very similar to among them (Additional file [2](#MOESM2){ref-type="media"}: Figure S2).Fig. 1Nucleotide and deduced amino acid sequences of the *PcD6DES* gene. Lowercase italics and capital letters indicate 5′/3′-untranslated region and coding sequence, respectively. Bold capital letters represent amino acid residues. The cytochrome *b5* domain (the main characteristic of a front-end desaturase) is underlined. Thick underline indicates the heme-binding motif, HPGG. Gray and white boxes indicate the transmembrane domain and histidine box, respectively. Asterisk indicates the translation termination sequence Phylogenetic analysis {#Sec15} --------------------- We performed phylogenetic analysis of D6DES peptide sequences from 25 species belonging to the Protista, Fungi, Plantae and Animalia kingdoms (Fig. [2](#Fig2){ref-type="fig"}). The D6DES sequences formed groups within each kingdom. The identity between PcD6DES (DQ3605) and PinD6DES (JF910287), which were the first and second reported D6DES in the *Phytophthora* genus, respectively, was 90.8%. However, the identity between PcD6DES and other fungal D6DES proteins was at most 64.1%. Furthermore, for the Fungi and Protista, the identities among deduced amino acids of *D6DES* genes were low (38.2 and 55.2%, respectively).Fig. 2Phylogenetic analysis of the deduced amino acid sequences of *D6DES* genes from various organisms. D6DES from microalgae (Protista), fungi (Fungi), plants (Plantae) and vertebrates (Animalia) are separately grouped by kingdom. Letters and numbers represent GenBank accession numbers. The origin of each D6DES is as follows: AF126798, *Mus musculus*; AF419296, *Pythium irregulare*; AY08239, *Phaeodactylum tricornutum*; AY234125, *Primula farinosa*; AY63057, *Glossomastix chrysoplasta*; AY952780, *Echium plantagineum*; BC123735, *Bos taurus*; DQ177498, *Cunninghamella echinulata*; DQ83605, *Phytophthora citrophthora*; EF413025, *Mortierella alpina*; EF636888, *Gallus gallus*; EU416278, *Oenothera biennis*; GQ162822, *Sparus aurata*; GU198926, *Ribes nigrum*; GU237486, *Echium amoenum*; GU390532, *Parietochloris incisa*; JF910287, *Phytophthora infestans*; KC817461, *Pythium aphanidermatum*; KP874952, *Umbelopsis isabellina*; KX584737, *Mortierella alpina*; KY214451, *Nannochloropsis oceanica*; NM_001093384, *Xenopus laevis*; NM_004265, *Homo sapiens*; U79010, *Borago officinalis*; XM_008589390, *Galeopterus variegatus*. Open box indicates PcD6DES. Sequences were aligned using DNASTAR MegAlign (Ver. 8.1.4) with the ClustalW method. The phylogenetic tree was generated using TreeView (Ver. 1.6.6) with the aligned data. Scale bar indicates 0.1 amino acid substitution per site Functional analysis in *Saccharomyces cerevisiae* {#Sec16} ------------------------------------------------- We compared the fatty acid composition between the control yeast strain and pYES2-*PcD6DES* yeast to investigate the production of SDA and GLA and confirm PcD6DES function. Above all, the expression of *PcD6DES* in transformed yeast cells was confirmed using RT-PCR (Additional file [2](#MOESM2){ref-type="media"}: Figure S3). Yeast harboring the pYES2 empty vector, which served as a control, only produced hexadecanoic acid (palmitic acid; C16:0), cis-9-hexadecanoic acid (palmitoleic acid; C16:1Δ^9^), octadecanoic acid (stearic acid; C18:0) and cis-9-octadecenoic acid (oleic acid; C18:1Δ^9^). Furthermore, when provided with LA, this control yeast strain did not produce any other fatty acids. However, pYES2-*PcD6DES* yeast supplemented with LA produced GLA. In addition, pYES2-*PcD6DES* yeast supplied with LA and ALA synthesized SDA as well as GLA (Table [1](#Tab1){ref-type="table"}). These results demonstrate that the *PcD6DES* gene encodes a protein that can convert LA and ALA to GLA and SDA, respectively, in yeast.Table 1Fatty acid composition of pYES2-*PcD6DES* yeast cultured in medium containing fatty acid substrates. Trace indicates below 0.1 mole%. Data represent mole% of fatty acid methyl esters. Experiments were carried out in triplicate, and the mean values are displayedFatty acidpYES2pYES2-*PcD6DES*-+LA+LA+LA and ALAC16:017.418.120.715.9C16:1Δ^9^41.215.215.86.8C16:2Δ^6,9^\--3.10.6C18:07.27.17.97.7C18:1Δ^9^34.213.815.88.3C18:2Δ^6,9^\--tracetraceLA-45.825.121.5GLA\--11.65.3ALA\-\--25.1SDA\-\--8.8Conversion rate (%)\--26.421.6Saturated FA: unsaturated FA1:3.071:2.971:2.501:3.24 We also analyzed the conversion rate of products by PcD6DES. In the case of pYES2-*PcD6DES* supplied with LA, the conversion rate of GLA was 11.6/(25.1 + 11.6) = 31.6%, putative C16:2Δ^6,9^ was 3.1/(15.8 + 3.1) = 16.4% and the total conversion rate was 26.4% (Table [1](#Tab1){ref-type="table"}). In the case of pYES2-*PcD6DES* supplied with both LA and ALA, the conversion rate of GLA was 5.3/(21.5 + 5.3) = 19.8%, SDA was 8.8/(25.1 + 8.8) = 26.0%, putative C16:2Δ^6,9^ was 0.6/(6.8 + 0.6) = 8.1% and the total conversion rate was 21.6% (Table [1](#Tab1){ref-type="table"}). The ratios of saturated fatty acids to unsaturated fatty acids were not significantly different in yeast cultures supplemented with LA and/or ALA and without LA and/or ALA (Table [1](#Tab1){ref-type="table"}). A putative cis-6,9-octadecadienoic acid (C16:2Δ^6,9^) peak was detected in the samples and putative C18:2Δ^6,9^ was also detected, but at a much lower proportion than C16:2Δ^6,9^ (Table [1](#Tab1){ref-type="table"}). Fatty acid analysis and segregation ratio of transgenic perilla {#Sec17} --------------------------------------------------------------- Five T~0~ *PcD6DES* transgenic perilla plants (PD6Ds) were obtained by *Agrobacterium*-mediated transformation. The transformants were confirmed by PCR of the *PcD6DES* gene and phosphinothricin acetyltransferase gene, which confers resistance to the herbicide Basta (Bayer Crop Science, Republic of Korea). We analyzed the fatty acid compositions of the T~2~ PD6D seeds from two T~1~ PD6Ds of each line (Table [2](#Tab2){ref-type="table"}). Three new peaks, which were absent in Yeobsil, appeared in the chromatogram from PD6D seeds (Fig. [3](#Fig3){ref-type="fig"}). The retention times of two peaks of them, located earlier and later than that of ALA, are the same as that of GLA and SDA in the external standard, respectively (Fig. [3](#Fig3){ref-type="fig"}). The remaining new peak that appeared in front of the LA peak was putative C18:2Δ^6,9^, as expected (Fig. [3](#Fig3){ref-type="fig"}), as this compound is found in some fungi (Table [2](#Tab2){ref-type="table"}) \[[@CR12], [@CR13]\]. In transgenic PD6D plants, the proportions of GLA, SDA and putative C18:2Δ^6,9^ increased while the proportions of oleic acid, LA and ALA decreased. In particular, the ALA content was significantly reduced in PD6D, likely due to GLA and SDA synthesis expending their respective substrates LA and ALA. Oleic acid content decreased in PD6D compared with Yeobsil (Table [2](#Tab2){ref-type="table"}), likely as a consequence of increasing PUFA content. There were two types of T~1~ PD6Ds whose T~2~ seeds contained over 46% or 28--35% GLA and SDA content in seed oil, respectively. We hypothesized that the variance resulted from the difference in *PcD6DES* gene expression levels between the homozygote and hemizygote. To measure the segregation ratio, we treated 40--50 T~1~ seedlings with 0.3% Basta and investigated the segregation ratios of the progenies of four T~0~ PD6D lines. All four T~1~ perilla lines segregated at a ratio of 3:1 (Additional file [1](#MOESM1){ref-type="media"}: Table S2).Table 2Fatty acid composition of mature *D6DES* T~2~ perilla (PD6D) seeds. Data represent mole% of fatty acid methyl esters. Experiments were performed in triplicate, and the mean values are givenFatty acidYeobsilPD6D 1-1PD6D 1-3PD6D 2-1PD6D 2-3PD6D 3-1PD6D 3-3PD6D 4-1PD6D 4-3C16:07.77.37.17.27.27.37.67.57.3C18:02.42.62.62.32.42.72.72.42.2C18:1Δ^9^18.515.714.412.914.714.213.313.712.6C18:2Δ^6,9^-1.62.00.71.81.11.71.80.6LA11.59.38.19.88.610.47.77.211.6GLA-16.724.915.924.616.824.824.414.2ALA60.129.920.832.821.030.221.021.537.6SDA-16.920.218.519.717.421.121.513.8D6DES products-35.147.035.146.135.347.647.728.7Fig. 3Chromatogram of *PcD6DES* perilla analyzed by GC. External standard for the mixture of LA, GLA, ALA and SDA was transmethylated. Yeobsil perilla seeds contain common fatty acids C16:0, C18:0, C18:1Δ^9^, LA and ALA. *PcD6D* transgenic perilla seeds contain C18:2Δ^6,9^, GLA and SDA, which are absent in Yeobsil Confirmation of the putative C18:2Δ^6,9^ peak {#Sec18} --------------------------------------------- To confirm the identity of the putative C18:2Δ^6,9^, we analyzed this compound from *PcD6DES* perilla seed oil using Pegasus HT GC-TOF MS (LECO, USA). LA and C18:2Δ^6,9^ are isomers whose double bond positions differ from each other. In the GC-TOF MS results, two slightly different peaks and mass spectra were observed (Fig. [4](#Fig4){ref-type="fig"}). In addition, these peaks were identified by matching their mass spectra from the NIST11 and Wiley9 mass libraries. Finally, the peak between the oleic acid and LA peaks was possibly C18:2Δ^6,9^ .Fig. 4Selected-ion chromatogram and mass spectra for LA methyl ester and putative C18:2Δ^6,9^ methyl ester (molecular mass: 294) from *PcD6DES* perilla seed. **a** Selected-ion chromatogram for m/z 294 and (**b**) mass spectra of LA methyl ester and putative C18:2Δ^6,9^ methyl ester as methyl ester derivatives separated on a 30 m\*0.25 mm i.d. fused-silica capillary column coated with 0.25 μm CP-SIL 8 CB Low Bleed *PcD6DES* expression in leaves and developing seeds of transgenic *PcD6DES* perilla {#Sec19} ----------------------------------------------------------------------------------- We performed quantitative RT-PCR (qRT-PCR) to measure the expression levels of *PcD6DES* and other fatty acid desaturase genes in leaves and developing seeds from Yeobsil and PD6D (Fig. [5](#Fig5){ref-type="fig"}). In DS3 of Yeobsil or PD6D 4--1-1, the expression of *fatty acid desaturase 2* gene from *P. frutescens* (*PfFAD2*) and *PfFAD3* was relatively high compared to that of *PfFAD7--1* and *PfFAD7--2*. *PcD6DES* was highly expressed during DS3 of PD6D 4--1-1; however, it was not expressed in Yeobsil at DS3 (Fig. [5a](#Fig5){ref-type="fig"}). In leaves of Yeobsil or PD6D 4--1-1, *PfFAD7--1* and *PfFAD7--2* were expressed at higher levels than *PfFAD2* and *PfFAD3*. *PcD6DES* was expressed at low levels similar to those of *PfFAD2* and *PfFAD3* (Fig. [5b](#Fig5){ref-type="fig"}). *Bar* (Basta resistance) was expressed during DS3 and in leaves of PD6D 4--1-1, but not in either DS3 or leaves of Yeobsil (Fig. [5](#Fig5){ref-type="fig"}a, b). In particular, the expression level of *bar* was much higher (54.7-fold) than that of other genes in PD6D 4--1-1 leaves (Fig. [5](#Fig5){ref-type="fig"}b). We also determined the expression level of *PcD6DES* gene in DS1 to DS4 and leaf. The expression of *PcD6DES* gene in PD6D 4--1-1 was low in DS1 to DS2 and very high in DS3 to DS4 (Fig. [5c](#Fig5){ref-type="fig"}). *PcD6DES* gene was also highly expressed in leaf tissue more than expected. No expression was detected in all Yeobsil samples.Fig. 5Relative expression levels of *PfFAD2*, *PfFAD3*, *PfFAD7--1*, *PfFAD7--2*, *PcD6DES*, and *bar* in (**a**) DS3, (**b**) leaves and (**c**) that of *PcD6DES* in DS1 to DS4 and leaf using quantitative RT-PCR. All experiments were carried out three times, and error bars indicate standard deviation Fatty acid composition in *PcD6DES* transgenic perilla leaves {#Sec20} ------------------------------------------------------------- To investigate the changes in fatty acid composition in PD6D leaves, we analyzed the fatty acid composition of 4-week-old leaves from T~2~ homozygous transgenic plants. Unlike the fatty acid composition of perilla seeds, leaves contained much higher levels of C16 fatty acids and LA but lower levels of oleic acid and ALA (Table [3](#Tab3){ref-type="table"}). Although the expression of *PcD6DES* was driven by the seed-specific vicilin promoter from *Pisum sativum* \[[@CR34]\], GLA and SDA were still synthesized and accumulated in PD6D leaves, albeit at a lower proportion than in seeds (Table [3](#Tab3){ref-type="table"}). PD6D seeds showed similar proportions of fatty acids among PD6D homozygous lines (PD6D \#1--3, \#2--3, \#3--3, \#4--1) (Table [2](#Tab2){ref-type="table"}). However, PD6D leaves exhibited different proportions of the fatty acids LA, GLA and ALA among PD6D homozygous lines, and C18:2Δ^6,9^ was not detected in leaves (Table [3](#Tab3){ref-type="table"}).Table 3Fatty acid composition of leaves from *D6DES* T~2~ perilla (PD6D) and Yeobsil plants. Data represent mole% of fatty acid methyl esters. Experiments were performed in triplicate, and the mean values are shownFatty acidsYeobsilPD6D 1-3-1PD6D 2-3-2PD6D 3-3-2PD6D 4-1-1C16:025.521.522.224.720.4C16:1Δ^3t^3.33.23.23.12.8C16:20.90.50.60.60.4C16:32.53.13.43.73.3C18:03.34.54.34.04.4C18:1Δ^9^4.13.53.64.13.3LA23.014.513.911.39.5GLA-6.08.810.16.7ALA35.737.333.131.942.9SDA-4.25.15.14.9C20:01.81.91.81.61.5*D6DES* products0.010.113.915.211.6Total PUFA62.165.564.862.567.7 Fatty acid composition in developing seeds from *PcD6DES* transgenic perilla {#Sec21} ---------------------------------------------------------------------------- GLA and SDA accumulated to high levels in PD6D mature seeds. We measured GLA and SDA, as well as fatty acids, at different stages of seed development to determine how the compositions of these molecules changed throughout seed development (Table [4](#Tab4){ref-type="table"}). During early seed development in Yeobsil, saturated fatty acid content was relatively high compared to the late stage. In addition, the proportions of LA and GLA were similar. However, as the seeds approached the late stage of development, saturated fatty acid contents became lower and a large proportion of LA was converted to ALA. The fatty acid composition in developing seed stage 1 (DS1) and the mature stage DS4 resembled that of mature perilla leaves. The saturated fatty acid content in PD6D DS1 was almost the same as that in Yeobsil DS1. During late seed development, saturated fatty acid contents were lower and PUFAs contents were higher than at the early stage in both Yeobsil and PD6D.Table 4Fatty acid composition of developing seeds from *PcD6DES* T~2~ perilla (PD6D) and Yeobsil plants. Data represent mole% of fatty acid methyl esters. Experiments were repeated in triplicate, and the mean values are givenFatty acidYeobsilPD6D 4-1-1DS1DS2DS3DS4DS1DS2DS3DS4C16:021.920.412.18.221.819.311.98.0C18:06.26.52.52.16.36.92.62.0C18:1Δ^9^6.05.910.110.75.05.48.811.9C18:2Δ^6.9^\-\-\-\-\--0.30.9LA32.330.419.518.632.728.914.47.8GLA\-\-\--2.23.118.025.4ALA33.736.955.860.430.332.025.322.0SDA\-\-\--1.74.418.722.0 The change in the proportions of PUFA during seed development in Yeobsil and PD6D are shown in Table [4](#Tab4){ref-type="table"} and Fig. [6](#Fig6){ref-type="fig"}. In Yeobsil, the proportions of LA and ALA were similar in DS1, and after DS1, LA levels gradually decreased, whereas ALA levels gradually increased (Table [4](#Tab4){ref-type="table"}, Fig. [6a](#Fig6){ref-type="fig"}). In PD6D seeds, the proportions of fatty acids did not differ from those of Yeobsil in DS1. However, after DS1, the proportion of ALA decreased and SDA increased at the expense of ALA. In addition, the proportion of LA was lower than that of Yeobsil, and GLA appeared to be produced from LA (Table [4](#Tab4){ref-type="table"}, Fig. [6b](#Fig6){ref-type="fig"}). PUFAs were diversified, and the degree of unsaturation became higher in PD6D seeds, which is similar to Yeobsil at all stages of seed development (Fig. [6c](#Fig6){ref-type="fig"}).Fig. 6Changes in the proportion of each PUFA in (**a**) Yeobsil, (**b**) PD6D, and (**c**) changes in the proportion of total PUFAs during seed development Fatty acid analysis of neutral lipids and polar lipids in mature perilla seeds {#Sec22} ------------------------------------------------------------------------------ To investigate the differences in fatty acid compositions of polar lipids and neutral lipids from mature Yeobsil and PD6D (DS4) seeds, we extracted total lipids from the seeds, separated them using TLC (Additional file [2](#MOESM2){ref-type="media"}: Figure S4) and analyzed the fatty acid composition of each lipid using GC. The fatty acid compositions of neutral lipids, TAG, diacylglycerol and polar lipids were analyzed separately. The fatty acid composition of polar lipids in mature Yeobsil DS4 seeds was similar to that at DS1 (Tables [4](#Tab4){ref-type="table"} and [5](#Tab5){ref-type="table"}). The polar lipids from mature PD6D seeds contained more GLA and SDA than those of PD6D DS1 (Table [5](#Tab5){ref-type="table"}). GLA and SDA associated more with neutral lipids than with polar lipids in PD6D but were not detected in Yeobsil seeds.Table 5Fatty acid composition of neutral lipids and polar lipids from mature perilla seeds. Data represent mole% of fatty acid methyl esters. Experiments were repeated in triplicate, and the mean values are presentedPolar lipidsNeutral lipidsYeobsilPD6D 4-1-1YeobsilPD6D 4-1-1C16:020.222.27.87.4C18:07.27.92.32.3C18:1Δ^9^6.89.111.613.3C18:2Δ^6.9^\-\--1.3LA30.119.117.67.2GLA-15.7-25.9ALA35.719.860.821.8SDA-6.2-20.8 Seed weight and seed oil content of transgenic *PcD6DES* perilla {#Sec23} ---------------------------------------------------------------- To investigate the characteristics of transgenic *PcD6DES* perilla seeds compared with Yeobsil seeds, we measured seed weight and oil content. We weighed 100 seeds three times and calculated the average seed weights. The seed weight of Yeobsil was the highest (4.70 mg/seed), and average seed weight of T~2~ perilla seeds was slightly less (4.36 mg/seed; 4.09--4.52 mg/seed) than Yeobsil seeds (Fig. [7a](#Fig7){ref-type="fig"}). The seed weights measured in this study are similar to those reported by Asif \[[@CR22]\]. Meanwhile, the seed oil content showed different trends compared to seed weight. The fatty acid contents in PD6D seeds were 397.6 μg/mg seeds and was similar or 3.3--3.6% higher than that of Yeobsil seeds. The fatty acid contents in PD6D 1--3-1, 3--3-2 and 4--1-1 were 398.9, 410.6 and 411.8 μg/mg seeds, respectively (Fig. [7b](#Fig7){ref-type="fig"}), and the average seed oil content was 407.1 μg/mg seeds. Based on these data, the FAME levels per seed were as follows: Yeobsil, 1.87 mg FAME/seed; PD6D 1--3-1, 1.80 mg FAME/seed; PD6D 3--3-2, 1.84 mg FAME/seed; PD6D 4--4-1, 1.68 mg FAME/seed. The FAME levels per seed in the PD6D lines were almost the same or 89.8% those of Yeobsil seeds. The total seed oil content was approximately 40% in perilla, which is in agreement with the data from Asif \[[@CR22]\] and Shin and Kim \[[@CR24]\]. Compared to Yeobsil, the seed weight of PD6D was slightly lower, but these seeds possessed slightly higher oil contents.Fig. 7Analysis of (**a**) weight and (**b**) oil content of 100 WT perilla and *PcD6DES* perilla seeds. All experiments were performed in triplicate, and error bars indicate standard deviation Discussion {#Sec24} ========== In this study, we characterized PcD6DES, the first D6DES identified in *Phytophthora* spp., and found it to resemble other known fatty acid desaturases. PcD6DES contains cytochrome b5 domain, three histidine boxes and six TM domains (Fig. [1](#Fig1){ref-type="fig"}). Thus, we conclude that *PcD6DES* encodes a protein with characteristics of a 'front-end' fatty acid desaturase. *Saccharomyces cerevisiae* has only one fatty acid desaturase, Ole1p which catalyzes the conversion C16:0 and C18:0 into C16:1Δ^9^ and C18:1Δ^9^, respectively \[[@CR35]\]. Therefore, *S. cerevisiae* contains mainly four kinds of fatty acids, C16:0, C16:1Δ^9^, C18:0 and C18:1Δ^9^. Functional characterization of *PcD6DES* in budding yeast showed PcD6DES produce C16:2Δ^6,9^ and C18:2Δ^6,9^, although the proportion of C18:2Δ^6,9^ was barely detectable (Table [1](#Tab1){ref-type="table"}). This result suggests that PcD6DES might have a weak affinity for monounsaturated fatty acids, including C16:1Δ^9^ and C18:1Δ^9^ (Table [1](#Tab1){ref-type="table"}). The ratios of saturated fatty acids to unsaturated fatty acids did not differ much from those of yeast cultured with LA and/or ALA and without LA and/or ALA. These results likely indicate that fatty acid metabolism is regulated in yeast cells to maintain the appropriate levels of unsaturated fatty acids while they take up unsaturated fatty acids. However, unlike the fatty acid composition of budding yeast expressing *PcD6DES*, we detected C18:2Δ^6,9^ in *PcD6DES* perilla seeds (Fig. [3](#Fig3){ref-type="fig"}). This is likely because perilla seed oil contains little C16:1Δ^9^ and relatively high levels of C18:1Δ^9^, which is consistent with reports describing the detection of C18:2Δ^6,9^ in transgenic oilseed crops expressing a fungal *D6DES* \[[@CR12], [@CR13]\]. The sum of GLA and SDA levels from each progeny of the same T~0~ plant was highly variable (Table [2](#Tab2){ref-type="table"}, Additional file [1](#MOESM1){ref-type="media"}: Table S3). We divided the progenies into those with high and low contents of D6DES product, which we attributed to the presence of the transgene in a homozygous vs. hemizygous state. The results of genotyping by Basta treatment supported this hypothesis (Additional file [1](#MOESM1){ref-type="media"}: Table S3). Under Basta treatment, seedlings of the high GLA and SDA lines (putative homozygous lines) all survived, whereas those of low GLA and SDA lines (putative hemizygous lines) showed a 3:1 segregation ratio (Additional file [1](#MOESM1){ref-type="media"}: Table S3). Therefore, it appears GLA and SDA contents depend on zygosity, with higher levels seen in homozygous plants and lower levels detected in hemizygous plants. *PcD6DES* was expressed and PcD6DES products accumulated not only in seeds but also in leaves of transgenic perilla (Table [3](#Tab3){ref-type="table"}; Fig. [5](#Fig5){ref-type="fig"}), despite *PcD6DES* being expressed from a seed-specific *vicilin* promoter. It is hard to conclude vicilin promoter shows leaky expression pattern because the expression pattern of vicilin promoter from *Pisum sativum* has not been reported. We supposed a few possibilities which results in this phenomenon. First, vicilin promoter from *Pisum sativum* might be originally leaky promoter which is not regulated tightly. Second, when vicilin promoter moved to perilla from pea, it may not be spatially regulated in the same manner as it is in native species. There was a report when the seed-specific promoters from wheat and barley directed the expression of green fluorescence protein, the expression was leaky \[[@CR36]\]. Third, when T-DNA harboring the expression cassette of *PcD6DES* under the control of vicilin promoter was integrated into perilla genome, the spatial regulation of *PcD6DES* expression might be changed by positional effect. Although the expression of the *vicilin* promoter does not appear to be entirely exclusive to seed tissue, the expression of *PcD6DES* was 47.6-fold higher in seeds than in leaves. Seeds contained much higher levels of substrates for PcD6DES (71.6%) than leaves (58.7%) (Tables [2](#Tab2){ref-type="table"} and [3](#Tab3){ref-type="table"}). This difference is likely due to the varied *PcD6DES* expression levels and the differential availability of precursor contents between seeds and leaves. When the borage *D6DES* gene was expressed under the control of the cauliflower mosaic virus 35S promoter in tobacco (*Nicotiana tabacum*), the levels of substrates and products of D6DES were 74.2 and 22.8%, respectively, and the conversion rate was 31.5% \[[@CR20]\]. Meanwhile, in the current study, the levels of substrates and products of D6DES in transgenic perilla leaves were 58.7 and 15.2%, respectively, and the conversion rate was 26.0% (Table [3](#Tab3){ref-type="table"}). This difference is likely because the constitutive 35S promoter drove *D6DES* expression more strongly in leaves than the seed-specific promoter used in the current study, as well as the higher substrate content in tobacco leaves than in perilla leaves. Overall, these results support our findings described above. In the fatty acids of perilla leaves, C16:1Δ^3t^ is produced by FAD4 in chloroplasts \[[@CR37]\]. D6DES can convert C16:1Δ^9^ and C18:1Δ^9^ into C16:2Δ^6,9^ and C18:2Δ^6,9^, respectively, in budding yeast (Fig. [2](#Fig2){ref-type="fig"}). Therefore, C16:1Δ^3t^, not a substrate for D6DES, is not converted into C16:2Δ^6,9^. The fatty acid compositions of DS1 and polar lipids in mature seeds in Yeobsil were similar (Tables [4](#Tab4){ref-type="table"} and [5](#Tab5){ref-type="table"}). Seeds at the early stage of development contain little TAG \[[@CR23]\], instead mainly containing polar lipids. On the contrary, PD6D did not reflect this trend. PcD6DES products are thought to accumulate in polar lipids of mature PD6D seeds during seed development. The fatty acid compositions from DS4 and neutral lipids of mature seeds in both PD6D and Yeobsil were similar (Tables [4](#Tab4){ref-type="table"} and [5](#Tab5){ref-type="table"}), likely because almost all seed oil comprises neutral lipids. Given that polar lipids incorporate more 16:0 at *sn-1* position than TAG \[[@CR38]\], polar lipids and DS1 contains more 16:0 than DS4 and neutral lipids (Tables [4](#Tab4){ref-type="table"} and [5](#Tab5){ref-type="table"}). Severe alteration of 16:0 from DS1 to DS4 was not by D6DES but by the relative proportion change of polar lipids and TAG. SDA of DS4 was gradually increased in PD6D because TAG content of DS4 is higher than earlier stage. TAG contains higher PUFAs than polar lipids in perilla (Table [5](#Tab5){ref-type="table"}). In Table [4](#Tab4){ref-type="table"}, Yeobsil DS4 contains more PUFAs than Yeobsil DS1. Thus, PD6D DS4 contains more GLA and SDA than PD6D earlier stage. The fatty acid composition of polar lipids from mature seeds indicated that GLA and SDA associate with membrane lipids and could not be completely transferred to TAG (Table [5](#Tab5){ref-type="table"}). The levels and patterns of *PfFAD2*, *PfFAD3*, *PfFAD7--1* and *PfFAD7--2* expression coincided with the previous report \[[@CR33]\]. The expression levels of endogenous genes, including *PfFAD2* and *PfFAD3* in DS3 and *PfFAD7--1* and *PfFAD7--2* in leaves, were lower in PD6D than in Yeobsil (Fig. [5](#Fig5){ref-type="fig"}a, b). Perhaps the high expression levels of *PcD6DES* and *bar* genes in DS3 and leaves, respectively, influence the endogenous genes responsible for the synthesis of PUFAs and lowered their expression. The expression level of *PcD6DES* gene in PD6D 4--1-1 is much higher in late stage than early stage (Fig. [5c](#Fig5){ref-type="fig"}). This result is in accordance with the expression of seed storage protein. The PcD6DES products of developing seeds in PD6D 4--1-1 were low in DS1 (3.9%) and DS2 (7.5%) but dramatically increased in DS3 (37.0%) and DS4 (48.3%) (Table [4](#Tab4){ref-type="table"}). The fatty acid analysis of developing seeds in PD6D 4--1-1 is consistent with the expression level of developing seeds in PD6D 4--1-1. The most common omega-3 and omega-6 fatty acids in vegetable oil are ALA and LA, respectively. Notably, these fatty acids are essential for human health. Vegetable oils from oilseed crops such as corn, sunflower, safflower, sesame, cottonseed and soybeans contain high levels of omega-6 fatty acid but little omega-3 fatty acid. If the ratio of omega-3 to omega-6 fatty acids decreases below the recommended 1:4 ratio due to the overconsumption of omega-6 fatty acid oil or cooking food in omega-6 fatty acid, there could be detrimental consequences to health \[[@CR39]\]. Studies have shown that a high intake of omega-6 fatty acids increases blood viscosity, vasospasm and vasoconstriction and decreases bleeding time \[[@CR39]\]. The ratio between omega-3 and omega-6 in PD6D seed oil is 1.35:1, which certainly exceeds the healthy recommended ratio. Moreover, PD6D is more beneficial to health because it can bypass the rate-limiting step from ALA to SDA, allowing SDA to be more efficiently converted to DHA \[[@CR3]\]. In PD6D seed oil, GLA and SDA accumulated to levels of up to 24 and 21%, respectively (Table [2](#Tab2){ref-type="table"}). By contrast, borage seeds contain 20--25% GLA, and evening primrose seeds contain 10% GLA, but they do not contain SDA \[[@CR20]\]. Blackcurrant seeds contain 15.8% GLA and approximately 2% SDA \[[@CR40], [@CR41]\], and hemp seeds contain 3.6% GLA and 2--3% SDA \[[@CR10], [@CR42]\]. Echium seeds contain 11.8% GLA and 13% SDA, which is the highest SDA content in natural land plants \[[@CR43]\]. While the sum of GLA and SDA from the plant seeds described above is up to 25%, PD6D seeds contain a similar amount of GLA to borage and a higher content of SDA than echium (Table [2](#Tab2){ref-type="table"}). The seed weight in perilla measured in the current study (\~ 4 mg) was similar to that measured by Asif \[[@CR22]\]. We detected a seed oil content of approximately 40% in perilla, which is also in agreement with previous results \[[@CR22], [@CR24]\]. Indeed, the introduction of fatty acid desaturase genes such as *D6DES* has not previously been shown to increase seed weight or seed oil content. Furthermore, transgenic plants generally demonstrate poor agronomic performance in traits other than their modified target traits. In *PcD6DES* perilla with the beneficial transgene activity the overall plant phenotype was similar to that of Yeobsil. There have been several reports of transgenic plants accumulating GLA and/or SDA in their seeds via the use of a *D6DES* transgene alone or in tandem with other fatty acid desaturase genes. In an early study, the expression of *D6DES* from cyanobacteria in transgenic tobacco resulted in GLA and SDA accumulation in seed oil \[[@CR44]\]. This was the first report of the biotechnological production of GLA and SDA in transgenic plants. Later, transgenic tobacco constitutively expressing *D6DES* from borage (*Borago officinalis*) was found to accumulate 13% GLA and 10% SDA in its seeds \[[@CR20]\]. In addition, canola plants coexpressing *D6DES* from the oleaginous fungus *Mortierella alpina* and *Δ12 desaturase* gene (*Brassica napus*) specifically in their seeds produced 40% GLA \[[@CR12]\]. Similarly, when *D6DES* from the oleaginous fungus *Pythium irregulare* was expressed under the control of the seed-specific napin promoter in *Brassica juncea*, GLA comprised 40% of seed oil \[[@CR13]\]. When the borage *D6DES* gene and Arabidopsis *Δ15 desaturase* gene were coexpressed in soybean driven by the soybean seed-specific *β-conglycinin* promoter, SDA accumulated to 29% of seed oil content \[[@CR45]\]. Linseed expressing the SDA-specific *D6DES* gene from *Primula vialii* under the control of the *Vicia faba* seed-specific USP promoter had a 13% SDA content in its seed oil \[[@CR15]\]. More recently, when the *D6DES* gene from the protozoan *Saprolegnia diclina* was expressed under the control of the Arabidopsis *OLEOSIN* promoter in safflower, GLA accumulated to 77% of the seed oil content, i.e., the highest reported GLA content for transgenic safflower \[[@CR46]\]. It is important to note that the GLA levels in transgenic seed oil reported by Liu et al. \[[@CR12]\], Hong et al. \[[@CR13]\] and Nykiforuk et al. \[[@CR46]\] were higher than those found in the current study. Furthermore, the SDA content in transgenic seed oil reported by Eckert et al. \[[@CR45]\] was also higher than we achieved. However, the results of Liu et al. \[[@CR12]\] and Eckert et al. \[[@CR45]\] were achieved via coexpression of *D6DES* and another desaturase gene, and there has been no report of higher GLA and SDA production in transgenic seed oil due to the introduction of a single gene. In addition, the production of perilla seeds containing 47.7% D6DES products (GLA, SDA and C18:2Δ^6,9^) due to the incorporation of only *D6DES* gene represents a dramatic improvement (Table [2](#Tab2){ref-type="table"}). Looking forward, SDA could be produced at very high levels if the ALA-preferred *D6DES* were introduced into perilla. For example, D6DES enzymes from *Primula vialii* and *Primula luteola* showed high ALA substrate specificity and produced SDA exclusively \[[@CR14], [@CR47]\]. Furthermore, perilla that produces very high levels of SDA could be used to produce EPA and DHA by introducing *fatty acid elongase*, *Δ5 desaturase* and *Δ4 desaturase*. Conclusions {#Sec25} =========== Two decades have been spent creating transgenic plants that produce higher levels of expensive functional fatty acids such as GLA and SDA in their seeds beyond what wild plants are capable of producing. In this study, we developed transgenic perilla with the very high content over 45% of both GLA and SDA. These plants might serve as an important resource for producing omega-3 oil capsules as health food and promoting human health. In addition, other genes could be added to these plants to create transgenic perilla that produce fish-oil-like oil in their seeds and provide further health benefits. Additional files ================ {#Sec26} Additional file 1:**Table S1.** Primers used in this study. Nucleotide symbols are as follows: Y, C/T; R, G/A; W, A/T; D, G/A/T; N, A/T/G/C. **Table S2.** Segregation ratio of *D6DES* T~1~ perilla plants treated with Basta. **Table S3.** Genotyping of *D6DES* T~2~ perilla plants treatment with Basta. (ZIP 3970 kb) Additional file 2:**Figure S1.** Vector constructs containing the PcD6DES gene. (A) Vector for yeast transformation. PGAL1 and CYS TT represent galactose-inducible GAL1 promoter and CYC1 transcriptional terminator, respectively. URA encodes a biosynthetic [enzyme](https://en.wikipedia.org/wiki/Enzyme) of uracil, as a marker gene for yeast selection. Amp^R^ encodes β-lactamase that inactivates antibiotics ampicillin, as a marker gene for *E. coli* selection. (B) Vector for plant transformation. pCAMBIA3300 was used as a backbone vector. Pvic and Tocs indicate vicilin promoter and octopine synthase III terminator, respectively. LB and RB represent left border and right border, respectively. Each box represents a gene expression cassette. B, *Bam*HI; C, *Cla*I; H3, *Hin*dIII; K, *Kpn*I; N, *Not*I; P, *Pst*I; R1, *Eco*RI; Sc, *Sac*I; X, *Xba*I, Xh, *Xho*I. **Figure S2.** The predicted transmembrane domains of fatty acid desaturases including **(A)** *Phytophthora citrophthora* D6DES, **(B)** evening primrose (*Oenothera biennis*) D6DES (GenBank accession No. EU416278) and **(C)** *Perilla frutescens var. frutescens* FAD2 (GenBank accession No. KP070823) by TOPCONS. **Figure S3.** The expression from *PcD6DES* gene in RNA level from *S. cerevisiae*. RT-PCR from total RNAs of *PcD6DES* yeast. pYES2 is yeast cells harboring a blank vector as an negative control. PcD6DES is yeast cells carrying pYES2-*PcD6DES*. *ScAct1* is a reference gene from *S. cerevisiae actin* gene (GenBank accession No. L00026). -- and + indicate non-induction and induction, respectively. The induction method of yeast was described in Methods section. M, 1 kb DNA ladder. **Figure S4.** TLC analysis of lipids extracted from perilla mature seeds. The lipids were developed and visualized under the ultra violet after the primuline spraying. The spots corresponding neutral lipids (TAG and DAG) and polar lipids were scraped off and the fatty acid composition was analyzed with GC. The method using this experiment is described in the 'Thin layer chromatography (TLC)' subsection of Methods section (ZIP 537 kb) ALA : α-linolenic acid D6DES : Δ6 desaturase DHA : cis-4,7,10,13,16,19-docosahexaenoic acid DS : developing seed stage EPA : cis-5,8,11,14,17-eicosapentaenoic acid FID : flame ionization detector GLA : γ-linolenic acid LA : linoleic acid SDA : stearidonic acid TM : transmembrane domain VLCPUFA : very long chain polyunsaturated fatty acid Not applicable. Funding {#FPar1} ======= The overall process of this research was supported by a research grant of Rural Development Administration's project (Project No. PJ01257102, K-RL), Republic of Korea, and the TLC data analysis was separately supported by the Mid-Career Researcher Program of the National Research Foundation of Korea (NRF-2017R1A2B4007096, HUK), Republic of Korea. Availability of data and materials {#FPar2} ================================== The sequence of *PcD6DES* gene from this study has been deposited to the NCBI GenBank (<https://www.ncbi.nlm.nih.gov/genbank/>) as an accession No. DQ836059. K-HK performed gene cloning, functional analysis in yeast and Perilla transformation; K-RL, JBK, JKK carried out the fatty acid analysis; S-BH screened the *Phytophthora* strain; K-RL, IJ conducted qRT-PCR and TLC experiments; MHL raised perilla plants to supply seeds for transformation; K-RL, K-HK, HUK analyzed the data; K-RL, K-HK wrote the paper. All authors read and approved the final manuscript. Ethics approval and consent to participate {#FPar3} ========================================== Not applicable. Consent for publication {#FPar4} ======================= Not applicable. Competing interests {#FPar5} =================== The authors declare that they have no competing interests. Publisher's Note {#FPar6} ================ Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
{ "pile_set_name": "PubMed Central" }
The outdoor opera, Dante's "La Vita Nuova", which Dr. Lecter and Mr. Pazzi see in Florence, was especially composed for the movie. Composer Patrick Cassidy did not stop at the three minute part as performed in the movie, but composed an entire aria, "Vide Cor Meum". Hannibal asks Pazzi about being demoted from the Il Mostro case. Il Mostro was a serial killer about whom Hannibal gives clues to Pazzi. This was a subplot that was filmed but never used as it was thought to be too complicated. The right side of the van following Clarice from her house is damaged with a headlight that does not match the undamaged, left side. Later, as the van is seen before crashing into items, the damage is missing and the headlight matches the other side. Hannibal Lecter: Dear Clarice, I have followed with enthusiasm the course of your disgrace and public shaming. My own never bothered me, except for the inconvenience of being incarcerated. But you may lack perspective. It's never made certain. Hannibal, when he says "above or below the wrist?" suggests that he did but he could have been threatening to cut off Clarice's hand in order to scare her into giving him the key. It's also possible Hannibal chopped off only his thumb to wriggle out of the cuff. What is certain is that he definitely did not try to cut through the chain on the cuffs; it would have been too unbelievable and he clearly doesn't have the use of that hand in the final scene. Q Why did Mason Verger cut off his own face? A Mason was a sexual deviant who was also infatuated with Lecter. Lecter had given him a 'popper' [in the book, a mixture of hallucinogenic and hypnotic drugs] before suggesting that he cut off his face and feed it to the dogs. Verger was based on the real case of a man named Michael who, while under the influence of PCP, did the same thing -- cut off parts of his face and fed them to some dogs. For more information on Michael, see here. Q Why didn't Jodie Foster return to play Clarice Starling? A In an interview for Total Film magazine, Foster said:The official reason I didn't do Hannibal is I was doing another movie, Flora Plum. So I get to say, in a nice dignified way, that I wasn't available when that movie was being shot... Clarice meant so much to Jonathan and I, she really did, and I know it sounds kind of strange to say but there was no way that either of us could really trample on her.
{ "pile_set_name": "Pile-CC" }
Jehovah's Witnesses with OBVIOUS drinking problems? My in-laws hide liquor in their room. They said it's to keep it from their son and it helps my MIL sleep. My kids found it and brought it up in front of them. Two different stories at once, ahahhahaa. I think they were embarrased. The trouble with "modest" consumption of alcohol is that every JW has their own idea of what constitutes "modest consumption." Early on, I was warned off the JWs a non-JW relative, following her attendance at a Jehovahs Witness wedding reception. She was quite appalled by the heavy drinking that she saw going on at that event. Later, I knew an elder who was rather concerned when named to attend the next session of the Kingdom Ministry School. He told us that he was going to "have to dry himself out beforehand" - referring to his fondness for apple wine, which he consumed for by the flagon full. For nine months after the 1975 debacle, that same elder never ventured out once in field service, and would regularly demolish a 2 litre flagon of sherry over the course of one night. Throughout all this, he kept his position, and was always quite highly regarded in the JW community. (a lot to do with his being a "closet" drinker, I think - you would never ever see him in any public bar around the place). I myself was not exactly squeaky clean when it came to the subject of the brown bottle. Raised by parents who were modest drinkers, I was first introduced to drinking when I began associating with the local congregation. There was considerable social pressure to indulge in the stuff, and as others have noted, it was an easy habit to adopt - being one of the few escapes / indulgences / releases (call it what you will!) that a Witness is permitted to have. The "guidance" that I received from the brother whom I studied with was that it was all-right to have the "occassional" heavy session on the grog, but one should still at all times "have all their faculties" about them. (This is indeed what he - an elder and regular pioneer - did). The immediate problem here is in precisely defining what constitutes "occassional", and where the boundary line between "still having all ones faculties" and having lost them is located! In my 28 years "in the Truth", I both witnessed - and participated in - much abuse of alcohol. Reminds me of something that happened shortly after I'd disassociated... I had remarried a nice non-JW, and we were visiting my dad's sister and her hubby up in Klamath Falls, Oregon. My aunt and uncle-by-marriage were also non-JWs... I told them a story about how my brother and I [both bullied into the JW religion, me from the age of 5, him from birth] used to sneak into the kitchen and get my dad's bottle of booze out of the refrigerator, pour some of the stuff into the sink, and set it on fire. We'd crouch in the dark around the kitchen sink, watching that pretty blue and multi-colored flame as the booze burned. My uncle looked at me, startled, and said, "That must have been some pretty hard liquor!" At that instant, I realized that my dad must have been a closet alcoholic, all those years that he was beating the "truth™ " into me and my brother.... Because he ALWAYS had some kind of hard liquor around.... A lot of things about my parents' Jehovah's Witness-run family system snapped into focus, then. Dear old self-righteous Daddy was a blazing alcoholic, and all those temper tantrums that he threw were probably fueled by alcohol. the head with A beer bottle and broke it ( thank goodness I was sporting AFRO,A hairstyle in the60,s) My ex had A bad temper especially when she drink. After we became JW, that anger turn to the kids. The funny thing about the beer bottle over the head, she called the police in order for me to leave. When the police got there, they ask me did I want to press charges against her. The good old days.
{ "pile_set_name": "Pile-CC" }
Partitioning of uncharged local anesthetic benzocaine into model biomembranes. The partitioning of uncharged local anesthetic benzocaine (BzC) into molecular aggregates formed by cationic surfactant decylammonium chloride (DeAC) and phospholipid dipalmitoylphosphatidylcholine (DPPC) was studied from the surface tension and light transmittance measurements. The quantities concerning the partitioning of BzC, the compositions of BzC in the surface-adsorbed film and micelle and three kinds of differential partition coefficients corresponding to phase transitions of the DPPC bilayer membrane were evaluated from thermodynamic analysis of the experimental data. The surface-adsorbed film and micelle were more abundant in BzC than the aqueous solution and significantly large differential partition coefficients for the DPPC membranes were observed. The results clearly showed that the BzC molecules greatly partitioned into hydrophobic environments produced by surfactant-monolayer and phospholipid-bilayer membranes. The partitioning behavior of BzC was also compared with that of charged local anesthetic procaine hydrochloride (PC.HCl). It was shown that the PC.HCl molecule did not or hardly partition into such hydrophobic environments. The contrasting results of the partitioning between BzC and PC.HCl are attributable to the drastic decrease of hydrophilicity of BzC due to the lacking of ionic polar head group in comparison with PC.HCl.
{ "pile_set_name": "PubMed Abstracts" }
Vivian Green Vivian Sakiyyah Green (born May 22, 1979) is an American R&B singer-songwriter and pianist. Early life Green was born May 22, 1979 in the East Oak Lane neighborhood of Philadelphia, and took an interest in singing, playing the piano, and songwriting at a very young age. At the age of thirteen, she became a member of a female quintet called Younique. She is a graduate of what is now Parkway Northwest High School for Peace and Social Justice. Green has credit for writing "Dear God" by Boyz II Men, from their 1997 album Evolution. Green received her big break at the age of nineteen when she became a backup singer for Jill Scott, who took her on an international tour. She signed to Columbia Records in November 2002. Career 2001–2003: A Love Story In 2002, Green released her debut album, A Love Story, which featured the number-one single "Emotional Rollercoaster". In the meantime, Green made a cameo appearance in the Cole Porter biopic De-Lovely singing a cover version of Porter's 1930 song "Love for Sale", which made the film's soundtrack album. She also played Brenda Holloway in an episode of the first season of NBC's drama series American Dreams, entitled "The Carpetbaggers" (originally aired on April 6, 2003), performing a rendition of Holloway's 1964 hit "Every Little Bit Hurts". 2004–2006: Vivian In 2005, she appeared on Cyndi Lauper's The Body Acoustic album on the tracks "I'll Be Your River" and "Sisters of Avalon". During the spring of 2005, three years after the release of her debut album, Green released her second studio album Vivian. It featured the lead single "Gotta Go Gotta Leave (Tired)", which peaked at No. 24 on the R&B chart and No. 1 on the dance charts The song also charted No. 1 on the Hot Adult Airplay. The track known as "I Like It (But I Don't Need It)" followed up as the album's second single. The song followed up the previous single's success by also reaching #1 on the dance charts. 2007–2011: Beautiful In 2007, Green appeared on Guru's album Jazzmatazz, Vol. 4: The Hip-Hop Jazz Messenger: Back to the Future on the track "Fine and Free". While performing at a gig in support of her second album, Green announced that she is currently recording her third full-length album on Koch Records. In April 2009, she signed a 3-album deal with E1 Music with the first album under the deal set to be released in Summer 2009. Her third album titled Beautiful was released April 6, 2010. The songs explore the ins and outs of love from a variety of perspectives, from the youthful romanticism of "Somewhere" to the playful insight of "So Good" and "Better Man" to the hard-won intensity of "Masterpiece" and "Beautiful." In contrast to her first two albums, which were recorded in a variety of studios with multiple producers, Vivian approached the recording of Beautiful in a more intimate, organic manner. With the exception of "Save Me," which she cut with Jason Farmer (Keyshia Cole, Wyclef Jean, Rihanna) in the producer's seat, Vivian recorded the entire album with Grammy-nominated producer Anthony Bell, a longtime friend and collaborator who made key production contributions to her first two albums, and whose extensive resume also includes work with Jazmine Sullivan, Jewel, Musiq, Raheem DeVaughn and Jill Scott. In 2011, she collaborated with Phoe Notes for a winter single titled "Missing You". It was released digitally on December 9. Phoe Notes and Green shot a video for the track on December 16. Additionally, she recorded the track "Keep On Going" for the Good Times – London and "Let It Burn" for the Birds Eye Riddim compilations. 2012–2013: The Green Room In 2012, her single, "Oh Freedom" for the Soundtrack for a Revolution was released on January 3, 2012. Later in the year, she did a couple of collaborations which included "Love" (w/Zion) for the album Legacy, "La La Means I Love You" (w/Bob Baldwin) for the album Betcha By Golly Wow: The Songs Of Thom Bell, and "Still Here" (w/Brian Culbertson) for the album Dreams. On August 7, 2012, Green released "Anything Out There" the lead single from her fourth album The Green Room. The album was released on October 9, 2012. In 2013, she undertook a few festivals and concerts in addition to TV appearances on BET and Centric's music series. 2014–2016: Vivid In 2014, she became the first artist signed to rapper/producer Kwamé's record label, Make Noise Recordings. Vivid, her fifth studio album was distributed via Caroline Records. On April 7, 2015, the first single released from the album was "Get Right Back to My Baby". In 2015 "Get Right BackTo My Baby" went to No. 2 on Billboard's UAC chart. Vivian was also nominated for a Soul Train Award . In 2016 Vivian released "Grown Folks Music(Work" which went to the top 15 on Billboard's UAC chart. 2017–present: VGVI On July 7, 2017, Vivian Released the first single off her sixth album VGVI, "I Don't Know." The song became a top-10 hit on Billboard's Adult R&B chart. VGVI was released on September 15, 2017. Personal life Between her first and second albums, she took a three-year hiatus. In 2004, she gave birth to her son Jordan. Vivian is now a full-time advocate for special needs children, publicly speaking about her experiences. Discography Studio albums A Love Story (2002) Vivian (2005) Beautiful (2010) The Green Room (2012) Vivid (2015) VGVI (2017) Award history BET Awards 2003: Best R&B Female Artist (nominated) Lady of the Soul Train Awards 2003: Best Solo R&B/Soul Single "Emotional Rollercoaster" (nominated) 2003: Best Solo R&B/Soul Album of the Year A Love Story (nominated) 2003: Best Solo R&B/Soul or Rap New Artist: Vivian Green (nominated) Soul Train Awards 2015: Centric Certified Award (nominated) References External links Official website Category:African-American female singer-songwriters Category:African-American singer-songwriters Category:American female singer-songwriters Category:African-American pianists Category:American women pianists Category:American rhythm and blues singer-songwriters Category:American soul singers Category:Columbia Records artists Category:Living people Category:Neo soul singers Category:Musicians from Philadelphia Category:Rhythm and blues pianists Category:1979 births Category:Singers from Pennsylvania Category:Songwriters from Pennsylvania Category:American contemporary R&B singers Category:21st-century American women singers Category:Ballad musicians Category:21st-century American singers Category:21st-century American pianists
{ "pile_set_name": "Wikipedia (en)" }
Oxidative susceptibility of low-density lipoproteins--influence of regular alcohol use. In population studies, a low-to-moderate intake of alcohol has been consistently linked to a lower risk of coronary artery disease. The recent suggestion that alcoholic beverages may be conferring this decrease in risk because they contain antioxidant phenolic compounds that reduce the oxidizability of low-density lipoprotein (LDL) has to be reconciled with the possible counteracting influence of a pro-oxidant effect of alcohol. In a controlled crossover study, we have now measured the oxidizability of LDL in 27 regular beer drinkers during consecutive 4-week periods, wherein they consumed a high versus low alcohol beer (4.9 vs. 0.9% alcohol v/v, respectively), with the two beers being similar in phenolic content. This resulted in a decrease in alcohol consumption by approximately 80% (408 +/- 25 ml/week vs. 75 +/- 11 ml/week). During the low alcohol period, there was no change in LDL vitamin E or its cholesterol or protein content. Analysis of LDL oxidation kinetics revealed an increase in oxidizability during the high alcohol phase. This was despite a decrease in arachidonic acid content of LDL and a corresponding increase in palmitic acid during high alcohol intake--a change in fatty acid composition that has the potential to favor a decrease in oxidizability. Our results suggest that alcohol ingestion increases LDL oxidation, despite reducing the polyunsaturated fatty acid composition. The overall effect of alcoholic beverages on LDL oxidation may be a balance between the pro-oxidant and antioxidant activity of its various constituents. The predominant pro-oxidant effect demonstrated in these beer drinkers, although not relevant to any potential decrease in coronary artery disease, may be important in the pathogenesis of alcohol-related disease in other organ systems.
{ "pile_set_name": "PubMed Abstracts" }
Libya: France urges special UN support Published duration 28 August 2014 image copyright EPA image caption Tripoli's international airport has been closed since mid-July because of heavy fighting France is calling for "exceptional support" for Libya, warning the country could fall into chaos without United Nations intervention. If no action is taken, French President Francois Hollande warned, "terrorism will spread across the region." His comments come a day after the UN Security Council called for an immediate ceasefire in Libya. It is also seeking sanctions against those involved in the surge in violence between rival militias. The names of those to face sanctions have not yet been decided. However, the Security Council has been alarmed by the increase in fighting between militia groups and Libya's army factions in recent weeks. On 23 August a coalition of militias, including some Islamist groups, operating under the banner Libya Dawn, seized control of the international airport in the capital, Tripoli from a Zintan-based militia. The victory, which secures the alliance's control over the capital, ends a five-week siege.
{ "pile_set_name": "OpenWebText2" }
A group of north Dartmouth teens will become beekeepers this summer through a program called the Healthy Honeybees Project. There will be six active "queen bee" teens, who will help raise the bees, extract the honey, sell and market it, and another 10 or 15 "worker bees," who will help out where they can. They'll have two experienced beekeepers involved to oversee the progress and look out for any safety issues. This social enterprise is the brainchild of Stewart Zaun, program coordinator with Family S.O.S., a non-profit organization that helps out both parents and youth with in-class and after-school programs. Up and buzzing by June "We were trying to come up with some kind of enterprise project, and the usual ideas, like bracelets and bake-sales, were going around," he said. "My cousin's a beekeeper. I was sitting on her porch watching the bees flying around, and it came to me." The teens, who meet at the Dartmouth North Community Centre, will be spearheading the project with community partners, such as the Centre for Entrepreneurship, Education, and Development and Scotian Bees and Honey, who are donating one of the hives. Two hives will be located at The Guy Jacobs Community Garden in Dartmouth. Zaun says the city has all but signed off on the project. He's expecting the hives to be up and buzzing by June.
{ "pile_set_name": "OpenWebText2" }
Scott Ocamb I have been delivering software solutions since the 1980's. I began my career as a developer and architect using Microsoft technologies. I always had a passion when it comes to software. Since my early days, I worked evenings and weekends learning the next new thing. I have consulted at dozens of firms, large and small in the Delaware Valley. This has exposed me to both the good and the bad in the software world. Seeing things done right and perhaps more importantly wrong gives me a unique perspective on delivering software. In 2006, I began to focus on delivering software following Agile principles. I discovered that practicing Agile is hard. As I moved between various consulting assignments, I noticed many firms missed some fundamental points of agile. It is easy to follow the steps but miss the point of Agile and thus dilute much of its value. I discovered that I have a knack for noticing these deficiencies and recommending alternatives that make a difference. Risk Free Pricing for New Customers Agile philosophy embraces small batch sizes and short Build - Measure - Learn feedback cycles. I incorporate this idea for customers who have never worked with me before. Every situation is different but in general an engagement with me begins with a short discovery phase of a week or two. If you are following Scrum, the timing of the phase coincides with the Scrum cycle. I attend the Scrum meetings so I can observe the team. If your team is new to agile I interview stake holders and together we come to and understand about how agile would work in your firm. The deliverable of the Discovery Phase is a detailed set of recommendations. If you are happy my work, we work together to develop a statement of work to implement any necessary improvements. This will be billed at the normal rate for as long as you need me. If you are not happy with my work, you are not obligated to pay for the discovery phase. My hope is, new customers will feel comfortable working with me for the first time. Selected Recommendations Darren Talham - Chief Software Architect at FidleiTrade Scott and I worked together for over a year at FideliTrade where he played a critical role in transforming the development group into an Agile Scrum team. Scott was extremely effective at introducing Scrum to the business owners and stakeholders, and he quickly gained their confidence and buy-in for the Scrum methodology. During his tenure, he built two Scrum teams from the ground up and acted as Scum Master and Agile Coach for the organization. Scott has thorough knowledge of the Agile Scrum methodology, and his knowledge goes far beyond theory. He is very hands on and is able to take complicated and difficult concepts and turn them into working processes. Not only did Scott implement our Agile process, he also configured and managed our toolsets to fit our specific needs. When Scott left us we had a fully functioning Agile process in place as well as all the tools we need to keep the process running smoothly. In addition to his Agile expertise, Scott has expert knowledge of the DevOps approach to software delivery. He was instrumental in setting up our DevOps procedures on Azure, and helped us automate our build and release pipelines integrating Team Services and Azure. I highly recommend Scott for any organization looking to implement an Agile process, or improve on their existing processes. Scott's knowledge and experience, along with his passion, guarantees that he will add value everywhere he goes.
{ "pile_set_name": "Pile-CC" }
Q: Can't build working Java app with gRPC, Protobuf and BoringSSL to JAR using Maven I have problem with building my Java app to jar file using Maven. Application is using gRPC and Protobuf. When I start my app in IntelliJ everything work just fine, problem is when I want to build jar with Maven... I don't have much experience with creating pom files. I tried to find some solution but nothing works and I ended up with pom.xml as below: [...] <properties> <grpc.version>1.17.1</grpc.version> <protoc.version>3.5.1-1</protoc.version> <netty.tcnative.version>2.0.13.Final</netty.tcnative.version> [...] </properties> <dependencies> <dependency> <groupId>io.grpc</groupId> <artifactId>grpc-protobuf</artifactId> <version>${grpc.version}</version> </dependency> <dependency> <groupId>io.grpc</groupId> <artifactId>grpc-stub</artifactId> <version>${grpc.version}</version> </dependency> <dependency> <groupId>io.grpc</groupId> <artifactId>grpc-netty</artifactId> <version>${grpc.version}</version> </dependency> <dependency> <groupId>io.netty</groupId> <artifactId>netty-tcnative-boringssl-static</artifactId> <version>${netty.tcnative.version}</version> <scope>runtime</scope> </dependency> [...] </dependencies> <build> <extensions> <extension> <groupId>kr.motd.maven</groupId> <artifactId>os-maven-plugin</artifactId> <version>1.5.0.Final</version> </extension> </extensions> <plugins> <plugin> <groupId>org.xolstice.maven.plugins</groupId> <artifactId>protobuf-maven-plugin</artifactId> <version>0.5.1</version> <configuration> <protocArtifact>com.google.protobuf:protoc:${protoc.version}:exe:${os.detected.classifier} </protocArtifact> <pluginId>grpc-java</pluginId> <pluginArtifact>io.grpc:protoc-gen-grpc-java:${grpc.version}:exe:${os.detected.classifier} </pluginArtifact> </configuration> <executions> <execution> <goals> <goal>compile</goal> <goal>compile-custom</goal> </goals> </execution> </executions> </plugin> <plugin> <groupId>org.apache.maven.plugins</groupId> <artifactId>maven-enforcer-plugin</artifactId> <version>1.4.1</version> <configuration> <source>1.8</source> <target>1.8</target> </configuration> <executions> <execution> <id>enforce</id> <goals> <goal>enforce</goal> </goals> <configuration> <rules> <requireUpperBoundDeps/> </rules> </configuration> </execution> </executions> </plugin> <plugin> <artifactId>maven-assembly-plugin</artifactId> <configuration> <archive> <manifest> <mainClass>pl.test.Main</mainClass> </manifest> </archive> <descriptorRefs> <descriptorRef>jar-with-dependencies</descriptorRef> </descriptorRefs> </configuration> </plugin> </plugins> </build> And this is the exception when I try to start gRPC server with SSL context: Exception in thread "Thread-2" java.lang.UnsatisfiedLinkError: failed to load the required native library at io.netty.handler.ssl.OpenSsl.ensureAvailability(OpenSsl.java:346) at io.netty.handler.ssl.ReferenceCountedOpenSslContext.<init>(ReferenceCountedOpenSslContext.java:202) at io.netty.handler.ssl.OpenSslContext.<init>(OpenSslContext.java:43) at io.netty.handler.ssl.OpenSslServerContext.<init>(OpenSslServerContext.java:347) at io.netty.handler.ssl.OpenSslServerContext.<init>(OpenSslServerContext.java:335) at io.netty.handler.ssl.SslContext.newServerContextInternal(SslContext.java:422) at io.netty.handler.ssl.SslContextBuilder.build(SslContextBuilder.java:447) at pl.test.grpc.GrpcServer.start(GrpcServer.java:80) at pl.test.app.Main.lambda$new$0(Main.java:80) at java.lang.Thread.run(Thread.java:748) Caused by: java.lang.ClassNotFoundException: io.netty.internal.tcnative.SSL at java.net.URLClassLoader.findClass(URLClassLoader.java:381) at java.lang.ClassLoader.loadClass(ClassLoader.java:424) at sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:349) at java.lang.ClassLoader.loadClass(ClassLoader.java:357) at java.lang.Class.forName0(Native Method) at java.lang.Class.forName(Class.java:348) at io.netty.handler.ssl.OpenSsl.<clinit>(OpenSsl.java:85) at io.grpc.netty.GrpcSslContexts.configure(GrpcSslContexts.java:194) at pl.test.grpc.GrpcServer.getSslContextBuilder(GrpcServer.java:72) ... 3 more I'm building it using command: mvn clean compile assembly:single Can someone help with creating working pom file? The result doesn't have to be single jar file, it might be multiple jars. A: I found solution, maybe it will help someone deal with the same problem. We have to add dependency io.netty.netty-handler and set compatible versions of io.grpc.grpc-netty, io.netty.netty-tcnative-boringssl-static and io.netty.netty-handler as it is described in table over here https://github.com/grpc/grpc-java/blob/master/SECURITY.md#netty. Here's my current pom.xml [...] <properties> <grpc.version>1.17.1</grpc.version> <protoc.version>3.5.1-1</protoc.version> <netty.tcnative.version>2.0.17.Final</netty.tcnative.version> <netty.handler.version>4.1.30.Final</netty.handler.version> [...] </properties> <dependencies> <dependency> <groupId>io.grpc</groupId> <artifactId>grpc-protobuf</artifactId> <version>${grpc.version}</version> </dependency> <dependency> <groupId>io.grpc</groupId> <artifactId>grpc-stub</artifactId> <version>${grpc.version}</version> </dependency> <dependency> <groupId>io.grpc</groupId> <artifactId>grpc-netty</artifactId> <version>${grpc.version}</version> </dependency> <dependency> <groupId>io.netty</groupId> <artifactId>netty-handler</artifactId> <version>${netty.handler.version}</version> </dependency> <dependency> <groupId>io.netty</groupId> <artifactId>netty-tcnative-boringssl-static</artifactId> <version>${netty.tcnative.version}</version> <scope>runtime</scope> </dependency> [...] </dependencies> <build> <extensions> <extension> <groupId>kr.motd.maven</groupId> <artifactId>os-maven-plugin</artifactId> <version>1.5.0.Final</version> </extension> </extensions> <plugins> <plugin> <groupId>org.xolstice.maven.plugins</groupId> <artifactId>protobuf-maven-plugin</artifactId> <version>0.5.1</version> <configuration> <protocArtifact>com.google.protobuf:protoc:${protoc.version}:exe:${os.detected.classifier} </protocArtifact> <pluginId>grpc-java</pluginId> <pluginArtifact>io.grpc:protoc-gen-grpc-java:${grpc.version}:exe:${os.detected.classifier} </pluginArtifact> </configuration> <executions> <execution> <goals> <goal>compile</goal> <goal>compile-custom</goal> </goals> </execution> </executions> </plugin> <plugin> <groupId>org.apache.maven.plugins</groupId> <artifactId>maven-enforcer-plugin</artifactId> <version>1.4.1</version> <configuration> <source>1.8</source> <target>1.8</target> </configuration> <executions> <execution> <id>enforce</id> <goals> <goal>enforce</goal> </goals> <configuration> <rules> <requireUpperBoundDeps/> </rules> </configuration> </execution> </executions> </plugin> <plugin> <artifactId>maven-assembly-plugin</artifactId> <configuration> <archive> <manifest> <mainClass>pl.test.Main</mainClass> </manifest> </archive> <descriptorRefs> <descriptorRef>jar-with-dependencies</descriptorRef> </descriptorRefs> </configuration> </plugin> </plugins> </build> And now I can build jar using command: mvn clean compile assembly:assembly
{ "pile_set_name": "StackExchange" }
LOS ANGELES – The sheriff's deputy who arrested Mel Gibson for drunken driving six months ago says his superiors have harassed him ever since a report detailing the star's anti-Semitic tirade was leaked to a celebrity news Web site. Deputy James Mee was transferred to another assignment and interrogated for several hours, and investigators seized a computer and phone records during a search of his home, his attorney told The Los Angeles Times for its Thursday editions. "His life and career would be a lot different had he not made that arrest," attorney Richard Shinee said. Neal Tyler, a division chief who oversees the sheriff's office where Gibson was booked, denied that Mee was singled out and said he didn't know of any problems with Mee's treatment. He declined to discuss Mee's specific complaints because of confidentiality rules, but he said, "I disagree with the assessment that personnel in the department or at the station have been relating to him or supervising him in an unfair manner." Mee arrested Gibson July 29 in Malibu on suspicion of driving under the influence of alcohol. An arrest report signed by Mee and posted on the celebrity news Web site TMZ.com said Gibson was belligerent and quoted him as saying: "The Jews are responsible for all the wars in the world." The actor-director later apologized to the Jewish community and pleaded no contest to a misdemeanor charge of drunken driving. After Gibson's much-publicized arrest, investigations were opened into whether Gibson received preferential treatment, and into who leaked Mee's report to TMZ.
{ "pile_set_name": "Pile-CC" }
Q: How to create a week, month, year summary of a database I want to create an application which one is summary the values of each column. I have a table like this: Each rows contains one goods Date | Company_Name | Order_cost | Weight | 2013-05-15| Dunaferr | 310 | 1200 | 2013-05-18| Pentele | 220 | 1600 | 2013-05-25| Dunaferr | 310 | 1340 | and what I exactly need is a table or view which contains the totals for the weights column for each week which is supposed to be extracted from the date column! Something like that company_name | week1 | week2 | week3 | week4 ... dunaferr | 35000 | 36000 | 28000 | 3411 pentele | 34000 | 255000 | 3341 | 3433 Is there any way to do this? A: I would do this in two steps: First step complete an sql query getting a summary with a sum for weight with a group by for yearweek SELECT Company_Name, YEARWEEK(Date), sum(weight) FROM table GROUP BY Company_Name, YEARWEEK(Date) http://dev.mysql.com/doc/refman/5.5/en/date-and-time-functions.html#function_yearweek. Second step would be to process this into the required format in the application year. If you absolutely have to do this in the database, then you are looking at implementing a pivot table, which has previously been covered here: MySQL pivot table
{ "pile_set_name": "StackExchange" }
Q: Php api via array Am trying to read a script api which returns an array: $api_key = "Uez4TWYH6OAQQHoUcICWJ8UUFYmwQ"; $file_id = "LNzcOp2b1352047884"; $ch=curl_init(); curl_setopt($ch,CURLOPT_URL,'http://ads.ngsms.tk/api/info.php?api_key='.$api_key.'&file_id='.$file_id); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); $api = curl_exec($ch); $api = print_r($api); Echo $api['file_id']; The above displays: Array ( [file_id] => LNzcOp2b1352047884 [file_name] => sic_ftp_3rda.sisx [file_type] => application/octet-stream [file_size] => 65144 ) How can I get the file_name and other values? A: To get any value within the array reference it in the same way you have done for file_id but instead replace the key with the value you are after e.g: $api['file_id']; $api['file_name']; $api['file_type']; $api['file_size']; Then to simply show this on the page, you can use echo: echo $api['file_id']; echo $api['file_name']; echo $api['file_type']; echo $api['file_size']; So your full code would be: <?php $api_key = "Uez4TWYH6OAQQHoUcICWJ8UUFYmwQ"; $file_id = "LNzcOp2b1352047884"; $ch=curl_init(); curl_setopt($ch,CURLOPT_URL,'http://ads.ngsms.tk/api/info.php?api_key='.$api_key.'&file_id='.$file_id); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); $api = curl_exec($ch); //print_r($api); $fileid = get_string_between($api, "[file_id] => ", "[file_name] "); $filename = get_string_between($api, " [file_name] => ", " [file_type] => "); $filetype = get_string_between($api, " [file_type] => ", " [file_size] =>"); $filesize = get_string_between($api, " [file_size] => ", ")"); echo "ID: $fileid <br /> name: $filename <br />type: $filetype <br /> size: " .$filesize; function get_string_between($string, $start, $end){ $string = " ".$string; $ini = strpos($string,$start); if ($ini == 0) return ""; $ini += strlen($start); $len = strpos($string,$end,$ini) - $ini; return substr($string,$ini,$len); }
{ "pile_set_name": "StackExchange" }
Characterization of the caspase cascade in a cell culture model of SOD1-related familial amyotrophic lateral sclerosis: expression, activation and therapeutic effects of inhibition. There is increasing evidence that apoptosis or a similar programmed cell death pathway is the mechanism of cell death responsible for motor neurone degeneration in amyotrophic lateral sclerosis. Knowledge of the relative importance of different caspases in the cell death process is at present incomplete. In addition, there is little information on the critical point of the death pathway when the process of dying becomes irreversible. In this study, using the well-established NSC34 motor neurone-like cell line stably transfected with empty vector, normal or mutant human Cu-Zn superoxide dismutase (SOD1), we have characterized the activation of the caspase cascade in detail, revealing that the activation of caspases-9, -3 and -8 are important in motor neurone death and that the presence of mutant SOD1 causes increased activation of components of the apoptotic cascade under both basal culture conditions and following oxidative stress induced by serum withdrawal. Activation of the caspases identified in the cellular model has been confirmed in the G93A SOD1 transgenic mice. Furthermore, investigation of the effects of anti-apoptotic neuroprotective agents including specific caspase inhibitors, minocycline and nifedipine, have supported the importance of the mitochondrion-dependent apoptotic pathway in the death process and revealed that the upstream caspase cascade needs to be inhibited if useful neuro-protection is to be achieved.
{ "pile_set_name": "PubMed Abstracts" }
AudioXpress One year (12 issues) for €122.50 (USD 124.94) AudioXpress Magazine is devoted to do-it-yourself audio. From speakers to amplifiers and preamps, vacuum tube technology to the newest in digital, audioXpress features construction projects to build, along with tips and tweaks to upgrade equipment, as well as articles and reviews to inform. Each issue of AudioXpress is filled with design ideas, projects to build, and articles on cutting-edge audio topics.
{ "pile_set_name": "Pile-CC" }
Open reduction, ulnar osteotomy and external fixation for chronic anterior dislocation of the head of the radius. We reviewed 15 patients, nine girls and six boys, with chronic anterior dislocation of the radial head which was treated by ulnar osteotomy, external fixation and open reconstruction of the elbow joint but without repair of the annular ligament. Their mean age was 9.5 years (5 to 15) and the mean interval between the injury and reconstruction was 22 months (2 months to 7 years). All radial heads remained reduced at a mean follow-up of 20 months (6 months to 5 years). Normal ranges of movement for flexion, extension, pronation and supination were unchanged in 96.1% (49/51) and worse in 3.9% (2/51). Limited ranges of movement were improved in 77.8% (7/9), unchanged in 11% (1/9) and further decreased in 11% (1/9).There were two superficial pin-track infections and two cases of delayed union but with no serious complications. Reconstruction of the radiocapitellar joint is easier using external fixation since accurate correction of the ulna can be determined empirically and active functional exercises started immediately. Only patients with a radial head of normal shape were selected for treatment by this method.
{ "pile_set_name": "PubMed Abstracts" }
Due to color differences in monitors, the colors on this site are for reference only. Please contact Epic Sports if you have any color questions. Frequently Bought With Customer Reviews W. KELLY (South Dakota) on May 6, 2013 4 Stars High quality jerseys that show really well. Purchased for a 12U fastpitch team and the girls love them. Only reason it gets 4 stars is the buttons are a translucent white while the jersey is deep purple. Really don't understand that, but the moms are fixing it! Otherwise everything was great.
{ "pile_set_name": "Pile-CC" }
There is a method for increasing a data area into which user data is to be written in a magnetic disc apparatus by which a servo pattern is divided into a plurality of zones from the inner periphery to outer periphery of a magnetic disc and the write frequency (reference frequency) of the servo pattern in the outer periphery zone is made higher than that in the inner periphery zone (zone servo method).
{ "pile_set_name": "USPTO Backgrounds" }
The present invention relates to a fluid control system, and in particular to a modular, valve-operated fluid control system. In many industrial applications, it is necessary to provide a large number of individually-controllable pneumatic or hydraulic fluid lines. In practice, this requires at least one electronically-operated solenoid valve to be provided for each fluid line. Rather than provide each valve with its own power and control leads, which would be impractical, it is known to connect all of the solenoid valves to a single power supply, provide a common data bus on which control signals are transmitted, and provide each valve with a controller for interpreting the control signals and operating the valve as required. EP-A-0299655 discloses one example of such a fluid control system. Such fluid control systems are generally complex, requiring elaborate control protocols and data decoders within the valve controllers to derive the specific instructions for each valve. In addition, it is usually necessary to provide each valve with a unique pre-set address or means for setting a unique address, such as a position encoder, to enable instructions to be transmitted to particular valves. This requirement introduces further complexity and leads to problems if addresses become non-unique. Furthermore, although some of the fluid control systems of the above-described kind may be described as xe2x80x9cmodularxe2x80x9d, for example, the system disclosed in U.S. Pat. No. 5,522,431 in which a common fluid manifold is provided by combining a plurality of separate manifold modules, those systems do not allow simple system construction or system expansion. Those systems, which are sold through a distributor, are pre-configured by the manufacturer according to a particular specification. As such, those systems do not allow for alteration by adding or removing valves without the need for substantial re-adjustment or system re-wiring/re-programming. It is thus an aim of the present invention to provide a modular fluid control system which can be easily configured, typically by distributors, by simply fitting together the required components in the desired configuration from a small range of different standard modules, and which, when powered up, is fully configured and ready for operation without the need for additional complicated wiring. Accordingly, the present invention provides a modular fluid control system, comprising: a control module for receiving parallel electronic control signals as a plurality of data streams, the control module including a control unit configured to convert the data streams of the parallel electronic control signals to serial electronic control signals, each including a plurality of data pulses as control instruction signals, and an electrical connector; a plurality of valve modules, each valve module including at least one valve operable to control the flow of pressurized fluid; and a plurality of manifold modules connectable in series to the control module and connected to respective ones of the valve modules, each manifold module including a fluid supply conduit to provide a common manifold for receiving pressurized fluid, first and second electrical connectors for connection with ones of the connectors of adjacent manifold modules and the connector of the control module to provide an electrical bus for transmission of the serial control signals and power supply, and a control unit configured to decode one or more of the first-received data pulses of the serial control signals, control the respective valve module accordingly, and pass any remaining data pulses as a modified serial control signal from which the decoded data pulses have been one of removed or blocked to the control unit of any downstream manifold module. Preferably, the manifold modules are non-addressed. In one embodiment the control system comprises a single group of series-connected manifold modules. In another embodiment the control system comprises a plurality of interconnected groups of series-connected manifold modules, and further comprises intermediate connection modules connected to the intermediate ends of the groups of manifold modules. Preferably, the control system further comprises an end connection module connected to the end of the series-connected manifold modules. Preferably, one of the control module or the end connection module includes a port for connection to a supply of pressurised fluid. Preferably, the serial control signals are pulse width modulated signals. More preferably, data pulses having different pulse widths designate different control states. Yet more preferably, the pulse widths are the active pulse widths. Preferably, the control unit of each manifold module is further configured to operate the respective valve module only on consecutively receiving the one or more data pulses having the same pulse widths a predetermined number of times. More preferably, the control unit of each manifold module is configured to operate the respective valve module only on consecutively receiving the one or more data pulses having the same pulse widths at least three times. Preferably, the valve modules include one of mono-stable or bi-stable valves. More preferably, the control unit of any manifold module connected to a valve module including a mono-stable valve is configured to decode the first-received data pulse of each of the received serial control signals. More preferably, the control unit of any manifold module connected to a valve module including a bi-stable valve is configured to decode the first- and second-received data pulses of each of the received serial control signals. Preferably, the control unit of the control module is further configured to terminate each of the serial control signals generated thereby with a termination signal to denote the end of each of the serial control signals. Preferably, the control unit of each manifold module is further configured to transmit return data signals to the control module. More preferably, the control unit of each manifold module is configured to transmit return data signals to the control module on receipt of the termination signal. More preferably, the control unit of the control module is further configured to convert the return data signals to parallel return data signals. Preferably, the manifold modules each comprise a body which includes a passage, and a printed circuit board housed in the passage which includes the connectors and the control unit, with the passages together defining a common passage in which the printed circuit boards are connected. Preferably, the main body of each manifold module is formed as an integral component. The fluid control system of the present invention, in being simple and requiring no re-wiring of the component parts, allows for configuration by non-skilled technicians, thus allowing for configuration by parties other than the manufacturer, such as a distributor. In its preferred embodiments the fluid control system of the present invention automatically provides a xe2x80x9cvirtual connectionxe2x80x9d between valve modules at any given location with reference to the respective pin or pins of the external connector. In the event that alteration of the configuration of the system is required, the system may be quickly disassembled, manifold modules and associated valve modules added, removed or re-arranged and then re-assembled. The new positions of the re-arranged valve modules will automatically correspond to the correct pin or pins of the external connector without the need to re-wire the system.
{ "pile_set_name": "USPTO Backgrounds" }
圖、文/卡卡洛普 相信各位對於「一人約會系列」都印象深刻吧。之前有過「跟假女友搭車出遊拍照」之類的辦法,「教你拍出一個人甜蜜約會照」這系列照片更加生動,作者地主惠亮又想出新辦法,讓一人約會照片更加逼真了!!那就是讓女朋友的手也入鏡拉!! 「一人約會」 超閃餵食閃光照~更逼真的方法來了 ▼總羨慕人家總有甜蜜女友的餵食照嗎? ▼但是實際上都一個人孤苦伶仃出去吃飯…… 不過沒關係,只要搬出一個人的閃光餵食照拍攝法 ▼相信你的FB打卡也可以變成這樣~ ▼嗚噢~超級甜蜜的 來吧跟著地主惠亮一起做,你也可以辦得到唷!不過先必須找一個角落來處理一下~ ▼拿出女生用的粉底液,塗抹在手上 然後再戴上之前一人約會照買的髮圈,還有塗上一人約會照進階版買的指甲油。這些買一次通通都還用的到喔! ▼就可以變成女孩子的手了 ▼接下來在餐廳裡只要把手放在自己的臉周圍做做樣子~像是塗番茄醬 ▼拍起來就會變這樣 ▼女朋友餵食 ▼是不是超逼真的 ▼當然也可以拍出這種出去野餐在玩的照片 ▼也可以自己在家裡房間玩,感覺好像在同居 只是這些照片只能近拍不要遠拍喔!不然就露餡了~~ 照片來源:portal.nifty.com 你累了嗎?快點進來看看「鍵盤大檸檬」平淡生活加點酸~ 點此到 看更多介紹
{ "pile_set_name": "OpenWebText2" }
By applying advances in molecular biology and molecular genetics to population based studies of HIV-1 infection, Viral Epidemiology Branch investigators help elucidate the distribution, determinants, and natural history of this cancer-associated virus.Chemokine Receptor Gene Polymorphisms Both the natural history of HIV infection and the response to antiretroviral therapy are heterogeneous, and it is known that polymorphisms in chemokine receptor genes modulate the natural history. We recently demonstrated that polymorphisms in chemokine receptor genes may also explain some of the heterogeneity in sustaining viral suppression observed among patients receiving potent antiretroviral therapy. We continued to lead the international meta-analysis of the effect of host genetics on the outcome of HIV infection. The meta-analysis seeks to increase statistical precision over that available from any single study. HIV RNA Levels The HIV RNA level is the strongest known predictor of prognosis among HIV-infected patients. We collaborated to demonstrate that a simple mathematical relationship exists between the HIV RNA level and survival time, such that a patient's cumulative exposure to viral replication predicts their survival. In developed areas, HIV-infected infants have high virus levels. We assessed HIV levels in untreated infants in Malawi by analysis of dried blood spots. We found that the median initial HIV level was higher among perinatally infected infants than among infants infected by breast-feeding, but that neither age at infection nor route of infection significantly influenced HIV levels measured 1 year after infection. We also participated in a collaboration that demonstrated that the HIV RNA level and the CD4 cell count are the main predictors of mortality among HIV-infected African children, as is true in developed countries. Effect of Recent Thymic Emigrants on HIV-1 disease The concentration of T-cell receptor-rearrangement excision DNA circles (TREC) in peripheral-blood T cells is a marker of recent thymic emigrant T cells. We collaborated in a study of the predictive ability of measurements of TREC for clinical outcome in HIV-1-infected individuals. We found that the concentration of TREC in the peripheral T-cell pool complements HIV-1 RNA load and CD4 T-cell count in predicting the rate of HIV-1 disease progression. These data suggest that recent thymic emigrants have a role in the pathogenesis of HIV-1 disease.
{ "pile_set_name": "NIH ExPorter" }
AEEE Important Dates 2019 AEEE Important Dates 2019 - The admission authorities of Amrita Vishwa Vidyapeetham has released the important dates for AEEE 2019. Candidates can check AEEE 2019 important dates to know about the commencement of admissions. AEEE will be conducted as a CBT (computer-based test) as well as a pen and paper test (offline). The CBT will be conducted from April 22-26, while a pen-and-paper test will be held on April 27, 2019. The application form of AEEE 2019 is released on October 19, 2018, both in online and offline mode. Candidates are advised to check the AEEE important dates 2019 to ensure that no important event related to the exam is missed. The result of AEEE 2019 will be declared on May 5, 2019. Read the full article to know further details about AEEE important dates 2019. AEEE 2019 Important Dates Candidates can check the important dates of AEEE 2019 given in the table below. The dates given are tentative and will be updated when declared by the official authorities. S.No. Events Important Dates 1 Release of Application form October 19, 2018 2 Commencement of Slot Booking for CBT April 5, 2019 3 Last Date for submission of Application Form and Slot Booking for CBT April 10, 2019 4 Last date of application submission for PPT April 25, 2019 5 AEEE 2019 Hall Ticket First Week of April 2019 6 AEEE 2019 Exam (Computer Based Test) April 22-26, 2019 (3 slots per day) 7 AEEE 2019 Offline Exam (Pen and Paper Based Exam) April 27, 2019 8 Declaration of Result May 5, 2019 9 Option open to change the academic preference & profile data. Entry of JEE Main scores May 5 to May 8 10 Trial Allotment and clarification of doubts (for both the modes- AEEE and JEE) May 10, 2019 11 Last date for fee payment of first allotment May 20, 2019 12 Second Allotment May 25, 2019 13 Last date for fee payment of second allotment May 30, 2019 14 Third Allotment June 5, 2019 15 Last date for fee payment of third allotment June 10, 2019 16 Verification of documents & filling the vacant seats. June 15 to 25, 2019 Highlights of AEEE Important Dates 2019 AEEE 2019 Application Form - The application form of AEEE 2019 is available from October 19, 2018. The application form is available both in online and offline mode. Candidates applying through JEE Main 2019 rank will also be required to fill the application form. To fill the application form of AEEE 2019 - Click here Or Apply from the window given below: AEEE 2019 Slot Booking & Hall Ticket - The slot booking process for AEEE 2019 CBT will start from April 5 and will close on April 10. The hall ticket will be available only after the slots are successfully booked by the candidates. AEEE 2019 Examination- The AEEE 2019 computer-based examination will be conducted from April 22-26. Pen and Paper test of AEEE 2019 will be held on May 27. The candidates will have to qualify the examination to be eligible for admissions. AEEE 2019 Counselling – The selected candidates will be called in for counselling which will commence from May 10. Allotment will be done as per the ranking of the candidates and his/her preference of courses.
{ "pile_set_name": "Pile-CC" }
[Streptomycin--an activator of persisting tick-borne encephalitis virus]. The effect of streptomycin (C) on persistence of tick-borne encephalitis (TBE) virus in Syrian hamsters infected with 3 strains of the virus (41/65, Aina/1448, Vasilchenko ) intracerebrally or subcutaneously was studied. In the animals not given C the infectious virus could be detected in the brain for 8-14 days but not later although their organs (mostly brains and spleens) contained the hemagglutinating antigen and viral antigen detectable by immunofluorescence. Intramuscularly C was given twice daily for 13-35 days in a daily dose of 200 mg/kg. The C-treated hamsters yielded 7 virulent TBE virus strains: 3 from the brain, 3 from the spleen, and one from the blood. No virus could be isolated from the liver, kidneys, or lungs despite the use of various methods for isolation including tissue explantation. The activating effect of C was observed against the background of 4-fold decrease in the titre of complement-fixing and antihemagglutinating antibodies. C exerted its activating effect both at early (70 days) and late (9 months) stages of TBE virus persistence. The activating effect of C appears to be due to its immunosuppressive properties and neurotoxic action on the CNS.
{ "pile_set_name": "PubMed Abstracts" }
One of the treatment strategies being explored for the management of lipodystrophy has been to replace a protease inhibitor with a non-nucleoside reverse transcriptase inhibitor (NNRTI). This poster was a meta-analysis of eighteen trials evaluating the impact of switching from a protease inhibitor to either nevirapine or efavirenz on the progression of body shape changes and hyperlipidemia. All studies published in peer-reviewed journals or presented at international conferences between 1999 and February 2001 were evaluated. Switching of NRTIs was permitted. The switch from the protease inhibitor must have been due to clinical or metabolic manifestations of lipodystrophy. There was no restriction on ARV therapy history including time on protease inhibitors. Blood cholesterol and triglycerides data, before and after the switch to the NNRTI, were pooled in a composite analysis. Some values were derived from graphs. Changes in body shape following the switch were collected, but could have been determined by patient self-report, physician assessment, anthropometric measurement or DEXA. In all eighteen studies, virologic suppression was maintained in the vast majority of patients (although the numbers are not given in this poster). There was a decrease in CHO and TG in all studies examining the switch from protease inhibitor to nevirapine. One study reported an increase in HDL, while another trial reported a reduction in LDL following the switch to nevirapine, but not following the switch to efavirenz. Insulin resistance normalized in two studies following the switch to nevirapine. Elevations in CHO and TGI were observed in a number of studies following the switch to efavirenz. Five studies demonstrated elevations in total CHO. Only one study showed improvement. Four studies showed increased TG levels, while four others showed improvements. Four studies showed an increase in HDL, whereas one study showed elevations in HDL and also in LDL and glucose. "Significant" changes in body shape were reported in three trials looking at a switch to nevirapine (although again, what "significant" means and how it was determined is not noted on the poster). "Limited, nonsignificant" improvement in body shape was reported in two studies of efavirenz switch. Subjective improvement (patient self-report) in body shape or quality of life was reported in four studies examining the switch to nevirapine, whereas "partial" improvement was reported in two studies of the switch to efavirenz. Figure 1. Changes in Total Cholesterol Following Switch from PI to NVP or EFV, or with Ongoing PI Figure 2. Changes in Triglyceride Following Switch from PI to NVP or EFV, or with Ongoing PI The authors of this poster conclude that the replacement of the protease inhibitor with nevirapine was associated with a reduction in mean blood cholesterol and triglycerides levels, leading to normalization in many patients. The switch to efavirenz was not associated with such improvement. They felt that the investigation of physical changes yielded less conclusive findings. The authors' conclusions about lipid changes fit with the generally accepted interpretation of the studies in the past few years. The changes in triglycerides with a switch to nevirapine have been quite marked, as have the changes in cholesterol. However, this poster suffers from several flaws. First, one must take note that this is a poster done by two people working for Boehringer Ingelheim. While there is no disputing the findings, the spin on this poster favoring nevirapine against efavirenz is unmistakable. Second, many of the switch studies have been seriously flawed in their collection of lipid data. A number of them have collected non-fasting samples and it is not clear how the authors reconcile this kind of data with properly collected fasting levels, since they make no distinction. Third, it is impossible to draw any real conclusions about body-shape changes given the variety of ways that data was collected, from DEXA scans to patient self-report. Certainly, no quantitative conclusions can be reached when so much subjective data is used. Most authors have concluded that there may be some resolution of fat accumulation, manifested as abdominal distention or buffalo hump, but no resolution of fat wasting, one of the most deforming aspects of lipodystrophy. Fourth, it is well known that efavirenz can increase total cholesterol, but most studies have found that the increase is in HDL, with unknown consequences. Despite these flaws, the authors' conclusions, listed below, were all very reasonable: a switch from protease inhibitor to NNRTI improves at least some of the lipid abnormalities; This article was provided by TheBodyPRO.com. It is a part of the publication The 1st International AIDS Society Conference on HIV Pathogenesis and Treatment. Please note: Knowledge about HIV changes rapidly. Note the date of this summary's publication, and before treating patients or employing any therapies described in these materials, verify all information independently. If you are a patient, please consult a doctor or other medical professional before acting on any of the information presented in this summary. For a complete listing of our most recent conference coverage, click here. TheBodyPRO.com is a service of Remedy Health Media, LLC, 750 3rd Avenue, 6th Floor, New York, NY 10017. TheBodyPRO.com and its logos are trademarks of Remedy Health Media, LLC, and its subsidiaries, which owns the copyright of TheBodyPRO.com's homepage, topic pages, page designs and HTML code. General Disclaimer: TheBodyPRO.com is designed for educational purposes only and is not engaged in rendering medical advice or professional services. The information provided through TheBodyPRO.com should not be used for diagnosing or treating a health problem or a disease. It is not a substitute for professional care. If you have or suspect you may have a health problem, consult your health care provider.
{ "pile_set_name": "Pile-CC" }
Q: How to extract text from a several "div class" (html) using R? My goal is to extract info from this html page to create a database: https://drive.google.com/folderview?id=0B0aGd85uKFDyOS1XTTc2QnNjRmc&usp=sharing One of the variables is the price of the apartments. I've identified that some have the div class="row_price" code which includes the price (example A) but others don't have this code and therefore the price (example B). Hence I would like that R could read the observations without the price as NA, otherwise it will mixed the database by giving the price from the observation that follows. Example A <div class="listing_column listing_row_price"> <div class="row_price"> $ 14,800 </div> <div class="row_info">Ayer&nbsp;19:53</div> Example B <div class="listing_column listing_row_price"> <div class="row_info">Ayer&nbsp;19:50</div> I think that if I extract the text from "listing_row_price" to the beginning of the "row_info" in a character vector I will be able to get my desired output, which is: ... 10 4000 11 14800 12 NA 13 14000 14 8000 ... But so far I've get this one and another full with NA. ... 10 4000 11 14800 12 14000 13 8000 14 8500 ... Commands used but didn't get what I want: html1<-read_html("file.html") title<-html_nodes(html1,"div") html1<-toString(title) pattern1<-'div class="row_price">([^<]*)<' title3<-unlist(str_extract_all(title,pattern1)) title3<-title3[c(1:35)] pattern2<-'>\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t([^<*]*)' title3<-unlist(str_extract(title3,pattern2)) title3<-gsub(">\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t $ ","",title3,fixed=TRUE) title3<-as.data.frame(as.numeric(gsub(",","", title3,fixed=TRUE))) I also try with pattern1<-'listing_row_price">([<div class="row_price">]?)([^<]*)< that I think it says to extract the "listing_row_price" part, then if exist extract the "row_price" part, later get the digits and finally extract the < thats follows. A: There are lots of ways to do this, and depending on how consistent the HTML is, one may be better than another. A reasonably simple strategy that works in this case, though: library(rvest) page <- read_html('page.html') # find all nodes with a class of "listing_row_price" listings <- html_nodes(page, css = '.listing_row_price') # for each listing, if it has two children get the text of the first, else return NA prices <- sapply(listings, function(x){ifelse(length(html_children(x)) == 2, html_text(html_children(x)[1]), NA)}) # replace everything that's not a number with nothing, and turn it into an integer prices <- as.integer(gsub('[^0-9]', '', prices))
{ "pile_set_name": "StackExchange" }
Giannis Kyriakopoulos Giannis Kyriakopoulos (alternate spellings: Yiannis, Yannis, Ioannis, Kiriakopoulos) (; born June 6, 1983) is a Greek professional basketball player. He is 1.88 m (6'2") in height, and he plays at the point guard position. Professional career In his pro career, Kyriakopoulos has played with the Greek Basket League clubs Panionios, AEL 1964, AEK Athens, and Panelefsiniakos. He was named the Greek 2nd Division Guard of the Year for the 2005–06 season, by the website Eurobasket.com. In the 2013–14 season, he played with Doxa Lefkadas in the Greek National B League (the 3rd level of Greece), and won the B League's north division championship with them. References External links FIBA Game Center Profile Eurobasket.com Profile Draftexpress.com Profile Greek Basket League Profile AEK Athens Profile Category:1983 births Category:Living people Category:AEK B.C. players Category:AEL 1964 BC players Category:Doxa Lefkadas B.C. players Category:Egaleo B.C. players Category:Greek men's basketball players Category:Greek Basket League players Category:KAOD B.C. players Category:Kastorias B.C. players Category:Olympias Patras B.C. players Category:Panelefsiniakos B.C. players Category:Panionios B.C. players Category:Point guards Category:Rethymno B.C. players
{ "pile_set_name": "Wikipedia (en)" }
Absolutism Absolutism may refer to: Government Absolute monarchy, in which a monarch rules free of laws or legally organized opposition; especially in the period c. 1610 – c. 1789 in Europe Enlightened absolutism, influenced by the Enlightenment (18th- and early 19th-century Europe) Autocracy, a political theory which argues that one person should hold all power Philosophy Morality Moral absolutism, the belief in absolute standards against which moral questions can be judged, regardless of context Graded absolutism, the view that a moral absolute, such as "Do not kill", can be greater or lesser than another moral absolute, such as "Do not lie" Other topics in philosophy Absolute (philosophy), an objective and unconditioned reality said to underlie perceived objects Absolute idealism, an ontologically monistic philosophy attributed to G. W. F. Hegel Physics Absolute theory, in physics Absolute space, a theory that space exists absolutely; contrast with relationalism
{ "pile_set_name": "Wikipedia (en)" }
Use of hearing aids by patients with closed mastoid cavity. Twenty-five patients who had undergone a closed-cavity tympanomastoidectomy in our Unit and wore a hearing aid in the operated ear were reviewed, and information was recorded on the use of the aid, and the patients' impression about it. The information obtained was analysed and compared with similar data from 39 hearing aid users of similar age with no history of ear surgery. Eighty per cent of the patients with a closed mastoid cavity were satisfied with the aid, and no significant difference was found between the two groups regarding the impression about the aid (chi square 3.06, p = 0.08), or the problems with it, which, in most of the cases, were related to several changes of mould (chi square 2.19, p = 0.13). The various recorded parameters are discussed, and it is concluded that the patients with a closed mastoid cavity can tolerate a hearing aid in the operated ear at least as well as the control subjects with no ear surgery.
{ "pile_set_name": "PubMed Abstracts" }
//------------------------------------------------------------------------------------------------------- // Copyright (C) Microsoft. All rights reserved. // Licensed under the MIT license. See LICENSE.txt file in the project root for full license information. //------------------------------------------------------------------------------------------------------- export function throwError() { throw new Error("This is an error"); }
{ "pile_set_name": "Github" }
Alfaro District San Juan is a district in San Ramón Canton, Costa Rica. References Category:Districts of Alajuela Province
{ "pile_set_name": "Wikipedia (en)" }
To use the new Pods, you'll need to be running one of the newer Xfinity home "Gateway" routers, something that Comcast says the majority of its customers (15 million of the total 26 million internet subscribers) have in their homes. Assuming that's the case, setup should be a breeze: Plug the pods in where you need better coverage, open the xFi WiFi app on your iPhone or Android device and then follow the on-screen directions. Comcast's Eric Schaefer (Senior VP of Broadband, Automation and Communications) said that his company bought the rights to Plume's WiFi management systems to integrate into Xfinity's WiFi products, but the Pods themselves look essentially identical to what Plume sells. They're small hexagons that plug into an outlet and include an ethernet port if you want to run a wired setup. Overall, the whole setup sounds near-identical to what Plume has sold for a few years (not that that's a bad thing). Schaefer also admits that mesh WiFi networks is a bit of a niche product for its customer base. "Blending the average across the country, about 70 percent of our homes had great coverage, and about 80 percent had acceptable coverage," he said, referencing surveyed homes that had been optimized for WiFi. That means the potential number of customers who'd benefit from isn't exactly massive, but it does help Comcast position Xfinity as a one-stop solution for all WiFi customers, regardless of how big their house might be. Of course, a lot of people who know enough to know they need a mesh network might also already be looking at third-party products like the aforementioned Plume, Eero or Google WiFi. But Comcast will also make it easy for new customers to determine if they'd benefit from Pods during the setup process; the xFi app can also help users figure out extending their network would be useful. Given Comcast's overall strategy of hooking customers up to additional services like home security and home automation, being able to make sure home WiFI stands up to the ever-growing number of devices on our networks is a smart priority.
{ "pile_set_name": "OpenWebText2" }
Customers Who Bought This Product Also Bought Young & Beautiful Vol. 3 VIXEN.com and two-time AVN Director of the Year Greg Lansky are proud to present Young & Beautiful Vol. 3. No other series has a better collection of young and natural talents! Cover-girls August Ames, Riley Reid, and Abella Danger indulge in an unforgettable seaside getaway that ends in an unexpected and steamy five-some. Also starring Scarlet Red, Karla Kush, Aidra Fox, and Vicki Chase in remarkable and passionate performances. With the high-end production value, breathtaking locations and captivating stories associated with VIXEN.com, Young & Beautiful Vol. 3. will leave you in awe!
{ "pile_set_name": "Pile-CC" }
Locked nucleic acid oligonucleotides: the next generation of antisense agents? Locked nucleic acid (LNA) is the term for oligonucleotides that contain one or more nucleotide building blocks in which an extra methylene bridge fixes the ribose moiety either in the C3'-endo (beta-D-LNA) or C2'-endo (alpha-L-LNA) conformation. The beta-D-LNA modification results in significant increases in melting temperature of up to several degrees per LNA residue. The alpha-L-LNA stereoisomer, which also stabilizes duplexes, lends itself to use in triplex-forming oligonucleotides and transcription factor decoys, which have to maintain a B-type (C2'-endo) DNA conformation. LNA oligonucleotides are synthesized in different formats, such as all-LNA, LNA/DNA mixmers, or LNA/DNA gapmers. Essentially, all aspects of antisense technology have profited from LNA due to its unprecedented affinity, good or even improved mismatch discrimination, low toxicity, and increased metabolic stability. LNA is particularly attractive for in vivo applications that are inaccessible to RNA interference technology, such as suppression of aberrant splice sites or inhibition of oncogenic microRNAs. Furthermore, the extreme antisense-target duplex stability (formation of persistent steric blocks) conferred by beta-D-LNA also contributes to the capacity to invade stable secondary structures of RNA targets. The in vivo studies reported so far indeed point to LNA as a promising antisense player at the horizon of clinical applications.
{ "pile_set_name": "PubMed Abstracts" }
Trump derangement syndrome Trump derangement syndrome (TDS) is a term for criticism or negative reactions to United States President Donald Trump that are alleged to be irrational and have little regard towards Trump's actual positions or actions taken. The term has been used by Trump supporters to discredit criticism of his actions, as a way of reframing the discussion by suggesting that his opponents are incapable of accurately perceiving the world. Origin of term The origin of the term is traced to political columnist and commentator Charles Krauthammer, a psychiatrist, who originally coined the phrase Bush derangement syndrome in 2003 during the presidency of George W. Bush. That "syndrome" was defined by Krauthammer as "the acute onset of paranoia in otherwise normal people in reaction to the policies, the presidency—nay—the very existence of George W. Bush". The first use of the term "Trump Derangement Syndrome" may have been by Esther Goldberg in an August 2015 op-ed in The American Spectator; she applied the term to "Ruling Class Republicans" who are dismissive or contemptuous of Trump. Krauthammer, in an op-ed harshly criticizing Trump, commented that—in addition to general hysteria about Trump—the "Trump Derangement Syndrome" was the "inability to distinguish between legitimate policy differences and... signs of psychic pathology" in his behavior. Definition Fareed Zakaria defined the syndrome as "hatred of President Trump so intense that it impairs people's judgment". CNN's editor-at-large Chris Cillizza called TDS "the preferred nomenclature of Trump defenders who view those who oppose him and his policies as nothing more than the blind hatred of those who preach tolerance and free speech". Pointing to previous allegations of Bush Derangement Syndrome and Obama Derangement Syndrome, Cillizza suggested, "Viewed more broadly, the rise of presidential derangement syndromes is a function of increased polarization—not to mention our national self-sorting—at work in the country today." Bret Stephens has described the term as something used by conservative groups whenever someone speaks out critically against Trump, regardless of political affiliation. Usage The term has been widely applied by pro-Trump writers to critics of Trump, accusing them of responding negatively to a wide range of Trump's statements and actions. The use of the term has been called part of a broader GOP strategy to discredit criticisms of Trump's actions, as a way of "reframing" the discussion by suggesting his political opponents are incapable of accurately perceiving the world. However, according to Kathleen Hall Jamieson of Annenberg Public Policy Center, the term could backfire on Trump supporters because people might interpret it to mean that Trump is the one who is "deranged", rather than those who criticize him. Some Trump supporters have asserted that he plays a form of "multi-dimensional chess" on a mental level his critics cannot comprehend, which they say explains why critics are frustrated and confused by Trump's words and actions. Fox News anchor Bret Baier and former House speaker Paul Ryan have characterized Trump as a "troll" who makes controversial statements to see his adversaries' "heads explode". The term has been used by journalists critical of Trump to call for restraint. Fareed Zakaria, who urged Americans to vote against Trump calling him a "cancer on American democracy", argues that every Trump policy "cannot axiomatically be wrong, evil and dangerous". Adam Gopnik, who takes a strong anti-Trump position, responded to these assertions that it is a "huge and even fatal mistake for liberals (and constitutional conservatives) to respond negatively to every Trump initiative, every Trump policy, and every Trump idea". Arguing that Trump's opponents must instead recognize that the real problem is "Deranged Trump Self-Delusion", which Gopnik defined the "Syndrome" as President Trump's "daily spasm of narcissistic gratification and episodic vanity". Examples of use Senator Rand Paul has cited the so-called syndrome several times. In a July 16, 2018, interview he said investigators should simply focus on election security and stop "accusing Trump of collusion with the Russians and all this craziness that's not true"—accusations which he said were entirely motivated by "Trump derangement syndrome". Trump used the term in a tweet following the 2018 Russia–United States summit in Helsinki: He also used it in a tweet about Alan Dershowitz's book The Case Against Impeaching Trump: In July 2018, Jeanine Pirro accused Whoopi Goldberg of suffering from Trump Derangement Syndrome during a guest appearance on The View to promote her newly published book. This occurred while Pirro was responding to a question about how the "deep state" really works. In July 2018, Eric Zorn wrote in the Chicago Tribune that the syndrome afflicts Trump's supporters more than his critics, as "what Team Trump is calling derangement is, in most cases, rational concern about his behavior and the direction he's taking the country.... The true Trump Derangement Syndrome loose on the land is the delusion suffered by those who still think he's going to make this country a better place for average people." White House Press Secretary Sarah Huckabee Sanders also used the term in this tweet: In September 2018, Fox News personality and Trump supporter, Sean Hannity criticized The Washington Post as having Trump Derangement Syndrome for stating in an editorial that Trump, because of his attitude toward climate change, is "complicit" in hurricanes battering the United States; Hannity said "it is now a full-blown psychosis, it is a psychological level of unhingement I have never seen." In November 2018, Michael Goodwin, writing in the New York Post, discussed a variant of Trump Derangement syndrome he called "Trump Imitation Syndrome". In August 2019, Anthony Scaramucci, Trump's former White House Communications Director, said in interviews with Vanity Fair and CNN that he had "Trump fatigue syndrome" instead of Trump derangement syndrome. In September 2019, Sean Hannity characterized as "Trump derangement syndrome" the continuing press coverage of Trump's days-long insistence that he was correct to state on September1 that Hurricane Dorian posed a danger to Alabama, asserting "pretty much every newsroom in America screwed this up and lied to you," adding there were "a lot of psychotic jackasses in the media mob". See also Public image of George W. Bush § Bush Derangement Syndrome neologism Clinton crazies References Category:Donald Trump Category:American political neologisms Category:Reactions to the election of Donald Trump Category:Words coined in the 2010s Category:Words and phrases introduced in 2015
{ "pile_set_name": "Wikipedia (en)" }
High mobility group nucleosome-binding family proteins promote astrocyte differentiation of neural precursor cells. Astrocytes are the most abundant cell type in the mammalian brain and are important for the functions of the central nervous system. Although previous studies have shown that the STAT signaling pathway or its regulators promote the generation of astrocytes from multipotent neural precursor cells (NPCs) in the developing mammalian brain, the molecular mechanisms that regulate the astrocytic fate decision have still remained largely unclear. Here, we show that the high mobility group nucleosome-binding (HMGN) family proteins, HMGN1, 2, and 3, promote astrocyte differentiation of NPCs during brain development. HMGN proteins were expressed in NPCs, Sox9(+) glial progenitors, and GFAP(+) astrocytes in perinatal and adult brains. Forced expression of either HMGN1, 2, or 3 in NPCs in cultures or in the late embryonic neocortex increased the generation of astrocytes at the expense of neurons. Conversely, knockdown of either HMGN1, 2, or 3 in NPCs suppressed astrocyte differentiation and promoted neuronal differentiation. Importantly, overexpression of HMGN proteins did not induce the phosphorylation of STAT3 or activate STAT reporter genes. In addition, HMGN family proteins did not enhance DNA demethylation and acetylation of histone H3 around the STAT-binding site of the gfap promoter. Moreover, knockdown of HMGN family proteins significantly reduced astrocyte differentiation induced by gliogenic signal ciliary neurotrophic factor, which activates the JAK-STAT pathway. Therefore, we propose that HMGN family proteins are novel chromatin regulatory factors that control astrocyte fate decision/differentiation in parallel with or downstream of the JAK-STAT pathway through modulation of the responsiveness to gliogenic signals.
{ "pile_set_name": "PubMed Abstracts" }
Our Opinion: Kosel has right idea about sunshine in Illinois Comment The State Journal-Register Writer Posted Apr. 14, 2014 at 1:10 AM Posted Apr. 14, 2014 at 1:10 AM Illinois lawmakers are not shy about trying to change the state’s Freedom of Information Act — the law that enables citizens and taxpayers to gain access to documents and information about how government operates and spends money. Unfortunately, not all of the changes lawmakers seek are good for the public. In early 2010, after an overhaul of the state’s FOIA law, it was a matter of weeks before lawmakers began looking for ways to water it down. They sought to bar the release of performance reviews of teachers, school administrators, police officers and other public employees. They wanted to allow governmental bodies to charge the citizens more to gain access to public documents. They sought to eliminate a provision that allows citizens who successfully sue public bodies for violating FOIA to collect attorney fees. Sadly, attempts to weaken Illinois’ sunshine laws continue. For example, Sen. Bill Cunningham, D-Chicago, recently proposed legislation that would exempt 911 recordings from FOIA, saying they have no news value and amount to an invasion of privacy. Cunningham, a former police spokesman, said he decided to introduce Senate Bill 3072 after hearing broadcasts of panicked 911 calls from the December 2012 Sandy Hook School shootings in Newtown, Conn. “The thousands of media outlets that aired those recordings weren’t acting as government watchdogs trying to shed light on the conduct of law enforcement,” he was quoted as saying. “They were simply looking to create shocking program content in order to boost ratings and drive visits to their websites.” It’s unclear how Cunningham knows so confidently what motivation the media had in airing those 911 recordings. But there are valid reasons why 911 calls should be a matter of public record. They provide a level of accountability for emergency response workers who are supposed to serve the public but who also face a multitude of challenges in doing so. Allowing the public to hear 911 calls helps them gain a better understanding of emergency events, how they were handled and what, if any, policy changes need to occur as a result. In addition, taxpayers provide the money that supports 911 operations and most first responder agencies. On the flip side, a different law pending at the Statehouse would strengthen the public’s right to know in Illinois. House Bill 3664, sponsored by Rep. Renee Kosel, R-New Lenox, would ban confidentiality clauses on settlement and severance agreements involving governmental bodies. This is sunshine we can get behind. The bill was prompted by outrage over a confidential $871,000 severance agreement negotiated between Chicago’s troubled Metra board and its former CEO Alex Clifford, who resigned last summer amid a patronage scandal that involved allegations that House Speaker Michael Madigan wielded influence over hiring at the commuter rail agency. Just last week, Madigan spokesman Steve Brown released a letter indicating the legislative inspector general cleared Madigan of any wrongdoing and that the investigation is now closed. Page 2 of 2 - But taxpayers were on the hook for Clifford’s severance package. And although they had to foot the bill, they were not privy to the details because the board agreed to a confidentiality clause that prohibited members or Clifford from discussing his separation or the details of the agreement. “These clauses seem little more than ‘hush money’ to keep an outgoing employee quiet,” Kosel said in a post on her website. Confidentiality clauses aren’t just a Chicago thing. They’re standard operating procedure for many public bodies. The District 186 school board’s nearly $178,000 separation agreement with former superintendent Walter Milton last year included a confidentiality clause. The agreement eventually became public after The State Journal-Register obtained a copy through FOIA, but board members had to abide by the confidentiality agreement, former board president Susan White said at the time. And in 2009 the University of Illinois Springfield paid $200,000 to a student to settle allegations of sexual impropriety involving a coach. The university resisted releasing the settlement agreement for two years, citing privacy concerns and other arguments, until the Illinois attorney general stepped in. Kosel’s bill, which cleared the House unanimously last week, makes sense for Illinois taxpayers and government accountability. Cunningham’s, not so much.
{ "pile_set_name": "Pile-CC" }
Improved outcomes from tertiary center pediatric intensive care: a statewide comparison of tertiary and nontertiary care facilities. To compare outcomes from pediatric intensive care in hospitals with different levels of resources. Prospective, blinded comparison of outcome and care. Tertiary (n = 3) and nontertiary (n = 71) hospitals in Oregon and southwestern Washington. All critically ill children admitted with respiratory failure and head trauma for 6 months. Severity of illness adjusted mortality rates were determined using admission day, physiologic profiles (Pediatric Risk of Mortality score) and care modalities were assessed daily. The crude mortality rate of the tertiary patients was four times higher than for the nontertiary patients (23.4% vs. 6.0%, p less than .0001). In the tertiary patients, the numbers of outcomes were accurately predicted by physiologic profiles (observed: 30 deaths and 98 survivors; predicted: 29.3 deaths and 98.7 survivors, z = -.25, p greater than .4). However, for the nontertiary patients, the number of the deaths were significantly different than predicted (observed: 20 deaths and 315 survivors; predicted: 14.4 deaths and 320.6 survivors, z = -2.08, p less than .05). The odds ratios of dying in a nontertiary vs. a tertiary facility were about 1.1, 2.3, and 8 (p less than .05) for mortality risk groups of less than 5%, 5% to 30%, and greater than 30%. Patients in tertiary facilities received more (p less than .05) invasive (e.g., arterial catheters) and complex (e.g., mechanical ventilation) care, whereas patients in nontertiary facilities received more (p less than .05) labor-intensive care (e.g., hourly vital signs). Care of the most seriously ill children in tertiary pediatric ICUs could improve their chances of survival.
{ "pile_set_name": "PubMed Abstracts" }
Reforming the Medicare payment structure to reward market-driven entrepreneurial innovations would cut healthcare costs by nearly $2.5 trillion by mid-century, according to a new study from the National Center for Policy Analysis (NCPA).
{ "pile_set_name": "Pile-CC" }
The Red Sox have “keen interest” in Phillies righty Pat Neshek, reports WEEI.com’s Rob Bradford. The 36-year-old Neshek (who has already tossed a scoreless inning in tonight’s All-Star Game) is widely expected to be traded, given his status as an impending free agent on baseball’s worst team. The sidearmer has worked to a pristine 1.27 ERA with 9.2 K/9, 1.3 BB/9 and a 36.5 percent ground-ball rate thus far in 2017. And, unlike in many previous seasons, Neshek has held left-handed opponents in check quite well. Right-handed opponents are hitting .234/.253/.286 against Neshek this season, while lefties are hitting .180/.231/.313. The Boston Globe’s Nick Cafardo reported that the Sox had scouted Neshek over the weekend as well, and he’s also been linked to the Nationals this summer. More on the Red Sox…
{ "pile_set_name": "OpenWebText2" }
SIM card maker Gemalto has dismissed recent reports that U.K. and U.S. spies obtained encryption keys protecting millions of mobile phones by hacking its network. Secret documents revealed last week suggested that spies from the U.S. National Security Agency and the U.K. Government Communications Headquarters had stolen SIM card encryption keys from Gemalto, allowing them to intercept the conversations of millions of mobile phone users. The GCHQ documents, dating from 2010, were among those leaked by former NSA contractor Edward Snowden. On Wednesday, though, Gemalto said that while it had detected sophisticated attacks on its office networks in 2010 and 2011 that it now believed were probably conducted by the NSA and GCHQ, these could not have led to the massive theft of SIM encryption keys. While the leaked documents showed the spies boasting “(We) believe we have their entire network,” Gemalto said that its internal investigation showed that the intrusions only breached its office network, and not the entirely separate infrastructure used for generating and transmitting the SIM card encryption keys. By 2010 those keys were being exchanged with its network operator customers by secure means in all but a few cases, making the wholesale theft of the keys unlikely and meaning that Gemalto could not have been the source of the massive leaks reported, it said. Furthermore, Gemalto had never sold SIM cards to four of the 12 networks named in the leaked documents, so it could not have been the source of, for example, 300,000 SIM encryption keys stolen from a Somali carrier, it said. That doesn’t exclude the possibility that the keys were stolen from other SIM manufacturers, though: Gemalto is the largest, but not the only, supplier of the devices. Even if the spy agencies had somehow stolen SIM encryption keys from Gemalto, only communications on second-generation mobile networks such as GSM would be vulnerable, not the newer 3G and 4G networks introduced by many operators after 2010, the company said. Gemalto assumed for the purposes of its investigation that the leaked documents were genuine and accurate, but did not seek to confirm or refute the documents’ claims, it said. Outsiders regularly—and unsuccessfully—try to hack its networks, it said, and only a few attempts breach even the outer levels of its network. In June 2010, it detected and immediately countered an attack seeking to spy on the office network at one of its French sites. The following month, some of its network operator customers received emails from spoofed Gemalto addresses, with attachments containing malware. Around that time, attacks were also made on the PCs of Gemalto staff in contact with customers. Following its investigation, Gemalto said it planned to improve its security processes and continue monitoring its networks. Barring further developments in this case, though, however, it plans to make no further comment on the matter.
{ "pile_set_name": "OpenWebText2" }
Recent advances in bulk metallic glasses for biomedical applications. With a continuously increasing aging population and the improvement of living standards, large demands of biomaterials are expected for a long time to come. Further development of novel biomaterials, that are much safer and of much higher quality, in terms of both biomedical and mechanical properties, are therefore of great interest for both the research scientists and clinical surgeons. Compared with the conventional crystalline metallic counterparts, bulk metallic glasses have unique amorphous structures, and thus exhibit higher strength, lower Young's modulus, improved wear resistance, good fatigue endurance, and excellent corrosion resistance. For this purpose, bulk metallic glasses (BMGs) have recently attracted much attention for biomedical applications. This review discusses and summarizes the recent developments and advances of bulk metallic glasses, including Ti-based, Zr-based, Fe-based, Mg-based, Zn-based, Ca-based and Sr-based alloying systems for biomedical applications. Future research directions will move towards overcoming the brittleness, increasing the glass forming ability (GFA) thus obtaining corresponding bulk metallic glasses with larger sizes, removing/reducing toxic elements, and surface modifications. Bulk metallic glasses (BMGs), also known as amorphous alloys or liquid metals, are relative newcomers in the field of biomaterials. They have gained increasing attention during the past decades, as they exhibit an excellent combination of properties and processing capabilities desired for versatile biomedical implant applications. The present work reviewed the recent developments and advances of biomedical BMGs, including Ti-based, Zr-based, Fe-based, Mg-based, Zn-based, Ca-based and Sr-based BMG alloying systems. Besides, the critical analysis and in-depth discussion on the current status, challenge and future development of biomedical BMGs are included. The possible solution to the BMG size limitation, the brittleness of BMGs has been proposed.
{ "pile_set_name": "PubMed Abstracts" }
<Canvas> <Kind>40</Kind> <Name>Post Effects</Name> <IsMinified>1</IsMinified> <XPosition>1.000000000</XPosition> <YPosition>357.000000000</YPosition> </Canvas> <Widget> <Kind>2</Kind> <Name>Enable</Name> <Value>0</Value> </Widget> <Widget> <Kind>4</Kind> <Name>Chroma_Distortion</Name> <Value>0.000000000</Value> </Widget> <Widget> <Kind>4</Kind> <Name>Grain_Distortion</Name> <Value>0.000000000</Value> </Widget> <Widget> <Kind>2</Kind> <Name>Do Bloom</Name> <Value>0</Value> </Widget> <Widget> <Kind>4</Kind> <Name>Bloom Level</Name> <Value>0.000000000</Value> </Widget> <Widget> <Kind>42</Kind> <Name>Bloom Size</Name> <Value>1</Value> </Widget>
{ "pile_set_name": "Github" }