text
stringlengths
0
2.82M
meta
dict
Q: Reduced cost zero for the two-phase Simplex? I cannot understand the line -12, -4, -5, 1, 1, -1, 0, 0, 0. Now the formula $\bf c - \bf A ^t \bf y$ when $c=0$ will result into the line. It is just many times a dot product: for example, 0-(1*5+1*1+1*6)=-12. But why is $c=0$ here? This problem is a part of two-phase Simplex but probably the same with most Simplexes. P.s. Page 116 in the Bertsimas -book (1997). A: Wrong! "Now the formula $c−A^ty$ when $c=0$ will result into the line." You would get something like $(1\times 8)-(3\times 8)$ so the matrix dimensions are totally wrong. Correct The reduced cost formula is $\bar c_j =c_j - c_B^T B^{-1} A_j$, more about the reduced calculations here. By this you can calculate the top line. The example $$\min y_1+y_2+y_3$$ so $c_1=c_2=c_3=c_4=c_5=0$, $c_6=c_7=c_8=1$, $x_B=(x_6,x_7,x_8)$ and $c_B=(1,1,1)$. And $B=I_3$, the 3-identity-matrix. Then for example $$\bar c_1=c_1-c_B^T A_1=-(1,1,1)^T (2,1,2)=-(2+1+2)=-5.$$ Your homework is to read the page 84 in Bertsimas again. Perhaps related Optimality conditions and Directions in Simplex method Reduced cost vector in the phase I of the Two-phase simplex? Optimum exists but not extreme point in Standard Form LP problem?
{ "pile_set_name": "StackExchange" }
Emma Mae BAMcinématek screens Emma Maeat 4:30 and 9:30 pm today as part of its very welcome and long overdue Jamaa Fanaka retrospective, "L.A. Rebel." Fanaka is one of the most fascinating figures in the movement which has come to be known as the “LA Rebellion” (sometimes also referred to as “The Los Angeles School of Black Filmmakers”), made up of African, Caribbean, and African-American film- and videomakers such as Charles Burnett, Julie Dash, Haile Gerima, Billy Woodberry, and others, who all came through UCLA Film School in the 1970s and 80s. A landmark moment in the history of Black and independent filmmaking in America, the “LA Rebellion” is often understood in contrast or even opposition to the blaxploitation genre of the same period. What makes Fanaka particularly interesting is the ways in which his films, unlike those of most of his peers, were often marketed as and parodied the narratives and strategies of blaxploitation films. ( Emma Mae , for instance, has, for most of its history, been distributed under the title Black Sister’s Revenge. ) Although Fanaka rejected the term blaxploitation, he also cannily invited this marketing strategy, pitching his films to audiences looking for a “blaxploitation film,” and delivering to those audiences works which brilliantly subvert and deconstruct genre tropes and expectations. The second of an incredible three features (and one short film) Fanaka made while at UCLA, Emma Mae is one of his greatest achievements and an excellent introduction to his body of work. The story concerns a young girl, Emma Mae, from rural Mississippi (where Fanaka also came from) who moves to Los Angeles to stay with family. Her LA relations—and, likely, the audience—expect her to be naive, unable to cope with life in the city. Much of the joy and surprise of Emma Mae lies in how she—and the film—upend these, and other, expectations, however. Beyond his unforgettable title character, Fanaka is interested in presenting a Black community in all of its complexity, attuned to class and political differences, documenting the different fashions and music to be found there. This interest in offering an expansive and generous vision of a Black community as whole is evident from the opening credit sequence, a wonderful, unhurried, and keenly observant document of an afternoon at a Compton park. Nevertheless, at the heart of Emma Mae is the singular, extraordinary performance Jerri Hayes gives in the title role. A drama student at UCLA when Fanaka cast her as Emma Mae, this—regrettably—would be the only film role she ever had. Luckily for New York moviegoers, Hayes will be in attendance at the 4:30 showing of Emma Mae today for a post-screening Q&A. Screen Slate depends on reader support to provide local film & video coverage
{ "pile_set_name": "Pile-CC" }
During oogenesis and maturation of the sea urchin egg, large stores of mRNA are accumulated for subsequent use during early embryogenesis. Utilization of stored maternal mRNA occurs at a very low rate prior to fertilization. After fertilization, dramatic changes in mRNA availability and recruitment occur, allowing rapid increases in the synthetic rate of many proteins during early cleavage. Changes have been documented in both overall rates of maternal mRNA utilization and in the selection of particular mRNA species at different developmental stages. Our previous studies have allowed the development of cell-free translation systems from eggs and embryos that reproduce the overall differences observed in the intact system. This investigation proposes to utilize these cell-free systems, in conjunction with other approaches, to identify the cellular components involved in the utilization of maternal mRNA. Using the cell-free systems an inhibitor of eIF-4F activity has been discovered in the unfertilized egg, that decreases gradually in activity over the first 2-3 hr after fertilization. The identity and nature of the eIF-4F inhibitory activity will be characterized. The mechanism by which this activity inhibits the initiation sequence will also be investigated. The manner in which the inhibitor is inactivated after fertilization will be explored. To complement these studies, a systematic search for developmentally regulated mRNA-interactive proteins will be undertaken, using a protein blotting and in vitro binding technique, with capped 32p-labelled mRNA's synthesized in vitro.
{ "pile_set_name": "NIH ExPorter" }
Q: Can I use the "Secretary Problem" to find the worst candidate, too? As you know, we use the "Secretary Problem" to choose the single best candidate. Now I would like to know can we use this rule to find the worst candidate, too? If yes, how to accomplish this? A: Yes. The algorithm simply finds the participant who is optimal according to some property, but does not care what that property means (as long as it defines an ordering relation on the candidates). Changing that property from being good to being bad (or whatever else) is just a definition without algorithmic relevance. A: I think he wants to know if you can use the procedure to choose the worst (instead of the best) candidate. The answer is yes. The situation is: you know how many candidates $N$ there are, but you don't know the distribution of the quality of the candidates. Also, you can only look at one candidate at a time, and not go back to a previous candidates ("no recall"). You use the $1/e$ algorithm: first look at $1/e$ of the $N$ candidates, and remember the quality of the worst of those, which is, say, $\underline{q}$. After the $N/e$ sampled candidates, you choose the first candidate that is worse than what you have previously seen, i.e., you choose candidate $i$ if $q_i\le \underline{q}$, and candidate $N$ if no candidate's quality was worse. This procedure maximizes the probability to choose the worst candidate. This is just the inversion of the solution to maximize the probability to choose the best candidate. A: Sure, the algorithm will just choose a highly ranked candidate (probably). It's up to you how you rank them - by how good they are, or by how bad they are, the algorithm doesn't know what the ranking system means.
{ "pile_set_name": "StackExchange" }
Introduction ============ Disease ecology has progressed tremendously in the last 30 years through a focus on simplified one-host one-pathogen models. However, recent studies have begun to emphasize the importance of more complex pathogen communities that normally infect single individuals or single host species in nature (Petney and Andrews [@b55]; Read and Taylor [@b56]; Lello et al. [@b43]; Pedersen and Fenton [@b54]; Fenton [@b23]; Rigaud et al. [@b57]). For example, multiple pathogen species have been shown to interact within individual hosts, resulting in compounded negative effects on individual host fitness (Lello et al. [@b43]) and such multiple infection may be a primary driver of virulence evolution (van Baalen and Sabelis [@b7]; Frank [@b24]). These pathogen interactions within an individual host are thought to occur either directly or indirectly, as a result of shared host resource or host immune-mediated interactions. Recent research from human co-infection studies suggest that most interactions between pathogens are synergistic, that is, the presence of one pathogen species increases the presence of the other, for example, resulting in higher parasite abundances in co-infected individuals, and consequently greater negative effects for health (Griffiths et al. [@b29]). However, factors allowing the long-term co-occurrence of multiple pathogen species on a single host species are poorly understood from both the theoretical and empirical perspective, limiting our ability to predict the overall threat of co-infection for host health and to anticipate the impact of controlling one pathogen on other members of the pathogen community. Based on analogies from community ecology, a susceptible host individual can be viewed as a set of heterogeneous resource patches, where different parts of the host (e.g., gastrointestinal tract vs. blood in animals, leaves vs. roots in plants, etc.) might provide niches that are sufficiently discrete to reduce competition between spatially separated pathogens (Holt and Dobson [@b33]; Pedersen and Fenton [@b54]). Recent research has suggested that many parasites are likely to interact indirectly with other species at the level of the individual host, through segregated host resources (Griffiths et al. [@b29]). However, closely related pathogens, such as members of the same genus, are more likely to occupy identical niches, and their occurrence on the same host species is less easily explained by resource partitioning. For example, combinations of several malaria-causing *Plasmodium* species have been observed in sympatry among human and avian populations, even co-infecting individual hosts and these different *Plasmodium* species have been shown to target different red blood cell classes ([@b65]). Another explanation of the persistence of closely related pathogen species on a single host species may be genetic polymorphisms for resistance to a specific pathogen (Dwyer et al. [@b20]; Aparicio et al. [@b5]) that allows co-occurrence of the pathogen at the population level, but not at the level of host individuals. It is well known that gene-for-gene systems, as well as specific induced immunity, can lead to the maintenance of multiple genotypes of a pathogen species on a single population or species of host (Cox [@b16]; Gruner et al. [@b30]). However, it is largely unknown to what extent such specificities in resistance occur at the within pathogen species level or how these will translate to among pathogen species (Heath [@b31]). The interactions between species-specific resistance and the maintenance of multiple-related pathogen species on a single host species are not well understood because there are few theoretical models or empirical studies (Roode et al. [@b58]; Aparicio et al. [@b5]). Some basic assumptions of trait evolution would apply to resistance to multiple pathogens species, including whether multiple species-specific resistances are genetically correlated. In addition, their long-term co-evolutionary dynamics is likely to be limited by the strength of any associated resistance costs to the individual host and the complexity of the pathogen community (Parker [@b53]; Antonovics [@b3]). More generally, studies on resistance to multiple pathogen species have been very limited (Leimu and Fischer [@b42]; Wisser et al. [@b64]), and results have shown either positive, negative, or the lack of a correlation across host genotypes. In other non-pathogenic systems, the evolution of structural defenses against herbivores in plants and parasitoids in insects function most often as general protection against groups of similar enemies (Boulétreau and Wajnberg [@b11]; Parker [@b53]). Anther-smut disease, caused by fungal pathogens in the genus *Microbotryum*, occurs frequently on plants in the Caryophyllaceae (Hood et al. [@b36]) and provides a suitable model for studying host--pathogen interactions in natural systems (Bernasconi et al. [@b9]). Although there is usually a high degree of host-species specificity in the pathogens (Le Gac et al. [@b41]), multiple *Microbotryum* species sometimes occur on a single host species. For example, *Silene vulgaris* in alpine regions of Europe harbors three *Microbotryum* species, *M. silenes-inflatae*, *M. lagerheimii*, and *M. violaceo-irregulare* (Kemler et al. [@b38]; Denchev [@b18]), and there are sites with complete sympatry of pathogen species within a population of one host species (Bucheli et al. [@b12]). It is unlikely that these *Microbotryum* species coexist because they occupy different morphological niches within the host individuals because anther-smut pathogens reside within a very limited region of the plant apical meristems and only produce spores in anthers of the flowers (Day [@b17]; Audran and Batcho [@b6]; Schäfer et al. [@b61]). Thus, pathogen-specific resistance is a possible alternative explanation of the occurrence of multiple *Microbotryum* species on a single host species. However, little is known about the specificity of resistance in any *Silene*-*Microbotryum* system. Studies have shown that there is substantial genetic variation for resistance in host populations, and it can sometimes have a simple genetic basis with a bimodal segregation, as in *S. vulgaris* (Cafuir et al. [@b14]), or be more continuously variable, as in *S. latifolia* (Alexander and Antonovics [@b1]; Biere and Antonovics [@b10]). Where variation in pathogen infectivity and host-genotype by pathogen-genotype interaction effects have been measured, sufficient variation in the pathogen infectivity, so that it could reflect local adaptation, was not observed (Carlsson-Graner [@b15]; Kaltz and Shykoff [@b37]). Here, we present a study of anther-smut disease on *Silene uniflora* (= *S. maritima*), a close relative of *S. vulgaris*, which also harbors populations of *M. silenes-inflatae* and *M. lagerheimii*. *Silene uniflora* is endemic to coastal regions of central and northern Europe, and its populations are disjunct from diseased populations of *S. vulgaris* in the Alps. We describe the occurrence of *M. silenes-inflatae* and *M. lagerheimii* in populations of *S. uniflora* in England and Wales. We then use experimental inoculations to determine whether pathogen-specific resistances may contribute to the maintenance of multiple *Microbotryum* species *S. uniflora* by quantifying family-level and population-level variation and covariation for resistance to these pathogens. Material and Methods ==================== Study system ------------ Fungi in the genus *Microbotryum* (Basidiomycota) cause anther-smut disease on many perennial species in the Caryophyllaceae (Hood et al. [@b36]). Anther-smut disease results in the pathogen replacing pollen in the host\'s anthers with fungal spores (i.e., teliospores) ([Fig. 1](#fig01){ref-type="fig"}), which are then transmitted to other plants by insect pollinators. The pathogen is generally found in all flowers of an infected plant and the disease results in the abortion of female structures, such that infected plants are sterilized. The disease cycle and life history, which are general across *Microbotryum* anther smuts, are summarized in Giraud et al. ([@b26]). There is little effect of infection upon individual host mortality, and the pathogen can persist for many years as it overwinters inside the host. The existence of host-species specificity among *Microbotryum* isolates from different host species has been known since the early 1900s (Goldschmidt [@b28]), but only recently have detailed morphological studies and molecular phylogenies helped to confirm the existence of such multiple species-specific *Microbotryum* lineages (Vánky [@b62]; Le Gac et al. [@b41]; Denchev et al. [@b19]), and some, including those studied here, have been given species names (Denchev [@b18]; Denchev et al. [@b19]). ![Anther-smut disease of *Silene uniflora*, caused by the fungi in the genus *Microbotryum*. The teliospores of the fungal pathogen replace the pollen of the plant and are carried to other plants by insect pollinators.](ece30002-2304-f1){#fig01} The host *Silene uniflora* (= *Silene maritima*) harbors populations of *Microbotryum lagerheimii* and *Microbotryum silenes-inflatae*. Within *Microbotryum* on European *Silene*, based on DNA sequences of three single copy genes, these two species are highly divergent, and in separate clades containing species that are specific to other hosts (Le Gac et al. [@b41]; note that the species in this article are referred to as "MvSv1" and "MvSv2," respectively). The two species are cross-compatible, but their hybrids showed a reduced ability to infect relative to hybrids between more closely related species (cf. Gac et al. [@b25]). High elevation populations of the closely related plant *Silene vulgaris* (Runyeon and Prentice [@b59]), also harbor *M. silenes-inflatae* and *M. lagerheimii*, as well as other *Microbotryum* species (Bucheli et al. [@b12]; Kemler et al. [@b38]; Denchev [@b18]; Le Gac et al. [@b41]; Lutz et al. [@b46]). Inoculation studies have also demonstrated the potential for co-infections by *M. silenes-inflatae* and *M. lagerheimii* of individual plants of *S. vulgaris* (Gold et al. [@b27]). *Silene uniflora* is a gynodioecious long-lived perennial herb found mostly in coastal habitats in central and northern Europe. A small number of inland populations exist in the United Kingdom, primarily associated with high elevation sites or in heavy metal contaminated soils (Marsden-Jones and Turril [@b49]). Prior studies of anther-smut disease on this host are very limited (Evans and Wilson [@b21]). Field surveys and collections ----------------------------- *Silene uniflora* populations in England and Wales were identified using locations noted in the literature, herbarium records, and online resources such as Wild About Britain (<http://www.wildaboutbritain.co.uk>). Fourteen populations were surveyed in 2008, at which time seeds were collected by common female parent ([Table 1](#tbl1){ref-type="table"}; [Fig. 2](#fig02){ref-type="fig"}). Selecting individual plants was conducted haphazardly, but at well-spaced intervals throughout each population to provide representative collections. Seeds of *S. uniflora* were collected as maternal half-sib families by taking seeds from one plant where the source of pollen was likely to include multiple plants. As individuals of *S. uniflora* typically grow as large mats that can become intertwined in high-density populations, care was taken to trace flowering stems back to a common tap root to ensure that seeds from separate maternal sources were not mixed. For most sites, more than 10 families were sampled for seeds and multiple capsules were collected for each family to maximize the seed availability ([Table 1](#tbl1){ref-type="table"}). ![Sampling localities and the occurrence of anther-smut disease on *Silene uniflora* in England and Wales. Details of localities are given in [Table 1](#tbl1){ref-type="table"}. Populations free of disease (Healthy) and populations where disease was found (Diseased) are indicated by "H" and "D," respectively.](ece30002-2304-f2){#fig02} ###### Population data for collections of *Silene uniflora* seeds and *Microbotryum* samples Location name Description of location and year visited Latitude, longitude Number of healthy individuals (families sampled for seeds) Number of diseased individuals (individuals sampled for disease) *Microbotryum* species ---------------------------------------- ------------------------------------------ ----------------------- ------------------------------------------------------------ ------------------------------------------------------------------ ------------------------ Thorne Waste\* (Yorkshire, England) Inland bog +53.40825, −0.20176 250 (12) 0 (0) Cley Next The Sea\* (Norfolk, England) Shingle beach +52.965866, +1.042957 100--200 (12) 0 (0) Blakeney Point\* (Norfolk, England) Shingle beach +52.963131, +0.989013 1000 (12) 0 (0) Morston Marsh (Norfolk, England) Coastal marsh +52.96317, +0.97074 80 (10) 0 (0) Knott End On Sea (Lancashire, England) Coastal meadow +53.92850, −2.99431 30 (0) 0 (0) Walney Island 1\* (Cumbria, England) Shingle beach +54.10965, −3.26817 150 (12) 0 (0) Walney Island 2\* (Cumbria, England) Shingle beach +54.06206, −3.22281 250 (12) 0 (0) Goginan (Ceredigion, Wales) Inland near mine +52.42836, −3.91877 120 (7) 0 (0) Aberystwyth\* (Ceredigion, Wales) Coastal cliff +52.42336, −4.08432 400 (14) 30--60 (25) *M. s.-i*. Pembrokeshire Coast 1\* (Wales) Coastal cliff +51.66542, −5.07025 150 (7) 3 (3) *M. s.-i*. Pembrokeshire Coast 2\* (Wales) Coastal cliff +51.66612, −5.08022 50--100 (7) 5 (5) *M. s.-i*. Hurlstone Point\* (Somerset, England) Coastal cliff +51.23113, −3.57748 80 (14) 3 (3) *M. s.-i*. Charterhouse\* (Somerset, England) Inland mine +51.30109, −2.70838 1000 (17) 500 (25) *M. s.-i./M. l*. Priddy\* (Somerset, England) Inland mine +51.25927, −2.64991 80 (8) 4 (3) *M. l*. The site names, descriptions, year of sampling, and GPS coordinates are given. Approximate numbers of healthy and diseased individuals are listed with the number of plants sampled families for seeds and fungal spores, respectively, given in parentheses. Asterisks indicate source populations for seeds used in the inoculation experiment. Identified *Microbotryum* species are abbreviated as *M. s.-i*. for *M. silenes-inflatae* and *M. l*. for *M. lagerheimii*. The latitude and longitude of each locality were recorded, as well as estimates of the number of healthy and diseased host plants ([Table 1](#tbl1){ref-type="table"}). To minimize cross-contamination in the field, *Microbotryum* samples were collected as mature but unopened flower buds from diseased plants rather than as open flowers. PCR-RFLP was used to assign field-collected specimens to either *M. silenes-inflatae or M. lagerheimii*. Following DNA extraction from spore-filled anthers using the Chelex method of Bucheli et al. ([@b13]), the internal transcribed spacer (ITS) region of the nuclear ribosomal RNA genes was amplified by PCR. The PCR product was digested by the *Hha*I restriction enzyme, where the restriction digest banding pattern differentiates *M. lagerheimii* from *M. silenes-inflatae*. ITS primers were designed to be specific to *Microbotryum* to avoid amplification of plant DNA: forward primer (5′ to 3′) CTGTTTAACCAGGGCGTGAC and reverse primer (5′ to 3′) TGATCTCGAAGGTTAGGATGC. Variation in physiological resistances -------------------------------------- To assess variation in physiological resistance, which is the prevention of disease following exposure to the pathogen, in *S. uniflora*, families were chosen with sufficient numbers of seeds to inoculate 30--50 individual plants per family with four pathogen genotypes, two from each of the two *Microbotryum* species applied to each host singly (see below). Families with too few seedlings to receive all four treatments were instead inoculated with two pathogen genotypes, one randomly chosen from each of the two *Microbotryum* species. Families from five populations free of disease and six populations where disease was present were used in the inoculation study ([Table 1](#tbl1){ref-type="table"}). Seeds were surface-sterilized in a dilute solution of sodium hypochlorite and alcohol and germinated in 150 × 15 mm Petri dishes containing 1/10th strength Murashige and Skoog Basal Salt Mixture (Sigma-Aldrich, St. Louis, MO) and 1% agar. After 10 days of incubation at 15°C, when most seedlings had fully expanded their cotyledons, 4 μL of inoculum was applied to the apical meristem as a suspension of 1400 fungal spores in water plus a surfactant (as in Hood [@b34]). In the anther-smut disease system, resistance variation assessed by experimental inoculation has been shown to strongly predict rates of disease transmission in the field (Alexander et al. [@b2]). Seedlings from each family were randomly assigned to receive an inoculation with a pathogen isolate from each of the following source populations: *M. lagerheimii* from Charterhouse, *M. lagerheimii* from Priddy, *M. silenes-inflatae* from Pembroke Coast 1 ([Table 1](#tbl1){ref-type="table"}), and *M. silenes-inflatae* from Dunwich. The Dunwich population from Suffolk, England (latitude: +52.280293, longitude +1.634146) was obtained in 2007 as part of a separate study. Pathogen isolates were each obtained from a single diseased flower bud, which almost invariably represents a single genotype (Baird and Garber [@b8]; López-Villavicencio et al. [@b44]), sampled at random from the respective populations. For each of the pathogen genotypes, spore germination rates were confirmed to be greater than 90% by examining growth on potato dextrose agar after 24 h at 22°C. After further incubating the inoculated seedlings at 15°C for 3 days, they were transplanted into 3.8-cm diameter Cone-tainers (Stueweand Sons Inc., Tangent, OR) filled with a soil mixture as described in Cafuir et al. ([@b14]) and grown in the greenhouse under long-day lights (16 h). The experiment was established in winter months, and greenhouse environmental controls were set to a daytime maximum temperature of ca. 20°C and a nighttime minimum temperature between 10 and 15°C. These conditions were determined to be favorable for disease development on *S. uniflora* based on preliminary studies (data not shown). The positions of plants in the greenhouse were completely randomized across treatments and populations. Upon flowering, each plant was scored as diseased or healthy, based on the presence or absence of fungal spores in the anthers. Plants with diseased flowers were removed after being scored to minimize cross-contamination. Plants that appeared healthy in the first open flower were maintained for two additional weeks separately from the rest of the experimental plants to determine if subsequent flowers were infected, which happened very rarely. Only flowering plants were assessed for disease and included in the statistical tests. Approximately 7% of the plants failed to flower (see below), and these were equally distributed across the treatments. To minimize the effects of small sample sizes on variance, families with fewer than ten flowering plants were excluded from subsequent analyses. All data on the proportion of plants diseased were arcsine transformed prior to analysis, and numbers of plants were used in weighted analyses. Correlation analyses between infection rates for *M. silenes-inflatae* versus *M. lagerheimii* among *S. uniflora* populations were conducted in SPSS v15 (SPSS, Chicago, IL). Among-family variance component estimates for the correlations and their standard errors were calculated using ASReml v.3 (<http://www.vsni.co.uk/software/asreml>). Families were identified as outliers in the analysis of correlation between resistance to *M. silenes-inflatae* versus *M. lagerheimii* by calculating *P*-values for Mahalanobis distances (*D*^2^) (Mahalanobis [@b48]; McLachlan [@b51]) for each family in SPSS v15. Mahalanobis *D*^2^ measures the distance of a particular case to the multidimensional mean of the remaining distribution, the values of which follow a χ^2^ distribution. Fisher\'s Exact test was also used as an alternative approach to determine whether outlying families differed in resistance depending on which of the pathogen species was used as inoculum. In calculating the Fisher\'s Exact test, the equation for the overall regression line was used to adjust the expected values due to the higher infection rate by *M. silenes-inflatae* compared with *M. lagerheimii*. Next, a Bonferroni correction was applied to the Fisher\'s Exact test to account for the 41 possible independent tests representing all families included in the experiment. Although the Fisher\'s Exact test uses information from the overall regression to calculate expected numbers of diseased plants, it does not utilize information about the distribution of other families in relation to that regression as the Mahalanobis *D*^2^ approach does. To help confirm the resistance characteristics of the outlying families (identified as above by the Mahalanobis distances and Fisher\'s Exact test), a second set of inoculations was performed with the remaining seeds using the methods described above. However, the second experiment was begun in September when greenhouse temperatures were higher leading to lower inoculation success. Results ======= Field surveys and collections ----------------------------- Anther-smut disease was found in six *S. uniflora* populations among the 14 populations surveyed in 2008; populations used for the inoculation study are indicated in [Table 1](#tbl1){ref-type="table"}. Four populations contained only *M. silenes-inflatae*, one population contained only *M. lagerheimii*, and one population from the inland Charterhouse site contained the two *Microbotryum* species in sympatry ([Table 1](#tbl1){ref-type="table"}, [Fig. 2](#fig02){ref-type="fig"}). The latter population contained 24 specimens of *M. lagerheimii* and one specimen of *M. silenes-inflatae*. Diseased populations tended to be found in the southwestern part of the surveyed region ([Fig. 2](#fig02){ref-type="fig"}), although the survey was not exhaustive. Variation in physiological resistances -------------------------------------- Of the inoculated *S. uniflora* plants (*n* = 3468), 93% flowered and were assessed for disease status. Among families receiving inoculation treatments from both *Microbotryum* species with two pathogen genotypes per species, 25 families had enough flowering plants (*n* ≥ 10) to compare infection rates between *Microbotryum* species. Among families receiving only one pathogen genotype per *Microbotryum* species, 16 families flowered sufficiently to compare infection rates. Resistance to *M. lagerheimii* and *M. silenes-inflatae* was significantly positively correlated among all *S. uniflora* populations ([Table 2](#tbl2){ref-type="table"}, [Fig. 3](#fig03){ref-type="fig"}b). The variance component of infection rates among families within populations was less strongly significant than the among population variance ([Table 2](#tbl2){ref-type="table"}, [Fig. 3](#fig03){ref-type="fig"}a,b). In particular, in populations found with disease, there was a strong, significant among-family variance contribution to infection rates in contrast to the lack of an among-family component for healthy populations. ![Correlated resistance/susceptibility to anther-smut disease in *Silene uniflora*. (a) Variation in family-level resistance following inoculation with *M. lagerheimii* or *M. silenes-inflatae*. Large and small circles reflect sample size for families that were inoculated with either two (combined) or one *Microbotryum* genotype per species, respectively. Black circles indicate statistical outliers from the overall correlation of resistances, that is, *S. uniflora* families with species-specific resistance. (b) Population-level resistance variation following inoculation with *M. lagerheimii* or *M. silenes-inflatae*. Black circles and white circles indicate whether the source population contained anther-smut disease or not, respectively. (c) Family-level resistance variation following inoculation with different genotypes of *Microbotryum* and separated as to whether the pathogen species was *M. lagerheimii* (white circles) or *M. silenes-inflatae* (gray circles). (d) Population-level resistance variation following inoculation different genotypes of *Microbotryum* and separated as to whether the pathogen species was *M. lagerheimii* (white circles) or *M. silenes-inflatae* (gray circles).](ece30002-2304-f3){#fig03} ###### Correlation of resistance to two *Microbotryum* species in *Silene uniflora* populations Type of correlation ----------------------------------------- -------------------------------------------- ---------------------------------------------------- Between *Microbotryum* species Among populations  All populations (*n* = 11) 0.919[\*\*\*](#tf2-3){ref-type="table-fn"} 0.849 (0.162)[\*\*\*](#tf2-3){ref-type="table-fn"}  Healthy populations (*n* = 5) 0.949[\*\*](#tf2-2){ref-type="table-fn"} 1.087 (0.168)[\*\*\*](#tf2-3){ref-type="table-fn"}  Diseased populations (*n* = 6) 0.773[\*](#tf2-1){ref-type="table-fn"} 0.502 (0.619) ns Among families within populations  All populations (*n* = 54) n.a. 0.305 (0.149)[\*](#tf2-1){ref-type="table-fn"}  Healthy populations (*n* = 26) n.a. −0.224 (0.227) ns  Diseased populations (*n* = 28) n.a. 0.651 (0.138)[\*\*\*](#tf2-3){ref-type="table-fn"} Between *M. silenes-inflatae* genotypes  Among populations (*n* = 9) 0.980[\*\*\*](#tf2-3){ref-type="table-fn"} n.a. Between *M. lagerheimii* genotypes  Among populations (*n* = 9) 0.809[\*\*](#tf2-2){ref-type="table-fn"} n.a. Arcsine transformed data: *P* \< 0.05, *P* \< 0.01, \*\*\**P* \< 0.001. Within each *Microbotryum* species, resistance to different pathogen genotypes was also significantly positively correlated among populations of *S. uniflora* ([Table 2](#tbl2){ref-type="table"}, [Fig. 3](#fig03){ref-type="fig"}d). Among-family variance components within each *Microbotryum* species, where both strains per species were tested on the same family, were not calculated due to small sample sizes. Two families (Family 8 from Blakeney Point and Family 6 from Walney Island) deviated from the overall correlation of family-level resistance to *M. lagerheimii* versus *M. silenes-inflatae* ([Table 3](#tbl3){ref-type="table"}, [Fig 3](#fig03){ref-type="fig"}a). In these two families, the infection rates differed significantly depending upon which pathogen species was used as inoculum according to Fisher\'s exact test ([Table 3](#tbl3){ref-type="table"}), and they were classified as outliers because they had Mahalanobis distances significantly larger than the 95% confidence intervals based upon resistance distributions of the other families ([Table 3](#tbl3){ref-type="table"}). Similarly, one family (Family 3 from Walney Island) was classified as an outlier from the correlation of resistance between pathogen genotypes within *M. silenes-inflatae* ([Table 3](#tbl3){ref-type="table"}, [Fig. 3](#fig03){ref-type="fig"}c). ###### Characterization of *Silene uniflora* families with specific resistances to anther-smut disease Inoculum = *M. lagerheimii* Inoculum = *M. silenes-inflatae* Mahalanobis *P*-value Fisher\'s Exact *P*-value[a](#tf3-1){ref-type="table-fn"} ----------------------------- ----------------------------- ---------------------------------- ----------------------- ----------------------------------------------------------- Species-specific resistance Blakeney Point -- Family 8 6% (*n* = 23) 83% (*n* = 40) 0.019 \<0.001 Walney Island -- Family 6 59% (*n* = 27) 8% (*n* = 25) 0.008 \<0.001 Inoculum = *M. silenes-inflatae* 1 Inoculum = *M. silenes- inflatae*2 Mahalanobis *P*-value Fisher\'s Exact *P*-value[b](#tf3-2){ref-type="table-fn"} ------------------------------ ------------------------------------ ------------------------------------ ----------------------- ----------------------------------------------------------- Genotype-specific resistance Walney Island -- Family 3 0% (*n* = 10) 89% (*n* = 27) 0.011 \<0.001 Includes a Bonferroni correction for 41 independent tests. Includes a Bonferroni correction for 25 independent tests. The characterization of these families as outliers was supported by the second run of inoculations using remaining seeds, although sample sizes were quite limited and greenhouse conditions were not optimal for disease development as described above. In particular, Family 6 from Walney Island had 86% (*n* = 7) of plants diseased by *M. lagerheimii* and 0% (*n* = 6) diseased by *M. silenes-inflatae*; this was a statistically significant confirmation of specific resistance in the repeat inoculations (Fisher\'s Exact test, *P* = 0.004). The other two repeated tests were not statistically significant, but were each in the same direction as the main experiment. Family 8 from Blakeney Point had 0% (*n* = 12) diseased by *M. lagerheimii* and 4% (*n* = 24) diseased by *M. silenes-inflatae*. Family 3 from Walney Island had 8% (*n* = 12) diseased by genotype 1 of *M. silenes-inflatae* and 15% (*n* = 26) diseased by genotype 2. Discussion ========== The occurrence of multiple pathogens that exploit the same host resource holds the potential to influence both the pathogen community structure and the evolution of host defenses. Across diverse plant and animal systems, our knowledge of these interactions is so limited as to make the suggestion of general patterns difficult. This study provides the first assessment of resistance to anther-smut disease in a host that naturally harbors more than one *Microbotryum* species. While infection rates varied greatly, there was a highly significant pattern of correlated, or "general" resistance among populations of *S. uniflora* to infection by the fungi *M. lagerheimii* and *M. silenes-inflatae*. This result is similar to those found in *Zea mays* (Wisser et al. [@b64]), *Brassica rapa* (Mitchell-Olds et al. [@b52]), and *Medicago sativa* (Hill and Leath [@b32]) for the correlated resistance to multiple fungal pathogens from different genera, at least in some of the pairwise comparisons. In *Microbotryum*, the results suggest that resistance mechanisms that have evolved in response to either pathogen species may often provide protection against the other con-generic pathogen. Resistance that was specific to one pathogen species or genotype was also detected, but much less frequently. Thus, the potential for specific resistances to explain the persistence of both *M. lagerheimii* and *M. silenes-inflatae* on differentially susceptible genotypes of the host *S. uniflora* appears unlikely. Sympatry of *M. lagerheimii* and *M. silenes-inflatae* in populations of *S. uniflora* was not frequent among the sites surveyed in this study, but prior research has shown the co-occurrence of these two *Microbotryum* species on *S. vulgaris* in the Alps (Bucheli et al. [@b12]; Le Gac et al. [@b41]). Only the Charterhouse population of *S. uniflora* contained both *Microbotryum* species, and this was represented only by a single sample of *M. silenes-inflatae* among 24 *M. lagerheimii* samples. Sympatry of *M. lagerheimii* and *M. silenes-inflatae* has also been observed in *S. uniflora* populations in Suffolk, England (E. Petit, J. Watson, P. Gladieux, T. Giraud, J. Antonovics, A. Pedersen, M. E. Hood, unpubl. data), but seed collections were not available to assess their resistance characteristics. Existing theory suggests that fixed versus variable frequencies of encounters with each individual pathogen species would result in specialized versus generalized resistance, respectively (Lapchin [@b40]). On the basis of the patterns of pathogen sympatry in the sampled populations, we may have expected specific resistance to be more common. However, we found the opposite pattern, that while there is great variation in the level of resistance among families, for most families, resistance provides similar levels of protection for the two pathogens. Further studies are needed to determine whether sympatry of multiple *Microbotryum* species in a single population is a transient occurrence, whether it is facilitated by factors other than specialized resistance in the host, or whether the evolution of resistance specificities is less likely in populations with sympatric pathogen species. Although the history of disease in the populations that were studied is unknown, it was interesting that the resistances among families were more strongly correlated in families collected from populations that were currently diseased; this supports the idea that selection for resistance to one pathogen species results in resistance to the other species. However, it should also be noted that besides a history of selection, there remains the possibility that maternal effects contributed to the assessment of resistance and that diseased populations may also be geographically separated in latitude from healthy populations. The occurrence of general resistance, combined with strong evidence for specific resistance in a minority of the families, raises questions about the genetic determination of resistance. This has not been investigated. There remains the possibility that maternal effects contributed to the assessment of resistance, and this cannot be excluded. It is also possible that generalized resistances might be more important under the laboratory inoculation procedure that has been optimized to achieve a high infection success. Studying specificity in field conditions should therefore be a high priority in future studies. If resistance to anther smut in the field is indeed general resistance, then this has important implications for the distribution of the species of *Microbotryum*. First, resistance to an endemic *Microbotryum* species may protect the host from the emergence via host shifts of related pathogens by lowering both the density and proportion of susceptible individuals. We have previously found evidence for host shifts of anther-smut disease into disease-free populations of *S. vulgaris* in North America and Europe (Hood et al. [@b35]). The susceptible genotypes may thus be particularly prone to receive the disease as host shifts from another species. In this system, there was substantial among family variation in cross-species transmission (Antonovics et al. [@b4]). Similarly, for a host with multiple endemic *Microbotryum* species, the local history of exposure and resistance evolution, could determine conditions limiting invasion by immigrant pathogens. A recent study has revealed wide variation in the prevalence of anther-smut disease among *Silene* species (Hood et al. [@b36]), and therefore it would be informative to assess the levels and generality of anther-smut resistance across this group of hosts and whether this influences the success of cross-species disease transmission. Studies on parasitoids of insects and other fungi on plants (Mitchell-Olds et al. [@b52]; Fellowes et al. [@b22]) have also shown the presence of generalized cross-species resistance, but the evolutionary implications for disease emergence have yet to be thoroughly explored. The second major implication of general resistance is that co-occurring pathogen species may compete more directly for a common set of susceptible host genotypes than if there were species-specific resistances, perhaps increasing the likelihood of co-infection and the within-host dynamics that drive pathogen virulence strategies (van Baalen and Sabelis [@b7]; May and Nowak [@b50]). Several studies have addressed co-infection dynamics in the anther-smut system, with indications that the strength of within-host competition is influenced by pathogen relatedness (Hood [@b34]; Koskella et al. [@b39]; López-Villavicencio et al. [@b44], [@b45]). In particular, Gold et al. ([@b27]) showed that the competitive exclusion between *M. lagerheimii* and *M. silenes-inflatae* was stronger than exclusionary interactions between genotypes within either species. In both Gold et al. ([@b27]) and the current study, there was also a difference in infection ability between the *Microbotryum* species, even though different pathogen isolates and hosts were used; *M. silenes-inflatae* caused relatively higher infection rates than *M. lagerheimii*. Inoculations in the present experiment were carried out with each pathogen genotype applied singly. However, whether the competitive dynamics of multiple infections might interact with the observed variation in susceptibility in *S. uniflora*, including species-specific resistances, should be investigated in further studies. It was surprising that no disease was found in the more northern populations on either the western or eastern coasts of England. The presence of disease in the southeastern coast is known from natural history collections, as well as ongoing studies of diseased populations in Suffolk and Kent (E. Petit, J. Watson, P. Gladieux, T. Giraud, J. Antonovics, A. Pedersen, M. E. Hood, unpubl. data). It is particularly interesting that instances of pathogen-specific resistance were found in *S. uniflora* families from the healthy northern populations. However, the current distribution of *Microbotryum* may not fully inform the history of selection for resistance and the "ghosts of disease past." In fact, a century ago Sir Edward J. Salisbury noted the presence of anther-smut disease on *S. uniflora* at Blakeney Point in the county of Norfolk (Salisbury [@b60]), a population now containing species-specific resistance to *M. lagerheimii* in one family, but where in our current survey, a thorough search of the site found no disease. In the absence of strong and widespread patterns of specific resistances, other explanations should be sought to explain the co-occurrence of *M. lagerheimii* and *M. silenes-inflatae* on *S. uniflora*. For example, we have not studied timing of disease expression nor possible differences in micro-climate effects on the transmission or infection success of the two pathogen species. Given the rare co-occurrence of the two species in natural populations, the histories of migration and colonization by the multiple *Microbotryum* species on *S. uniflora* and *S. vulgaris* may help explain the distributions of multiple pathogens on these host species; studies of related species of *Microbotryum* on other host species have shown phylogeographical effect to be important (e.g., Vercken et al. [@b63]). With increased ability to identify often cryptic differences between pathogen species and the growing impact of anthropogenic dispersal worldwide, such studies can provide important insights into the determinants of modern community assemblages. We thank Chris Kim for technical assistance, Marcel E. Dorken for identifying a diseased population in Pembrokeshire, and Tatiana Giraud for helpful comments on the manuscript. This study was supported by award NSF-DEB 0747222 to MEH and by Amherst College to EC for conducting a Senior Honors Thesis. ABP was funded by an Advanced Fellowship as part of a Wellcome Trust Strategic Grant for the Centre for Immunity Infection and Evolution (095831). Conflict of interest ==================== None declared. [^1]: **Funding Information** The work was supported by award NSF-DEB 0747222 to MEH and by Amherst College to EC for conducting a Senior Honors Thesis. ABP was funded by an Advanced Fellowship as part of a Wellcome Trust Strategic Grant for the Centre for Immunity Infection and Evolution (095831). [^2]: These authors contributed equally to this study.
{ "pile_set_name": "PubMed Central" }
DIY- Wool Dryer Ball Tutorial I love DIYing. Wool dryer balls are practical; they lower drying time, decrease wrinkles, and reduce static. If you make them you can even add one more point to your score on “You Might be a Crunchy Mom if…” score. So if you are trying to avoid chemicals, help out the environment and save money, check out these wool dryer balls! (I recommend you start with at least 4 dryer balls to see a difference in your laundry). You will need: 100% wool yarn (mine was 220 yards) Panty Hose String Crochet Needle Essential Oil (lavender, tea tree, etc.) -optional Making the yarn balls: Start making a yarn ball. I like to wrap it around 2-3 of my fingers about 20 times. Keep wrapping until it takes the shape of a small yarn ball. Optional-Stop when your yarn ball is about half the size of a tennis ball. Add 3-4 drops of your favorite essential oil. Continue wrapping until your yarn ball is the size of a tennis ball. (The balls will shrink during the felting process). If you want larger dryer balls, feel free to make them bigger. Cut your yarn and thread it through a yarn needle. Push the needle through the ball and pull it out of the other side. Cut off excess yarn. Continue making yarn balls until you are out of yarn. I made 3 balls with my 220 yard skeen of wool yarn. Felting the Dryer Balls: Insert your ball to the end of your panty hose and tie off with a piece of string or dental floss. (Do not use extra yarn here as it will felt in the process). Continue until all your dryer balls are secured in the pantyhose. Now felt your dryer balls by washing them in your washer on the hottest setting. (If your water heater is turned down, turn it up for the washing process… don’t forget to turn it back down!) When the washer is finished, dry in the dryer on your hottest setting. The balls will have gotten smaller during the felting process. Anna Kauzlarich lives in Atlanta, GA and is a 20-something Wife and Mother to three children aged 18 months to 6 years. She is a stay at home mom who homeschools her children using a Waldorf method and is passionate about eating real food, breastfeeding, gentle parenting, and birth education. What is a Crunchy Mom? Whatever you want to call it, there are as many definitions for “crunchy mom” as there are moms. Unfortunately, the thing about labels is that they are not always very useful, especially when everyone has a different idea about what those labels represent. So, instead of telling you that a crunchy mom is someone who does this or doesn’t do that, let’s define “crunchy mom” ... Read More.
{ "pile_set_name": "Pile-CC" }
Role of MRI bone marrow imaging in recurrent lymphoma. Infiltration by Hodgkin disease of the bone marrow of a thoracic vertebral body in a symptomatic patient was identified by magnetic resonance imaging, but not by radiography, radionuclide bone scanning, or computed tomography. The discovery of disease at this site substantially altered subsequent therapy.
{ "pile_set_name": "PubMed Abstracts" }
We have been dealing with a scary medical emergency in our family this week. My father-in-law had a subdural hematoma that led to a trip to the hospital and surgery. I am happy to report that he is progressing at a remarkable pace, and we are optimistic that he will make a full recovery. Extended time spent in a hospital affords you with ample opportunities to witness people acting their best in the face of some of the worst circumstances. I was fortunate to observe and interact with ICU nurses who executed their duties with efficiency and empathy. The neurosurgeon who performed the surgery was skilled and compassionate in equal measure. The surgical liaison who provided us with updates from the operating room started to cry as she saw me cry with relief after finding out the surgery was a success, sharing in a life-changing moment.
{ "pile_set_name": "Pile-CC" }
Q: How often is viewDidLoad called? When the user switches to another program and then back again., the original program's view will be replaced by a new view from another program. So when the user switches back to the original program, would viewDidLoad be called the second time ? Am asking this because if this is the case, then the initialization code placed inside viewDidLoad would be executed every time the user switches the screen back and forth. And this could result in reseting views and loosing unfinished works of the user ... A: Don't do view controller initialisation in viewDidLoad. This is a common mistake. For stuff that should only happen once when the view controller is loaded, do it in the controller's init method, like this: - (id)initWithNibName:(NSString *)nibNameOrNil bundle:(NSBundle *)bundleOrNil { if ((self = [super initWithNibName:nibNameOrNil bundle:bundleOrNil])) { //do your initialisation here } return self; } The initWithNibName:bundle: method is called before the view is loaded from the nib, and is only called once in the lifespan of the view controller. The controller's view can be loaded and unloaded multiple times during the lifespan of the controller and viewDidLoad will be called every time. It may be unloaded whenever it's not on screen, usually if memory is low. If you do set stuff up in viewDidLoad (e.g. adding subviews programmatically) you should always unset them again in viewDidUnload. Think of viewDidLoad and viewDidUnload as being like the init/dealloc for the view property of the view controller. For stuff that relates to the views, create and release it in those methods. For stuff that relates to the controller itself, create and release it in initWithNibName and dealloc. UPDATE: On iOS 6 and later, viewDidUnload is never called any more (unless the view is explicitly set to nil in the code), and so viewDidLoad will typically only be called once in the life of a view controller. This makes the advice above less critical, but it's still best practice, and still necessary if you need to support iOS 5 and earlier. UPDATE 2: If you are loading your view controller from a Storyboard (which is now the recommended practice) instead of creating it programmatically then initWithNibName:bundle: will not be called. Use initWithCoder: or awakeFromNib to initialize your controller instead. A: @Nick Lockwood provides excellent information, but there are a few more things to remember. First, initWithNibName:bundle: is not called if the view controller is instantiated from a nib file or storyboard. In that case, initWithCoder: and awakeFromNib are called instead. This situation used to be somewhat uncommon on iOS, but with the addition of storyboards it is now much more common for view controllers to bypass initWithNibName:bundle:. I recommend putting non-UI initialization code in a separate method (I call mine setup) and call it from both initWithNibName:bundle: and awakeFromNib. But I only do this if it's important that that initialization only run once. Otherwise I put it in viewWillAppear: to be as lazy-load as possible. Second, you should not do anything that references self.view in init... or awakeFromNib. You should never reference self.view until viewDidLoad is called (otherwise you will force the nib file to be loaded sooner than it is needed). UI-related things should go in viewDidLoad if they're related to setting up the views, or viewWillAppear: if they're related to configuring the views (i.e. loading them with data). So the way I usually set these things up: @implementation - (void)setup { // Non-UI initialization goes here. It will only ever be called once. } - (id)initWithNibName:(NSString *)nibName bundle:(NSBundle *)bundle { if ((self = [super initWithNibName:nibName bundle:bundle])) { [self setup]; } return self; } - (void)awakeFromNib { [self setup]; } - (void)viewDidLoad { // Any UI-related configuration goes here. It may be called multiple times, // but each time it is called, `self.view` will be freshly loaded from the nib // file. } - (void)viewDidUnload { [super viewDidUnload]; // Set all IBOutlets to `nil` here. // Drop any lazy-load data that you didn't drop in viewWillDisappear: } - (void)viewWillAppear:(BOOL)animated { [super viewWillAppear:animated]; // Most data loading should go here to make sure the view matches the model // every time it's put on the screen. This is also a good place to observe // notifications and KVO, and to setup timers. } - (void)viewWillDisappear:(BOOL)animated { [super viewWillDisappear:animated]; // Unregister from notifications and KVO here (balancing viewWillAppear:). // Stop timers. // This is a good place to tidy things up, free memory, save things to // the model, etc. } - (void)dealloc { // standard release stuff if non-ARC [[NSNotificationCenter defaultCenter] removeObvserver:self]; // If you observed anything // Stop timers. // Don't unregister KVO here. Observe and remove KVO in viewWill(Dis)appear. } @end A: -viewDidLoad will be called once whenever the view controller needs to load its view hierarchy. Obviously, that'll happen the first time that the controller accesses its view. If the view controller later unloads its view, then -viewDidLoad will be called again the next time the view is loaded. A view controller won't unload its view just because the view is hidden, but it might do so if memory starts to run low. A view controller should know the state of its views and be able to set them up as necessary in its -viewDidLoad method. Views shouldn't be used to store state -- nothing should be irrevocably lost just because the view is unloaded.
{ "pile_set_name": "StackExchange" }
Apoptosis induction and inhibition of HeLa cell proliferation by alpha-naphthoflavone and resveratrol are aryl hydrocarbon receptor-independent. Human papilloma viruses 16 and 18 express E6 and E7 oncoproteins. E6 activates and redirects E6-associated protein (E6AP), an E3 ubiquitin ligase. E6AP interacts with Ube2l3, an E2 ubiquitin conjugating enzyme protein (also known as UbcH7), to promote p53 ubiquitination and degradation by the 26S proteasome. Therefore, blocking E6-mediated p53 degradation might be an alternative treatment for cervical cancer. In addition, activation of the aryl hydrocarbon receptor (AHR) induces Ube2l3 expression, resulting in p53 ubiquitination and degradation. The aim of the present study was to determine whether inhibition of AHR in HeLa cells resulted in an increase in p53 and apoptosis along with a decrease in cell proliferation. The results demonstrate that two AHR antagonists, α-naphthoflavone (α-NF) and resveratrol, decreased cell proliferation, arrested cells in the gap 1/synthesis (G1/S) phases, and increased p53 levels and apoptosis. However, knocking out the Ahr gene did not abrogate the effects of α-NF and resveratrol. Moreover, Ahr-null cells presented similar cell proliferation rates and apoptosis levels when compared to control HeLa cells. Taken together, the results indicate that α-NF's and resveratrol's cytostatic and cytotoxic actions, respectively, occur through an AHR-independent mechanism, and that AHR is not required for HeLa cell proliferation.
{ "pile_set_name": "PubMed Abstracts" }
Want a peek into our grocery cart? Here’s how I’m grocery shopping and feeding eight people on the cheap. This post may contain affiliate links. When you make a purchase through those links, I am paid a small amount in advertising fees. Thanks for your support. I really appreciate it. September and October are generally […] POPULAR SERIES If you haven’t planned your Christmas menu yet, now’s a good time to do so. You can shop the sales in the coming weeks and save money on the feast! Here are our favorite recipes for Christmas. This days since Thanksgiving have been a blur for me. I’ve been throwing most of my work hours […] POPULAR SERIES This Single Crust Pot Pie comes together quickly, particularly if you’ve got holiday leftovers. Be sure to add it to the rotation for this holiday season. What says cozy, cold-weather dinner than a chicken pot pie? I’m not sure there is anything more comforting. Flaky pie crust, creamy sauce, succulent chicken and veggies – what could […] GET THE BOOK Celebrate the season with a festive Kale Salad with Red Grapes, Almonds, and Scallions. It’s quick and easy to pull together. This is the season when it’s easy to overindulge. I mean, cookies, cakes, and pie? Oh my! I had no trouble going back for a second plate of turkey dinner. Or a second piece […] Did you do a Pantry Challenge in January? Tell us how much you saved! So, the pantry challenge has wound down. Did you survive? I know several of you are continuing on which I think is so incredibly awesome! If that’s you, know that folks are still chatting and keeping each other encouraged on this […] TAKE THE CHALLENGE Celebrate the season with a festive Kale Salad with Red Grapes, Almonds, and Scallions. It’s quick and easy to pull together. This is the season when it’s easy to overindulge. I mean, cookies, cakes, and pie? Oh my! I had no trouble going back for a second plate of turkey dinner. Or a second piece […] Grocery Geek: Costco for FREE? Food shouldn't be complicated. Or bad for you. Or expensive. I'm working to craft good cheap eats that we can both enjoy. You can read more about this site here. Check out my cookbooks if you're needing some budget-friendly inspiration. Read about how to make healthy eating work for you here. My first week of grocery shopping during the Pantry Challenge turned out to be pretty successful. Despite the fact that we’re already out of bread. Once I cleaned out the pantry and cupboards earlier this week, I felt such a renewed sense of ownership over my kitchen. I know what I have, I know what we need to use soon, I know what not to buy again (evidenced in the bag of stuff to take to the food pantry and what was tossed into the trash). And I restrained myself while shopping this week. I keep a magnetic pad of paper on my refrigerator where I keep a running log of things we need. I keep lists for Costco, Walmart, Sprouts, and Trader Joe’s, my four regular grocery stops. Imagine my horror when the list of things that we were truly out of and truly needed was Costco! Any Costco member will testify to the fact that it is hard not to come out of that store with more than you intended. And to do this during a Pantry Challenge? Be still my racing heart. Since I had to return those lovely-baking-pans-that-I-really-liked-but-started-to-flake-their-coating, it seemed like I just needed to bite the bullet. What restraint! Here’s what I ended up getting: I didn’t even buy everything on my list! And, as you can tell, it was a pretty boring list: bananas, cheese, pasta, half and half, milk, bread, and cleaning supplies: Dawn, sponges, and vinegar. I bought nothing that wasn’t already on the list. My total: $66. However, since we upgraded to an executive membership earlier last year, I had a rebate check for $67 and some change. So, it was the once-in-a-lifetime FREE grocery trip at Costco, since that rebate was money that came out of my grocery budget last year! Who woulda thunk it? (I suppose if you really want to get technical, some of that money was recouped from the extra expense for the upgraded membership. But, let’s not split hairs. I’ll take my Costco victories wherever I can get them! In my mind, I’d already made peace with the membership cost because I stopped getting harassed at the checkout AND we save so much shopping there. But, if it makes you more comfortable, we can count $45 back toward the membership which means this trip cost me $44.) And fresh produce: We subscribe to the large box from Abundant Harvest Organics. I really can’t say enough good things about these folks. If you live in Southern California, you should join. Seriously. They deliver as far south as San Diego and as far north as Ventura. It is the best deal for farm fresh organic produce, often beating the price of grocery store conventional. The food is seasonal and “normal” enough that we are stocked with fresh fruit, salad greens, and some new funky stuff to try. But, thankfully, funky isn’t so funky anymore as I learn what to do with it. This week’s box contained apples, pears, pomegranates, spinach, turnips, rutabagas, new potatoes, truly baby carrots, swiss chard, arugula, lavendar, red leaf lettuce, and butternut squash. The promised fennel was missing, but that’s okay, because I didn’t know what to do with it. They are great about missing or less than stellar items, though, as they threw in an extra bundle of carrots, oranges and pears to compensate for some under-par broccoli last time. I ordered 20 pounds of apples as an “extra,” bringing our total to $59.40. Also in the grocery haul was a quick $5 stop for hubs to buy cilantro and smores fixings for a bonfire at the beach. That brought our weekly total to $64.40, not bad when you consider I went to Costco, too! {snickers} Month to Date: $64.40* *Or $108.40 if you want to count the membership money (see note above). Comments We go to a restaurant that serves a pear with a lavender honey sauce that is to die for! When I saw you got both pairs and lavender my mouth started watering. I’ve looked on line but haven’t found a recipe for it, one of these days I’m going to have to experiment! Enjoy your produce. @Christine A, They kept asking me and I kept declining. They never mentioned that if the rebate does not at least equal the difference in membership between regular and executive, they will refund the amount. If they’d told me that, I would have done it earlier! Figures, I spent enough there now that I lost money by not doing it earlier. oh well. Anyway, they said gas does NOT count for the executive rebate. I use my Costco AmEx, which gets the gas rebate, but the executive rebate is not earned for fuel purchases. (Tobacco also does not earn it, but that doesn’t affect me.) @Jessica, All standard groceries definitely DID count. That is the majority of what I purchase there, so I would not have bothered had they not been eligible. From their terms and conditions: “Reward is not calculated: (i) on purchases of cigarettes or tobacco-related products, gasoline, Costco Cash Cards, postage stamps, alcoholic beverages in certain states (including Alabama, Georgia, Kentucky, Ohio, and Michigan), and at food courts; (ii) on membership fees; (iii) on purchases not recorded through Costco’s front-end registers and transactions done on or through Web sites not hosted by Costco even if accessed through Costco.com, including all business, consumer, and insurance services, the online photo center, Costco Travel, and the My Publisher website” Glad you had a fun free trip! Always nice. I had to do Costco during this pantry challenge as well – it was brutal and I spent a fortune but it was most of what I will need for the month but for the most ‘expirable’ stuff. I gave up my executive membership as it was a catch-22 for me. I was charging, which I’m trying to avoid because I tend to spend more than when I pay cash. And then when I stopped charging it became less worthwhile [last year they had to fulfill that promise to give us what it cost us if we made less!] Now when they accost me with that gun I just say no thanks! We tried and don’t want it again. It may change for us in this new year. I don’t like that most of their cheese and butter has hormones, so I buy those at Trader Joe’s. Those are some of the staples I buy there, so we’ll see if this year’s membership pays for itself or not. I love Costco too.. Im a past Exec member as well.. I spent way too much there in the past & I dont spend enough now to compensate, for the cost of the exec membership. I do keep my membership there for certain specific items that I cant get anywhere else for less.. either quality or price.. usually both. One of my “tricks” to shopping there is if I only need a few items, I dont get a cart.. I have to carry my items. When my hands are full, I cant buy anymore. 😉 Its kept my bill down many a time. You did a great job this week.. I havent been to the grocery store yet, but I will be going over the weekend probably. Just need eggs, sausage, & milk that Im aware of. Keeping my fingers crossed. 😉 Thanks for pointing that out. Since they don’t deliver to Santa Barbara and points on the Central Coast, I just assumed they didn’t go farther north. That’s great that you could change the location during vacation. That’s amazing. Costco arrived here a couple of years ago. I haven’t ever been, but a friend of mine is a member and she’s going to take me to look around. I’m not at all sure it’d be worth my while to join. I don’t buy brand items and Aldi is so very cheap anyway. But I’m looking forward to seeing the place and how the prices stack up. If it’d be worth my while I’ll join…. Your comment reminded me to check what’s in next week’s box. I have a backlog of squash and next week looks the same, so I better start using it or give it away. This is our first season, only done it since August, so I have no clue what’s in our future. You’ll have to give me hints of good things to come. Oh my goodness, I’m so glad you mentioned that Abundant Harvest comes to Ventura County. I had no idea…and I’ve been reading about your boxes and adventures with new ingredients the whole time! I am going to seriously consider giving this a try. Thanks! Definitely! We, well, I, love it. Hubs isn’t crazy that I am making things we wouldn’t normally have, like sweet potatoes and sauteed greens. But, I feel like I’m exposing my kids to new tastes that I never had before. You could try a small box at first and see if you like it. I wish we had a Costco. Only Sam’s for us – but I prefer Costco. And your box of fresh produce – AMAZING!! Not much is growing out here in Eastern Iowa this time of year. Our unseasonably warm weather this week made me antsy for spring and gardening – but reality will hit one of these days and we’ll be covered in snow. I spent $37 this week on a fridge full of fresh fruit and veggies and farm fresh eggs. Not too bad, all things considered! I have been trying to weigh my options on getting a Costco card. I would have to send the hubby on most occasions. He passes by there everyday and we live about 70 miles from the closest one…. I would be scared with him in there. I’m imagining 200 pairs of socks and 55 gallons of nacho cheese dip! I wish I could find a Costco for Dummys post!!!!!! that is one beautiful box of produce, especially for January! I just came from my farmer’s market meeting and one of our farmer’s gave me fresh tomatoes he grew in his greenhouse. I nearly jumped for joy. I live outside Boston so this was just such an unexpected surprise. Kudos on Costco on the cheap. Not an easy task. I love using my Costco rebate!!! WOW, we must spend a ton – our check is usually around $130 – so it surely pays for our membership plus a bit. We do use a lot of gas – so the extra rebate on gas is nice. I must be the minority here, but I have a Costco exec. membership AND a Sam’s club membership that I share with my mom. I prefer Costco (both stores are within 15 minutes of our suburban Seattle home) but Sam’s is nice on weekends- much less crowded and I like that they carry different brands. We also do a produce box (Full Circle Farms) every other week. And I do love that I can go online and modify what I’ll receive. My family is adventurous, but not so for hubs. My Costco check has never NOT paid for itself- but we buy ALL of our appliances, electronics, furniture etc from Costco. I came across your blog in a somewhat random way. (I found Ty’s Burger House on Yelp and was looking for a website which could show me a menu.) Thank you so much for mentioning Abundant Harvest Organics! I have been wanting a service like this for a while and am excited to check them out. Thanks too for such great words of wisdom. I’m impressed with the little I’ve seen so far and look forward to checking out the rest of your website! Thanks for your kind words. Ty’s was pretty good, though honestly we haven’t been back. We’ve since done The Counter and Elevation Burger. But, sometimes In-N-Out is just plain sufficient. Obviously not the same quality ingredients. Abundant Harvest is fantastic. I was wanting something like it for a long time, and the local CSAs were just too chintzy with what they gave us. This is perfect. I have a Sam’s membership. To combat the unplanned purchases, I made a Click N Pull grocery list of the stuff I normally buy each month. It took a couple of hours to set it up, but each month I spend about 15 minutes clicking the boxes – they pull the merchandise and I pay and pick it up. It is very nice and you know BEFORE you go how much you spent. The cold stuff is kept in the refrigerators until you go and then they take it to the register. The only disadvantage is that the register is near the candy aisle and if my hubby goes – he’ll buy a “treat” that’s not on my list! LOL! Hi! I'm Jessica. I love Jesus, my six sweet kiddos, and my husband of 22 years. I write cookbooks, blog posts, and multiple to-do lists. I also make a pretty good dinner that won't cost a fortune. Read more. Recent Comments Popular Series Disclaimer/Disclosure Please note that the advertisements posted here do not necessarily represent Jessica Fisher's views and opinions. Also be advised that some of these advertising partners may use cookies and web beacons on our site (when you click through). You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. To better serve my readers, I have implemented Google Analytics cookies in order to better know visitor demographics. For opt outs, go here.
{ "pile_set_name": "Pile-CC" }
Q: MySQL filtering out a criteria I thought this is simple with you guys here, but a little bit hard for me to figure out how to do this. I have tried but did not get the result so wanted to consult every one here. Here I have three columns: state, store, laptop_brand I wanted to filter out how many store have the amount of HP < 3 ( group by State). My idea on this is like this: SELECT state, count(laptop_brand) FROM sample_survey WHERE count(select store from sample_survey where laptop_brand = "HP") <3 group by state but I could not make it real. sample_survey Attached pic snippet data for your reference. Thank you for any suggestions. A: Please Try this: SELECT state, store, count(laptop_brand) as total_laptop FROM sample_survey WHERE laptop_brand = "HP" GROUP BY state, store HAVING count(laptop_brand)<3
{ "pile_set_name": "StackExchange" }
Q: Data from mysql database in to text fields via php? I've created a database with a table called pages in it. Within this table there are fields called pages_id, pagename, pagedesc, pagekey and pagecont. How can I pull the data from these fields in the database, in to editable text fields? I've tried below, but my code isn't working :( <?php // Make a MySQL Connection mysql_connect("####", "####", "####") or die(mysql_error()); mysql_select_db("####") or die(mysql_error()); // Get all the data from the "example" table $result = mysql_query("SELECT * FROM pages") or die(mysql_error()); ?> <p>Page title</p><br /> <?php echo"<input name=\"pagename\" type=\"text\" id=\"pagename\" value=\"" .$pagename. "\">"; ?> <p>Keywords</p><br /> <?php echo"<input name=\"pagekey\" type=\"text\" id=\"pagekey\" value=\"" .$pagekey. "\">"; ?> <p>Description</p><br /> <?php echo"<input name=\"pagedesc\" type=\"text\" id=\"pagedesc\" value=\"" .$pagedesc. "\">"; ?> <p>Content</p><br /> <?php echo "<textarea name=\"pagecont\" cols=\"120\" rows=\"20\" id=\"pagecont\" >".$pagecont."</textarea>";?> A: You haven't fetched a row from your query result, and are outputting undefined variables. The proper sequence should be: $result = mysql_query($sql) or die(mysql_error()); // run the query $row = mysql_fetch_assoc($row); // fetch a result row echo $row['name_of_field']; // output one of the result row's data fields. Also note that when you're outputting data into an HTML form as you are, you have to make sure that nothing in the data you're outputting will 'break' the form. e.g. If the output text contains a ", and you're using those quotes around your form field's attributes, you'll "break" the html. best practice for output-to-html is to use: <input type="text" name="somefield" value="<?php echo htmlspecialchars($row['name_of_field']) ?>" />
{ "pile_set_name": "StackExchange" }
How can the earth be millions of yrs old and we can't find a tree over 10K yrs old? How can the earth be millions of years old and we can't find a tree over 10K yrs old? I don't know how old the earth is...neither do you friend. But can't you skeptics just admit this is puzzling to your worldview? I mean many of those that believe in a young earth put it around 10K years old...right in line with the age of this tree in Sweden... World's Oldest Living Tree -- 9550 Years Old -- Discovered In Sweden ScienceDaily (Apr. 16, 2008) — The world's oldest recorded tree is a 9,550 year old spruce in the Dalarna province of Sweden. The spruce tree has shown to be a tenacious survivor that has endured by growing between erect trees and smaller bushes in pace with the dramatic climate changes over time. For many years the spruce tree has been regarded as a relative newcomer in the Swedish mountain region. "Our results have shown the complete opposite, that the spruce is one of the oldest known trees in the mountain range," says Leif Kullman, Professor of Physical Geography at Umeå University. A fascinating discovery was made under the crown of a spruce in Fulu Mountain in Dalarna. Scientists found four "generations" of spruce remains in the form of cones and wood produced from the highest grounds. The discovery showed trees of 375, 5,660, 9,000 and 9,550 years old and everything displayed clear signs that they have the same genetic makeup as the trees above them. Since spruce trees can multiply with root penetrating braches, they can produce exact copies, or clones. The tree now growing above the finding place and the wood pieces dating 9,550 years have the same genetic material. The actual has been tested by carbon-14 dating at a laboratory in Miami, Florida, USA. Previously, pine trees in North America have been cited as the oldest at 4,000 to 5,000 years old The discovery showed trees of 375, 5,660, 9,000 and 9,550 years old and everything displayed clear signs that they have the same genetic makeup as the trees above them. Notice that the various-aged-trees had the "same genetic make-up" meaning that the basic substances that the each tree were extremely similiar..so why haven't we found older ones with the same make-up....could it be something as simple as the earth wasn't here then? Because trees are a living thing and eventually they die. Rocks and earth are inanimate things which are not living species. Like all flora and fauna species tress have a life expectancy. Sorry, but thats a really weak argument for creationism in this instance Over time, the chemical and physical properties of the plant remains (believed to mainly have been fern-like species antedating more modern plant and tree species) were changed by geological action to create a solid material. Trees die, tectonic plates shift, climates change, the raw material of the ex tree is compressed into the earth, broken down and crushed into coal over thousands of years. The oldest human to have ever lived was 122 years old, should we assume the Earth is no older than that? The oldest tortoise was 188, should we also assume this is the oldest the Earth can be? The fact we found a tree that has lived nearly 10,000 years is incredible, but shouldn't indicate the age of the Earth in any way. Trees from the "petrified forest" existed more than 3 million years ago (and repudiates the notion we can't find a tree over 10K yrs old). We may not have living trees over 10,000 years old but we do have fossilized amber (which is produced by trees) that date to 320 million years ago. So clearly trees have been around for quite some time. While Pando isn’t technically the oldest individual tree, this clonal colony of Quaking Aspen in Utah is truly ancient. The 105-acre colony is made of genetically identical trees, called stems, connected by a single root system. The “trembling giant” got its start at least 80,000 years ago, when all of our human ancestors were still living in Africa. But some estimate the woodland could be as old as 1 million years, which would mean Pando predates the earliest Homo sapiens by 800,000 years. At 6,615 tons, Pando is also the heaviest living organism on earth. I have heard of this beast before. Simply an amazing organism and quite ancient. Originally posted by OzWeatherman Because trees are a living thing and eventually they die. Rocks and earth are inanimate things which are not living species. Like all flora and fauna species tress have a life expectancy. Sorry, but thats a really weak argument for creationism in this instance I didn't know that the earth was created with trees? I though trees eventually grew on them when they could? Your tree argument is actually in conflict with a theory that the earth is anything but millions of years old. Considering every other planet within this solar system has NO trees, yet they exist here on earth. There for trees on this planet by way of logic had to have grown here, which implies a drastic change from something like mars, mercury, or Venus (our closest planets) to what earth is today, it just doesn't make sense something like that could occur over a mere 10 thousand years... There are multitudes of different way that all lead to the evidence earth is millions of years old. How old life is here though is another question all together. You are right though, I cannot claim absolute knowledge and fact to how old the earth is. Notice the ZERO flags...It is just a ridiculous question. So are you saying that YOU THINK the earth is only 10,000 years old? Did you get this idea after reading "the good book"? I'm guessing you think dinosaurs are made up to, eh? Are you trying to posit some judeo-christian world view with this? Well the basic nuts and bolts can be explained by for instance...THE ICE AGE there have been countless. Now hows about the fern? they have been proven to be around for more then a couple 100 million years. Here's my question to you....what test did they use on the tree in Sweden?...radio carbon dating...ok well in at least as far as that method is valid AND since it is from the same parameters...Radio Carbon dating has found any number of biological life forms that date back 100's of millions of years....yes from right here on this ol earth. Is it possible carbon dating is flawed?...sure but the inverse of your conjecture subjects itself to the same parameters. The Above Top Secret Web site is a wholly owned social content community of The Above Network, LLC. This content community relies on user-generated content from our member contributors. The opinions of our members are not those of site ownership who maintains strict editorial agnosticism and simply provides a collaborative venue for free expression.
{ "pile_set_name": "Pile-CC" }
70 F.Supp.2d 1061 (1999) Mohammad YOUSEFI and David Kane, on behalf of themselves and all others similarly situated, Plaintiffs, v. LOCKHEED MARTIN CORPORATION, Vance Coffman, Marcus Bennett, Norman Augstine, Vincent Marafino, James Blackwell, and Thomas Corcoran, Defendants. Joseph Edmonds, on behalf of himself and all others similarly situated, Plaintiff, v. Lockheed Martin Corporation, Vance Coffman, Marcus Bennett, Norman Augstine, Vincent Marafino, James Blackwell, and Thomas Corcoran, Defendants. William Kretchmeyer, on behalf of himself and all others similarly situated, Plaintiff, v. Lockheed Martin Corporation, Vance Coffman, Marcus Bennett, Norman Augstine, Vincent Marafino, James Blackwell, and Thomas Corcoran, Defendants. Nos. CV99-0372LGBRNBX, CV99-1266LGBRBNX, CV99-1476LGBRNBX. United States District Court, C.D. California. May 25, 1999. *1062 *1063 William S Lerach, Alan Schulman, Darren J Robbins, Randall J Baron, Milberg Weiss Bershad Hynes & Lerach, San Diego, CA, Lawrence J Lederer, Daniel Berger, Berger & Montague, Philadelphia, PA, for Mohammad Yousefi, on behalf of themselves and all others similarly situated, plaintiff. William S Lerach, Alan Schulman, Darren J Robbins, Randall J Baron, Milberg Weiss Bershad Hynes & Lerach, San Diego, CA, Lawrence J Lederer, Daniel Berger, Berger & Montague, Philadelphia, PA, Marc A Topaz, Schiffrin & Barroway, Bala Cynwyd, PA, for David Kane, on behalf of themselves and all others similarly situated, plaintiff. Seth Alben Aronson, O'Melveny & Myers, Los Angeles, CA, for Lockheed Martin Corp, Vance Coffman, Marcus Bennett, Norman Augustine, Vincent Marafino, James Blackwell, Thomas Corcoran, defendants. ORDER SUA SPONTE STRIKING PARTIES FROM THE MOTION TO CONSOLIDATE; ORDER GRANTING MOTION TO CONSOLIDATE; ORDER DENYING MOTION FOR DESIGNATION OF LEAD PLAINTIFFS; ORDER DENYING MOTION FOR DESIGNATION OF LEAD COUNSEL; ORDER SUA SPONTE DESIGNATING LEAD PLAINTIFFS; ORDER SUA SPONTE DESIGNATING LEAD COUNSEL. BAIRD, District Judge. I. INTRODUCTION. Three class action lawsuits have been filed against Lockheed Martin Corporation *1064 and six of its officers for securities fraud. Plaintiffs in two of the suits and 134 other potential class members (1) move to consolidate the actions, (2) move for the Court to appoint them lead plaintiffs, and (3) move for the Court to appoint their attorneys lead counsel. The Court strikes sua sponte all moving parties from the motion to consolidate with the exception of Mohammad Yousefi, David Kane, and William Kretchmeyer, and it grants the motion. The Court denies the motion to appoint lead plaintiffs and lead counsel. After close review of the complaints, 137 class members' declarations certifying the purchase of Lockheed stock, and the resumes of three law firms that specialize in prosecuting securities fraud, the Court names sua sponte James Corbin and the City of Philadelphia Board of Pensions and Retirement as lead plaintiffs and the law firm of Milberg, Weiss, Bershad, Hynes & Lerach as lead counsel. II. FACTUAL BACKGROUND AND PROCEDURAL HISTORY. On January 14, 1999, plaintiffs Mohammad Yousefi ("Yousefi") and David Kane ("Kane") filed this securities fraud class action on behalf of themselves and those who purchased Lockheed Martin Corporation ("Lockheed") stock between August 13, 1998 and December 23, 1998. (Yousefi Complaint, 1:2-5). Plaintiffs allege that defendant Lockheed and six of its officers made false and misleading statements concerning the prospective value of the company and its stock in association with two mergers and one take-over involving Lockheed. (Yousefi Complaint, 1:1-31:3). Yousefi and Kane further allege that the officer defendants sold their stock before publicly disclosing Lockheed's financial troubles, thereby violating insider trading laws. (Yousefi Complaint, 10:5-13:28). Plaintiffs state claims under Sections 10(b) and 20(a) of the Securities and Exchange Act of 1934, as well as Rule 10b-5 under the Act. (Yousefi Complaint, 69:12-25). On February 5, 1999, Joseph Edmonds ("Edmonds") filed a class action against Lockheed and the same six officers for the securities fraud that occurred between August 13, 1998 and December 23, 1998. Edmonds states claims under Sections 10(b) and 20(a) and Rule 10b-5. (Edmonds Complaint, 36:3-37:24). On February 11, 1999, William Kretchmeyer ("Kretchmeyer") filed a securities fraud class action, identical to the Yousefi and Edmonds actions. This suit involves the same defendants, the same allegations of fraud, and the same claims. On March 15, 1999, Yousefi, Kane, Kretchmeyer, and 134 other potential class members, collectively identifying themselves as the "Lockheed Plaintiffs Group," filed a motion to consolidate the three suits. On that same day, the Lockheed Plaintiffs Group also filed a motion to appoint its 137 members lead plaintiffs in the class action. On March 29, 1999, defendants filed a notice of non-opposition to the motion to consolidate. On April 1, 1999, the Lockheed Plaintiffs Group filed a reply. No other potential class members filed motions for appointment as lead plaintiff or otherwise opposed the Lockheed Plaintiffs Group's motions. III. MOTION TO CONSOLIDATE. A. LEGAL STANDARD. Rule 42(a) of the Federal Rules of Civil Procedure governs motions to consolidate actions. See Fed.R.Civ.P. 42(a). When actions involving a common question of law or fact are pending before the court, it may order a joint hearing or trial of any or all matters in issue in the actions; it may order all the actions consolidated; and it may make such orders concerning proceedings therein as may tend to avoid unnecessary costs or delay. Fed.R.Civ.P. 42(a). The threshold issue, therefore, is whether the actions involve common facts or legal issues. See Enterprise *1065 Bank v. Saettele, 21 F.3d 233, 235 (8th Cir.1994). When the suits subject to consolidation involve securities fraud, "a court shall not make the [lead plaintiff and counsel determination] until after the decision on the motion to consolidate is rendered." See 15 U.S.C. § 78u-4(a)(3)(B)(ii) (1997). After the court decides the motion to consolidate, "the court shall appoint the most adequate plaintiff as lead plaintiff for the consolidated actions" as soon as practicable. See 15 U.S.C. § 78u-4(a)(3)(B)(ii). B. APPLICATION. The Lockheed Plaintiffs Group moves to consolidate the Yousefi, Edmonds, and Kretchmeyer suits. (Motion to Consolidate, Face Page). This group consists of Yousefi, Kane, Kretchmeyer, and 134 class members that purchased Lockheed stock during the period at issue. (Baron Decl., Exhs. A, B). Aside from Yousefi, Kane, and Kretchmeyer, the group's members are not named plaintiffs in any of the suits. Only a party to an action may move for consolidation of its action with another; alternatively, a district court presiding over the matters may order consolidation sua sponte. See In re Air Crash Disaster at Florida Everglades, 549 F.2d 1006, 1012-21 (5th Cir.1977) (explaining who may assert a motion to consolidate). Given this rule, Yousefi, Kane, and Kretchmeyer may move for consolidation because they are parties to the suits at issue. However, the 134 other members of the Lockheed Plaintiffs Group, which are not party to the three suits subject to consolidation, cannot move to consolidate the actions. Pursuant to Rule 12(f) of the Federal Rules of Civil Procedure, the Court strikes sua sponte the 134 members of the Lockheed Plaintiffs Group that are not party to the three actions at issue from the motion to consolidate. See Fed.R.Civ.P. 12(f) (permitting courts to strike "immaterial" pleadings). With regard to Rule 42(a)'s requirements, the Yousefi, Edmonds, and Krechmeyer suits all state claims for violations of Sections 10(b) and 20(a) and Rule 10b-5 for false and misleading statements that defendants made relating to Lockheed stock between August 13, 1998 and December 23, 1998. (Yousefi Complaint, 69:12-25; Edmonds Complaint, 36:3-37:24; Kretchmeyer Complaint, 69:12-25). They also allege that the individual defendants sold their stock before making public disclosures concerning Lockheed's finances. (Yousefi Complaint, 10:5-13:28; Edmonds Complaint, 6:25-8:15; Kretchmeyer Complaint, 10:4-13:28). The Yousefi and Kretchmeyer complaints are written by the same counsel and are identical in form and content. The Edmonds complaint is written by counsel different from that of the Yousefi and Kretchmeyer actions, but it paraphrases those complaints almost paragraph by paragraph. Because the Court finds that the complaints contain common issues of law and fact, it grants the motion to consolidate CV 99-372 LGB (RNBx), CV 99-1266 LGB (RNBx), and CV 99-1476 LGB (RNBx). IV. MOTION TO APPOINT LEAD PLAINTIFF AND LEAD COUNSEL. The 137 members of the Lockheed Plaintiffs Group move for the Court to name them joint lead plaintiffs. They also move for the law firm of Milberg, Weiss, Bershad, Hynes & Lerach ("Milberg, Weiss"), the law firm of Schiffrin & Barroway, and the law firm of Berger & Montague to serve as joint lead counsel for the instant class action suit. A. The Private Securities Litigation Reform Act of 1995. In 1995, Congress passed the Private Securities Litigation Reform Act, which established procedures for the filing of class action suits under the Securities and Exchange Act of 1934. See 15 U.S.C. § 78u-4 (codifying the Act); S.Rep. No. *1066 104-98, at 8-12 (1995), reprinted in 1995 U.S.C.C.A.N. 679, 687-91. According to the Act's legislative history, Congress views the plaintiff's bar as quick to file non-meritorious securities fraud suits on behalf of nominally interested plaintiffs anytime there is a downward turn in a stock's value, hoping to extract a speedy settlement. See S.Rep. No. 104-98, at 8-12 (1995), reprinted in 1995 U.S.C.C.A.N. 679, 687-91. To end these abuses, the Act permits district courts to appoint the plaintiff it perceives to be the most qualified to represent the class, rather than the first plaintiff to file suit. See 15 U.S.C. § 78u-4. Ideally, courts will appoint institutional investors with large holdings in the stock as lead plaintiff. As Congress and academics have noted, institutional investors have incentives to monitor their suits closely because of their substantial stakes in the stock at issue, thereby eliminating frivolous tactics and settlements that inflate attorneys' fees. See S.Rep. No. 104-98, at 6, 11 (1995), reprinted in 1995 U.S.C.C.A.N. 679, 685, 690 ("Numerous studies show that investors recover only 7 to 14 cents for every dollar lost as a result of securities fraud."); Janet Cooper Alexander, Do the Merits Matter? A Study of Settlements in Securities Class Actions, 43 Stan.L.Rev. 511, 513 (1991) (noting that in one business sector, every company that suffered a market loss of twenty million dollars or more faced a securities fraud suit); Elliot J. Weiss & John S. Beckerman, Let the Money Do the Monitoring: How Institutional Investors Can Reduce Agency Costs in Securities Class Actions, 104 Yale L.J.2053, 2109-27 (1995) ("[A] court might well feel confident in assuming that a fee arrangement an institutional investor had negotiated with its lawyers before initiating a class action maximized those lawyers' incentives to represent diligently the class' interests, reflected the deal a fully informed client would negotiate, and thus presumptively was reasonable."). To effect these ends, the Act sets forth two steps in the lead plaintiff appointment procedure. First, the plaintiff who filed the complaint shall publish, in a widely circulated national business-oriented publication or wire service, a notice advising members of the proposed class that the action is pending and that any member of the class may move the court to serve as lead plaintiff within sixty days of the notice's publication. See 15 U.S.C. § 78u-4(a)(3)(A). Plaintiff must publish this notice within twenty days of filing the complaint. See 15 U.S.C. § 78u-4(a)(3)(A)(i). If more than one action on behalf of a class asserting substantially the same claim is filed, the Act only requires the plaintiff in the first-filed action to publish the notice. See 15 U.S.C. § 78u-4(a)(3)(A)(ii). Second, the district court shall consider any motion made by a purported class member in response to the notice and shall appoint as lead plaintiff the member or members of the purported class that the court determines to be most capable of adequately representing the interests of class members. See 15 U.S.C. § 78u-4(a)(3)(B). The Act also creates a rebuttable presumption concerning which party is most capable of adequately representing the interests of class members. The court shall apply the rebuttable presumption to the person that, (1) "has either filed the complaint or made a motion in response to a notice" of the action, (2) "has the largest financial interest in the relief sought by the class," and (3) "otherwise satisfies the requirements of Rule 23 of the Federal Rules of Civil Procedure." 15 U.S.C. § 78u-4(a)(3)(B)(iii)(I). The presumption may be rebutted "only upon proof by a member of the purported plaintiff class that the presumptively most adequate plaintiff" (1) "will not fairly and adequately protect the interests of the class" or (2) "is subject to unique defenses that render such plaintiff incapable of adequately representing the class." 15 U.S.C. § 78u-4(a)(3)(B)(iii)(II). B. COMPLIANCE WITH THE ACT'S NOTICE REQUIREMENTS. Yousefi and Kane, who filed the first action, have complied with the Act's *1067 notice requirements. See 15 U.S.C. § 78u-4(a)(3)(B) (requiring that the firstfiled action meet notice requirements). On January 14, 1999, the day on which they filed suit, Yousefi and Kane announced on the Dow Jones & Company's Business Wire their class action suit against Lockheed and its officers, filed in the Central District of California. (Baron Decl., Exh. D). The wire details the securities fraud allegations against Lockheed and its officers for the period of August 13, 1998 to December 23, 1998. (Baron Decl., Exh. D). As required by the Act, the announcement also states that "[i]f you are a member of the Class described above, you may, no later than 60 days from today, move the Court to serve as lead plaintiff of the Class, if you so choose." (Baron Decl., Exh. D). Class members had until March 15, 1999 to move this Court to appoint them lead plaintiffs. No class members filed such a motion other than the instant motion. Since the passage of the Act, district courts, including this Court, have repeatedly recognized the Business Wire as a "widely circulated national business-oriented ... wire service," as required by the Act. See, e.g., Squyres v. Union Texas Petroleum Holdings, Inc., 1999 Fed.Sec. L.Rep. (CCH) ¶ 90,405 (C.D.Cal. November 2, 1998) (Baird, J.); Chill v. Green Tree Fin. Corp., 181 F.R.D. 398, 403 (D.Minn.1998); D'Hondt v. Digi Int'l, Inc., 1997 WL 405668, at *1 (D.Minn. Apr.3, 1997); Greebel v. FTP Software, Inc., 939 F.Supp. 57, 62-63 (D.Mass.1996) ("Business Wire is subscribed to by hundreds of print publications and wire services, encompassing news media in all fifty states."). Accordingly, the Court finds that Yousefi and Kane have met the Act's notice requirements. C. GROUPING UNRELATED CLASS MEMBERS TO ESTABLISH THE REBUTTABLE PRESUMPTION. Courts applying the Act are divided over whether multiple class members may aggregate their losses in order to satisfy the presumption's requirement that the lead plaintiff be the "person or group of persons [that] has the largest financial interest in relief sought by the class." See 15 U.S.C. § 78u-4(a)(3)(B)(iii). The Southern District of New York, in In re Donnkenny Inc. Securities Litigation, 171 F.R.D. 156 (S.D.N.Y.1997), denied plaintiffs' motion to aggregate two institutional investors and four individuals to serve as lead plaintiffs. See id. at 157. The court reasoned that by grouping the interests of unrelated class members, those members would most likely abdicate the coordination of the suit to their attorneys. See id. The court expressed that this result would be at odds with the Act's purpose of eliminating lawyer-driven litigation. See id. However, the majority of courts addressing this issue have permitted the aggregation of claims. See, e.g., In re Advanced Tissue Sciences Sec. Litig., 184 F.R.D. 346, 353 (S.D.Cal.1998) (allowing the aggregation of six plaintiffs); In re Oxford Health Plans, Inc. Sec. Litig., 182 F.R.D. 42, 45-48 (appointing three plaintiffs as lead plaintiffs); Chill v. Green Tree Financial Corp., 181 F.R.D. 398, 409 (D.Minn.1998) (aggregating six plaintiffs). Courts have arrived at this result because the Act expressly permits a court to appoint more than one lead plaintiff. The court "shall appoint as lead plaintiff the member or members of the purported plaintiff class that the court determines to be most capable of adequately representing the interests of class members." 15 U.S.C. § 78u-4(a)(3)(B)(i) (emphasis added). Furthermore, when choosing the lead plaintiff, the court must appoint the "person or group of persons" that meets the rebuttable presumption's requirements. 15 U.S.C. § 78u-4(a)(3)(B)(iii)(I) (emphasis added). Therefore, the Act clearly contemplates the appointment of multiple plaintiffs to manage the litigation. Nevertheless, the Court recognizes a tension between the Act's express *1068 purpose and language. Although the legislative history stresses the need to place control of securities class actions in a small and finite number of plaintiffs, the statute's language explicitly provides for more than one lead plaintiff, altogether failing to limit the number of lead plaintiffs a court may employ. See 15 U.S.C. § 78u-4(a)(3)(B); See S.Rep. No. 104-98, at 8-12 (1995), reprinted in 1995 U.S.C.C.A.N. 685. This tension's import is that Congress desired the Act to mitigate abusive litigation tactics, in contrast to serving as an antidotal measure. Examining the Act through this palliative lense, the Court finds that it contemplates the aggregation of unrelated plaintiffs as a permissible, albeit suboptimal, result. Contrary to the holding in In re Donnkenny Inc. Securities Litigation, this Court therefore holds that where a group of unrelated plaintiffs move to aggregate their claims to serve as lead plaintiffs, and no party or potential class member opposes the motion, the court may permit the aggregation. In sum, the Court finds that the Act does not prohibit outright the Lockheed Plaintiffs Group from collectively moving for appointment as joint lead plaintiffs. The tension between the Act's legislative history and express language also counsels this Court's decision concerning the appropriate number of class members to serve as lead plaintiffs. As explained above, the Lockheed Plaintiffs Group consists of three named plaintiffs and 134 unrelated class members. Precedent does not exist for a group of lead plaintiffs this large. In fact, when courts appoint multiple class members as lead plaintiffs, they typically appoint less than ten plaintiffs. See, e.g., See In re Advanced Tissue Sciences Sec. Litig., 184 F.R.D. 346, 353 (S.D.Cal.1998) (allowing the aggregation of six plaintiffs); In re Oxford Health Plans, Inc. Sec. Litig., 182 F.R.D. 42, 45-48 (appointing three plaintiffs as lead plaintiffs); Chill v. Green Tree Financial Corp., 181 F.R.D. 398, 409 (D.Minn.1998) (aggregating six plaintiffs). Confronted with a similar issue, the Southern District of California, in In re Advanced Tissue Sciences Securities Litigation, 184 F.R.D. 346 (S.D.Cal.1998), denied a motion to appoint approximately 250 unrelated class members as lead plaintiffs and denied another motion to appoint 165 unrelated class members. The Court reasoned that numerous lead plaintiffs would make "the administration of this action unnecessarily complex and unwieldy" and would be "inconsistent with the goal of restoring control over lawsuits to plaintiffs." Id. at 352. Instead, the court granted an alternative motion to appoint six class members as lead plaintiffs. See id. Like the Southern District of California, this Court finds that an aggregation of class members as large as the Lockheed Plaintiffs Group would frustrate the Act's purposes. One of its primary goals is to enable plaintiffs to seize control of securities fraud class action suits from the plaintiff's bar. See S.Rep. No. 104-98, at 8-12 (1995), reprinted in 1995 U.S.C.C.A.N. 679, 687-91. In a suit with 137 lead plaintiffs, attorneys would have to assume a leadership role to coordinate and manage this number of lead plaintiffs. In addition, as the number of lead plaintiffs increases, individual plaintiff's incentives to monitor attorney behavior decreases, causing a "free-rider" problem. As a leading article on shareholder monitoring explains, The monitor will continue to expend effort as long as his cost of doing so is less than his expected benefit. But when there are many potential monitors with overlapping interests, the optimal level may prove more elusive. An individual seeking to reduce his own monitoring costs may attempt to rely on the efforts of others; such "freeriding," if widespread, will lead to undermonitoring. See Saul Levmore, Monitors and Freeriders in Commercial and Corporate Settings, 92 Yale L.J. 49, 49 (1982). In short, if the Court appoints only a few lead plaintiffs, those plaintiffs are likely to assume *1069 more responsibility over the suit than if the court appointed hundreds of lead plaintiffs. Because the Court finds that the appointment of 137 lead plaintiffs would frustrate the Act's purposes, the Court denies the Lockheed Plaintiffs Group's motion for appointment as lead plaintiffs. D. AUTHORITY TO APPOINT LEAD PLAINTIFF. As of the date of this order, only three published opinions have denied class members' motions for appointment as lead plaintiffs. As explained above, in In re Donnkenny Inc. Securities Litigation, 171 F.R.D. 156 (S.D.N.Y.1997), the district court denied a group of unrelated class members' motion to be named lead plaintiffs, reasoning that the Act does not permit the aggregation of claims. See id. at 157-58. Instead, the court granted an institutional investor's motion to be named lead plaintiff. See id. at 158. In Chill v. Green Tree Financial Corp., 181 F.R.D. 398 (D.Minn.1998), the district court denied a motion to name 300 class members lead plaintiffs but granted an alternative motion to name a much smaller group of class members lead plaintiffs. See id. at 413-15. Similarly, in In re Advanced Tissue Sciences Securities Litigation, 184 F.R.D. 346 (S.D.Cal.1998), the district court denied a motion to name approximately 250 class members lead plaintiffs and denied a motion to name 165 class members lead plaintiffs. See id. at 352-53. Instead, the court granted an alternative motion to name six members lead plaintiffs. See id. at 353. In all three of these suits, the district courts denied motions to be named lead plaintiffs only to grant motions in the alternative. In the instant suit, the Lockheed Plaintiffs Group's motion is the only one that has been filed. Although the law firm of Milberg, Weiss represented plaintiffs in all three of the above-mentioned suits and represents plaintiffs in this suit, the firm has not filed a motion in the alternative. Instead, the Lockheed Plaintiffs Group's motion, signed by a Milberg, Weiss attorney, asks the Court to name the 137 class members lead plaintiffs and then allow the lead plaintiffs to designate "lead plaintiff representatives" to manage the suit. (Lead Plaintiff Motion, 2:25-28). The Lockheed Plaintiffs Group cites to a recent opinion from this District, Schlagal v. Learning Tree Int'l, CV 98-6384 ABC (Ex), 1999 WL 672306 (C.D.Cal. Feb. 25, 1999), where the court permitted lead plaintiffs to designate lead plaintiff representatives at the class certification stage. See id. at *5-*6. The Schlagel court noted that it may "leave the decision of whom to appoint as a smaller representative group to lead plaintiffs and their counsel." Id. at *6 (emphasis added). Contrary to this holding, in a suit such as this one where counsel would have to manage the large Lockheed Plaintiffs Group, permitting the group and its counsel to name representative lead plaintiffs would allow counsel to name nominally interested plaintiffs as a means of seizing control of the suit. This strategy is a novel and veiled attempt to shift the Court's authority to name lead plaintiffs to counsel, effectively nullifying the aim of the Act. Therefore, the Court does not permit the Lockheed Plaintiff's Group to name representatives. This presents the Court with an issue of first impression: If the Court denies a motion to name lead plaintiffs, does the Act compel it to designate a lead plaintiff, or should it wait for another class member to file a motion for the designation of lead plaintiff? The Court finds that the Act advocates the former approach. Under the Act, Not later than 90 days after the date on which a notice is published [announcing the filing of the suit], the court shall consider any motion made by a purported class member in response to the notice, including any motion by a class member who is not individually named as a plaintiff in the complaint or complaints, and shall appoint as lead plaintiff *1070 the member or members of the purported plaintiff class.... 15 U.S.C. § 78u-4(a)(3)(B)(i). The purpose of the notice requirement is to afford institutional investors the opportunity to intervene in these actions. If a court does not receive a response within the prescribed time frame, it must assume that these optimal plaintiffs will not intervene. The ninety day time frame, which would have applied to this suit if it were not a consolidated action, expired on April 15, 1999. Given the Act's mandatory language that the district court "shall appoint [a] lead plaintiff" either within ninety days or as soon as practicable when a motion to consolidate is pending, the Court holds that it must appoint a lead plaintiff at this juncture in the suit. This holding is implicitly supported by In re Oxford Health Plans, Inc. Securities Litigation, 182 F.R.D. 42 (S.D.N.Y.1998). In that suit, three sets of investors moved for the court to appoint them lead plaintiffs. See id. at 43-46. Finding that all three sets of plaintiffs were qualified to represent the class, the Court appointed all three sets of class members joint lead plaintiffs, with each exercising a single vote. See id. Therefore, the court did not grant the letter of class members' motions but instead modified them sua sponte in order to progress with the suit. E. APPOINTMENT OF LEAD PLAINTIFF. When determining which class member to appoint lead plaintiff, a court should consider the rebuttable presumption factors enumerated in the Act, even when the motion is unopposed. These factors are: (1) whether the class member filed the complaint or the motion for lead plaintiff; (2) in the court's determination, whether the class member has the largest financial interest in the relief sought by the class; and (3) whether the class member otherwise satisfied the requirements of Rule 23. 15 U.S.C. § 78u-4(a)(3)(B)(iii)(I). Courts have also taken the following factors into consideration to determine which class member to appoint lead plaintiff. (1) whether the class member is an institutional investor. See In re Oxford Health Plans, Inc. Sec. Litig., 182 F.R.D. 42, 47 (S.D.N.Y.1998). (2) whether there is evidence that the class member will serve as an efficient monitor of its attorneys. See id. at 46. (3) whether the class member uniquely represents class interests. See id. at 47. Each of the 137 members of the Lockheed Plaintiffs Group filed a "Certification of Named Plaintiff," which states that the member wants to serve as lead plaintiff, the dates the member traded Lockheed stock, the number of shares the member purchased, and the price the member paid per share. (Baron Decl., Exh. A). The Lockheed Plaintiffs Group also presents a statement of loss for each member of the group. (Baron Decl., Exh. B). This loss ranges from $24.99 to $155,765.89. The largest investor is James Corbin ("Corbin"), who alleges a loss of $155,765.89. (Baron Decl., Exh. B). The second largest investor is the City of Philadelphia Board of Pensions and Retirement ("City of Philadelphia"), which alleges a loss of $130,137.50. (Baron Decl., Exh. B). The Court finds that Corbin and the City of Philadelphia would best serve as lead plaintiffs. Both Corbin and the City of Philadelphia meet the rebuttable presumption's first requirement because they both filed the instant motion and signed certifications declaring that they are willing to serve as lead plaintiffs. See 15 U.S.C. § 78u-4(a)(3)(B)(iii)(I). (Baron Decl., Exh. A). Furthermore, Corbin and the City of Philadelphia possess the largest financial interests in the Lockheed stock of all the movants, thereby meeting the rebuttable presumption's second requirement. See 15 U.S.C. § 78u-4(a)(3)(B)(iii)(I). *1071 (Baron Decl., Exh. A). The Court also finds that with the appointment of one lead plaintiff who is an individual private investor and one lead plaintiff that is an institutional investor, the lead plaintiffs will represent a broader range of shareholder interests than if the Court appointed an individual or an institutional investor alone. See In re Oxford Health Plans, 182 F.R.D. at 47 (appointing a group of individual investors and institutional investors to serve as joint lead plaintiffs because they would represent a broad range of interests). The Court also finds that Corbin and the City of Philadelphia meet Section 78u-4's Rule 23 requirements. At this stage of the proceeding, proposed lead plaintiffs need only make a preliminary showing that they satisfy the requirements of Rule 23. See Gluck v. Cellstar Corp., 976 F.Supp. 542, 546 (N.D.Tex.1997) (noting that Congress did not require an exhaustive Rule 23 showing). Because the lead plaintiffs will state claims identical to those in the consolidated action arising out of alleged misstatements made between August 13, 1998 and December 23, 1998, their claims arise from the same "course of conduct" that gives rise to the claims of the other class members, thereby meeting the commonality and typicality requirements. See In re United Energy Corp. Solar Power Modules Tax Shelter Investments Sec. Litig., 122 F.R.D. 251, 254-56 (C.D.Cal.1988). Next, a class of at least 137 members makes joinder of all members impracticable, thereby meeting the numerosity requirement. See General Tel. Co. v. Equal Employment Opportunity Comm'n, 446 U.S. 318, 330, 100 S.Ct. 1698, 64 L.Ed.2d 319 (1980). Finally, no evidence exists to suggest that Corbin and the City of Philadelphia are antagonistic to other members of the class or their attorneys, thereby meeting the adequacy of representation requirement. See Diana Doe v. Los Angeles Unified School Dist., 48 F.Supp.2d 1233 (C.D.Cal.1999). For these reasons, the Court is satisfied that Corbin and the City of Philadelphia meet Rule 23's requirements. However, because Section 78u-4 only requires preliminary class certification findings, the Court does not preclude any party from contesting the ultimate class certification on the basis of the instant findings. See Gluck, 976 F.Supp. at 546. Incidentally, the Court recognizes that none of the class members moving to serve as lead plaintiff possess enough of a financial stake to ensure careful and prolonged monitoring of this suit. The service list in this suit names ten corporate law firms, suggesting that legal fees in this matter are compounding quickly. Even Corbin's and the City of Philadelphia's financial stakes are not weighty enough for them to expend large amounts of time and resources supervising this suit. See In re Oxford Health Plans, 182 F.R.D. at 47 (appointing investors with tens of millions of dollars at stake as lead plaintiffs). To minimize the free-rider problem, the Court nevertheless believes that Corbin and the City of Philadelphia may each exert more control over their attorneys by serving as one of two lead plaintiffs, in contrast to serving as one of 137 lead plaintiffs. Accordingly, the Court appoints Corbin and the City of Philadelphia as lead plaintiffs in this suit. Each shall exercise an equal vote in managing this litigation. See id. at 45 (charging each lead plaintiff with an equal vote to facilitate decision-making). F. APPOINTMENT OF LEAD COUNSEL. Corbin and the City of Philadelphia, like the other 135 members of the Lockheed Plaintiffs Group, move to appoint three law firms to serve as lead counsel: (1) Milberg, Weiss; (2) Schiffrin & Barroway; and (3) Berger & Montague. As to the appointment of lead counsel requirements, the Act states only that "[t]he most adequate plaintiff shall, subject to the approval of the court, select and retain counsel to represent the class." 15 U.S.C. § 78u-4(a)(3)(B)(v). Nevertheless, the Act's legislative *1072 history reveals that Congress wanted to vest district courts with the authority to appoint lead counsel to prevent attorneys from racing to the courthouse to be "the first to file." See S.Rep. No. 104-98, at 4-12 (1995), reprinted in 1995 U.S.C.C.A.N. 679, 683-91. Here, Corbin and the City of Philadelphia move to have the same three law firms serve as lead counsel, thereby eliminating potential abuses from attorneys trying to "file first." Nonetheless, the Court finds that the Act would be better served by the appointment of one law firm to manage the case. As explained above, one of the central purposes of the Act is to enable plaintiffs to control counsel. See S.Rep. No. 104-98, at 11 (1995), reprinted in 1995 U.S.C.C.A.N. 679, 690. If the Court appointed three law firms as lead counsel, Corbin and the City of Philadelphia would have to exert their authority in triplicate every time they made a decision. The Court finds that Corbin and the City of Philadelphia are more likely to develop a strong attorney-client relationship if they only have to deal with one central law firm, as opposed to three. Accordingly, the Court will only permit one law firm to serve as lead counsel in this case on the basis that class interests are better served by a central law firm. Upon review of the three firms' resumes, the Court finds that they all have broad experience and success in prosecuting securities fraud class actions. In differentiating between the three firms, the Court finds that Milberg, Weiss' attorneys have signed all the pleadings in the Yousefi and Ketchmeyer actions up to this point in the litigation, thereby displaying a strong familiarity with the facts of this suit. On this basis, the Court finds that Milberg, Weiss is the most capable of serving as lead counsel. See Squyres v. Union Texas Petroleum Holdings, Inc., 1999 Fed. Sec.L.Rep. (CCH) ¶ 90,405 (C.D.Cal. November 2, 1998) (Baird, J.) (finding Milberg, Weiss qualified to serve as lead counsel); In re Advanced Tissue Sciences Sec. Litig., 184 F.R.D. 346, 352 (S.D.Cal. 1998) (same); Chill v. Green Tree Fin. Corp., 181 F.R.D. 398, 403, 413-15 (D.Minn.1998) (same); In re Donnkenny, Inc. Sec. Litig., 171 F.R.D. 156, 158 (S.D.N.Y.1997) (same). Accordingly, the Court denies the Lockheed Plaintiffs Group's motion for appointment of lead counsel, but it names Milberg, Weiss as lead counsel. V. CONCLUSION. The Court strikes sua sponte all moving parties from the motion to consolidate with the exception of Mohammad Yousefi, David Kane, and William Kretchmeyer, and it grants the motion. The caption in this matter shall be: IN RE LOCKHEED MARTIN CORP. SECURITIES LITIGATION. CV 99-372 LGB (RNBx) CLASS ACTION Consolidated with: CV 99-1266 LGB (RNBx) CV 99-1476 LGB (RNBx) The lead plaintiffs shall file a concise consolidated amended complaint within forty-five days after receiving this order. The Court denies the motion to appoint lead plaintiff and lead counsel. The Court names James Corbin and the City of Philadelphia Board of Pensions and Retirement lead plaintiffs and the law firm of Milberg, Weiss, Bershad, Hynes & Lerach as lead counsel. IT IS SO ORDERED.
{ "pile_set_name": "FreeLaw" }
Cricket was not merely a game - a great and noble game. It was the embodiment of everything that was best in the British, it was something above politics, a bridge that crossed the divides separating the races.
{ "pile_set_name": "Pile-CC" }
Determination of SB 216469-S during tablet production using near-infrared reflectance spectroscopy. A near-infrared method was developed for analyzing SB 216469-S tablets at various stages of tablet processing, particularly after (i) high shear granulation, (ii) lubrication, (iii) core tablet compression, and (iv) aqueous film coating. Tablets with three different drug concentrations ranging from 1.5% (w/w) to 6.0% (w/w) were examined along with a placebo. Similarly, moisture levels during the granulation drying process were measured, along with the thickness of the tablet coating. Tablet identification inside blister packaging for clinical supplies was also demonstrated.
{ "pile_set_name": "PubMed Abstracts" }
Lattice-independent approach to thermal phase mixing We show how to achieve lattice-spacing-independent results in numerical simulations of finite-temperature stochastic scalar field theories. We generalize a previous approach by obtaining results which are independent of the renormalization scale. As an application of our method, we examine thermal phase mixing in the context of Ginzburg-Landau models with short-range interactions. In particular, we obtain the lattice-spacing and renormalization-scale-independent critical value of the control parameter which determines the free-energy barrier between the two low-temperature phases. We also propose a simple procedure to extract the critical value of control parameters for different choices of lattice spacing.
{ "pile_set_name": "PubMed Abstracts" }
Heretofore, there have been provided various types of bar, link and other articulated mechanisms for preventing the theft of vehicles, such as bicycles, motorcycles, motor bikes, mopeds and the like. Such devices have ranged from the very complex to the very simple such as that which is identified as bike chain locks. These locks have generally included a flexible belt, strap or chain which has an integral pad-lock mechanism for locking the free ends of the chain together so that the chain can be looped around the wheel, for example, of the vehicle and then attached around a fixed part of the vehicle frame. More recently, there has been provided a chain lock which incorporates a main body having at one end a plate detachably secured thereto and which with the body defines a channel to receive the chain which is engaged by a pair of prongs which are secured by a manually operable lock mechanism disposed in the body. Such chain lock device is disclosed, for example, in U.S. Pat. No. 4,019,354. Other lock devices are further illustrated, for example, in U.S. Pat. Nos. 60,454, 587,456 and 3,754,420.
{ "pile_set_name": "USPTO Backgrounds" }
First determination of the incidence of the unique TOR1A gene mutation, c.907delGAG, in a Mediterranean population. The c.907delGAG mutation in the TOR1A gene (also named DYT1) is the most common cause of early-onset primary dystonia. The mutation frequency and prevalence have so far been only estimated from rare clinical epidemiological reports in some populations. The purpose of this study was to investigate the incidence at birth of the c.907delGAG mutation in a French-representative mixed population of newborn from South-Eastern France. We applied an automated high-throughput genotyping method to dried blood spot samples from 12,000 newborns registered in Hérault between 2004 and 2005. Only one allele was found to carry the mutation, which allows to determine its incidence at birth as 1/12,000 per year in this area.
{ "pile_set_name": "PubMed Abstracts" }
Joint Commission, HCFA restraint regs are at odds. The restraint standards from the Joint Commission on Accreditation of Healthcare Organizations and restraint regulations from the Health Care Financing Administration (HCFA) differ in key areas. HCFA requires a physician or other licensed practitioner to perform a face-to-face evaluation within one hour, while the Joint Commission requires the evaluation within 12 hours. HCFA doesn't permit the use of physician-developed protocols for restraints, while the Joint Commission allows protocols to be used. HCFA requires that restraints can be used only in emergency situations, unless it's documented that all other types of interventions have failed, while the Joint Commission permits restraint use for some behavioral management situations.
{ "pile_set_name": "PubMed Abstracts" }
With the Duke Victory… • Improved to 27-2 overall and 17-1 in the ACC to finish the regular season. • Posted an ACC-record 17 league wins this season. • Moved the all-time series record to 47-38 in favor of UNC. • Won its sixth straight game against North Carolina. • Coach P moved to 41-2 at home against ACC opponents during her six years. • Improved to 22-13 all-time at home versus North Carolina. • Moved to 14-0 at home this season marking the fourth undefeated regular season in Blue Devil history (2006-07, 2008-09, 2010-11). • Coach P moved to 82-5 all-time in Cameron Indoor Stadium.. Freshman Alexis Jones • Scored a career-high 22 points and dished four assists. • Totaled double-figure scoring for the third straight game, which is a career best. • Had two three-point plays. • Hit a career-high 11-of-12 from the free throw line, including 11 in a row. • Owns 100 assists on the season. • Moved into a tie for seventh on Duke’s single-season freshman steals list with 54. • Tallied double-digit scoring for the ninth time this season. Sophomore Elizabeth Williams • Notched 13 points, six rebounds, two steals, one assist and five blocked shots. • Her five blocked shots is the most since she swatted five on Dec. 9 vs. St. John’s. • Notched double-digit scoring for the 16th straight ACC contest. • Blocked a shot for the 62nd straight game since arriving at Duke. • With her five blocked shots, moved into fourth place on Duke’s all-time swats list with 199. • Moved into fifth on Duke’s single-season blocks list with 82. • Notched double-figure scoring in the 26th time this season and 53 times in her career. Senior Allison Vernerey • Notched six rebounds, four points, two blocks and one steal in 16 minutes. • Made her fifth start of the season. • Was honored prior to the game as she played her final regular season game in Cameron Indoor Stadium. Junior Haley Peters • Totaled 10 points, seven rebounds and two steals. • Netted double-figure scoring for the third straight game, 22nd time this season and 51 times in her career. Junior Tricia Liston • Posted eight points, five rebounds, one assist, one block and one steal. • Hit 1-of-4 from downtown. • Missed eight consecutive three-pointers in a span of two games before draining her first of the game at the 9:41 mark of the second half. • Snapped a streak of hitting 12 straight free throws with her first attempt in the second half. Junior Richa Jackson • Pulled down seven rebounds, which tied for a team-best. Other Duke Notes… • With Alexis Jones scoring 22 points, Duke now owns five different players with 20 or more points in a game this season. • Cut down the nets after the game for winning the ACC regular season title for the fourth straight year and the second straight outright title. • Was outrebounded for the second straight game, 48-47. • Held UNC to only 29.7 percent shooting in the game, which was a season low. • Hit only 2-of-11 three-pointers. • Drained 23-of-30 free throws. • Totaled a season-high 29 turnovers. • Blocked eight shots. • Dished only nine assists, which is the lowest for Duke in ACC play this season. • Registered its first sellout crowd of the season with 9,314 fans. It marks the 15th sellout in school history and the first since Feb. 27, 2011 versus North Carolina. • Went on a 22-2 run in the second half to grab a 48-34 lead at the 9:41 mark. • Trailed at the half, 27-26, marking the second straight game the Blue Devils have trailed at the break and third time this season (UConn, at Miami). • Will next play in the ACC Tournament on Friday, March 8 at 2:00 p.m., against the winner of the No. 8 seed vs. No. 9 seed contest in Greensboro, N.C.
{ "pile_set_name": "Pile-CC" }
Q: Backtracking in a while loop (python 3.x) I'm reasonably new to Python. I wanted to know if I could use an input and ask a question like 'are you sure?', and if the answer is no to go back to the original input. I've got this so far: variable = input("Make a choice between a, b, c or d. ") while variable not in ("a","b","c","d"): variable = input("Make a correct choice. ") if variable == "a": do things if variable == "b": do other things etc etc I want to ask, after they have typed in their choice, are you sure about your choice? If they say yes, that's fine, carry on, but if they say 'no' I want to be able to go to the same input without typing the whole thing out again. Is there any way to do that? A: You could embed the bit that you want to repeat in a while True block that you break out of? For example: while True answer = input("What is the correct answer, a, b, or c? ") check = input("Are you sure (y/n)? ") if check=="y" or check=="Y": break
{ "pile_set_name": "StackExchange" }
Q: Preventing form from submition on autosuggest I have the following form: <form action="/web/projects/add" id="EventAddForm" method="post" accept-charset="utf-8"> <div style="display:none;"><input type="hidden" name="_method" value="POST"/></div> <div class="input text"> <label for="AddressSearch">Search address</label> <input name="adress_search" type="text" id="AddressSearch"/> </div> <div class="input text required"> <label for="EventAddress">Address</label> <input name="data[Event][address]" type="text" id="EventAddress"/> </div> <div class="input text required"> <label for="EventPostNr">Post nr</label> <input name="data[Event][post_nr]" type="text" id="EventPostNr"/> </div> <div class="input text required"> <label for="EventCity">City</label> <input name="data[Event][city]" type="text" id="EventCity"/> </div> <div class="submit"> <input type="submit" value="Save"/> </div> </form> The previously mentioned fields are used for choosing autosuggested addresses by google maps and I omit that code for better readability, but the problem appears when the autosuggest dropdown appears. If a users navigates to one of the suggestion by keyboard and presses enter, the whole form is submitted. I have the following function to prevent the form from submition on mouse click: jQuery('#EventAddForm').submit(function( event ) { if ( $("#AddressSearch").is(":focus") || $("#EventPostNr").is(":focus") || $("#EventCity").is(":focus")) event.preventDefault(); }); But what I want to do is to prevent the form on the enter click as well. I lack some knowledge in jQuery and just cannot get it running, so any help or guidance is much appreciated. A: It's not a good idea to specify all the fields in case they change. Instead use a more generic selector. jQuery('#EventAddForm').submit(function( event ) { if ($(this).find('input:text:focus').length) event.preventDefault(); }); http://jsfiddle.net/KpXD3/
{ "pile_set_name": "StackExchange" }
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/> <meta http-equiv="X-UA-Compatible" content="IE=9"/> <meta name="generator" content="Doxygen 1.8.7"/> <title>Mooltipass: src/AES/gf256mul/gf256mul.h Source File</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="jquery.js"></script> <script type="text/javascript" src="dynsections.js"></script> <link href="search/search.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="search/search.js"></script> <script type="text/javascript"> $(document).ready(function() { searchBox.OnSelectItem(0); }); </script> <link href="doxygen.css" rel="stylesheet" type="text/css" /> </head> <body> <div id="top"><!-- do not remove this div, it is closed by doxygen! --> <div id="titlearea"> <table cellspacing="0" cellpadding="0"> <tbody> <tr style="height: 56px;"> <td id="projectlogo"><img alt="Logo" src="HaD_Mooltipass.png"/></td> <td style="padding-left: 0.5em;"> <div id="projectname">Mooltipass </div> <div id="projectbrief">Offline Password Keeper Developed on Hackaday</div> </td> </tr> </tbody> </table> </div> <!-- end header part --> <!-- Generated by Doxygen 1.8.7 --> <script type="text/javascript"> var searchBox = new SearchBox("searchBox", "search",false,'Search'); </script> <div id="navrow1" class="tabs"> <ul class="tablist"> <li><a href="index.html"><span>Main&#160;Page</span></a></li> <li><a href="pages.html"><span>Related&#160;Pages</span></a></li> <li><a href="annotated.html"><span>Data&#160;Structures</span></a></li> <li class="current"><a href="files.html"><span>Files</span></a></li> <li> <div id="MSearchBox" class="MSearchBoxInactive"> <span class="left"> <img id="MSearchSelect" src="search/mag_sel.png" onmouseover="return searchBox.OnSearchSelectShow()" onmouseout="return searchBox.OnSearchSelectHide()" alt=""/> <input type="text" id="MSearchField" value="Search" accesskey="S" onfocus="searchBox.OnSearchFieldFocus(true)" onblur="searchBox.OnSearchFieldFocus(false)" onkeyup="searchBox.OnSearchFieldChange(event)"/> </span><span class="right"> <a id="MSearchClose" href="javascript:searchBox.CloseResultsWindow()"><img id="MSearchCloseImg" border="0" src="search/close.png" alt=""/></a> </span> </div> </li> </ul> </div> <div id="navrow2" class="tabs2"> <ul class="tablist"> <li><a href="files.html"><span>File&#160;List</span></a></li> <li><a href="globals.html"><span>Globals</span></a></li> </ul> </div> <!-- window showing the filter options --> <div id="MSearchSelectWindow" onmouseover="return searchBox.OnSearchSelectShow()" onmouseout="return searchBox.OnSearchSelectHide()" onkeydown="return searchBox.OnSearchSelectKey(event)"> <a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(0)"><span class="SelectionMark">&#160;</span>All</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(1)"><span class="SelectionMark">&#160;</span>Data Structures</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(2)"><span class="SelectionMark">&#160;</span>Files</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(3)"><span class="SelectionMark">&#160;</span>Functions</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(4)"><span class="SelectionMark">&#160;</span>Variables</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(5)"><span class="SelectionMark">&#160;</span>Enumerations</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(6)"><span class="SelectionMark">&#160;</span>Enumerator</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(7)"><span class="SelectionMark">&#160;</span>Macros</a><a class="SelectItem" href="javascript:void(0)" onclick="searchBox.OnSelectItem(8)"><span class="SelectionMark">&#160;</span>Pages</a></div> <!-- iframe showing the search results (closed by default) --> <div id="MSearchResultsWindow"> <iframe src="javascript:void(0)" frameborder="0" name="MSearchResults" id="MSearchResults"> </iframe> </div> <div id="nav-path" class="navpath"> <ul> <li class="navelem"><a class="el" href="dir_68267d1309a1af8e8297ef4c3efbcdba.html">src</a></li><li class="navelem"><a class="el" href="dir_b09f712dc5b362ce98c669b88a24f750.html">AES</a></li><li class="navelem"><a class="el" href="dir_5168b6abe292d0262f630f0bc43cae62.html">gf256mul</a></li> </ul> </div> </div><!-- top --> <div class="header"> <div class="headertitle"> <div class="title">gf256mul.h</div> </div> </div><!--header--> <div class="contents"> <div class="fragment"><div class="line"><a name="l00001"></a><span class="lineno"> 1</span>&#160;<span class="comment">/* gf256mul.h */</span></div> <div class="line"><a name="l00002"></a><span class="lineno"> 2</span>&#160;<span class="comment">/*</span></div> <div class="line"><a name="l00003"></a><span class="lineno"> 3</span>&#160;<span class="comment"> This file is part of the AVR-Crypto-Lib.</span></div> <div class="line"><a name="l00004"></a><span class="lineno"> 4</span>&#160;<span class="comment"> Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de)</span></div> <div class="line"><a name="l00005"></a><span class="lineno"> 5</span>&#160;<span class="comment"></span></div> <div class="line"><a name="l00006"></a><span class="lineno"> 6</span>&#160;<span class="comment"> This program is free software: you can redistribute it and/or modify</span></div> <div class="line"><a name="l00007"></a><span class="lineno"> 7</span>&#160;<span class="comment"> it under the terms of the GNU General Public License as published by</span></div> <div class="line"><a name="l00008"></a><span class="lineno"> 8</span>&#160;<span class="comment"> the Free Software Foundation, either version 3 of the License, or</span></div> <div class="line"><a name="l00009"></a><span class="lineno"> 9</span>&#160;<span class="comment"> (at your option) any later version.</span></div> <div class="line"><a name="l00010"></a><span class="lineno"> 10</span>&#160;<span class="comment"></span></div> <div class="line"><a name="l00011"></a><span class="lineno"> 11</span>&#160;<span class="comment"> This program is distributed in the hope that it will be useful,</span></div> <div class="line"><a name="l00012"></a><span class="lineno"> 12</span>&#160;<span class="comment"> but WITHOUT ANY WARRANTY; without even the implied warranty of</span></div> <div class="line"><a name="l00013"></a><span class="lineno"> 13</span>&#160;<span class="comment"> MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the</span></div> <div class="line"><a name="l00014"></a><span class="lineno"> 14</span>&#160;<span class="comment"> GNU General Public License for more details.</span></div> <div class="line"><a name="l00015"></a><span class="lineno"> 15</span>&#160;<span class="comment"></span></div> <div class="line"><a name="l00016"></a><span class="lineno"> 16</span>&#160;<span class="comment"> You should have received a copy of the GNU General Public License</span></div> <div class="line"><a name="l00017"></a><span class="lineno"> 17</span>&#160;<span class="comment"> along with this program. If not, see &lt;http://www.gnu.org/licenses/&gt;.</span></div> <div class="line"><a name="l00018"></a><span class="lineno"> 18</span>&#160;<span class="comment">*/</span></div> <div class="line"><a name="l00019"></a><span class="lineno"> 19</span>&#160;<span class="preprocessor">#ifndef GF256MUL_H_</span></div> <div class="line"><a name="l00020"></a><span class="lineno"> 20</span>&#160;<span class="preprocessor">#define GF256MUL_H_</span></div> <div class="line"><a name="l00021"></a><span class="lineno"> 21</span>&#160;</div> <div class="line"><a name="l00032"></a><span class="lineno"> 32</span>&#160;<span class="preprocessor">#include &lt;stdint.h&gt;</span></div> <div class="line"><a name="l00033"></a><span class="lineno"> 33</span>&#160;</div> <div class="line"><a name="l00034"></a><span class="lineno"> 34</span>&#160;uint8_t gf256mul(uint8_t a, uint8_t b, uint8_t reducer);</div> <div class="line"><a name="l00035"></a><span class="lineno"> 35</span>&#160;</div> <div class="line"><a name="l00036"></a><span class="lineno"> 36</span>&#160;<span class="preprocessor">#endif </span><span class="comment">/* GF256MUL_H_ */</span><span class="preprocessor"></span></div> <div class="line"><a name="l00037"></a><span class="lineno"> 37</span>&#160;</div> </div><!-- fragment --></div><!-- contents --> <!-- start footer part --> <hr class="footer"/><address class="footer"><small> Generated on Mon Apr 21 2014 22:26:15 for Mooltipass by &#160;<a href="http://www.doxygen.org/index.html"> <img class="footer" src="doxygen.png" alt="doxygen"/> </a> 1.8.7 </small></address> </body> </html>
{ "pile_set_name": "Github" }
Q: What is the difference between sequential access and sequential traversal of elements in data structures Sequential traversal is the main difference between linear and non linear data structures.Can anyone explain it briefly? A: A linear data structure is something like this: A B C D E For instance, lists and arrays. Each element is followed by a single element. Traversal is trivial, as you simply go from one element to the next. For instance, if you start at A, you only have one next element B, from B you only have one next element C and so on. A non-linear data structure is something like this: A / \ B C / \ / \ D E F G For instance, a tree. Notice how A is followed by two elements; B and C, and each of them is followed by two elements. Now traversal is more complex, because once you start from A, you have a choice of going to either B and C. What's more, once at B, you have a choice of going further down, or going "sideways" to C. In this case (a tree), your traversal options are breadth-first or depth-first.
{ "pile_set_name": "StackExchange" }
Paul Austin Kelly Paul Austin Kelly (born 1960) is an American singer. A former rock musician who has sung opera, the tenor and also writes, records and performs music for children. Musical beginnings Kelly attended Rondout Valley High School in Accord, New York and the Hartt School of Music in West Hartford, Connecticut. When he began his music career he fronted bands with names such as Legend, Black Dog and Guilded Spice. Kelly sang an eclectic mix of rock, pop music, folk and jazz. It wasn’t until he went to music school that the operatic potential of his voice was discovered. Opera performances Kelly has sung with the Metropolitan Opera, the Royal Opera at Covent Garden, and La Scala in Milan, Italy. The role of Count Almaviva in Rossini's The Barber of Seville has become his signature role. Kelly has also made numerous live performances on BBC Radio. Recording Kelly is an artist on the Opera Rara music label, the Telarc label and the Decca label. In 2003 he launched the Walking Oliver children's music label. The label won the National Parenting Publications Award (NAPPA) in the children's music category for the CD Hello Michael Rosen. The recording featured the poetry of children's literature icon Michael Rosen set to original music by Kelly. On the Walking Oliver CD titled Dreams, Kelly provided music and vocals for poems composed by primary school children from across the UK who had been chosen as winners of the first Walking Oliver Poetry in Song Contest. In 2008 Kelly recorded the CD "The Song Is You" with British jazz pianist and producer Kenny Clayton. The CD contains popular music from the Great American Songbook by such composers as Rodgers and Hart, Jerome Kern and Oscar Hammerstein II. In 2009 Kelly recorded "Where Did The Dinosaurs Go?" a CD recorded on the Walking Oliver label. The CD won an iParenting Media Award for Outstanding Audio. Personal life Kelly lives in Lewes in southern England. It was while performing with the nearby Glyndebourne Opera early in his career that he became enamored of the local area and decided to settle there with his wife, Carol. He still returns to his native country. References External links Walking Oliver website Category:American operatic tenors Category:Musicians from Kingston, New York Category:Living people Category:1960 births Category:The Hartt School alumni Category:Place of birth missing (living people) Category:Classical musicians from New York (state)
{ "pile_set_name": "Wikipedia (en)" }
David Lloyd Jones, Lord Lloyd-Jones David Lloyd Jones, Lord Lloyd-Jones, Kt, PC, FLSW (born 13 January 1952) is a British judge and legal scholar. He is currently a justice of the Supreme Court of the United Kingdom and served earlier as a member of the Court of Appeal of England and Wales and as a chairman of the Law Commission. Early life Lloyd Jones was born on 13 January 1952, to William Elwyn Jones and Annie Blodwen Jones (née Lloyd-Jones). He was educated at Pontypridd Boys' Grammar School. He studied law at Downing College, Cambridge: he graduated with a first class Bachelor of Arts (BA) degree, later promoted to a Master of Arts (MA Cantab) degree, and a first class Bachelor of Laws (LLB) degree. Career Academic career Lloyd Jones was a Fellow of Downing College, Cambridge from 1975 to 1991. From 1999 to 2005, he was a visiting professor at City University, London. He has written articles that have been published in a number of academic journals specialising in law. Legal career Lloyd Jones was called to the bar in 1975 (Middle Temple). He became a recorder in 1994 and served as a junior Crown Counsel (Common Law) from 1997 to 1999. Lloyd Jones became a Queen's Counsel in 1999. In 2009, it was revealed that he had been paid more than £1 million for his involvement in the Bloody Sunday Inquiry. On 3 October 2005, he was appointed as a High Court judge, and was assigned to the Queen's Bench Division. He served as presiding judge on the Wales and Chester Circuit and chairman of the Lord Chancellor's Standing Committee on the Welsh Language from 2008 to 2011. On 1 October 2012, Lloyd Jones was appointed a Lord Justice of Appeal, and was appointed to the Privy Council on 7 November 2012. Honours In 2005, upon being appointed a High Court judge, he received the customary appointment of Knight Bachelor. On 14 February 2006, he was knighted at Buckingham Palace by Queen Elizabeth II. He was made an Honorary Fellow of Aberystwyth University in 2012. He was awarded an honorary degree by Swansea University in 2014. In 2016, he was elected a Fellow of the Learned Society of Wales (FLSW). References See also List of Lords Justices of Appeal Category:1952 births Category:Living people Category:Alumni of Downing College, Cambridge Category:Fellows of Downing College, Cambridge Category:British Queen's Counsel Category:Knights Bachelor Category:Members of the Privy Council of the United Kingdom Category:Welsh judges Category:People educated at Pontypridd High School Category:Judges of the Supreme Court of the United Kingdom Category:Members of the Middle Temple Category:Fellows of the Learned Society of Wales Category:20th-century Welsh writers Category:20th-century British judges Category:21st-century Welsh writers
{ "pile_set_name": "Wikipedia (en)" }
An integrated rat genome map based on genetic and cytogenetic data. In this study we combined three major rat genome maps, by adding 66 markers to the Kyoto Laboratory Animal Science map (KLAS map), and constructed an integrated map. The resultant integrated map consists of 5,682 redundant markers, spanning a genetic length of 2,028 cM. Eighty genetic markers were anchored to the cytogenetic map, fixing all the genetic maps in the physically correct orientation. This map encapsulates the progress in rat mapping studies in past years and offers useful information for QTL analysis. The map figures are available at http:/(/)www.anim.med.kyoto-u.ac.jp/.
{ "pile_set_name": "PubMed Abstracts" }
Docosapentaenoic acid Docosapentaenoic acid (DPA) designates any straight chain 22:5 fatty acid, that is a straight chain open chain type of polyunsaturated fatty acid (PUFA) which contains 22 carbons and 5 double bonds. DPA is primarily used to designate two isomers, all-cis-4,7,10,13,16-docosapentaenoic acid (i.e. 4Z,7Z,10Z,13Z,16Z-docosapentaenoic acid) and all-cis-7,10,13,16,19-docosapentaenoic acid (i.e. 7Z,10Z,13Z,16Z,19Z-docosapentaenoic acid). They are also commonly termed n-6 DPA and n-3 DPA, respectively; these designations describes the position of the double bond being 6 or 3 carbons closest to the (omega) carbon at the methyl end of the molecule and is based on the biologically important difference that n-6 and n-3 PUFA are separate PUFA classes, i.e. the omega-6 fatty acids and omega-3 fatty acids, respectively. Mammals, including humans, can not interconvert these two classes and therefore must obtain dietary essential PUFA fatty acids from both classes in order to maintain normal health (see essential fatty acids). Isomers all-cis-4,7,10,13,16-docosapentaenoic acid (osbond acid) n-6 DPA is an ω-6 fatty acid with the trivial name osbond acid. It is formed by the stepwise elongation and desaturation of arachidonic acid i.e. 5Z,8Z,11Z,14Z-eicosatetraenoic acid (5,8,11,14-20:4n-6) to the 24 carbon PUFA intermediate (i.e. 6,9,12,15,18:24-5n-6) and the retro-conversion of this intermediate to DPAn-6 as follows: all-cis-7,10,13,16,19-docosapentaenoic acid (clupanodonic acid) n-3 DPA is an n-3 fatty acid with the trivial name clupanodonic acid. It is an intermediary between eicosapentaenoic acid (EPA, 5,8,11,14,17-20:5n-3) and docosahexaenoic acid (DHA, 22:6 ω-3) in the following stepwise pathway in which DPAn-3 is a precursor to DHA (6,9,12,15,18,21:24:6n-3) and the final product, 4,7,10,13,16,19-22:6n-3, can be retro-converted to DPAn-3: Mammalian cells, including human cells, metabolize DPAn-3 to an array of products that are members of the specialized proresolving mediators class of PUFA metabolites. These metabolites include seven resolvins Ds (RvT1, RvT2, RvT3, RvT4, RvD1n-3, RvD2n-3, and RvD5n-3; see specialized proresolving mediators#n-3 DPA-derived resolvins and Resolvin); two protectins (PD1n-3 and PD2n-3; see specialized proresolving mediators#n-3 DPA-derived protectins/neuroprotectins and neuroprotectin); and three maresins (MaR1n-3, MaR2n-3,and MaR3n-3l see specialized proresolving mediators#n-3 DPA-derived maresins and maresin. Nutrition Docosapentaenoic acid (DPA) is an n-3 fatty acid that is structurally similar to eicosapentaenoic acid (EPA) with the same number of double bonds, but two more carbon chain units. Dietary sources These are the top five sources for DPA according to the USDA Agricultural Research Service: Fish oil, menhaden 0.668g in 1 tbsp. (13.6g) Fish oil, salmon 0.407g in 1 tbsp. (13.6g) Salmon, red (sockeye), filets with skin, smoked (Alaska Native) 0.335g in 1 filet (108g) Fish, salmon, Atlantic, farmed, raw 0.334g in 3 oz (85g) Beef, variety meats and by-products, brain, cooked, simmered 0.326g in 3oz (85g) Seal meat and human breast milk are rich in DPA. Functions Clupanodonic acid, an omega-3 fatty acid, along with its metabolite DHA and other long chain omega-3 fatty acids, is under study to determine properties of omega-3 fats in humans, such as in inflammation mechanisms. See also List of omega-3 fatty acids References Category:Fatty acids Category:Alkenoic acids
{ "pile_set_name": "Wikipedia (en)" }
Q: Chat app using IOS and Java I need to do a CHAT APP for iPhone . I just look some sites on chat app hierarchy , those all good to know such as : Chat app for IOS using Php server ..etc... This s good enough to achieve my task . But I'm looking at IOS app with JAVA (server side) . I didn't see any samples or tutorials or materials on JAVA . I just need to know , Can I go through on PHP only , Or else is there any possible to do on Java with some research . I like to do on Java . Please let me know , If any materials related to it . Thanks . A: You can use Openfire Chat Server. Openfire is a real time collaboration (RTC) server licensed under the Open Source Apache License. It uses the only widely adopted open protocol for instant messaging, XMPP (also called Jabber). Openfire is incredibly easy to setup and administer, but offers rock-solid security and performance. Easy to configure and use. Guide for installing Openfire Server: http://www.igniterealtime.org/builds/openfire/docs/latest/documentation/install-guide.html http://www.youtube.com/watch?v=BFHiRYRx79E
{ "pile_set_name": "StackExchange" }
Direct observation of lithium staging in partially delithiated LiFePO4 at atomic resolution. Lithium ions in LiFePO(4) were observed directly at atomic resolution by an aberration-corrected annular-bright-field scanning transmission electron microscopy technique. In addition, it was found in partially delithiated LiFePO(4) that the remaining lithium ions preferably occupy every second layer, along the b axis, analogously to the staging phenomenon observed in some layered intercalation compounds. This new finding challenges previously proposed LiFePO(4)/FePO(4) two-phase separation mechanisms.
{ "pile_set_name": "PubMed Abstracts" }
Q: SQL - no rows selected after inner join - I don't get it Ok here are my two tables I'm trying to do a join on, using ORACLE: FOURNISSEUR TABLE4 And I'm sorry for copying pictures but I'm having a hard time copying tables from MYSQLPLUS.. I'm trying to do a join on NF but it doesn't seem to work... what am I doing wrong? SELECT fournisseur.NF,fournisseur.NomF FROM fournisseur INNER JOIN table4 ON fournisseur.NF=table4.NF ORDER BY fournisseur.NF; And yeah I feel stupid.. A: Does the NF column in the fournisseur table have spaces after the values? The column heading for fournisseur.NF looks really wide and appears to be displaying a VARCHAR2(20) (or CHAR(20); but see below) column which could also mean there is extra white-space. Try trimming the values. e.g. ON TRIM(fournisseur.NF) = table4.NF If this indeed works, then I'd look into using CHAR(2), which is hopefully the same type as table4.NF, for fournisseur.NF which would avoid this issue simply by not allowing the extra spaces to begin with. Since filler spaces on the end of a CHAR(n) field "don't mean anything" then using CHAR(n) types throughout would also remove the observed issue. Here is a SQL Fiddle, modified from Coat CO's comment, which shows lack-of-join behavior when there are extra spaces in a VARCHAR2(n) column.
{ "pile_set_name": "StackExchange" }
Q: Is there a Transformation engine or library using .NET? We're looking for a Transformation library or engine which can read any input (EDIfact files, CSV, XML, stuff like that. So files (or webservices results) that contain data which must be transformed to a known business object structure.) This data should be transformed this to a existing business object using custom rules. XSLT is both to complex (to learn) and to simple (not enough features) Can anybody recommend a C# library or engine? I have seen Altova MapForce but would like something I can send out to dozens of people who will build / design their own transformations without having to pay dozens of Altova licenses. A: If you think that XSLT is too difficult for you, I think you can try LINQ to XML for parsing XML files. It is integrated in the .NET framework, and you can use C# (or, if you use VB.NET 9.0, better because of the XML literals) instead of learning another language. You can integrate it with the existing application without much effort and withouth the paradigm mismatch between the language and the file management that occurs with XSLT. Microsoft LINQ to XML Sure, it's not a framework or library for parsing files, but neither XSLT is, so...
{ "pile_set_name": "StackExchange" }
Q: Windows XP Style Button How can I get a Windows XP-style button in my MFC dialog? A: You'll have to add a manifest file to your project. Check out this article: Using Windows XP Styles in your MFC/WIN32 Applications
{ "pile_set_name": "StackExchange" }
Status of endoscopic liver surgery in Japan: a questionnaire survey conducted by the Japanese Endoscopic Liver Surgery Study Group. In 2007, the First Annual Meeting of the Japanese Endoscopic Liver Surgery Study Group was convened. We report the results of a questionnaire survey conducted by this study group that attempted to assess the current status and safety of endoscopic liver surgery. A questionnaire survey was conducted at 26 hospitals to determine the operative procedures, rates of conversion to open surgery, and morbidity rates in patients who had undergone laparoscopic hepatectomy and endoscopic ablation therapy. Laparoscopic hepatectomy was performed in 471 patients by means of nonanatomical partial resection (57.7%), left lateral sectionectomy (24.6%), hemihepatectomy (12.5%), sectionectomy other than lateral sectionectomy (2.5%), and segmentectomy (2.5%). Hepatectomy was performed by a totally laparoscopic procedure in 47% of the patients and by a hybrid procedure in 53%. The rate of complications was 12.3%; there was no case of serious liver failure or operative mortality. Endoscopic ablation therapy was performed in 169 patients through a thoracoscopic (25.4%) or laparoscopic approach (74.6%), using radiowaves (55.6%), microwaves (40.2%), cryotherapy (1.8%), or ethanol (0.6%). The incidence of complications was 6.6%. In properly selected patients, laparoscopic hepatectomy and endoscopic ablation therapy are safe treatments for liver tumors.
{ "pile_set_name": "PubMed Abstracts" }
Summary: “Oh.” He seemed to be saying that a lot, Remus realized. And a lot of blinking. But damn, what else was one supposed to do when faced with Sirius Black back from the dead, bearing the strangest story Remus had ever heard, and incredibly horny?Categories:Remains of the Day > Leaving FeastCharacters: Remus LupinGenres: General, DramaTime Period: NoneWarnings: NoneSeries: NoneChapters: 1 Table of ContentsCompleted: Yes Word count: 2269 Read Count: 324 Disclaimer: The characters and situations of Harry Potter depicted on this website are the legal property of J.K. Rowling, Bloomsbury, and Warner Brothers, and have been used without permission. No copyright infringement is intended. No profit is being made from this site, as it is for entertainment purposes only. All artwork used is the sole property of Leelastarsky, Marta, Duranya, Lizardspots, Donna Marie Evans, Fiendling, hill_,_odella_ and Lisa Rourke and are used with permission.
{ "pile_set_name": "Pile-CC" }
The present invention relates to semiconductor devices and their manufacture, and more specifically to a structure and method of making a stacked transformer structure using through-silicon vias (TSVs). A transformer is a device that transfers electrical energy from one circuit to another through inductively coupled conductors or coils. A varying current in the first or primary winding creates a varying magnetic flux in the transformer and thus a varying magnetic field through a second or secondary winding. This varying magnetic field induces a varying electromotive force (EMF), or “voltage”, in the secondary winding. This effect is referred to as inductive coupling. Transformers range in size from on-chip transformers occupying the area less than one square millimeter to huge units weighing hundreds of tons used to interconnect portions of power grids. However, regardless of size, all transformers operate on the same basic principles, although the range of designs is wide. While new technologies have eliminated the need for transformers in some electronic circuits, transformers are still found in nearly all electronic devices.
{ "pile_set_name": "USPTO Backgrounds" }
Show trial A show trial is a public trial in which the judicial authorities have already determined the guilt, and/or innocence, of the defendant. The actual trial has as its only goal the presentation of both the accusation and the verdict to the public so they will serve as both an impressive example and a warning to other would-be dissidents or transgressors. Show trials tend to be retributive rather than corrective and they are also conducted for propagandistic purposes. The term was first recorded in 1928. China Following the formation of the People's Republic of China in 1949, the Communist Party of China under Mao Zedong began a massive socioeconomic and political campaign called the Great Leap Forward, which lasted circa 1958–1961. During this time, many thousands of people classified as elements of the bourgeois like wealthy landlords were rounded up and given show trials, with some being sentenced to death. Between 1 and 2 million landlords were executed as counterrevolutionaries in Communist China. After the Tiananmen Square protests of 1989, show trials were given to "rioters and counter-revolutionaries" involved in the protests and the subsequent military massacre. Chinese Nobel Peace Prize laureate Liu Xiaobo was given a show trial in 2009. Chinese writer and dissident Ma Jian argued that Gu Kailai, the wife of purged Communist Chinese leader Bo Xilai, was given a show trial in 2012. Middle East Judiciary in countries such as Bahrain and Saudi Arabia is completely dependent on the wishes and wants of the governing regimes. During their show trials, Human rights activists and opposition figures are routinely given harsh verdicts in predetermined rulings by the kangaroo courts. Egypt The United Nations human rights office and various NGOs expressed "deep alarm" after an Egyptian Minya Criminal Court sentenced 529 people to death in a single hearing on 25 March 2014. The judgment was condemned as a violation of international law. By May 2014, approximately 16,000 people (and as high as more than 40,000 by one independent count) have been imprisoned after the 2013 Egyptian coup d'état in July 2013. Egypt's ousted President Mohamed Morsi was sentenced to death on 16 May 2015, along with 120 others. Turkey After the failed coup attempt in 2016, the government of Turkey blamed the Gülen movement for the coup and authorities have arrested thousands of soldiers and judges. This was followed by the dismissal, detention or suspension of over 160,000 officials. Soviet Union As early as 1922, Lenin advocated staging several "model trials" ("показательный процесс", literally "demonstrative trial", "a process showing an example") in Soviet Russia and the Soviet Ukraine. Show trials were common during Joseph Stalin's political repressions, such as the Moscow Trials of the Great Purge period (1937–38). The Soviet authorities staged the actual trials meticulously. If defendants refused to "cooperate"—i.e., to admit guilt for their alleged and mostly fabricated crimes—they did not go on public trial, but suffered execution nonetheless. This happened, for example during the prosecution of the so-called , a party invented in the late 1920s by the OGPU, which, in particular, assigned the notable economist Alexander Chayanov (1888-1937, arrested in 1930) to it. Some solid public evidence of what really happened during the Moscow Trials came to the West through the Dewey Commission (1937). After the collapse of the Soviet Union (1991), more information became available. This discredited the New York Times reporter Walter Duranty, who claimed at the time that these trials were actually fair. Eastern Europe Following some dissent within ruling communist parties throughout the Eastern Bloc, especially after the 1948 Tito–Stalin split, several party purges occurred, with several hundred thousand members purged in several countries. In addition to rank-and-file member purges, prominent communists were purged, with some subjected to public show trials. These were more likely to be instigated, and sometimes orchestrated, by the Kremlin or even Stalin himself, as he had done in the earlier Moscow Trials. Such high-ranking party show trials included those of Koçi Xoxe in Albania and Traicho Kostov in Bulgaria, who were purged and arrested. After Kostov was executed, Bulgarian leaders sent Stalin a telegram thanking him for the help. In Romania, Lucreţiu Pătrăşcanu, Ana Pauker and Vasile Luca were arrested, with Pătrăşcanu being executed. The Soviets generally directed show trial methods throughout the Eastern Bloc, including a procedure in which confessions and evidence from leading witnesses could be extracted by any means, including threatening to torture the witnesses’ wives and children. The higher-ranking the party member, generally the more harsh the torture that was inflicted upon him. For the show trial of Hungarian Interior Minister János Kádár, who one year earlier had attempted to force a confession of Rajk in his show trial, regarding "Vladimir" the questioner of Kádár: The evidence was often not just non-existent but absurd, with Hungarian George Paloczi-Horváth’s party interrogators delightedly exclaiming "We knew all the time—we have it here in writing—that you met professor Szentgyörgyi not in Istanbul, but in Constantinople." In another case, the Hungarian ÁVH secret police also condemned another party member as a Nazi accomplice with a document that had actually been previously displayed in glass cabinet of the Institute of the Working Class Movement as an example of a Gestapo forgery. The trials themselves were "shows", with each participant having to learn a script and conduct repeated rehearsals before the performance. In the Slánský trial in Czechoslovakia, when the judge skipped one of the scripted questions, the better-rehearsed Slánský answered the one which should have been asked. Yugoslavia In 1946, Draža Mihailović and a number of other prominent figures of the Chetnik movement during World War II wre tried for high treason and war crimes committed during WWII. The trial opened in the presence of about 60 foreign journalists. Mihailović and ten others were sentenced to death by a firing squad (two in absentia); the others in the process were convicted to penalties ranging from 18 months to 20 years in prison. In 2015, a Serbian court invalidated Mihailović's conviction. The court held that it had been a Communist political show trial that was controlled by the government. The court concluded that Mihailović had not received a fair trial. Mihailović was, therefore, fully rehabilitated. Hungary Stalin's NKVD emissary coordinated with Hungarian General Secretary Mátyás Rákosi and his ÁVH head the way the show trial of Hungarian Minister of Interior László Rajk should go, and he was later executed. Czechoslovakia The Rajk trials in Hungary led Moscow to warn Czechoslovakia's parties that enemy agents had penetrated high into party ranks, and when a puzzled Rudolf Slánský and Klement Gottwald inquired what they could do, Stalin's NKVD agents arrived to help prepare subsequent trials. The Czechoslovak Communist party subsequently arrested Slánský himself, Vladimír Clementis, Ladislav Novomeský and Gustáv Husák (Clementis was later executed). The Slánský show trial began. Slánský and eleven others were convicted together of being "Trotskyist-zionist-titoist-bourgeois-nationalist traitors" in one series of show trials, after which they were executed and their ashes were mixed with material being used to fill roads on the outskirts of Prague. By the time of the Slánský trials, the Kremlin had been arguing that Israel, like Yugoslavia, had bitten the Soviet hand that had fed it, and thus the trials took an overtly anti-Semitic tone, with eleven of the fourteen defendants tried with Slánský being Jewish. Romania As the end of the 1989 Romanian Revolution neared, First Secretary of the Communist Party Nicolae Ceaușescu and his wife Elena were condemned to death and shot dead by a firing squad after a Stalinist-style trial in a kangaroo court. Western Europe The Cadaver Synod was the posthumous trial of Catholic Pope Formosus held in 897. The Dreyfus affair was a show trial in France in 1894, where a Jewish captain, Alfred Dreyfus, was accused and convicted of spying for the German Empire and exiled. The Kapenguria Six were leading Kenyan nationalists who were subjected to a show trial by the British in 1952–53, and imprisoned thereafter in Northern Kenya. The 2019 trial against Catalan pro-independence leaders by Spain has been denounced by Amnesty International and the largest Spanish judge association Jueces para la democracia as well as 120 of Spain's top jurists in an open letter as being a gross violation of the defendants' rights to protest, freedom of speech and association without no credible legal grounds. Several top Spanish constitutional law professors such as Javier Pérez Royo have denounced the trial as a legal farce plagued by irregularities with a verdict written beforehand . Nazi Germany Between 1933 and 1945, the Nazi government established a large number of Sondergerichte that were frequently used to prosecute those hostile to the regime. The People's Court was a kangaroo court established in 1934 to handle political crimes after several of the defendants at the Reichstag fire Trial were acquitted. Between 1933 and 1945, an estimated 12,000 Germans were killed on the orders of the "special courts" set up by the Nazi regime. See also 1415 trial of Jan Hus, Konstanz 1431 trial of Joan of Arc, Rouen 1649 trial of Charles I of England (by the High Court of Justice for the trial of Charles I) 1792 trial of Louis XVI during the French Revolution 1894 Trial of the Thirty, Paris 1946 Trial of Mihailović et al and execution, Belgrade, under Yugoslav communist regime 1948 trial and execution of Shafiq Ades, Iraq 1949 show trial and execution of László Rajk, under Hungary's communist regime 1953 Stalinist show trial of the Kraków Curia, Poland 1981 trial of the Gang of Four in China 1984 televised trial and execution of Al-Sadek Hamed Al-Shuwehdy in Libya 1989 Trial of Nicolae and Elena Ceaușescu and execution 2009 Iran poll protests trial of over 140 defendants The Trial of Saddam Hussein 2009 (June 4) trial of Euna Lee and Laura Ling in North Korea Eastern Bloc politics Kangaroo court: a sham legal proceeding NKVD troika, sentencing by extrajudicial commission Political trial, a criminal trial with political implications. Posthumous trial Witch-hunt, hunting down people of a certain race/trait/profession/political conviction for doing or saying something sinful Notes References Hodos, George H. Show Trials: Stalinist Purges in Eastern Europe, 1948–1954. New York, Westport (Conn.), and London: Praeger, 1987. Showtrials Website of the European Union Balázs Szalontai, Show trials. In: Ruud van Dijk et al. (eds.), Encyclopedia of the Cold War (London and New York: Routledge, 2008), pp. 783–786. Downloadable at academia.edu External links Category:Informal legal terminology Category:Types of trials Category:Propaganda techniques Category:Abuse of the legal system Category:Trials of political people
{ "pile_set_name": "Wikipedia (en)" }
The presence of humoral immunity (circulating antibodies) to adenovirus capsid proteins is a barrier to the use of adenovirus vectors for gene therapy. The prototype adenovirus vectors that have been developed for gene therapy are based on subgroup C adenoviruses such as that of serotype 5. The prevalence of neutralizing antibodies against subgroup C adenoviruses is generally high in human populations as a result of frequent exposure to these pathogens. This fact is likely to greatly limit the effectiveness of gene therapy vectors based on serotypes such as Ad5. Analysis of the nature of the protective antibodies against adenoviruses has indicated that the most important target is the major capsid protein, hexon [Wolfhart (1988) J. Virol 62, 2321; Gall et al. (1996) J. Virol. 70, 2116]. Several efforts have been made to engineer the hexon so as to evade the anti-hexon antibodies by making chimeric adenoviruses harboring hexons from other serotypes [Roy et al. (1998) J. Virol. 72, 6875; U.S. Pat. No. 5,922,315; Gall et al. (1998) J. Virol. 72, 10260; Youil et al. (2002) Hum. Gene Ther. 13, 311; Wu et al. (2002) J. Virol. 76, 12775]. However, this has been largely unsuccessful when exchanges among distant serotypes are attempted. Alternatively, investigators have proposed using adenovirus vectors that rarely cause human infections or using adenoviruses from non-human sources. However, the lack of a practical manner in which to produce large numbers of such vectors has proved to be a hindrance to developing such vectors.
{ "pile_set_name": "USPTO Backgrounds" }
Encyclopædia Iranica Advanced Search HEDĀYAT, MOḴBER-AL-SALṬANA i. LIFE AND WORK HEDAYAT, MOḴBER-AL-SALṬANA i. LIFE AND WORK Hedayat (Figure 1) belonged to a distinguished family, several members of which had served as ranking officials under the late Qajars and in early Pahlavi administration. His father, ʿAliqoli Khan Moḵber-al-Dawla (q.v.), a son of the literary historian and courtier Reżāqoli Khan Hedāyat (q.v.), was director of the Telegraph and Post Office and held cabinet positions under NāsÂer-al-Din Shah. EDUCATION AND EARLY CAREER Hedayat received his elementary education in Tehran and studied French with a private tutor; then, at the age of fourteen, he was sent with his elder brother, Mortażāqoli, the future Ṣaniʿ-al-Dawla, to Berlin to study a scientific subject of his choice. There, he learned German from a private tutor for six months before he was fluent enough to attend a regular school, but he dropped out after just a few months, complaining that studying subjects such as Latin, Greek, and German history would be a waste of time for him (Hedayat, 1997, pp. 11, 20-21). Mehdiqoli Ḵān(-e) Ḵānān, the name he was known by at this time, stayed in Germany for about three years and returned to Persia in spite of the advice of his father, who wanted him to stay on and study medicine. He mastered the German language, however. The deep interest that he developed in German culture remained with him throughout his life, and he was not shy about articulating it; he once referred to Germans as “our cousins” (Hedayat, 1997, p. 52). Upon his return to Persia in 1879, he was employed at the Telegraph Office, which was run by his father; and, at the same time, he continued his education with a private tutor at Dār al-Fonun (q.v.), studying Persian literature and Arabic (Hedayat, 1997, pp. xxvii, 27-29, 31, 32-33). Hedayat entered the service of the Qajar court in 1894, when he and his brother were appointed as the private stewards (piš-ḵedmat-e ḵāṣṣ) of Nāṣer-al-Din Shah (Hedayat, 1997, p. 69), in which capacity he occasionally translated German texts for the monarch. He also served for a short time as the director of Post, Customs, and Telegraph Office in Tabriz and taught German at the Dār al-Fonun for eight months in 1885. He later became the director of the ʿElmiya and the Military Schools (Hedayat, 1950, pp. 72-73, 149-51, 183-86) and accompanied Moẓaffar-al-Din Shah as his interpreter of German on the monarch’s second journey to Europe. While he was in Berlin, he managed to obtain permission to be an observer for forty days at the state printing house to improve his own skills in photogravure process, which remained a lifelong hobby of his (Hedayat, 1950, pp. 152 ff., 164; idem, 1997, p. 68; Maḥbubi Ardakāni, II, pp. 226-28). In 1903, Hedayat joined Mirzā ʿAli-Asˊágar Khan Atābak (q.v.) on a trip around the world. His intention, he would later write, was to influence Atābak’s frame of mind and prepare him for future reforms (Hedayat, 1989, p. 3). Hedayat remained a close confidant of Moẓaffar-al-Din Shah, who was especially interested in hearing Hedayat speak of the parliamentary system of Japan (Hedayat, 1950. pp. 142, 191). The highlights of Hedayat’s political career include the role he played in the Constitutional Revolution (q.v.), his tenures as governor-general of Fārs and of Azerbaijan during the critical years of World War I and its aftermath, and finally his premiership in the early Pahlavi era. ROLE IN THE CONSTITUTIONAL REVOLUTION During the early stages of the Constitutional Revolution, Hedayat served as the main intermediary between the shah and the Constitutionalists. He was familiar with the French Revolution and considered it to be without real substance (bimāya), although he liked its slogan of liberty, equality, and especially fraternity. He remained, however, rather skeptical about the concept of republicanism, which in his opinion “looked like a school without a headmaster” (Hedayat, 1950, pp. 21, 385-88; Taqizādeh, p. 71; Eḥtešām-al-Salṭana, p. 628; Kasrawi, 1991, pp. 219-20). Hedayat, who worked on the committee that drafted the election laws for the Majles, believed that the British system of parliamentary government was better suited for Persia and was displeased that the constitution of Belgium was used as a model (Hedayat, 1950, pp. 188-90, 193). When the first Majles convened, its members demanded that Moḥammad-ʿAli Shah present them with an edict (dast-ḵaṭṭ), officially proclaiming his allegiance to constitutional government. Under pressure, Moḥammad-ʿAli Shah issued the edict, which was drafted by Hedayat and presented by him to the Majles and then read to a crowd gathered in the Bahārestān (Nāẓem-al-Eslām, II, pp. 82-86; Kasrawi, 1991, p. 223; Hedayat, 1950, pp. 194-96). Hedayat was charged with conducting the election of Tehran deputies in the First Majles (Hedayat, 1997, p. 142) and also drafted a law guaranteeing freedom of the press, which he based on the French press laws. The bill was passed by the Majles, but it was not put into practice. The draft of a law prohibiting government officials from taking bribes was proposed in the Majles, but it was never voted on, since the government demanded a general application of the law to include everybody. According to Hedayat, the new Majles was hampered by the fact that the great majority of the deputies, not having any understanding of what a constitutional government meant, were engaged in pursuing their own personal interests. He charged that the most articulate deputies were either in secret contact with the royal house or were receiving instructions from a foreign power. Moreover, the government was facing the continuous protests of ambassadors representing the colonial powers (Hedayat, 1997, p. 152; Ādamiyat, pp. 233-34), personal intrigues of members of the royal household, the activities of numerous associations, which were trying to intimidate by threatening violence, and the rashness of ambitious Majles deputies trying to pose as leaders of the movement while having no concept of constitutional government (Hedayat, 1997, pp. 140-52; Ādamiyat, pp. 138 ff.). Hedayat’s statesmanship, political influence, prudent moderation, and tact were clearly demonstrated during his service as governor-general (wāli) of Azerbaijan and Fārs, both at a time when these outlying provinces, considered the domains of powerful foreign interests, were seething with distubances. Governor general of Azerbaijan. In April 1908, he was appointed the governor of Azerbaijan, but he resigned (he was not recalled, as in some sources) in July of the same year after the coup d’etat of Moḥammad-ʿAli Shah (Hedayat, 1950, pp. 219 ff.). Hedayat made his way to Europe, meeting in Paris and Istanbul with Persian exiles active in the Constitutional Movement (Hedayat, 1950, pp. 236, 238-41, 245). After the Constitutionalist forces recaptured Tehran in 1909, he was urgently asked by both the leaders of the new government and the provincial council of Tabriz to return and resume his post as governor of Azerbaijan. Hedayat was initially reluctant but eventually accepted the assignment. He arrived in Tabriz on 3 Šaʿbān 1327/19 August 1909 to find the province in turmoil, while the Russians, who were against his re-appointment and were demanding his removal from Azerbaijan, already had a considerable military force stationed in the Tabriz suburbs (Hedayat, 1950, pp. 243 ff., 250-51, 256-58, 264-66, 271-74; Kasrawi, 1961, pp. 85 ff.; Amirḵizi, pp. 204 ff., 453-56; Baširi, ed., p. 707). Hedayat was caught in the middle of factional conflicts in Tabriz. One faction earnestly demanded his removal in a telegram sent to the Majles and the cabinet, at a time when the Russian ambassador in Tehran was pressuring the central government for the same. Hedayat ignored the recommendation of his brother, Mortażāqoli Ṣaniʿ-al-Dawla, a cabinet member, who advised him to resign. Later, after Ṣaniʿ-al-Dawla’s assassination, his other brother, Mo-ḥammadqoli Moḵber-al-Molk, also advised him to give up and leave for Europe. Hedayat finally submitted his resignation and left Tabriz for Europe toward the end of August 1911, having served for about two years (Hedayat, 1950, pp. 279-83, 287, 288, 295-97; Kasrawi, 1961, pp. 154-56). He spent three months in Europe and returned to Tehran in December 1911, when the government was facing a political crisis and serious discord with the Majles, due to the Russian ultimatum of November 29 that demanded the dismissal of Shuster, the American financial administrator working for the government (Shuster, pp. 166-67, 177, 181-82). Governor-general of Fārs. In 1912 Hedayat was appointed governor-general of Fārs, where rivalry, conflict of interests, and blood feud between Esmāʿil Khan Ṣawlat-al-Dawla, the powerful anti-British chief of the Qašqāʾi tribal confederacy, and the pro-British acting governor Ḥabib-Allāh Khan Qawām-al-Molk, leader of the Ḵamsa tribes, had thrown the entire province into a bloody civil war. Hedayat arrived in Shiraz on 16 October 1912. He abolished the road toll along the Shiraz-Kāzerun route and managed a working relationship with both Ṣawlat-al-Dawla and Qawām-al-Molk, officially re-appointing the former as the Qašqāʾi chief (il-ḵāni). Peace and order and the safety of commercial traffic were re-established in Fārs. During World War I, the province of Fārs became the stage for a fi;erce Anglo-German rivalry and a brutal struggle between their agents and allies among tribal khans and local notables. On 8 August 1915 British forces occupied Būšehr, and five days later they stormed the deserted village of Delvā. Hedayat’s disapproval of foreign intervention in Persian affairs, not to mention his pro-German sentiments, was a thorn in the side of the British and more than once prompted them to demand his removal. On 13 September he was recalled from Shiraz at the insistence of the British, and Qawām-al-Molk was installed as acting governor of Fārs (Hedayat, 1950, pp. 349 ff., 364-66; idem, 1994, pp. 963-66; Kaḥḥālzāda, pp. 219-20; Ghani, pp. 86-88). Hedayat remained active in Persia’s political life despite the dislike of the British, who had demanded that he would never again get any government job and whose representative would not even tolerate Hedayat’s presence in the same room with him (Kaḥḥālzāda, pp. 219-20; Dawlatābādi, IV, p. 128). After leaving Shiraz, he remained aloof for a time, even avoiding friends and associates. He was approached, however, by the German Legation in Tehran to start a secret anti-British society (Kaḥḥālzāda, pp. 262 ff.), an event which may explain his resumption of active life in Persian politics. He was elected as the deputy of Tehran to the Fourth Majles and served in the short-lived cabinets of ʿAyn-al-Dawla (q.v.; according to Šajiʿi, III, p. 110, denied by Hedayat) and Mirzā Ḥasan Khan Mostawfi-al-Mamālek (Hedayat, 1950, p. 400; Šajiʿi, pp. 110-11, 31; Curzon, in Šayḵ-al-Eslāmi, pp. 218-19; Sykes, 1969, II, p. 499). Shortly thereafter, Hedayat volunteered to go to Azerbaijan, where a group of dissidents under Shaikh Moḥammad Ḵiābāni (q.v.), a former Majles deputy from Tabriz, had risen in armed rebellion against the central government. The prime minister Mošir-al-Dawla appointed Hedayat as governor-general of Azerbaijan with full authority to curb the rebellious movement. The rebels had already taken control of the city, had changed the name of the province to Āzādistān and issued stamps in the new name of the province, and demanded the formal recognition of the new name by the central government in Tehran. Governor-general of Azerbaijan. Hedayat reached the vicinity of Tabriz in mid-August 1921, accompanied only by a few personal attendants. In order to avoid bloodshed, he tried to arrange for a private meeting with Ḵiābāni, but the latter refused. On 12 September 1920, the Cossacks attacked Ḵiābāni’s strongholds and routed the defenders; the next day Ḵiābāni himself was killed or, according to Hedayat, committed suicide in his hiding place, which a child, or a street beggar, pointed out to the Cossacks (Hedayat, 1950, pp. 406-10, 435; idem, 1984, pp. 349-54; Raḥmat Khan, pp. 369, 380-81, 533-34; Barzegar, pp. 70-73; Šarḥ-e ḥāl waeqdāmāt, pp. 37-38; Šayḵ-al-Eslāmi, II, pp. 89-116). In his next appointment, Hedayat was faced with the rebellion of a gendarme detachment that, under Major Abu’l-Qāsem Lāhuti, arrested the officer sent from Tehran to assume their command and marched in full force on Tabriz toward the end of January 1922. Taking control of the city, they arrested Hedayat and declared martial law in the city. Mošir-al-Dawla, the new prime minister, preferred a negotiated settlement, as suggested by Hedayat in a telegram he had sent to Tehran at the request of his captors. The rebellion soon lost strength as a number of disillusioned gendarmes, who had thought, or had been led to believe, that the march on Tabriz was to claim the payment of overdue wages, deserted. On 6 February 1922, the government forces under Brigadier Šaybāni reached the vicinity of Tabriz and the next day, linking with the Cossack detachment in the city, overwhelmed the rebels in a brief but bloody battle. Lāhuti escaped with a company of about 300 of his comrades; he sought refuge in the Soviet Union and eventually settled down in Tajikistan. Captured officers were court-martialed and sentenced to death, but the new governor, Moḥammad Moṣaddeq, did not allow the sentences to be carried out in Tabriz. He sent them with a recommendation for clemency to Tehran, where their sentences were reduced to prison terms; and some of them were eventually enlisted in the new army (Hedayat, 1950, pp. 425-39; idem, 1984, pp. 370-84; Arfa, pp. 128-32; Bahār, pp. 174-80; Moṣaddeq, pp, 143, 157; Mostawfi, III, pp. 371-74; Makki, pp. 14-34; Cronin, pp. 145-51; Rypka, Hist. Iran. Lit., pp. 376, 535-36, 564-66; Alamuti, pp. 210-14; Ṭoluʿi, pp. 98-101). Hedayat left Tabriz and arrived in Tehran in early March 1922. A week later he occupied his Majles seat as a Tehran deputy despite sharp criticism for his role in the violent suppression of the Ḵiābāni movement (Hedayat, 1950, pp. 428-35; idem, 1984, pp. 386-87). He twice held the post of the minister of public welfare and commerce, in 1923 and 1926, in the cabinets of his friend Mostawfi-al-Mamālek, and also served as the chief justice in the High Court of Cassation (Divān-e ʿāli-e tamiz). In the meantime the Qajar dynasty was deposed in favor of Sardār Sepah, who ascended the throne on 16 December 1925 as Reza Shah Pahlavi. On 2 June 1927 Mostawfi-al-Mamālek resigned; and four days later Hedayat, chosen by the new king as prime minister, presented his cabinet to the Majles (Hedayat, 1950, pp. 449-50, 469-70, 475; idem, 1984, pp. 388-89; Šajiʿi, pp. 143-44, 159-62; Ṭoluʿi, pp. 185 ff.). PRIME MINISTER Reza Shah, who did not tolerate the slightest disobedience from anybody and rulled with an iron hand, was determined to modernize the country and create a firmly controlled, centralized government. Hedayat, a popular elderly statesman with good reputation, was chosen (apparently on the suggestion of Teymurtāš) to be a ceremonial figurehead with no executive authority of any significance, as Hedayat himself admitted (Hedayat, 1997, pp. 376, 378, 386; Millspaugh, p. 26, n. 7, describes him as “spineless and benumbed”). Every policy suggestion had to be presented to and approved by Reza Shah before it could be brought to the cabinet to be promulgated. The true leader of the cabinet was the indefatigable, talented minister of court, ʿAbd-al-Ḥosayn Teymurtāš, who functioned as the instrument of the monarch in all non-military matters. At times Hedayat might act, however, to temper the extreme measures contemplated by Teymurtāš, such as the case of the protest of the clergy in Qom against the compulsory military service, when Teymurtāš threatened to use artillery fire against the city (Hedayat, 1997, pp. 373-74, 376-78, 397, 401, 402, 411; Dawlatābādi, IV, pp. 390-93; Makki, IV, pp. 425 ff.; ʿĀqeli, 2001, pp. 518-29). Hedayat served as prime minister, and formed four cabinets, in the period 1927 to 1933, in which the country experienced administrative, educational, financial, and social reforms that transformed the face of the country in many ways. The most significant episode during Hedayat’s tenure was the unilateral cancellation of the D’Arcy oil concession (q.v.) by the Persian government in November 1932 by the direct order of Reza Shah, and the signing of the new agreement in September of the same year (see ANGLOҳPERSIAN OIL COMPANY). It is noteworthy that in the various accounts of the lengthy international legal dispute that ensued (e.g., Ellwell-Sutton, Fāteḥ, Ferrier), Hedayat’s name is hardly mentioned. On 21 Šahrivar 1312/12 September 1933, Hedayat was summoned by Reza Shah to the court and ordered to resign with his entire cabinet (Hedayat, 1997, pp. 401-3, 412-13; Taqizādeh, pp. 245, 247). WORKS Hedayat, despite his heavy political responsibilities during a difficult transitional period of Persian history, was a productive scholar and musicologist. He had developed a keen interest in music since his early childhood (for his works on music, see ii. below). His political memoir, Ḵāṭerāt o ḵaṭarāt (1st ed., 1950), is a detailed record of personal experiences and observations of an astute eyewitness of the most turbulent period in the history of modern Persia, when its geographical integrity and even its very independence was at stake. Unfortunately, a critical edition is still wanting. Hedayat also wrote a memoir of his trip around the world, Safar-nāma-ye tašarrof be Makka … (1st ed. 1951), and a history of Persia, Gozāreš-nāma-ye Irān, in four volumes (1st ed. 1938-54), of which two editions of the last section, dealing with the Constitutional Revolution and the last years of the Qajar dynasty (by M. Ṭoluʿi, and M.-ʿA. Ṣawti), have been published. These books are written in an easy, fluent Persian, free of traditional embellishments and close to the spoken language, even when complex issues are discussed. Minor works include Afkar-e ʿomam (on religion; 1st ed., 1946); Toḥfa-ye moḵberi yā kār-e bikāri, a small collection of his poems; Toḥfat al-āfāq, a travelogue on the history and geography of Europe; Toḥfat al-aflāk, on cosmography with illustrations and maps; Bostān-e adab, an anthology of poems; Qawāʾed al-tarjomān, used as a text for teaching French (Maḥbubi Ardakāni, I, p. 393); Dastur-e soḵan, on the grammar of Persian language; and Toḥfat al-arib, on prosody. He also wrote a textbook for children, which was used at elementary schools across the country (Hedayat, 1997, p. 4; Ḥabib Yaḡmāʾi, pp. 227-28; Waziri’s intro. to Hedayat, 1984, p. 9). Judging by the poems he included in his memoirs, Hedayat was a poet of some merit, but apparently his other responsibilities did not leave him enough time to develop his poetical talent. His best-known poem is the one with the refrain “Bāz šod didagān-e man az ḵᵛāb …” that was printed in the elementary textbooks. PERSONAL TRAITS Hedayat was an intellectual and man of letters. He was described by Taqizādeh (pp. 331, 343) as the most learned Persian in German language and literature and by a German diplomat as a man more fluent in that language than a well-educated (adib) native speaker (apud Kaḥḥālzāda, p. 263). According to Aḥmad-ʿAli Sepehr, he overlooked the anti-British activities in Fārs when he was serving there as governor-general, and, as the minister of interior in a cabinet with a pro-German attitude, he would telegraph messages to Fārs encouraging support for the activities of Wilhelm Wassmuss, the German spy among the tribes (Sepehr, pp. 76, 79). After his recall from Fārs, he was approached by Sommer, a member of the German Legation in Tehran, to use his popularity and influence to set up a secret pro-German society that would work for the downfall of Woṯuq-al-Dawla’s cabinet and his replacement by a new government headed by Hedayat himself. Hedayat considered the proposal and met with Sommer at least twice, first in his own house and the next time at the legation. There is no indication in sources consulted whether such a society was formed, although the existence of a similar pro-German group with connections to Hedayat is on record (Kaḥḥālzāda, pp. 96-97, 418-19; Dawlatābādi, IV, p. 128; Nāṭeq, pp. 100-101). Hedayat was a traditional Muslim, who did not like some aspects of the modernization campaign that was pushed mercilessly forward by Reza Shah. After the latter’s fall, he had the occasion to criticize it for not having been adequately studied and carefully planned. According to him, Western modes of life were blindly adopted and forcefully imposed on the public without regard for, and often at the expense of, traditional and religious values of the land. He did not like the campaign for coining new Persian terms to replace their Arabic counterparts, which he thought was unnecessary and detrimental to the language. His sharpest criticism was directed at the campaign for the universal removal of the veil (enforced in January 1936; see ČĀDOR), which, he believed, would eventually lead to the reckless disregard for family life and the spread of prostitution (taḵrib-e zendagi-e ḵāna-vāda wa tarwij-e faḥšā). He commented that, in the rush to Westernize the country, attention was focused only on the façade, while the real essence of Western civiliza-tion was ignored (Hedayat, 1997, pp. 411, 405-8, 412-13, 472-73, 476, 481, 492-93). Hedayat remained a believer in constitutional government during most of his political life, although he evidently lacked the fervor of his more revolutionary colleagues such as Sayyed Ḥasan Taqizādeh. The rise of Reza Shah, whose autocratic rule eliminated any sign of a constitutional government and turned the Majles into the monarch’s rubber stamp, seem to have made him develop serious doubts about the validity of instituting such a government in Persia at least in his own time, since, according to him, neither the public nor the Majles deputies had any clear idea of a constitutional government. He complained that governments changed in rapid succession on the basis of the deals made in private rather than on merits, and membership in the Majles had turned into a stepping stone for higher positions and self-enrichment, while the interests of the people were ignored. In expressing his disillusion, Hedayat went so far as to call democracy the Devil’s inspiration (elqā-ye Šayṭān; Hedayat, 1986, pp. 330, 479-81, 487-91, 496-98; Ḡani, IX, p. 671). Hedayat’s premiership (the longest of any under Reza Shah), his assumed role in the death of Ḵiābāni, and the controversial dismissal of Arthur Millspaugh, whose strictness in dispensing public funds had earned for him the nickname “Dr. Pul Nist” (Dr. No Money), all made him an easy target for sharp attacks as an accomplice in the “crimes” of the state in that period (e.g., see the so-called indictment drawn up by Eskandari, pp. 30 ff.). Qāsem Ḡani, with obvious exaggeration, has described Hedayat as “one of the pure souls and gems and sources of honor for the human race” (az arwāḥ-e mojarrada wa jawāher-e nofus wa māya-ye efteḵār-e nawʿ-ebašar; Ḡani, III, p. 56); but Ebrāhim Saṟfāʾi, while admitting his reputation for honesty and lack of ambition (dorost-kāri wa vārastagi), accuses him of abuse of power for accumulation of wealth (Ṣafāʾi, II, p. 467). Mehdi Bāmdad characterizes him as sagacious, honest, efficient, stubborn, energetic, well-informed, and ambitious, yet totally subservient to his superiors (Bāmdād, IV, p. 187). Although a man of strong religious convictions, Hedayat seems not to have harbored any prejudice against people of other faiths (e.g., Nāṭeq, p. 233). Hedayat retired without pension after thirty-nine years of service in the government, because his positions as governor-general and cabinet member did not qualify him. For a time he lived in a distressed financial situation, but he eventually pleaded with his former colleagues and friends, ʿAli-Akbar Dāvar and Moḥammad-ʿAli Foruḡi, who obtained the Majles approval for setting up a pension for him (Hedayat, 1950, p. 402). He built a hospital (still in operation as Bimārestān-e Hedāyat), a school, and a mosque in the village of Darrus, where he had his residence and owned a large acreage of land (Ṣafāʾi, II, p. 468).
{ "pile_set_name": "Pile-CC" }
Lotus effect I also heard that the car and motorcycle brand BMW looked at this affect. In a paper about motorcycle technology they talk about nature as their role model. Three examples are shown: The fir cone principle, the lotus effect and the spider's web. These 3 inspired different technolgies as you can read on the following page. Whoever wants to read a little more into the paper, just follow this link which goes deeper into the technologies applied to motorcycle suits. Pages About An ecological future, one that is resilient, resource-abundant and conducive to life, lies in the knowledge banks of nature’s elegant solutions taken from 3.8 billion years of a research and development period (R&D). In this elective course we explore nature's solutions to the challenges we grapple with as architects and designers. WELCOME!
{ "pile_set_name": "Pile-CC" }
Lack of specificity for PCR assays targeting human Bacteroides 16S rRNA gene: cross-amplification with fish feces. Methods focused on members of the genus Bacteroides have been increasingly utilized in microbial source-tracking studies for identifying and quantifying sources of nonpoint fecal contamination. We present results using standard and real-time PCR to show cross-amplification of Bacteroides 16S rRNA gene molecular assays targeting human fecal pollution with fecal DNA from freshwater fish species. All except one of the presumptively human-specific assays amplified fecal DNA from at least one fish species, and one real-time PCR assay amplified DNA from all fish species tested. Sequencing of PCR amplicons generated from fish fecal DNA using primers from the real-time assay revealed no mismatches to the human-specific probe sequences, but the nucleotide sequences of clones from fish fecal samples differed markedly from those of human feces, suggesting that the fish-related bacteria may be different strains. Our results strongly demonstrate the potential for cross-amplification of human-specific PCR assays with fish feces, and may call into question the results of studies in which these Bacteroides-specific molecular markers are used to quantify human fecal contamination in waters where fish contribute to fecal inputs.
{ "pile_set_name": "PubMed Abstracts" }
Development and validation of a stereoselective HPLC method for the determination of the in vitro transport of nateglinide enantiomers in rat intestine. A simple stereoselective high performance liquid chromatographic method was developed for the determination of the in vitro transport of the enantiomers of nateglinide (N-(trans-4-isopropylcyclohexyl-carbonyl)-phenylalanine) in the rat intestine using a Chiralcel OJ-RH column (150 x 4.0 mm, 5 microm). The effects of the mobile phase composition, pH, the flow rate, and the temperature on the chromatographic separation were investigated. The enantioseparation was achieved at 33 degrees C using a mobile phase containing 100 mM potassium dihydrogen phosphate, pH 2.5, and ACN (32:68 v/v) delivered at a flow rate of 1 mL/min. The analytes were monitored at 210 nm and linearity (r >0.99) was obtained for a concentration range of 0.5-50 microg/mL. The LOD and LOQ were 0.2 and 0.5 microg/mL for the R-enantiomer and 0.2 and 0.8 microg/mL for the S-enantiomer, respectively. Both, the intra- and interday accuracy and precision of the calibration curves were determined. The method was successfully applied to estimate the in vitro passage of the enantiomers and the racemate of nateglinide in duodenum, jejunum, and ileum of rats. Generally, higher concentrations of nateglinide and the S-enantiomer were observed when the racemate was administered compared to administration of the individual enantiomers of nateglinide.
{ "pile_set_name": "PubMed Abstracts" }
Mass spectrometry of proteins directly from polyacrylamide gels. The direct combination of thin-layer gel electrophoresis and matrix-assisted laser desorption/ionization mass spectrometry has been demonstrated with good sensitivity and mass accuracy, offering potential advantages in speed and reduced complexity. Mass spectra have been obtained from isoelectric focusing, sodium dodecyl sulfate, and native gels with as little as 660 fmol of α- and β-chain bovine hemoglobin and 1 pmol of horse heart myoglobin loaded. CNBr digests were performed in situ, and the products were probed in-gel. Noncovalent complexes such as multimeric protein systems, enzyme inhibitor complexes, and protein-ligand complexes can also be characterized when gel electrophoresis is run under nondenaturing conditions. This approach shows promise for simplifying the interface between gel electrophoresis and mass spectrometry.
{ "pile_set_name": "PubMed Abstracts" }
Human muscle cell surface antigen 16.3A5 is encoded by a gene on chromosome 11. A monoclonal antibody (McAb), 16.3A5, has been characterized that reacts with a cell surface antigen of human muscle cells and a variety of nonmuscle cells. The gene controlling synthesis of 16.3A5 antigen has been assigned to human chromosome 11 by assessing McAb reactivity on a panel of mouse-human cell hybrids. The 16.3A5 has a novel specificity distinct from other chromosome 11-encoded antigens such as W6/34, F10.44.2, TRA1.10, and 4D12 antigens.
{ "pile_set_name": "PubMed Abstracts" }
Euro’s strength is due to progress of coalition talks in Germany coupled with hawkish meeting minutes from the European Central Bank. “Of course the Dow Jones, with its multinational make-up, was more than happy to watch the dollar cliff-dive, with the greenback’s issues fuelling the index’s 150 point, 25700-crossing, record-breaking climb," said Campbell. 3.40pm: US data points to more interest rate hikes, says ING The increase in the US core consumer price inflation rate and growth in retail sales could fuel expectations that the Federal Reserve is to tighten policy further, according to ING Research. Core CPI edged up to 1.8% in December from 1.7%, led by rises in housing and medical care items. The Fed is targeting 2% inflation and has cited low CPI as a concern. “If inflation rises as we suspect then this will only heighten market expectations that the risk is skewed towards a more aggressive series of Federal Reserve rate hikes,” said ING. While retail sales growth slowed to 0.4% in December from 0.9% in November, ING said three -month annualised retail sales increase remains in double digits at 11.3%. “With the US’ activity story benefiting from strong domestic momentum and rapidly improving global demand, we continue to look for US GDP to expand by 3% this year.” 3.20pm: Spanish and Dutch finance ministers seek soft Brexit deal The pound rise against the dollar appears to be fuelled by reports that Spanish and Dutch finance ministers have agreed to work together to push for a Brexit deal that keeps the UK’s ties with EU close. Spanish Economy Minister Luis de Guindos and his Dutch counterpart Wopke Hoekstra met earlier this week when they discussed their common ground on Brexit, Bloomberg reported, citing sources. Sterling its up 0.9% to US$1.3671. 2.50pm: Wall Street off to a flyer; drags Footsie into the blue Stocks got off to a flying start although Facebook Inc's (NASDAQ:FB) decline weigh on the Nasdaq Composite. The Nasdaq Composite was up 4 points, or just 0.1%, compared to the 8 point (0.3%) rise on the S&P 500, at 2,776. The Dow Jones was sitting pretty with a triple-digit gain at 25,739, up 163. Facebook was down 4.6% at US$179.13 after a negative reaction to changes to its news feed. Investors were poring over the latest consumer price data, which showed the annual inflation rate fell to 2.1% from 2.2% in November, largely because of gasoline prices. Back in Blighty, the FTSE 100 was up 19 at 7,782, having picked up following the strong start by Wall Street. 2.10pm: Trump will be 'frustrated' after US retail sales miss, says analyst Today's US retail sales will disappoint the White House after missing expectations, according to Dennis de Jong, managing director at UFX.com “President Trump, will be frustrated that the US consumer has been less extravagant than he may have liked, but this could all change next month after the expensive Christmas period comes to an end. “The president has been reliant on bullish US retail figures to drive growth in recent months, and he will hope that next month’s data can rediscover the impressive results that were recorded towards the end of last year.” 2.00pm: FTSE dips as cable strengthens The pound has risen to its highest level agains the dollar since the Brexit vote at US$1.37 following US data and reports that Spain and the Netherlands are willing to back a soft Brexit. Excluding volatile items such as food and energy, the so-called core CPI rose at a annual rate of 1.8% in December after a 1.7% rise a month earlier. Month-on-month core CPI increased 0.3%, up from 0.2% in November. The Commerce Department said US retail sales rose 0.4% month-on-month in December, missing expectations of 0.5%, following an upwardly revised 0.9% gain in November. GKN PLC (LON:GKN) shares shot up 26% to 421p after appointing a new chief executive, rejecting a takeover bid from Melrose and announcing the separation of its automotive and aerospace businesses. "Despite cable’s gains, the 25% surge seen by GKN – which rejected an unsolicited takeover bid by Melrose, only for the latter to state it would be back – and the reversal of early losses in the commodity sector allowed the FTSE to eke out a 0.2%," said Connor Campbell, financial anlayst at Spreadex. "That leaves the UK index at a record peak of 7,780, around 50 points higher than where it started the week." Smiths Group PLC (LON:SMIN) shares grew 4% to 1,645p after Goldman Sachs lifted its target price on the stock and after the maker of medical devices said that new tax rules in the US will have a favourable effect in the current year and beyond. Packaging and paper company Mondi Plc (LON: MNDI) was up 2% to 1,930p after a rating upgrade from Investec. Engineer Rotork PLC (LON:ROR) shares rose 3% to 300p after HSBC raised its rating to ‘buy’ and lifted the target price to 335p from 250p, saying it expects order intake to improve on a recovery in oil and gas markets. B&M European Value Retail (LON:BME) climbed 3% to 410p after the discount retailer reported strong quarterly sales on the back of its rapid expansion. Just Eat PLC (LON:JE.) shares dropped 1% to 793.60p a day after its shares jumped following an upgrade by Barclays to ‘overweight’ from ‘neutral’. Bovis Homes PLC (LON:BVS) erased earlier gains after Peel Hunt cut its rating on the stock to ‘hold’ from ‘add’, saying it believes its shares “may pause for a bit following the bounce up in the last 4-5 months”. Shares were flat at 1,151p. Mitchells & Butlers PLC (LON:MAB) share rebounded 1% to 271p following an a decline in early trading after reporting a slowdown in sales growth over the past seven weeks. In currencies, the pound rose 0.5% versus the dollar to US$1.3618 but fell 0.07% versus a stronger euro to €1.1245. The euro reached a three-year high against the dollar at €1.2136 following news that German Chancellor Angela Merkel’s conservative Christian Democratic Union bloc and the centre-left Social Democrats were preparing to recommend formal coalition negotiations. It seems Melrose Industries PLC (LON:MRO) is not backing down after GKN PLC (LON:GKN) rebuffed its £7bn hostile approach. In a statement, the company said it believes it can “re-energise and re-purpose” GKN, suggesting it will continue pursue the group. “Melrose believes that there would be significant operational and commercial benefits arising from Melrose’s ownership of GKN’s businesses, reversing a history of existing GKN management not delivering on margin targets,” it said. “GKN announced today its intention to separate the businesses. Melrose believes that shareholder value would be maximised by it significantly improving the businesses prior to any separation. The potential acquisition represents a significant opportunity for Melrose to execute on its strategy of maximising inherent value of specialised industrial businesses it owns." The broker said : “We suspect that given its mounting liabilities, recent press comment, growing customer worries and supply chain hesitancy that Carillion will be forced (by the banks) to accelerate its financial restructuring.” The government is being urged to bring contracts from the company back to public control amid worries it could collapse. Carillion, whose contacts with the government include work on schools, the NHS and the HS2 project, has met with lenders to discuss options to reduce debt. “It would have major implications for the outsourced government contracts the company holds, as well as the firm’s thousands of workers, those in the supply chain and those who rely on Carillion’s pension fund. “The government, who, despite warnings carried on with its programme of outsourcing public services to this company, must stand ready to bring these contracts back into public control, stabilise the situation and safeguard our public services.” GKN PLC (LON:GKN) is the biggest riser on the FTSE 100 this morning after appointing a new chief executive, rejecting a takeover bid from Melrose Industries PLC (LON:MRO) and announcing the separation of its automotive and aerospace businesses. The news comes two months after ousting incoming chief executive Kevin Cummings and announcing a further write-off at its US aerospace business in the wake a recent profit warning. “GKN has made up for years of lumbering progress in a flash. A takeover offer, subsequent rejection, new CEO, transformation strategy, trading update and planned separation of the business all in one go – it’s hard to describe GKN as a Mondeo now!,” said Nicholas Hyett, equity analyst at Hargreaves Lansdown. Hyett added: “The money to be made from a split is likely to have been what drew turnaround specialist Melrose to the table in the first place – the challenge for newly confirmed CEO Anne Stevens is to deliver a better result for shareholders than the 405p she turned down today.” The latest trading update from Bovis Homes has impressed with analysts saying it has made progress in its turnaround following a faulty homes scandal and takeover bids from Galliford Try and Redrow last year. Greg Fitzgerald, who was brought back as chief executive in April last year to help overhaul the business, said the group delivered against all of its 2017 financial and operational targets as it worked to put its faulty homes scandal behind it. "Yet more encouraging results from Bovis Homes today confirm what we always suspected - that the problems with build quality and contractors could be easily fixed and Greg Fitzgerald was the man for the job," said Neil Wilson, senior market analyst at ETX Capital. "The market could not be more favourable with low interest rates, high employment, low supply and high demand. Bovis was at risk of missing out but it seems to have caught up." Shares rose 3% to 1,185p. 8.30am: London stocks open higher The FTSE 100 rose 9 points to 7,771 in earlier trading, led by GKN PLC (LON:GKN). GKN shares surged 20% to 397p after saying it rejected a takeover bid from Melrose Industries PLC (LON:MRO) and appointed Anne Stevens as its new chief executive. In November, the automotive and aerospace components company revealed it had ousted incoming chief executive Kevin Cummings as it announced a further write-off at its US aerospace business in the wake a recent profit warning. In economic data, China’s trade surplus in dollar terms rose to US$54.69bn in December from US$40.21bn the previous month, beating expectations of US$37.44bn. Exports rose 10.9% following a 12.3% rise in November, compared to forecasts for a 10.0% increase. Imports grew just 4.5% after a 17.7% jump a month earlier, missing estimates for a 14.8% rise. Later in the session, US consumer price inflation data will be released with analysts expecting growth to slow to 2.1% year-on-year in December from 2.2% in November. US retail sales data is expected to reveal a 0.5% rise in December compared to a month ago. Proactive news headlines: Sirius Minerals PLC (LON:SXX) is confident production of polyhalite at the York Potash project will start on time and on budget. A quarterly update indicated there had been some delay to excavation of the mine, called Woodsmith, due to the weather in Yorkshire, but Sirius is confident it can make up the time lost. Ferrum Crescent PLC (LON:FCR), the European lead-zinc explorer, has announced the appointment of Colin Bird as a non-executive chairman, with immediate effect. The AIM listed group said Grant Button, its interim non-executive chairman, will resume his former role as non-executive director. FFI Holdings Plc (LON:PLC) has broadened the scope of its insurance business with the acquisition of a motorsports events specialist and expects to announce another deal this month. Subsidiary Reel Media, which FFI acquired in December, has bought the business from US broker All Risks for US$1.83mln. Telit Communications Plc (LON:TCM) revealed that the tax case relating to its Italian business has reared up again. Last summer, the industrial Internet of Things specialist won a court battle with the Italian tax authorities when the latter's appeal against the annulling of three VAT assessments for Tallit’s Italian business was rejected. Now it has emerged that the country's authorities have submitted appeals to the Italian Supreme Court, after two tiers of lower level court found in Telit's favour. African Potash Ltd (LON:AFPO) furthered its entry into game-changing blockchain technology - striking a deal on a joint venture with Gibraltar firm TokenCommunities Limited. The group said this will complement the FinComEco joint venture struck in November and will bolster its plans to operate a range of platforms and projects in the agricultural commodity markets sector in sub-Saharan Africa. Oracle Power PLC (LON:ORCP) is to take full ownership of the company that owns the mining lease for the Thar coal to power project in Pakistan. Anthony Scutt, Oracle’s chairman, said: "The move to 100% ownership of SCEL is a material development for Oracle, clearing a significant hurdle as the Company moves to financial close. Goldplat plc (LON:GDP) has made a breakthrough in its dispute with Rand Refinery - as the pair have agreed a proposed full and final settlement. Ortac Resources has changed its name to Arc Minerals Ltd (LON:ARCM) with immediate effect. The company's new ticker will be ARCM.LN and trading under the new name is expected to commence on or around 22 January 2018. Advanced Oncotherapy (LON: AVO), the developer of next-generation proton therapy systems for cancer treatment, has announced that yesterday Dr Enrico Vanni, a non-executive director of the company purchased 40,000 ordinary shares at a price of 54.5p each. Following this transaction, Dr Vanni now holds 1,263,946 ordinary shares, representing 1.56% of the issued share capital. 6.40am: FTSE set to open in positive territory FTSE 100 is poised to continue climbing on Friday after another record finish yesterday, buoyed by more gains on Wall Street and after mixed trading in Asia overnight. Despite retailers lagging, Britain's blue chip index closed up 14 points at 7,762 - its third record peak in a row - and is called by spreadbetters at IG Index to start around three points higher today. In the US, the rally of 2018 shows no sign of abating with the Dow Jones soaring 205 points to finish at 25,574 and the broader S&P 500 up 19 at 2,767. It was a less glowing picture in Asia overnight where the Nikkei 225 in Japan is down 58 points at 23,652 - falling for a second day - on a strengthening yen. The Shanghai Composite Index is also lower, off around six points, as the latest Chinese trade data showed both imports and exports slowed in December. Of interest today on the macro front will be US inflation data, which will lead to further debate about the pace of interest rate rises, and US retail sales stats covering the run up to Christmas. Meanwhile in London, on the company front, pubs and property are on the menu. Partners: Tech Capital, a subsidiary of Proactive Investors, acts as the vanguard for listed tech companies to interact with institutional and highly capitalised investors. Headquartered in London, Tech Capital is led by a team of Europe's leading analysts and journalists, publishing daily content, covering all key movements in the Technology market.
{ "pile_set_name": "Pile-CC" }
Ghosts or KKK: Three Florida students of color who donned sheets now face suspension Three Tampa-area high school students face suspension after wearing Ku Klux Klan costumes to school. While their names have not been released, two of them are Latino and one is Arabic. They told the administration that they were dressed as ghosts, wearing white sheets, their hats just happened to be pointed, according to WESH. Last week was Homecoming week at Wiregrass Ranch High School, and the students were told they could dressed up as characters. Many came as superheroes or television characters. The students were accused of harassment and face a possible 10 days of suspension.
{ "pile_set_name": "Pile-CC" }
Quantitative effect of a single large dose of methylprednisolone on infarct size in baboons. Despite numerous studies directed at determining the ability of glucocorticoids to minimise myocardial ischaemic damage following acute coronary occlusion, there remains no clear consensus concerning their usefulness. Within an ischaemic region, glucocorticoids produce membrane stabilising effects which decrease the autolytic effects of marked cellular swelling and lysosomal membrane rupture. Their use has also been associated with a decreased cellular lysis due to infiltrating inflammatory cells and with an increase in collateral blood flow. The use of glucocorticoids has remained clinically attractive due to experimental observations regarding these local actions; however, the potential of these actions to enhance long-term viability of ischaemic myocardium has remained uncertain. A major problem in the comparison of the extent of infarction between treated and untreated animals has been the variability in infarct size that results from coronary artery ligation at any given anatomical site. In the experimental baboon model which we have employed, we have previously shown that the ultimate epicardial area of infarction, as well as the volume of infarction as assessed histologically at 7 days post occlusion, shows a good linear relationship to the area of ischaemic injury at 1-hour post occlusion, as assessed by high resolution epicardial ST segment mapping. In this way animals may serve as their own controls and as long as an intervention is initiated at 1 h or later post occlusion, then the epicardial area or transmural volume of histologically assessed infarction at 7 days can be compared with the predicted epicardial area or transmural volume of infarction and hence determine the effect of that intervention in altering infarct size. This experimental model does not rely on a comparison of the absolute magnitude of infarcts between treated and untreated animals and, therefore, avoids the error introduced by the inherent variability in infarct size between animals after coronary occlusion.
{ "pile_set_name": "PubMed Abstracts" }
During the fast I started praying for about 200 people everyday that I wrote down in my journal; my family, DTS classmates and staff, and friends who God put on my heart. I was prompted by my brother to go to Verizon and cancel some tablets that we never used that were adding a good chunk of money to our bill. So I went to the store and while talking to the rep, he said I could upgrade my phone for $1.50 more a month. So I said yes and while we were transferring the data from old phone to the new, the rep asked me why my brother and I kept putting our phone lines on hold. I then explained that we’re missionaries through YWAM, and that he was doing a school in England (SBS) and that I was in Taiwan for part of my DTS. Through that I spoke with him for about an hour about the Gospel, Jesus’s love for him, and missions. When I was leaving the store, I asked to pray for him and he said yes so I got love on him like Jesus. He was promptly added to my list of people to pray for. Praise be to Jesus!
{ "pile_set_name": "Pile-CC" }
Q: Is AppendFormat() or AppendLine() the safer/sleeker solution? I've been creating dynamic strings to append to a StringBuilder like so: StringBuilder sb = new StringBuilder(); string bla = "bla"; sb.AppendLine(string.Format("android:id=\"@+id/{0}\" ", bla)); ...but then I noticed that StringBuilder has an AppendFormat() method, which obviates the "string.Format()". So I wondered if AppendFormat() also adds a newline, as AppendLine() does (as opposed to Append(), which doesn't). IOW, to achieve the same effect as: sb.AppendLine(string.Format("android:id=\"@+id/{0}\" ", bla)); ...when using AppendFormat(), would I need to use two lines, like so: sb.AppendFormat("android:id=\"@+id/{0}\" ", bla); sb.AppendLine(); ? The answer is yes - two lines are needed, or I must revert to explicitly using string.Format() within a call to AppendLine(). Actually, there is at least one way this can be accomplished in one line with AppendFormat(), to wit: sb.AppendFormat("android:id=\"@+id/{0}\" {1}", bla, Environment.NewLine); ...but that is arguably no more elegant than than AppendLine(string.Format(... So which of the following is better (more performant) or safer, or does it not matter? sb.AppendFormat("android:id=\"@+id/{0}\" {1}", bla, Environment.NewLine); sb.AppendLine(string.Format("android:id=\"@+id/{0}\" ", bla)); A: Just create your own extension method that calls both AppendLine and AppendFormat, to create the method that you want, the ability to append a line using a format string without explicitly adding the new line character: public static StringBuilder AppendLineFormat( this StringBuilder builder, string formatString, params object[] args) { return builder.AppendFormat(formatString, args) .AppendLine(); } (Feel free to create an overload of this for each overload of AppendFormat, if you want to.) A: The most readable is: sb.AppendFormat("android:id=\"@+id/{0}\" ", bla) .AppendLine(); string.Format uses StringBuilder internally, so I wouldn't go with sb.AppendLine(string.Format()).
{ "pile_set_name": "StackExchange" }
Moorland chat The moorland chat (Pinarochroa sordida), also known as the alpine chat or hill chat, is a species of songbird in the Old World flycatcher family. It is endemic to north-east Africa where it is common in its habitat. It lives at high altitudes on moors and grassland, usually above 3,400 m (11,100 ft), but can live as low as 2,100 m (6,900 ft). It has a short tail and long legs. It is bold and will approach people. The chat was first discovered on Mount Elgon on the Uganda-Kenya border by Jackson. The English geographer Halford Mackinder brought back the same bird from Mount Kenya in 1899. He presented a paper on the first ascent to the Royal Geographical Society in 1900. The scientific results of his expedition were discussed in detail afterwards. The moorland chat was usually placed in the genus Cercomela, but molecular phylogenetic studies published in 2010 and 2012 found that the species was not closely related to birds in Cercomela or to birds in the closely related genus Oenanthe. The moorland chat was therefore assigned to its own monotypic genus Pinarochroa which had been introduced by the Swedish zoologist Carl Jakob Sundevall in 1872. The genus name Pinarochroa is derived from the Greek word pinaros meaning "dirty" and khroos, khroas meaning "coloured". The specific epithet sordida is from the Latin sordidus meaning "shabby" or "dirty". Taxonomy There are a number of recognised subspecies: P. s. sordida High altitude moorlands of Ethiopia P. s. ernesti North Kenya (Mt. Kenya and Aberdare Mountains) P. s. rudolfi North Kenya (Mt. Elgon moorlands) and adjacent East Uganda P. s. olimotiensis High altitude moorlands of North Tanzania (Crater Highlands) References Category:Muscicapidae Category:Birds of East Africa moorland chat
{ "pile_set_name": "Wikipedia (en)" }
--- author: - 'Luis F. Rodríguez, Yolanda Gómez, and Lizette Guzmán' title: 'Ionization-bounded and Density-bounded Planetary Nebulae' --- Introduction ============ Planetary nebulae, and in general any type of nebula photoionized by a central star or cluster of stars can be classified as either ionization-bounded or density-bounded. In the first case, the radius of the ionized region is determined by the absorption of the ionizing photons in the inner parts of the nebula. Even if there is more external gas available, it will remain neutral. In contrast, a density-bounded planetary nebula is one in which the ionized region terminates simply because there is no more gas available. Even if there are ionizing photons available, there will be no dense gas to ionize and the photons will escape to the diffuse halos that are known to surround planetary nebulae (Perinotto et al. 2004; Sandin et al. 2008). When the nebula is visible in the optical, the presence of lines such as \[O I\] $\lambda$6300 (i. e. Bieging et al. 2007), that originate from the region of transition between ionized and neutral hydrogen, suggests that the nebula is ionization-bounded. Also the association of the planetary nebula with neutral (Rodríguez & Moran 1982) or molecular (Treffers et al. 1976) hydrogen or with other molecular species (Thronson 1983) suggests ionization-boundness. However, the situation is not as simple since a nebula can be ionization-bounded in some directions (with respect to the ionizing star) and density-bounded in others and the evidence of a transition from ionized to neutral or molecular gas could be coming from some directions only. It is relevant to know if a nebulae is ionization-bounded in all directions since in this case all the ionizing photon flux from the central star is trapped inside the nebula. Only in this case an accurate estimate of this ionizing flux can be derived indirectly by observing the nebular emission, for example in recombination lines or free-free emission. Otherwise, we will underestimate the ionizing photon flux. In an important development, Zijlstra et al. (2008) have reported Very Large Array observations taken over 25 years of NGC 7027 at frequencies above 5 GHz, where the free-free emission is optically thin. They find that the flux density is changing at a yearly rate of -0.145$\pm$0.005% and propose that this is caused by a decrease in the number of ionizing photons coming from the central star. However, their conclusion assumes that this planetary nebula is ionization-bounded in all directions. This assumption seems very reasonable for NGC 7027 that is known to be associated with many molecular emissions and to possess large obscuration, suggesting that the ionized region is completely engulfed in neutral gas. However, this assumption should be tested. Finally, Mellema (2004) and Sch[ö]{}nberner et al. (2005) have noted that the apparent expansion velocity in the plane of the sky of planetary nebulae that are ionization-bounded can be larger than the true expansion velocity of the gas since we also have the contribution of the outward motion of the ionization front as the nebula expands. This discrepancy becomes quite large during the optically-thin stage of nebular evolution (Sch[ö]{}nberner et al. 2005). The knowledge of whether or not a nebula is ionization-bounded can be used to approximately correct for this effect. ![If we divide the emission from a nebula in the plane of the sky in $n$ pie slices, each slice will have an opening angle of $2 \pi / n$ radians (see figure) and its apex will coincide with the ionizing star. From the point of view of an observer in the central star, each of these slices will appear as a spherical wedge with a solid angle of $4 \pi / n$ steradians. []{data-label="fig1"}](pieslice.eps) In this paper we discuss a simple criterion that can be derived from good quality radio continuum images taken at frequencies where the ionized nebula is optically-thin. This analysis provides a necessary, although not sufficient, condition to classify a nebula as ionization-bounded. If the nebula fails the criterion, it can be considered to be density-bounded, at least in some directions (as seen from the central star). The criterion ============= We make the following assumptions: i) the central star produces a photoionizing flux that is isotropic as seen from the position of the star, and ii) the nebula is optically-thin in the free-free continuum. The first assumption implies that, if the nebula is ionization-bounded, the rate of photoionizations (and recombinations) produced in the nebula is independent of direction and is a constant for a given solid angle (as seen from the star). Then, the number of free-free photons (that in steady state is proportional to the number of recombinations, e. g. Schraml & Mezger 1969), produced per differential of solid angle as seen from the star is a constant. This conclusion is valid even if the radius of the ionized gas is different in different directions. A larger density in a given direction will cause a smaller ionized radius, but the number of free-free photons produced per unit of volume will be larger, so the number of free-free photons produced per differential of solid angle will remain constant. The second assumption implies that all free-free photons produced escape from the nebula. We now ask: what implications have these conclusions in the appearance of the nebula in the sky? As seen by the observer, we can split the nebula in $n$ identical “pie” slices centered in the central star (see Fig. 1), each with an opening angle given by $2 \pi / n$ radians. As seen from the central star each of these slices is a spherical wedge with solid angle given by $4 \pi / n$ steradians. Since this solid angle is constant for all wedges, we conclude that for a nebula to be ionization-bounded, the flux density in each of the slices should be constant, within the noise. This simple test can be implemented by following the next steps: 1) obtain a good quality radio continuum image of a nebula at a frequency where it is known to be optically thin in the free-free emission, 2) define a center for the nebula either using the stellar position or symmetry considerations applied to the nebula, 3) use the task IRING of the NRAO software package AIPS (Astronomical Image Processing System) to determine the flux density in each of $n$ identical slices centered in the position determined in the previous step. The radius of these slices has to be large enough to contain all the nebular emission. Finally, 4) plot these flux densities as a function of the position angle of the slices to analyze their behavior. Observations ============ The two sets of observations used in this study were obtained in the standard continuum mode and taken from the archive of the VLA of the NRAO[^1]. One set was for NGC 7027 ( = PN G084.9-03.4), and was taken at 43.34 GHz on 2001 November 9 in the D configuration as part of the VLA Calibrator Flux Density project (R. A. Perley & B. Butler 2008, in preparation). The amplitude calibrator was 1331+305, with an adopted flux density of 1.46 Jy. NGC 7027 was used as its own phase calibrator, with a bootstrapped flux density of 4.90$\pm$0.13 Jy. This set was analyzed with the specific goal of testing the hypothesis of ionization-boundness of Zijlstra et al. (2008). The second set was for Hb 4 ( = PN G003.1+02.9), and was taken at 8.46 GHz on 2001 February 18 in the BnA as part of project AK528. The amplitude calibrator was 1331+305, with an adopted flux density of 5.21 Jy. The phase calibrator was 1745$-$290, with a bootstrapped flux density of 0.67$\pm$0.02 Jy. In Table 1 we present, for each planetary nebula, the position adopted as the center of the nebula (in both cases taken to be equal to the position of the minimum emission in the “bowl” that characterizes the morphology of these objects), and the frequency of the observations. PN $\alpha$(2000)$^a$ $\delta$(2000)$^a$ $\nu$(GHz) ----------- -------------------- -------------------- ------------ NGC 7027 21 07 01.74 42 14 09.4 43.34 Hb 4 17 41 52.81 -24 42 07.8 8.46 \[tab:1\] : Observational Parameters The data were reduced using the standard VLA procedures in the software package AIPS of NRAO and then self-calibrated in phase and amplitude. The images were made with the ROBUST weighting parameter (Briggs 1995) of AIPS set to 0. Interpretation and Results ========================== NGC 7027 -------- In Figure 2 we show the 43.34 GHz image of NGC 7027. This planetary nebula is known to be optically-thin above $\sim$5 GHz (Zijlstra et al. 2008), so we expect this 43.34 GHz image to be tracing optically-thin free-free emission. In Figure 3 we plot the flux densities of each slice as a function of their position angle. The slices were made with an angular radius of 10$''$ and an opening of $10^\circ$, with the position angle incrementing by $10^\circ$. This flux density per slice is approximately constant (only small modulations at the $\sim$10% level are present). We conclude that this result is consistent with NGC 7027 being ionization-bounded in all directions, in agreement with the assumption of Zijlstra et al. (2008). This test is relevant because if NGC 7027 were density-bounded in some directions, the observed decrease in flux density could be due to the expansion of the nebula, allowing more ionizing photons to escape in the directions where the nebula is density-bounded and not to a decrease in the number of ionizing photons from the central star. The assumption of NGC 7027 being ionization-bounded is fundamental for the Zijlstra et al. (2008) analysis and our results are consistent with this assumption. ![43.34 GHz contour and greyscale image of the planetary nebula NGC 7027. The contours are -5, -4, 4, 5, 6, 8, 10, 12, 15, 20, 30, 40, 50, 60, 80, 100, and 120 times 3.1 mJy beam$^{-1}$, the rms noise of the image. The greyscale is shown in the top wedge, in mJy beam$^{-1}$. The synthesized beam ($2\rlap.{''}21 \times 1\rlap.{''}80$ with a position angle of $-79^\circ$) is shown in the bottom left corner of the image. The cross marks the position adopted as the center of the nebular emission (see Table 1). []{data-label="fig2"}](N7027GREY.PS) ![Flux density of the image slices of NGC 7027 as a function of their position angle.[]{data-label="fig3"}](ngc7027.eps) Unfortunately, the constancy in the flux density of the slices is not a sufficient condition to assure ionization-boundness: an ionized ring seen face-on would show this same constancy but it will be density-bounded along the line of sight. Hb 4 ---- ![8.46 GHz contour and greyscale image of the planetary nebula Hb 4. The contours are -5, -4, 4, 5, 6, 8, 10, 12, 15, 20, 30, 40, and 50 times 0.10 mJy beam$^{-1}$, the rms noise of the image. The greyscale is shown in the top wedge, in mJy beam$^{-1}$. The synthesized beam ($0\rlap.{''}91 \times 0\rlap.{''}49$ with a position angle of $-53^\circ$) is shown in the bottom left corner of the image. The cross marks the position adopted as the center of the nebular emission (see Table 1). []{data-label="fig4"}](HB4GREY.PS) ![Flux density of the image slices of Hb 4 as a function of their position angle.[]{data-label="fig5"}](hb4.eps) In Figure 4 we show the 8.46 GHz image of Hb 4. The 1.4 and 5.0 GHz flux densities of this planetary nebula are 158 mJy (Condon & Kaplan 1998) and 170 mJy (Aaquist & Kwok 1990), respectively. This indicates that the nebula is optically-thin above $\sim$1.4 GHz, so we expect the 8.46 GHz image to be tracing optically-thin free-free emission. In Figure 5 we plot the flux densities of each slice as a function of their position angle. The slices were made, as for NGC 7027, with an angular radius of 10$''$, every $10^\circ$. In contrast to NGC 7027, the flux density per slice of Hb 4 shows a strong modulation. This modulation implies that the nebula is density-bounded at least in the NW and SE position angles, where ionizing photons will be escaping to the interstellar medium. We conclude that this result indicates that Hb 4 is not ionization-bounded in all directions. An estimate of the stellar ionizing flux from indicators like H$\alpha$ or free-free emission will then result in an underestimate of the true value. Conclusions =========== We present a simple observational test that allows to establish if an ionized nebula is ionization-bounded or not. The condition is necessary but not sufficient. We applied this test to NGC 7027 and Hb 4, finding that the first object is probably ionization-bounded while the second is density-bounded, at least in some directions. LFR and YG acknowledge the support of DGAPA, UNAM, and of CONACyT (México). This research has made use of the SIMBAD database, operated at CDS, Strasbourg, France. Aaquist, O. B., & Kwok, S. 1990, , 84, 229 Bieging, J. H., Boley, P. A., Latter, W. B., & Tielens, A. G. G. M. 2008, , 676, 390 Briggs, D. 1995, Ph.D. thesis, New Mexico Inst. of Mining and Technology Condon, J. J., & Kaplan, D. L. 1998, , 117, 361 Mellema, G. 2004, A&A, 416, 623 Perinotto, M., Sch[ö]{}nberner, D., Steffen, M., & Calonaci, C. 2004, , 414, 993 Rodríguez, L. F., & Moran, J. M. 1982, , 299, 323 Sandin, C., Sch[ö]{}nberner, D., Roth, M. M., Steffen, M., B[ö]{}hm, P., & Monreal-Ibero, A. 2008, , 486, 545 Sch[ö]{}nberner, D., Jacob, R., & Steffen, M. 2005, , 441, 573 Schraml, J., & Mezger, P. G. 1969, , 156, 269 Thronson, H. A., Jr. 1983, , 264, 599 Treffers, R. R., Fink, U., Larson, H. P., & Gautier, T. N., III 1976, , 209, 793 Zijlstra, A. A., van Hoof, P. A. M., & Perley, R. A. 2008, , 681, 1296 [^1]: The National Radio Astronomy Observatory is operated by Associated Universities Inc. under cooperative agreement with the National Science Foundation.
{ "pile_set_name": "ArXiv" }
Seikkyi Kanaungto Township Seikkyi Kanaungto Township ( ) is located on the southwestern bank of Yangon river across from downtown Yangon, Myanmar. The township comprises eight wards, and is bounded by the Yangon river in the north, the Twante Canal in the east, and Twante Township in the south and west. The township is still largely rural and undeveloped mainly because it still lacks a bridge across the Yangon river to downtown. Seikkyi Kanaungto has 16 primary schools, and one high school. References Category:Townships of Yangon
{ "pile_set_name": "Wikipedia (en)" }
Tuesday, November 22, 2016 Trumping The Bond Market? The rise in Treasury yields slowed this week, highlighting skepticism in some quarters that Donald Trump’s presidency will usher in a period of rising inflation. The yield on the 10-year Treasury note, which falls as prices increase, fell Wednesday, following a muted rise on Tuesday, while the 30-year bond yield fell both Tuesday and Wednesday. Yields had surged since the U.S. presidential election on the view that Mr. Trump’s tenure will generate a period of rising inflation, as he pursues policies such as tax cuts, regulatory rollbacks and infrastructure spending to boost economic growth (click n image below). Market-based inflation indicators were rising before Mr. Trump’s victory last week, following sharp declines earlier in 2016. But some investors say factors including the size of the U.S. debt load could limit the effectiveness of any fiscal-stimulus efforts. The more debt that is outstanding, the less bang for any given dollar of spending, some say. These skeptics insist the bond selloff has gone too far. “I was rolling my eyes so many times in the past few days that I thought I was going to go blind,” said David Rosenberg, chief economist and market strategist at Gluskin Sheff & Associates Inc. “The inflationistas have a lot to account for because history is not on their side.” Other quarrels with the pro-inflation narrative focus on the numerous premature inflation calls of the past decade. Some economists and businessmen wrote an open letter in 2010 warning then-Federal Reserve Chairman Ben Bernanke that monetary stimulus would have inflationary consequences, a view that now seems thoroughly discredited. Inflation has failed to hit the Federal Reserve’s 2% annual target for more than four years. The U.S. producer-price index for final demand, a measure of business prices, held flat in October compared with the prior month, data showed Wednesday. Prices were up 0.8% from a year earlier. Lacy Hunt, executive vice president at Hoisington Investment Management Co. in Austin, Texas, has long invested his fund in Treasurys with faraway maturities, reasoning that the economy is too weak to generate inflation that would erode the gains on those securities. Since the election, he has been bombarded with calls from clients wondering whether the bond selloff is the death knell for the bond rally that began in 1981. On Wednesday, the 30-year yield fell to 2.925%, while the 10-year yield fell to 2.222% (last week's data). A bond-market gauge that compares nominal Treasury yields with inflation-protected counterparts forecasts that inflation will climb at 1.88% annually over the next 10 years, up from 1.4% in July, according to Tradeweb. Mr. Hunt’s answer: No way. “There is always this rush to judgment when there’s a major policy change,” he said. He is investing new client money in long-term Treasurys, those maturing in 10 years or more. One reason he thinks inflation is set to stay low is the nation’s $19.8 trillion debt load. The increase in debt stands to make each dollar go less far in spurring growth, he said. From 1952 to 1999, it took about $1.70 in nonfinancial debt for gross domestic product to expand by $1. In the year through June, it took $4.90 to do the same. The national debt could increase $5.3 trillion over a decade should Mr. Trump cut taxes and boost spending as he has said during the campaign, according to the nonpartisan Committee for a Responsible Federal Budget. Even after stimulus projects are completed, their impact on inflation isn’t necessarily positive. Improving roads and rails to make transportation more efficient can actually cut per-unit costs, Mr. Rosenberg said. He cited the New Deal package in the 1930s and the highway-construction spending of the 1950s as big stimulus measures that didn’t in their own right boost prices. Still, many investors think inflation is headed higher as part of a broader economic reckoning. Prices had been rising in the months before the election, and a policy pivot could boost that, some say. Market factors like higher interest rates and a stronger dollar also may have a damping effect on inflation because they can restrain the economy. “There is a good chance that we are at one of those major reversals that last a decade,” Ray Dalio, chairman and chief investment officer at Bridgewater Associates, said in a LinkedIn post Tuesday. He suggested inflation was set to climb. Even those who don’t see inflation in the cards suggest that some elements of Mr. Trump’s policy proposals may work toward that purpose, such as his vow to cut the corporate tax rate to 15% from 35%. Yet the experience of tax cuts during President Ronald Reagan’s administration suggests this took a long time to filter through to the economy, Mr. Hunt said. The most important macro theme I routinely cover on this blog is global deflation. You can view my past comments on deflation here. An equally important and closely related macro theme I love to cover is the so-called bond bubble. You can view my past comments on that topic here. What do I keep warning all of you of? You need to get the macro right in order to get the micro right. If you don't understand the cyclical and structural forces driving the US and global economy, you will fall prey to the noise and get caught up in the price action and risk losing serious money. More importantly, bond yields are rocketing higher and when it comes to pension deficits, it's the direction of interest rates that ultimately counts a lot more than any gains in asset values because as I keep reminding everyone, the duration of pension liabilities is a lot bigger than the duration of pension assets, so for any given move in rates, liabilities will rise or decline much faster than assets. Will the rise in rates and gains in stocks continue indefinitely? A lot of underfunded (and some fully funded) global pensions sure hope so but I have my doubts and think we need to prepare for a long, tough slug ahead. Trump also needs to carefully consider bolstering Social Security for all Americans and modeling it after the (now enhanced) Canada Pension Plan where money is managed by the Canada Pension Plan Investment Board. One thing he should not do is follow lousy advice from Wall Street gurus and academics peddling a revolutionary retirement plan which only benefits Wall Street, not Main Street. You should read my comment on the global pension storm to understand why I continue to worry about global deflation, the rising US dollar and why bond yields are likely to revisit new secular lows, placing even more pressure on global pensions in the years ahead. This is why I respectfully disagree with Bob Prince and Ray Dalio at Bridgewater who called an end to the 30-year bond bull market after Trump's victory. I have serious concerns on Trump and emerging markets and I wouldn't be so quick to rush out of bonds (in fact, I see the big backup in bond yields as an opportunity to buy more long dated bonds (TLT) and will cover this in a separate comment). Let me flat out state that I believe the recent backup in bond yields is another huge bond buying opportunity and smart global asset allocators and pensions are buying long dated US nominal government bonds at these levels (click on image): The chart above shows price action of the iShares 20+ Year Treasury Bond ETF (TLT) and it's important to remember that bond yields and prices are inversely related (so when yields go up, bond prices fall). What this chart shows is that every time this ETF fell below its 50-week moving average and stayed above the 200-week moving average, it was time to load up on bonds. I use weekly charts to determine long-term trends and to see if price action is breaking down and so far, despite all the noise of the "30-year bond bull market being dead," I'm not convinced and think smart investors are loading up on bonds here. That is my technical argument. On a fundamental level, and I've written plenty of comments on this, I just don't see fading risks of global deflation and I'm worried if the greenback keeps surging higher, which I correctly predicted back in early August, then we will see deflationary headwinds in the US as earnings get hit, unemployment rises and we'll see lower inflation expectations because a rising US dollar lowers import prices. Of course, deflation is most prevalent in Europe and Japan which is why the ECB and Bank of Japan are still buying government bonds, desperately trying to reflate inflation expectations which are moribund in these regions. The divergence in US monetary and global monetary policy is driving the US dollar higher, as is the expectation of a massive US fiscal expansionary program. How long can this go on before it wreaks havoc on emerging markets and reinforces global deflation? We will find out soon enough but my friend François Trahan of Cornerstone Macro did another great short video presentation this morning and he allowed me to share this chart with you which shows global PMIs relative to the 10-year US Treasury bond yield (click on image): What the chart shows is global PMIs have peaked and that typically means lower global growth ahead, which is bullish for bonds, especially US bonds. And if a crisis in emerging markets erupts under a President Trump or even before he takes office, global investors will be running into US bonds (flight to safety and liquidity). [Note: François Trahan will be in Montreal on January 26 of the new year to present his outlook at a CFA Montreal luncheon. My former boss and colleague, Clément Gignac and Stéfane Marion will also be presenting their outlook as will professor Ari Van Assche of HEC Montréal. Details of this event can be found here.] That is the global backdrop. As Lacy Hunt and Van Hoisington argue in their latest economic quarterly comment, 2015's surging debt levels will also weigh on domestic growth and constrain growth no matter what President Trump and Congress pass as a stimulus package (there are already grumblings from Republican lawmakers over deficits and Trump's agenda). Remember my six structural factors as to why I am worried about global deflation ahead: High structural unemployment in the developed world (too many people are chronically unemployed and we risk seeing a lost generation if trend continues) These six structural factors are why I'm convinced why global deflation is gaining steam and why we have yet to see the secular lows in global and US bond yields. The reflationistas and bond bubble clowns will argue otherwise but I'm sticking with my macro call on global deflation which is why I'm recommending you load up on US long dated bonds after the latest backup in yields. [...] at one point a rising US dollar impedes growth and is deflationary and if you ask me, the rise of protectionism will cost America jobs and rising unemployment is deflationary, so even if Trump spends like crazy on infrastructure, the net effect on growth and deflation is far from clear. All this to say I respectfully disagree with Ray Dalio, Bob Prince and the folks at Bridgewater which is why I recommended investors sell the Trump rally, buy bonds on the recent backup in yields and proceed cautiously on emerging markets as the US dollar strengthens and could wreak a deflationary tsunami in Asia which will find its way back on this side of the Atlantic. Unlike Ray Dalio and others, I just don't see the end of the bond bull market and I'm convinced we have not seen the secular low in long bond yields as global deflation risks are not fading, they are gathering steam and if Trump's administration isn't careful, deflation will hit America too. This is why I continue to be long the greenback and would take profits or even short emerging market (EEM), Chinese (FXI), Metal & Mining (XME) and Energy (XLE) shares on any strength. And despite huge volatility, I remain long biotech shares (IBB and equally weighted XBI) and keep finding gems in this sector by examining closely the holdings of top biotech funds. And in a deflationary, ZIRP & NIRP world, I still maintain nominal bonds (TLT), not gold, will remain the ultimate diversifier and Financials (XLF) will struggle for a long time if a debt deflation cycle hits the world (ultra low or negative rates for years aren't good for financials). As far as Ultilities (XLU), REITs (IYR), Consumer Staples (XLP), and other dividend plays (DVY), they have gotten hit lately partly because of a backup in yields but also because they ran up too much as everyone chased yield (might be a good buy now but be careful, high dividend doesn't mean less risk!). Interestingly, however, high yield credit (HYG) continues to perform well which bodes well for risk assets. Below, Oksana Aronov, JPMorgan Asset Management alternative fixed income strategist, and Barbara Reinhard, Voya Investment Management head of asset allocation, discuss current moves in the markets and what investors should be considering. And while stock investors have calmed down, bond investors have gotten jittery. So who’s right about what’s ahead for the economy? Matt Maley of Miller Tabak and Gina Sanchez of Chantico Global discuss with Brian Sullivan (Note: This interview took place last week). Lastly, Carmignac Managing Director, Didier Saint-Georges, gives his thoughts on the outlook for the bond market, following the US decision to elect Donald Trump. Listen very carefully to his discussion on what's driving inflation and deflationary headwinds have not disappeared. No comments: Post a Comment About This Blog/ Contact Information This blog was created to share my unique insights on pensions and investments. The success of the blog is due to the high volume of readers and excellent insights shared by senior pension fund managers and other experts. Institutional and retail investors are kindly requested to support my efforts by donating or subscribing via PayPal below. For all inquiries, please contact me at LKolivakis@gmail.com. About Me I am an independent senior economist and pension and investment analyst with years of experience working on the buy and sell-side. I have researched and invested in traditional and alternative asset classes at two of the largest public pension funds in Canada, the Caisse de dépôt et placement du Québec (Caisse) and the Public Sector Pension Investment Board (PSP Investments). I've also consulted the Treasury Board Secretariat of Canada on the governance of the Federal Public Service Pension Plan (2007) and been invited to speak at the Standing Committee on Finance (2009) and the Senate Standing Committee on Banking, Commerce and Trade (2010) to discuss Canada's pension system. You can follow my blog posts on your Bloomberg terminal and track me on Twitter (@PensionPulse) where I post many links to pension and investment articles as well as my market thoughts and other articles of interest. Thank You! I'd like to thank all of you who support this blog, I truly appreciate it. Retail investors can subscribe using one of the three options below ($50, $100 or $250 CAD a year). Institutional investors can show their support via an annual subscription of $500, $1000 or $5000 CAD (contact me for details). Also, anyone can contribute any amount at any time through the "donate" button (a tip). Please take the time to show your support for the work that goes into this blog. Thank you! Retail Subscription (CAD) Institutional Subscription (CAD) Periodic Tip (CAD) Twitter Subscribe To Blog Follow by Email Search This Blog Loading... Translate Scrolling This Blog As you scroll down the right-hand side, you will first see links to pension news, a guide to the basics, my blog archive, popular posts and comprehensive links to Canadian and global funds, government organizations, institutional organizations, advisors and vendors, broker dealers & investment banks, documents to pension plan governance, assets and liabilities, links to conferences, geopolitical news, market and industry research and my blog roll. All links are listed in alphabetical order. I've also included links to worthy charities and resources to fight Multiple Sclerosis. Readers can subscribe to my posts entering their email at the top of the right hand side. They can also search my blog using any key word in the custom search at the top of the page. Finally, take the time to read my disclaimer at the bottom and always remember there is no free lunch on Wall Street.Always be skeptical of everything you read, including comments from yours truly! Total Pageviews Disclaimer Pension Pulse is a collection of my thoughts pertaining to issues on pension funds and financial markets. The information and opinions contained on this site are merely guidelines. This site does not guarantee any monetary claims by following these recommendations. This website is not liable for any loss that you incur due to these programs, nor do we ask for any monetary gains from your success of using these recommendations. We also do not guarantee the results of any products or recommendations listed on this site. You must do your own due diligence before investing in any product.
{ "pile_set_name": "Pile-CC" }
11? False Let g(b) = -b**2 - 2*b + 7. Let y be g(-3). Suppose 2*c - p = 4*p + 431, 2*c = -y*p + 422. Does 13 divide c? False Is 9 a factor of ((-9648)/192)/(105/36 + -3)? True Let o(r) = -2*r**3 - 3*r**2 - 9*r - 15. Is o(-7) a multiple of 5? False Let g = 86 + -167. Let d = g + 141. Does 20 divide d? True Suppose -6000 = 43*p - 53*p. Does 50 divide p? True Let p(d) = d**3 + 10*d**2 + 17*d + 11. Let w be p(-8). Suppose -w*z + 21 = u, -4*z = 2*u - 30 - 12. Is 9 a factor of u? False Let p be (-51)/(-4) - 4/(-16). Let h(f) be the third derivative of f**6/120 - 7*f**5/30 + 7*f**4/12 - f**3/6 - 5*f**2. Is h(p) a multiple of 5? False Suppose 0 = 15*g - g - 1680. Is 15 a factor of g? True Let m(y) = y - 7*y - 5 + 4*y + y. Let j be m(-5). Suppose -75 = -j*l - 3*l. Does 10 divide l? False Let x be 30/9 - 4/(-6). Suppose 0 = 2*z - f - 36 + 13, -2*z - x*f + 38 = 0. Is z a multiple of 13? True Let w(p) = -p + 1. Suppose -4*t - 5 = -t - 2*q, -3*t = -5*q + 17. Let f be w(t). Suppose f = -5*h - 2*k + 30, -2*h - k + 12 = -3*k. Is h a multiple of 3? True Suppose 225 + 201 = 3*w. Does 9 divide w? False Let x(v) = 5*v. Let w(s) = s + 5. Let f be w(-4). Let h be x(f). Suppose h*u = 7*u - 30. Is u a multiple of 5? True Let t be 9 + 0 - (-1 + 4). Suppose -1860 + 408 = -t*w. Does 13 divide w? False Suppose 678*y - 22134 = 664*y. Is 93 a factor of y? True Suppose 8*r - 2 - 22 = 0. Suppose -2*c + r*l + 16 = 0, 0*c - 3*c + 3*l + 27 = 0. Is 5 a factor of c? False Let g be (4/(-12))/(1/12). Let r be -3*((2 - 0) + -1). Is 17 - (g - -3)*r a multiple of 7? True Let q = 27 - 22. Suppose 0 = 2*x - q*x + 90. Does 15 divide x? True Is (-25)/(150/24)*(-839)/2 a multiple of 14? False Suppose 33 = 5*t - 17. Suppose 2*m = -4*s + t, s - 5*m - 35 = -s. Suppose s*h = 21 + 4. Does 4 divide h? False Let o(l) = 0*l + 0*l + l**2 + 3*l - 2*l**2. Let w be o(3). Suppose -5*y + 23 + 15 = 3*p, w = 5*p + 3*y - 74. Is p a multiple of 16? True Suppose 92 = -4*l + 2*s, -3*l - s - 62 = 2. Let a = l - -61. Suppose -5*k + 2*k + 3*p + 63 = 0, -2*k + p = -a. Is k a multiple of 9? True Let y = 1746 + -1381. Is y a multiple of 2? False Suppose -2*y + 1488 = x, 7*y = 8*y - 2*x - 744. Is 31 a factor of y? True Let y = -8 - -11. Is 29 a factor of 24 + 21/y + -2? True Let o(h) = h**2 - 19*h - 7. Let j = 33 - 24. Let c be o(j). Let q = -3 - c. Does 27 divide q? False Suppose 1494 = 3*g + o, 5*g - 9*o = -14*o + 2480. Is 19 a factor of g? False Suppose 0 = 5*q - 2*q - 6. Suppose -p = -q - 0. Suppose -3*g + 3*v + 0*v + 27 = 0, p*v = 5*g - 30. Is g a multiple of 4? True Is (-4)/72*4 + 12318/27 a multiple of 24? True Suppose 5*r - m = -3*m + 104, -m = r - 19. Let q be -13*(-4)/(-2*2). Let k = r + q. Is 7 a factor of k? False Suppose -21*t = -49*t + 3024. Does 3 divide t? True Suppose -m + 2 = -0*m. Let a(w) = 42*w**3 - 3*w + 2. Let h be a(m). Suppose -h = -5*s - 62. Does 18 divide s? True Suppose 17*d - 14*d - 1277 = -2*s, 0 = -4*s - 20. Does 41 divide d? False Suppose 5*u - 16 = -s, -6*u = -3*s - 2*u + 48. Does 3 divide 9 + -9 + s/1? False Suppose 0*m + 18 = 2*m. Let y(z) = z**2 - 9*z + 2. Let v be y(m). Let c = v + 4. Is c a multiple of 2? True Let n(o) = -2*o + 17 + 5 + 0*o - 3*o. Let m be n(-7). Let g = -36 + m. Is 21 a factor of g? True Suppose -7*j + 108 + 172 = 0. Is 8 a factor of j? True Let l be (4/(-8))/((-1)/(-198)). Is (l/22)/((-2)/12) a multiple of 4? False Let y(d) = d**3 - 3*d**2 - 7*d + 8. Let f be y(4). Let p = 2 - f. Is p/(-5)*100/(-6) a multiple of 16? False Let n be -304 - 7 - (-5)/(10/(-8)). Let m = n - -543. Does 57 divide m? True Suppose i + i + 486 = 0. Let b = 407 + i. Is b a multiple of 41? True Let s = -126 + 209. Suppose -4*w = -w - 4*a - s, -3*w = -5*a - 85. Let m = 73 - w. Is 16 a factor of m? True Suppose 0 = t - 4*w - 14 - 4, -12 = 3*w. Suppose -t*g + 17 = -33. Is g a multiple of 4? False Let d = 38 + -38. Suppose z + d*z = 24. Does 6 divide z? True Suppose 5*c + 1001 = 3*i, -4*c + 183 + 128 = i. Is 44 a factor of i? False Let y(x) = -x**3 - 2*x**2 + 3. Suppose -6*q = -3*q + 27. Let z = 6 + q. Does 12 divide y(z)? True Let z be (-1 + -3731)*72/108. Is 14 a factor of ((-18)/8)/(-6 - z/416)? False Suppose 4*x + l - 20 = -0*x, 4*l + 20 = 4*x. Suppose 2*b - 17 = j, x*b + j - 40 = 13. Is (b/(-4) - -2)*-36 a multiple of 3? True Let j = 71 + -68. Suppose 0 = w - j*u + 5*u - 14, 4*w - 56 = -5*u. Is w a multiple of 7? True Suppose 188 = 7*t - 589. Is t a multiple of 37? True Let c = 11 + -7. Suppose c*u + 3*b - 262 = -u, 2*b + 192 = 4*u. Is u a multiple of 10? True Let d(g) = 3*g - 5. Let a be 2*(-3 + (-39)/(-6)). Let m = a + 0. Is 10 a factor of d(m)? False Is 11 a factor of 9 + 2/(-1) + 1 + 260? False Let b = -25 - -53. Suppose l - b = 28. Does 14 divide l? True Let i(h) = h**3 + 5*h**2 + h - 2. Let g be i(-2). Let l = 26 - g. Suppose 0 = -2*c + l + 132. Is c a multiple of 32? False Let m = 5 + -27. Suppose 3*f - 84 = 5*a, 5*f - 4*a = 3*f + 54. Is (m/f)/(2/(-183)) a multiple of 27? False Let w(v) = -v**3 + 5*v**2 - 7*v - 1. Suppose -4*t + 0 = -16. Let p be w(t). Let a(c) = -c**2 - 19*c - 10. Is 17 a factor of a(p)? True Let q = -42 - -46. Suppose m = -0*l - l + 17, 5*m - 94 = q*l. Is 18 a factor of m? True Is 27905/30 + (-1 - (-25)/30) a multiple of 10? True Let i = 709 - 321. Suppose 6*y - y - 5*p - 455 = 0, 0 = -4*y - 2*p + i. Is y a multiple of 20? False Let n be 27/18 + 1022/4. Suppose -289 = -2*o + n. Is 39 a factor of o? True Suppose 5*r - 270 = -0. Suppose 0*a + 3*a + r = -4*n, a - 62 = 4*n. Let m = 25 + n. Is m a multiple of 3? False Let l(c) = -4 + 3 - 70*c + 4. Is l(-2) a multiple of 22? False Let r(m) = -30*m**2 + 5. Let u(d) = d**2 - d + 1. Let f(g) = -r(g) + 3*u(g). Is f(-1) a multiple of 17? True Let f(g) = -2*g**2 - 29*g - 20. Is 14 a factor of f(-8)? True Let j = -10 + -4. Let w be -7*(5 + (-425)/35). Let h = w + j. Does 18 divide h? True Does 16 divide (1 - -288)*102/51? False Suppose -4*d + 0*p + p = 15, -5 = 5*p. Suppose -11*n = -5*n + 210. Is 6 a factor of (-7 + 3)/d - n? True Suppose 1186 = 2*b - 6*n + 5*n, -5*n = -b + 584. Is 18 a factor of b? True Let f(t) = t - 5. Let y(q) = 10*q + 1. Let i be y(2). Let d = i + -6. Is f(d) a multiple of 8? False Let i be 4 + (-1)/((-3)/9). Let f be (-328)/32*(-1 - i). Let h = f - -13. Is 30 a factor of h? False Let a(y) = 383*y**2. Let c be a(-1). Let w be ((-7)/(-7))/((-12)/16 + 1). Suppose 2*t = 4*t + 2*q - 174, w*t = 3*q + c. Is t a multiple of 15? False Let l(r) = -r**3 - 10*r**2 + 11*r + 16. Let k be ((-2 - -2) + -1)*11. Is l(k) even? True Let c be (-14)/4 - (-24)/16. Is 4 a factor of (c + 0)*(-91)/14? False Let d(w) = -2*w**2 + 12*w - 7. Let z(f) = 6*f**2 - 36*f + 21. Let k(l) = 8*d(l) + 3*z(l). Is k(8) a multiple of 13? True Suppose 22*y = 7*y + 990. Is y a multiple of 3? True Suppose 0 = -3*j + 1 + 29. Let n be (6/j)/((-2)/(-230)). Does 21 divide (4 - n/12)*-36? True Let f = -19 - -26. Suppose -2*i + f*i = 100. Does 10 divide i? True Let i = -2227 - -3339. Does 42 divide i? False Suppose -o = -5, 0 = 6*a - 3*a - 3*o + 9. Suppose 0 = -0*t + 3*t - 12, a*t = -y + 10. Suppose -y*r - 5*h = -55, r - 25 = -4*h + 2*h. Is 5 a factor of r? True Let x(m) = -311*m**3 + m**2 + 3*m + 3. Is 52 a factor of x(-1)? True Suppose -4*x = -0*x + g - 11, -5*x = g - 15. Suppose 2*h = -2*h + x*p + 176, 2*h + 5*p = 123. Is 10 a factor of h? False Suppose 5*d + 2845 = 5*x + 6*d, d + 5 = 0. Does 33 divide x? False Suppose 3*r - 18 = -4*v - 0*r, 0 = -4*v - 5*r + 14. Suppose -k + v = k. Suppose -17 - 4 = -k*q. Is q a multiple of 7? True Suppose 5*a + h + 603 = 0, -a + 4*h = -5*a - 492. Let v = a - -171. Does 17 divide v? True Suppose -107*i + 105*i = 6. Let h be 1/4*9*4. Let j = h + i. Is j a multiple of 3? True Let q(w) = 0*w - 5 - 84*w**2 - 13 + w + 85*w**2. Is q(-9) a multiple of 3? True Suppose -g + 12 = -4*x - 7, -x - 5 = 0. Let y = g - -20. Is y/((0 - 1)*-1) a multiple of 8? False Let z = 1226 + 496. Suppose 5*x - z = -312. Does 43 divide x? False Let l(a) = -2*a - 16. Let d be l(-10). Suppose 0 = -0*i + 5*i + 5*p - 535, -d*p = -5*i + 508. Is i a multiple of 26? True Let q(x) = -x**3 - x**2 - 4*x - 3. Let d be q(-2). Suppose d = 2*s + m - 2, s - 2 = -4*m. Does 13 divide 2/s + (-116)/(-3)? True Suppose 91 = -3*k + 901. Does 11 divide k? False Le
{ "pile_set_name": "DM Mathematics" }
// Package jlexer contains a JSON lexer implementation. // // It is expected that it is mostly used with generated parser code, so the interface is tuned // for a parser that knows what kind of data is expected. package jlexer import ( "encoding/base64" "encoding/json" "errors" "fmt" "io" "strconv" "unicode" "unicode/utf16" "unicode/utf8" ) // tokenKind determines type of a token. type tokenKind byte const ( tokenUndef tokenKind = iota // No token. tokenDelim // Delimiter: one of '{', '}', '[' or ']'. tokenString // A string literal, e.g. "abc\u1234" tokenNumber // Number literal, e.g. 1.5e5 tokenBool // Boolean literal: true or false. tokenNull // null keyword. ) // token describes a single token: type, position in the input and value. type token struct { kind tokenKind // Type of a token. boolValue bool // Value if a boolean literal token. byteValue []byte // Raw value of a token. delimValue byte } // Lexer is a JSON lexer: it iterates over JSON tokens in a byte slice. type Lexer struct { Data []byte // Input data given to the lexer. start int // Start of the current token. pos int // Current unscanned position in the input stream. token token // Last scanned token, if token.kind != tokenUndef. firstElement bool // Whether current element is the first in array or an object. wantSep byte // A comma or a colon character, which need to occur before a token. UseMultipleErrors bool // If we want to use multiple errors. fatalError error // Fatal error occurred during lexing. It is usually a syntax error. multipleErrors []*LexerError // Semantic errors occurred during lexing. Marshalling will be continued after finding this errors. } // FetchToken scans the input for the next token. func (r *Lexer) FetchToken() { r.token.kind = tokenUndef r.start = r.pos // Check if r.Data has r.pos element // If it doesn't, it mean corrupted input data if len(r.Data) < r.pos { r.errParse("Unexpected end of data") return } // Determine the type of a token by skipping whitespace and reading the // first character. for _, c := range r.Data[r.pos:] { switch c { case ':', ',': if r.wantSep == c { r.pos++ r.start++ r.wantSep = 0 } else { r.errSyntax() } case ' ', '\t', '\r', '\n': r.pos++ r.start++ case '"': if r.wantSep != 0 { r.errSyntax() } r.token.kind = tokenString r.fetchString() return case '{', '[': if r.wantSep != 0 { r.errSyntax() } r.firstElement = true r.token.kind = tokenDelim r.token.delimValue = r.Data[r.pos] r.pos++ return case '}', ']': if !r.firstElement && (r.wantSep != ',') { r.errSyntax() } r.wantSep = 0 r.token.kind = tokenDelim r.token.delimValue = r.Data[r.pos] r.pos++ return case '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', '-': if r.wantSep != 0 { r.errSyntax() } r.token.kind = tokenNumber r.fetchNumber() return case 'n': if r.wantSep != 0 { r.errSyntax() } r.token.kind = tokenNull r.fetchNull() return case 't': if r.wantSep != 0 { r.errSyntax() } r.token.kind = tokenBool r.token.boolValue = true r.fetchTrue() return case 'f': if r.wantSep != 0 { r.errSyntax() } r.token.kind = tokenBool r.token.boolValue = false r.fetchFalse() return default: r.errSyntax() return } } r.fatalError = io.EOF return } // isTokenEnd returns true if the char can follow a non-delimiter token func isTokenEnd(c byte) bool { return c == ' ' || c == '\t' || c == '\r' || c == '\n' || c == '[' || c == ']' || c == '{' || c == '}' || c == ',' || c == ':' } // fetchNull fetches and checks remaining bytes of null keyword. func (r *Lexer) fetchNull() { r.pos += 4 if r.pos > len(r.Data) || r.Data[r.pos-3] != 'u' || r.Data[r.pos-2] != 'l' || r.Data[r.pos-1] != 'l' || (r.pos != len(r.Data) && !isTokenEnd(r.Data[r.pos])) { r.pos -= 4 r.errSyntax() } } // fetchTrue fetches and checks remaining bytes of true keyword. func (r *Lexer) fetchTrue() { r.pos += 4 if r.pos > len(r.Data) || r.Data[r.pos-3] != 'r' || r.Data[r.pos-2] != 'u' || r.Data[r.pos-1] != 'e' || (r.pos != len(r.Data) && !isTokenEnd(r.Data[r.pos])) { r.pos -= 4 r.errSyntax() } } // fetchFalse fetches and checks remaining bytes of false keyword. func (r *Lexer) fetchFalse() { r.pos += 5 if r.pos > len(r.Data) || r.Data[r.pos-4] != 'a' || r.Data[r.pos-3] != 'l' || r.Data[r.pos-2] != 's' || r.Data[r.pos-1] != 'e' || (r.pos != len(r.Data) && !isTokenEnd(r.Data[r.pos])) { r.pos -= 5 r.errSyntax() } } // fetchNumber scans a number literal token. func (r *Lexer) fetchNumber() { hasE := false afterE := false hasDot := false r.pos++ for i, c := range r.Data[r.pos:] { switch { case c >= '0' && c <= '9': afterE = false case c == '.' && !hasDot: hasDot = true case (c == 'e' || c == 'E') && !hasE: hasE = true hasDot = true afterE = true case (c == '+' || c == '-') && afterE: afterE = false default: r.pos += i if !isTokenEnd(c) { r.errSyntax() } else { r.token.byteValue = r.Data[r.start:r.pos] } return } } r.pos = len(r.Data) r.token.byteValue = r.Data[r.start:] } // findStringLen tries to scan into the string literal for ending quote char to determine required size. // The size will be exact if no escapes are present and may be inexact if there are escaped chars. func findStringLen(data []byte) (hasEscapes bool, length int) { delta := 0 for i := 0; i < len(data); i++ { switch data[i] { case '\\': i++ delta++ if i < len(data) && data[i] == 'u' { delta++ } case '"': return (delta > 0), (i - delta) } } return false, len(data) } // getu4 decodes \uXXXX from the beginning of s, returning the hex value, // or it returns -1. func getu4(s []byte) rune { if len(s) < 6 || s[0] != '\\' || s[1] != 'u' { return -1 } var val rune for i := 2; i < len(s) && i < 6; i++ { var v byte c := s[i] switch c { case '0', '1', '2', '3', '4', '5', '6', '7', '8', '9': v = c - '0' case 'a', 'b', 'c', 'd', 'e', 'f': v = c - 'a' + 10 case 'A', 'B', 'C', 'D', 'E', 'F': v = c - 'A' + 10 default: return -1 } val <<= 4 val |= rune(v) } return val } // processEscape processes a single escape sequence and returns number of bytes processed. func (r *Lexer) processEscape(data []byte) (int, error) { if len(data) < 2 { return 0, fmt.Errorf("syntax error at %v", string(data)) } c := data[1] switch c { case '"', '/', '\\': r.token.byteValue = append(r.token.byteValue, c) return 2, nil case 'b': r.token.byteValue = append(r.token.byteValue, '\b') return 2, nil case 'f': r.token.byteValue = append(r.token.byteValue, '\f') return 2, nil case 'n': r.token.byteValue = append(r.token.byteValue, '\n') return 2, nil case 'r': r.token.byteValue = append(r.token.byteValue, '\r') return 2, nil case 't': r.token.byteValue = append(r.token.byteValue, '\t') return 2, nil case 'u': rr := getu4(data) if rr < 0 { return 0, errors.New("syntax error") } read := 6 if utf16.IsSurrogate(rr) { rr1 := getu4(data[read:]) if dec := utf16.DecodeRune(rr, rr1); dec != unicode.ReplacementChar { read += 6 rr = dec } else { rr = unicode.ReplacementChar } } var d [4]byte s := utf8.EncodeRune(d[:], rr) r.token.byteValue = append(r.token.byteValue, d[:s]...) return read, nil } return 0, errors.New("syntax error") } // fetchString scans a string literal token. func (r *Lexer) fetchString() { r.pos++ data := r.Data[r.pos:] hasEscapes, length := findStringLen(data) if !hasEscapes { r.token.byteValue = data[:length] r.pos += length + 1 return } r.token.byteValue = make([]byte, 0, length) p := 0 for i := 0; i < len(data); { switch data[i] { case '"': r.pos += i + 1 r.token.byteValue = append(r.token.byteValue, data[p:i]...) i++ return case '\\': r.token.byteValue = append(r.token.byteValue, data[p:i]...) off, err := r.processEscape(data[i:]) if err != nil { r.errParse(err.Error()) return } i += off p = i default: i++ } } r.errParse("unterminated string literal") } // scanToken scans the next token if no token is currently available in the lexer. func (r *Lexer) scanToken() { if r.token.kind != tokenUndef || r.fatalError != nil { return } r.FetchToken() } // consume resets the current token to allow scanning the next one. func (r *Lexer) consume() { r.token.kind = tokenUndef r.token.delimValue = 0 } // Ok returns true if no error (including io.EOF) was encountered during scanning. func (r *Lexer) Ok() bool { return r.fatalError == nil } const maxErrorContextLen = 13 func (r *Lexer) errParse(what string) { if r.fatalError == nil { var str string if len(r.Data)-r.pos <= maxErrorContextLen { str = string(r.Data) } else { str = string(r.Data[r.pos:r.pos+maxErrorContextLen-3]) + "..." } r.fatalError = &LexerError{ Reason: what, Offset: r.pos, Data: str, } } } func (r *Lexer) errSyntax() { r.errParse("syntax error") } func (r *Lexer) errInvalidToken(expected string) { if r.fatalError != nil { return } if r.UseMultipleErrors { r.pos = r.start r.consume() r.SkipRecursive() switch expected { case "[": r.token.delimValue = ']' r.token.kind = tokenDelim case "{": r.token.delimValue = '}' r.token.kind = tokenDelim } r.addNonfatalError(&LexerError{ Reason: fmt.Sprintf("expected %s", expected), Offset: r.start, Data: string(r.Data[r.start:r.pos]), }) return } var str string if len(r.token.byteValue) <= maxErrorContextLen { str = string(r.token.byteValue) } else { str = string(r.token.byteValue[:maxErrorContextLen-3]) + "..." } r.fatalError = &LexerError{ Reason: fmt.Sprintf("expected %s", expected), Offset: r.pos, Data: str, } } func (r *Lexer) GetPos() int { return r.pos } // Delim consumes a token and verifies that it is the given delimiter. func (r *Lexer) Delim(c byte) { if r.token.kind == tokenUndef && r.Ok() { r.FetchToken() } if !r.Ok() || r.token.delimValue != c { r.consume() // errInvalidToken can change token if UseMultipleErrors is enabled. r.errInvalidToken(string([]byte{c})) } else { r.consume() } } // IsDelim returns true if there was no scanning error and next token is the given delimiter. func (r *Lexer) IsDelim(c byte) bool { if r.token.kind == tokenUndef && r.Ok() { r.FetchToken() } return !r.Ok() || r.token.delimValue == c } // Null verifies that the next token is null and consumes it. func (r *Lexer) Null() { if r.token.kind == tokenUndef && r.Ok() { r.FetchToken() } if !r.Ok() || r.token.kind != tokenNull { r.errInvalidToken("null") } r.consume() } // IsNull returns true if the next token is a null keyword. func (r *Lexer) IsNull() bool { if r.token.kind == tokenUndef && r.Ok() { r.FetchToken() } return r.Ok() && r.token.kind == tokenNull } // Skip skips a single token. func (r *Lexer) Skip() { if r.token.kind == tokenUndef && r.Ok() { r.FetchToken() } r.consume() } // SkipRecursive skips next array or object completely, or just skips a single token if not // an array/object. // // Note: no syntax validation is performed on the skipped data. func (r *Lexer) SkipRecursive() { r.scanToken() var start, end byte if r.token.delimValue == '{' { start, end = '{', '}' } else if r.token.delimValue == '[' { start, end = '[', ']' } else { r.consume() return } r.consume() level := 1 inQuotes := false wasEscape := false for i, c := range r.Data[r.pos:] { switch { case c == start && !inQuotes: level++ case c == end && !inQuotes: level-- if level == 0 { r.pos += i + 1 return } case c == '\\' && inQuotes: wasEscape = !wasEscape continue case c == '"' && inQuotes: inQuotes = wasEscape case c == '"': inQuotes = true } wasEscape = false } r.pos = len(r.Data) r.fatalError = &LexerError{ Reason: "EOF reached while skipping array/object or token", Offset: r.pos, Data: string(r.Data[r.pos:]), } } // Raw fetches the next item recursively as a data slice func (r *Lexer) Raw() []byte { r.SkipRecursive() if !r.Ok() { return nil } return r.Data[r.start:r.pos] } // IsStart returns whether the lexer is positioned at the start // of an input string. func (r *Lexer) IsStart() bool { return r.pos == 0 } // Consumed reads all remaining bytes from the input, publishing an error if // there is anything but whitespace remaining. func (r *Lexer) Consumed() { if r.pos > len(r.Data) || !r.Ok() { return } for _, c := range r.Data[r.pos:] { if c != ' ' && c != '\t' && c != '\r' && c != '\n' { r.AddError(&LexerError{ Reason: "invalid character '" + string(c) + "' after top-level value", Offset: r.pos, Data: string(r.Data[r.pos:]), }) return } r.pos++ r.start++ } } func (r *Lexer) unsafeString() (string, []byte) { if r.token.kind == tokenUndef && r.Ok() { r.FetchToken() } if !r.Ok() || r.token.kind != tokenString { r.errInvalidToken("string") return "", nil } bytes := r.token.byteValue ret := bytesToStr(r.token.byteValue) r.consume() return ret, bytes } // UnsafeString returns the string value if the token is a string literal. // // Warning: returned string may point to the input buffer, so the string should not outlive // the input buffer. Intended pattern of usage is as an argument to a switch statement. func (r *Lexer) UnsafeString() string { ret, _ := r.unsafeString() return ret } // UnsafeBytes returns the byte slice if the token is a string literal. func (r *Lexer) UnsafeBytes() []byte { _, ret := r.unsafeString() return ret } // String reads a string literal. func (r *Lexer) String() string { if r.token.kind == tokenUndef && r.Ok() { r.FetchToken() } if !r.Ok() || r.token.kind != tokenString { r.errInvalidToken("string") return "" } ret := string(r.token.byteValue) r.consume() return ret } // Bytes reads a string literal and base64 decodes it into a byte slice. func (r *Lexer) Bytes() []byte { if r.token.kind == tokenUndef && r.Ok() { r.FetchToken() } if !r.Ok() || r.token.kind != tokenString { r.errInvalidToken("string") return nil } ret := make([]byte, base64.StdEncoding.DecodedLen(len(r.token.byteValue))) len, err := base64.StdEncoding.Decode(ret, r.token.byteValue) if err != nil { r.fatalError = &LexerError{ Reason: err.Error(), } return nil } r.consume() return ret[:len] } // Bool reads a true or false boolean keyword. func (r *Lexer) Bool() bool { if r.token.kind == tokenUndef && r.Ok() { r.FetchToken() } if !r.Ok() || r.token.kind != tokenBool { r.errInvalidToken("bool") return false } ret := r.token.boolValue r.consume() return ret } func (r *Lexer) number() string { if r.token.kind == tokenUndef && r.Ok() { r.FetchToken() } if !r.Ok() || r.token.kind != tokenNumber { r.errInvalidToken("number") return "" } ret := bytesToStr(r.token.byteValue) r.consume() return ret } func (r *Lexer) Uint8() uint8 { s := r.number() if !r.Ok() { return 0 } n, err := strconv.ParseUint(s, 10, 8) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: s, }) } return uint8(n) } func (r *Lexer) Uint16() uint16 { s := r.number() if !r.Ok() { return 0 } n, err := strconv.ParseUint(s, 10, 16) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: s, }) } return uint16(n) } func (r *Lexer) Uint32() uint32 { s := r.number() if !r.Ok() { return 0 } n, err := strconv.ParseUint(s, 10, 32) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: s, }) } return uint32(n) } func (r *Lexer) Uint64() uint64 { s := r.number() if !r.Ok() { return 0 } n, err := strconv.ParseUint(s, 10, 64) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: s, }) } return n } func (r *Lexer) Uint() uint { return uint(r.Uint64()) } func (r *Lexer) Int8() int8 { s := r.number() if !r.Ok() { return 0 } n, err := strconv.ParseInt(s, 10, 8) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: s, }) } return int8(n) } func (r *Lexer) Int16() int16 { s := r.number() if !r.Ok() { return 0 } n, err := strconv.ParseInt(s, 10, 16) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: s, }) } return int16(n) } func (r *Lexer) Int32() int32 { s := r.number() if !r.Ok() { return 0 } n, err := strconv.ParseInt(s, 10, 32) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: s, }) } return int32(n) } func (r *Lexer) Int64() int64 { s := r.number() if !r.Ok() { return 0 } n, err := strconv.ParseInt(s, 10, 64) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: s, }) } return n } func (r *Lexer) Int() int { return int(r.Int64()) } func (r *Lexer) Uint8Str() uint8 { s, b := r.unsafeString() if !r.Ok() { return 0 } n, err := strconv.ParseUint(s, 10, 8) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: string(b), }) } return uint8(n) } func (r *Lexer) Uint16Str() uint16 { s, b := r.unsafeString() if !r.Ok() { return 0 } n, err := strconv.ParseUint(s, 10, 16) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: string(b), }) } return uint16(n) } func (r *Lexer) Uint32Str() uint32 { s, b := r.unsafeString() if !r.Ok() { return 0 } n, err := strconv.ParseUint(s, 10, 32) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: string(b), }) } return uint32(n) } func (r *Lexer) Uint64Str() uint64 { s, b := r.unsafeString() if !r.Ok() { return 0 } n, err := strconv.ParseUint(s, 10, 64) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: string(b), }) } return n } func (r *Lexer) UintStr() uint { return uint(r.Uint64Str()) } func (r *Lexer) UintptrStr() uintptr { return uintptr(r.Uint64Str()) } func (r *Lexer) Int8Str() int8 { s, b := r.unsafeString() if !r.Ok() { return 0 } n, err := strconv.ParseInt(s, 10, 8) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: string(b), }) } return int8(n) } func (r *Lexer) Int16Str() int16 { s, b := r.unsafeString() if !r.Ok() { return 0 } n, err := strconv.ParseInt(s, 10, 16) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: string(b), }) } return int16(n) } func (r *Lexer) Int32Str() int32 { s, b := r.unsafeString() if !r.Ok() { return 0 } n, err := strconv.ParseInt(s, 10, 32) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: string(b), }) } return int32(n) } func (r *Lexer) Int64Str() int64 { s, b := r.unsafeString() if !r.Ok() { return 0 } n, err := strconv.ParseInt(s, 10, 64) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: string(b), }) } return n } func (r *Lexer) IntStr() int { return int(r.Int64Str()) } func (r *Lexer) Float32() float32 { s := r.number() if !r.Ok() { return 0 } n, err := strconv.ParseFloat(s, 32) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: s, }) } return float32(n) } func (r *Lexer) Float64() float64 { s := r.number() if !r.Ok() { return 0 } n, err := strconv.ParseFloat(s, 64) if err != nil { r.addNonfatalError(&LexerError{ Offset: r.start, Reason: err.Error(), Data: s, }) } return n } func (r *Lexer) Error() error { return r.fatalError } func (r *Lexer) AddError(e error) { if r.fatalError == nil { r.fatalError = e } } func (r *Lexer) AddNonFatalError(e error) { r.addNonfatalError(&LexerError{ Offset: r.start, Data: string(r.Data[r.start:r.pos]), Reason: e.Error(), }) } func (r *Lexer) addNonfatalError(err *LexerError) { if r.UseMultipleErrors { // We don't want to add errors with the same offset. if len(r.multipleErrors) != 0 && r.multipleErrors[len(r.multipleErrors)-1].Offset == err.Offset { return } r.multipleErrors = append(r.multipleErrors, err) return } r.fatalError = err } func (r *Lexer) GetNonFatalErrors() []*LexerError { return r.multipleErrors } // JsonNumber fetches and json.Number from 'encoding/json' package. // Both int, float or string, contains them are valid values func (r *Lexer) JsonNumber() json.Number { if r.token.kind == tokenUndef && r.Ok() { r.FetchToken() } if !r.Ok() { r.errInvalidToken("json.Number") return json.Number("0") } switch r.token.kind { case tokenString: return json.Number(r.String()) case tokenNumber: return json.Number(r.Raw()) default: r.errSyntax() return json.Number("0") } } // Interface fetches an interface{} analogous to the 'encoding/json' package. func (r *Lexer) Interface() interface{} { if r.token.kind == tokenUndef && r.Ok() { r.FetchToken() } if !r.Ok() { return nil } switch r.token.kind { case tokenString: return r.String() case tokenNumber: return r.Float64() case tokenBool: return r.Bool() case tokenNull: r.Null() return nil } if r.token.delimValue == '{' { r.consume() ret := map[string]interface{}{} for !r.IsDelim('}') { key := r.String() r.WantColon() ret[key] = r.Interface() r.WantComma() } r.Delim('}') if r.Ok() { return ret } else { return nil } } else if r.token.delimValue == '[' { r.consume() var ret []interface{} for !r.IsDelim(']') { ret = append(ret, r.Interface()) r.WantComma() } r.Delim(']') if r.Ok() { return ret } else { return nil } } r.errSyntax() return nil } // WantComma requires a comma to be present before fetching next token. func (r *Lexer) WantComma() { r.wantSep = ',' r.firstElement = false } // WantColon requires a colon to be present before fetching next token. func (r *Lexer) WantColon() { r.wantSep = ':' r.firstElement = false }
{ "pile_set_name": "Github" }
[FTP a file to a server and send the URL to your friend. Supported automatic zipping before upload and encryption via SFTP and FTPS.] [Default FTP server] [Close dialog after upload is completed] [ZIP support] [Enter archive name manually] [Compression level:] [Upload File Manager] [Completed:] [Remaining:] [File Manager] [FTP File Manager] [Deselect All] [Delete from list] [Delete from FTP] [Enter file name] [File exists] [File with the same name already exists on the server.] [How to proceed?] [Copy URL] [Automatically delete file after...] [Delete from List] [Do you really want to cancel all running jobs?] [FTP Server 1] [FTP Server 2] [FTP Server 3] [FTP Server 4] [FTP Server 5] [FTP Server %d] [Zip and upload file(s)] [Zip and upload folder] [FTP File manager] [Show FTPFile manager] [Upload file] [Zip and upload file] [You have to fill FTP server setting before upload a file.] [Error has occurred while trying to create a dialog!] [FTP File - Select a folder] [Folder not found!] [The selected folder does not contain any files.\nFTP File sends files only from the selected folder, not from subfolders.] [Error occurred when zipping the file(s).] [%0.1f kB/s] [%0.1f%% (%d kB/%d kB)] [%s (%d kB/%d kB)] [Do you really want to cancel this upload?] [Status: %s\r\nFile: %s\r\nServer: %S] [File exists - %s] [Error occurred when opening local file.\nAborting file upload...] [Error occurred when initializing libcurl.\nAborting file upload...] [FTP error occurred.\n%s] [Download link:] [Do you really want to cancel running upload?] [%s\r\nSpeed: %s\r\nCompleted: %s\r\nRemaining: %s] [You have to fill and enable at least one FTP server in setting.] [FTP+SSL (Explicit)] [FTP+SSL (Implicit)] [SFTP (Secure FTP over SSH)]
{ "pile_set_name": "Github" }
Odontogenic tumors: analysis of 127 cases. One hundred and twenty-seven cases of histologically confirmed odontogenic tumors were retrieved from a total of 5,289 oral and maxillary lesions diagnosed at the Division of Oral Pathology, Federal University of Rio Grande do Norte, during a period of 30 years (1970-1999). The most common histological diagnosis was odontoma (50.40%), followed by ameloblastoma (30.70%). The prevalence of odontogenic tumors was greater in females and the peak incidence occurred in the second and third decades of life. The main anatomical location was the mandible, and no malignant tumors were found.
{ "pile_set_name": "PubMed Abstracts" }
House Republicans falsely claim that they have a mandate from voters equal to Obama’s Sunday Jan 6, 2013 at 11:20 AM Dana Milbank NAILS IT: As a new Congress convenes, it has become an unquestioned truth among Republicans that their party has as much of a mandate as President Obama because voters returned them to power in the House The mantra has been intoned by John Boehner, Paul Ryan, Mitch McConnell, Newt Gingrich, Grover Norquist and many other party eminences, and there is a certain logic to saying that the voters, by giving Republicans the House, were asking for divided government. But the claim to represent the voters’ will doesn’t add up. The final results from the November election were ... Read more Pat Cunningham Dana Milbank NAILS IT: As a new Congress convenes, it has become an unquestioned truth among Republicans that their party has as much of a mandate as President Obama because voters returned them to power in the House The mantra has been intoned by John Boehner, Paul Ryan, Mitch McConnell, Newt Gingrich, Grover Norquist and many other party eminences, and there is a certain logic to saying that the voters, by giving Republicans the House, were asking for divided government. Original content available for non-commercial use under a Creative Commons license, except where noted. Crookston Times - Crookston, MN ~ 124 South Broadway, Crookston, MN 56716 ~ Privacy Policy ~ Terms Of Service
{ "pile_set_name": "Pile-CC" }
// // "$Id: Fl_Widget.H 5982 2007-11-19 16:21:48Z matt $" // // Widget header file for the Fast Light Tool Kit (FLTK). // // Copyright 1998-2005 by Bill Spitzak and others. // // This library is free software; you can redistribute it and/or // modify it under the terms of the GNU Library General Public // License as published by the Free Software Foundation; either // version 2 of the License, or (at your option) any later version. // // This library is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU // Library General Public License for more details. // // You should have received a copy of the GNU Library General Public // License along with this library; if not, write to the Free Software // Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 // USA. // // Please report all bugs and problems on the following page: // // http://www.fltk.org/str.php // #ifndef Fl_Widget_H #define Fl_Widget_H #include "Enumerations.H" class Fl_Widget; class Fl_Window; class Fl_Group; class Fl_Image; typedef void (Fl_Callback )(Fl_Widget*, void*); typedef Fl_Callback* Fl_Callback_p; // needed for BORLAND typedef void (Fl_Callback0)(Fl_Widget*); typedef void (Fl_Callback1)(Fl_Widget*, long); struct FL_EXPORT Fl_Label { const char* value; Fl_Image* image; Fl_Image* deimage; uchar type; uchar font; uchar size; unsigned color; void draw(int,int,int,int, Fl_Align) const ; void measure(int&, int&) const ; }; class FL_EXPORT Fl_Widget { friend class Fl_Group; Fl_Group* parent_; Fl_Callback* callback_; void* user_data_; short x_,y_,w_,h_; Fl_Label label_; int flags_; unsigned color_; unsigned color2_; uchar type_; uchar damage_; uchar box_; uchar align_; uchar when_; const char *tooltip_; // unimplemented copy ctor and assignment operator Fl_Widget(const Fl_Widget &); Fl_Widget& operator=(const Fl_Widget &); protected: Fl_Widget(int,int,int,int,const char* =0); void x(int v) {x_ = (short)v;} void y(int v) {y_ = (short)v;} void w(int v) {w_ = (short)v;} void h(int v) {h_ = (short)v;} int flags() const {return flags_;} void set_flag(int c) {flags_ |= c;} void clear_flag(int c) {flags_ &= ~c;} enum {INACTIVE=1, INVISIBLE=2, OUTPUT=4, SHORTCUT_LABEL=64, CHANGED=128, VISIBLE_FOCUS=512, COPIED_LABEL = 1024}; void draw_box() const; void draw_box(Fl_Boxtype, Fl_Color) const; void draw_box(Fl_Boxtype, int,int,int,int, Fl_Color) const; void draw_focus() {draw_focus(box(),x(),y(),w(),h());} void draw_focus(Fl_Boxtype, int,int,int,int) const; void draw_label() const; void draw_label(int, int, int, int) const; public: virtual ~Fl_Widget(); virtual void draw() = 0; virtual int handle(int); Fl_Group* parent() const {return parent_;} void parent(Fl_Group* p) {parent_ = p;} // for hacks only, Fl_Group::add() uchar type() const {return type_;} void type(uchar t) {type_ = t;} int x() const {return x_;} int y() const {return y_;} int w() const {return w_;} int h() const {return h_;} virtual void resize(int,int,int,int); int damage_resize(int,int,int,int); void position(int X,int Y) {resize(X,Y,w_,h_);} void size(int W,int H) {resize(x_,y_,W,H);} Fl_Align align() const {return (Fl_Align)align_;} void align(uchar a) {align_ = a;} Fl_Boxtype box() const {return (Fl_Boxtype)box_;} void box(Fl_Boxtype a) {box_ = a;} Fl_Color color() const {return (Fl_Color)color_;} void color(unsigned a) {color_ = a;} Fl_Color selection_color() const {return (Fl_Color)color2_;} void selection_color(unsigned a) {color2_ = a;} void color(unsigned a, unsigned b) {color_=a; color2_=b;} const char* label() const {return label_.value;} void label(const char* a); void copy_label(const char* a); void label(Fl_Labeltype a,const char* b) {label_.type = a; label_.value = b;} Fl_Labeltype labeltype() const {return (Fl_Labeltype)label_.type;} void labeltype(Fl_Labeltype a) {label_.type = a;} Fl_Color labelcolor() const {return (Fl_Color)label_.color;} void labelcolor(unsigned a) {label_.color=a;} Fl_Font labelfont() const {return (Fl_Font)label_.font;} void labelfont(uchar a) {label_.font=a;} uchar labelsize() const {return label_.size;} void labelsize(uchar a) {label_.size=a;} Fl_Image* image() {return label_.image;} void image(Fl_Image* a) {label_.image=a;} void image(Fl_Image& a) {label_.image=&a;} Fl_Image* deimage() {return label_.deimage;} void deimage(Fl_Image* a) {label_.deimage=a;} void deimage(Fl_Image& a) {label_.deimage=&a;} const char *tooltip() const {return tooltip_;} void tooltip(const char *t); Fl_Callback_p callback() const {return callback_;} void callback(Fl_Callback* c, void* p) {callback_=c; user_data_=p;} void callback(Fl_Callback* c) {callback_=c;} void callback(Fl_Callback0*c) {callback_=(Fl_Callback*)c;} void callback(Fl_Callback1*c, long p=0) {callback_=(Fl_Callback*)c; user_data_=(void*)p;} void* user_data() const {return user_data_;} void user_data(void* v) {user_data_ = v;} long argument() const {return (long)user_data_;} void argument(long v) {user_data_ = (void*)v;} Fl_When when() const {return (Fl_When)when_;} void when(uchar i) {when_ = i;} int visible() const {return !(flags_&INVISIBLE);} int visible_r() const; void show(); void hide(); void set_visible() {flags_ &= ~INVISIBLE;} void clear_visible() {flags_ |= INVISIBLE;} int active() const {return !(flags_&INACTIVE);} int active_r() const; void activate(); void deactivate(); int output() const {return (flags_&OUTPUT);} void set_output() {flags_ |= OUTPUT;} void clear_output() {flags_ &= ~OUTPUT;} int takesevents() const {return !(flags_&(INACTIVE|INVISIBLE|OUTPUT));} int changed() const {return flags_&CHANGED;} void set_changed() {flags_ |= CHANGED;} void clear_changed() {flags_ &= ~CHANGED;} int take_focus(); void set_visible_focus() { flags_ |= VISIBLE_FOCUS; } void clear_visible_focus() { flags_ &= ~VISIBLE_FOCUS; } void visible_focus(int v) { if (v) set_visible_focus(); else clear_visible_focus(); } int visible_focus() { return flags_ & VISIBLE_FOCUS; } static void default_callback(Fl_Widget*, void*); void do_callback() {callback_(this,user_data_); if (callback_ != default_callback) clear_changed();} void do_callback(Fl_Widget* o,void* arg=0) {callback_(o,arg); if (callback_ != default_callback) clear_changed();} void do_callback(Fl_Widget* o,long arg) {callback_(o,(void*)arg); if (callback_ != default_callback) clear_changed();} int test_shortcut(); static char label_shortcut(const char *t); static int test_shortcut(const char*); int contains(const Fl_Widget*) const ; int inside(const Fl_Widget* o) const {return o ? o->contains(this) : 0;} void redraw(); void redraw_label(); uchar damage() const {return damage_;} void clear_damage(uchar c = 0) {damage_ = c;} void damage(uchar c); void damage(uchar c,int,int,int,int); void draw_label(int, int, int, int, Fl_Align) const; void measure_label(int& xx, int& yy) {label_.measure(xx,yy);} Fl_Window* window() const ; // back compatability only: Fl_Color color2() const {return (Fl_Color)color2_;} void color2(unsigned a) {color2_ = a;} }; // reserved type numbers (necessary for my cheapo RTTI) start here. // grep the header files for "RESERVED_TYPE" to find the next available // number. #define FL_RESERVED_TYPE 100 #endif // // End of "$Id: Fl_Widget.H 5982 2007-11-19 16:21:48Z matt $". //
{ "pile_set_name": "Github" }
**New for 2016. LG Electronic’s OLED65B6P 65-inch Flat 4K OLED TV is LG’s highly rated 65-inch B6 Series 4K Ultra HD TV. An OLED TV gives you many advantages over LCD and LED TVs. The black levels of OLED TVs are the best of all screen technologies. The viewing angles are fantastic, with no loss of contrast. Another advantage is speed, which is important when viewing fast moving action. OLED is many times faster than LED and LCD displays (0.1 microseconds refresh). There are no backlights as each pixel is self illuminating. LG is the leader in OLED TVs. Not only is this an OLED TV, but also a 4K Ultra HD TV with over 8 million pixels of resolution. This is four times the resolution of Full HD, giving you a stunning sharp picture. Most TVs have a 3 color pixel. LG has added a fourth, a white sub-pixel to the conventional three colors (red, green and blue). This technology will enhance the color range and accuracy for more realistic colors. New for 2016, the LG OLED65B6P B6 Series includes HDR technology with HDR10 & Dolby Vision. This technology will give you a brighter picture with colors that pop, and better dynamic range. This model also includes both an HEVC(H.265) and VP9 decoder for 4K streaming video from online providers such as Netflix and Amazon. Use the Bluetooth® wireless audio streaming to speakers or headphones. Upgraded Quad Core Processor, WebOS 3.0, Magic Remote, Built-in WiFi. …More…Available Sizes: 55-inch and 65-inch **New for 2016. LG Electronic’s OLED55B6P 55-inch Flat 4K OLED TV is LG’s highly rated 55-inch 4K Ultra HD TV. An OLED TV gives you many advantages over LCD and LED TVs. The black levels of OLED TVs are the best of all screen technologies. The viewing angles are fantastic, with no loss of contrast. Another advantage is speed, which is important when viewing fast moving action. OLED is many times faster than LED and LCD displays (0.1 microseconds refresh). There are no backlights as each pixel is self illuminating. LG is the leader in OLED TVs. Not only is this an OLED TV, but also a 4K Ultra HD TV with over 8 million pixels of resolution. This is four times the resolution of Full HD, giving you a stunning sharp picture. Most TVs have a 3 color pixel. LG has added a fourth, a white sub-pixel to the conventional three colors (red, green and blue). This technology will enhance the color range and accuracy for more realistic colors. New for 2016, the LG OLED55B6P B6 Series includes HDR technology with HDR10 & Dolby Vision. This technology will give you a brighter picture with colors that pop, and better dynamic range. This model also includes both an HEVC(H.265) and VP9 decoder for 4K streaming video from online providers such as Netflix and Amazon. Use the Bluetooth® wireless audio streaming to speakers or headphones. Upgraded Quad Core Processor, WebOS 3.0, Magic Remote, Built-in WiFi. …More…Available Sizes: 55-inch and 65-inch
{ "pile_set_name": "Pile-CC" }
Q: 2 UIAlertView one after the other I have an 2 UIAlert which is displayed I press on a button. I want the 2nd alert to be visible only when the first UIAlert is dismissed that is when we have pressed the first OK button. How should I proceed please? Below is my code: - (IBAction)button:(id)sender { UIAlertView *view; view = [[UIAlertView alloc] initWithTitle: @"Message" message: @"Adding..." delegate: self cancelButtonTitle: @"OK" otherButtonTitles: nil]; [view show]; MyAppAppDelegate *appDelegate = (MyAppAppDelegate *)[[UIApplication sharedApplication] delegate]; if (appDelegate.array_presets.count) { view = [[UIAlertView alloc] initWithTitle: @"Message" message: @"limit already reached" delegate: self cancelButtonTitle: @"OK" otherButtonTitles: nil]; [view show]; } [view autorelease]; } A: Use different tags for your two alert views. alertView.tag = 1000; Implement the alert view delegate method and check for the tag value. When the delegate gets called with the first alert view create and show the second alert view. - (void)alertView:(UIAlertView *)alertView didDismissWithButtonIndex:(NSInteger)buttonIndex { if(alertView.tag == 1000) { //first alert view's button clicked UIAlertView *view = [[UIAlertView alloc] initWithTitle: @"Message" message: @"limit already reached" delegate: self cancelButtonTitle: @"OK" otherButtonTitles: nil]; view.tag = 2000; [view show]; } if(alertView.tag == 2000) { //handle second alert view's button action } }
{ "pile_set_name": "StackExchange" }
{ "culture": "tr", "texts": { "DisplayName:Abp.Mailing.DefaultFromAddress": "Varsayılan gönderici adresi", "DisplayName:Abp.Mailing.DefaultFromDisplayName": "Varsayılan gönderici adı", "DisplayName:Abp.Mailing.Smtp.Host": "Sunucu", "DisplayName:Abp.Mailing.Smtp.Port": "Port", "DisplayName:Abp.Mailing.Smtp.UserName": "Kullanıcı adı", "DisplayName:Abp.Mailing.Smtp.Password": "Şifre", "DisplayName:Abp.Mailing.Smtp.Domain": "Domain", "DisplayName:Abp.Mailing.Smtp.EnableSsl": "SSL aktif", "DisplayName:Abp.Mailing.Smtp.UseDefaultCredentials": "Varsayılan kimlik kullan", "Description:Abp.Mailing.DefaultFromAddress": "Varsayılan gönderici adresi", "Description:Abp.Mailing.DefaultFromDisplayName": "Varsayılan gönderici adı", "Description:Abp.Mailing.Smtp.Host": "SMTP üzerinden e-posta göndermek için kullanılacak sunucunun IP adresi ya da adı.", "Description:Abp.Mailing.Smtp.Port": "Sunucunun SMTP portu.", "Description:Abp.Mailing.Smtp.UserName": "Varsayılan kimlik kullanılmaması durumunda kullanılacak kullanıcı adı.", "Description:Abp.Mailing.Smtp.Password": "Varsayılan kimlik kullanılmaması durumunda kullanılacak şifre.", "Description:Abp.Mailing.Smtp.Domain": "Kimlik bilgilerinin doğrulanacağı sunucu/domain.", "Description:Abp.Mailing.Smtp.EnableSsl": "Email gönderiminde SSL kullanılıp kullanılmayacağı.", "Description:Abp.Mailing.Smtp.UseDefaultCredentials": "Varsayılan kimlik bilgilerinin kullanılıp kullanılmayacağı.", "TextTemplate:StandardEmailTemplates.Layout": "Varsayılan e-posta layout şablonu", "TextTemplate:StandardEmailTemplates.Message": "Basit bir mesaj göndermek için e-posta şablonu" } }
{ "pile_set_name": "Github" }
Science Religion and Dogma I ran across an article the other day where the writer quoted Physicist Beverly Rubik Ph.D., Director of the Center for Frontier Sciences at Temple University in Philadelphia. I liked what she had to say and thought it pertained to our discussions on homeopathy: “Perhaps the greatest obstacle that frontier scientists are unprepared for but inevitably face is political – the tendency for human systems to resist change, to resist the impact of new discoveries, especially those that challenge the status quo of the scientific establishment … … “Science” has become institutionalized and is largely regulated by an establishment community that governs and maintains itself … In recent times there has been a narrowing of perspectives resulting in a growing dogmatism, a dogmatic scientism. There is arrogance bordering on worship of contemporary scientific concepts and models … taught in our schools in a deadening way which only serves to perpetrate the dogma … Strangely, the contemporary scientific establishment has taken on the behavior of one of its early oppressors: the church. Priests in white lab coats work in glass-and-steel cathedral-like laboratories, under the rule of bishops and cardinals who maintain orthodoxy through mainstream “peer review”.” It is interesting that she makes a religious analogy when so very often the critics of homeopathy suggest that adhering to Hahnemann’s teachings smacks of religious dogma. Maybe their accusations are projection.
{ "pile_set_name": "Pile-CC" }
Q: Rehosted Workflow Designer throws TypeLoadException upon Load I'm trying to rehost the workflow designer in my WPF app. However, when I try to initialise it I get a TypeLoadException dialog with the following message: "Could not load type 'Reporting.Primitives.Documents.IDocField`1' from assembly 'Reporting.Primitives, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null'." I've tried stripping it down and have gotten to the simple invocation code here: var wnd = new Window(); var grid = new Grid(); wnd.Content = grid; var met = new DesignerMetadata(); met.Register(); var d = new WorkflowDesigner(); d.Load(new Sequence()); grid.Children.Add(d.View); wnd.Show(); It is the call to Load that causes the exception. Here's the weird part: There's no type in the solution called IDocField<T>. There's an IDocField and a DocField<T> : IDocField, so it seems to be inventing this IDocField<T> type from somewhere. I don't have any reflection calls looking for an IDocField<T> either. I've also tried moving this code around the app into various modules that aren't directly referencing Reporting.Primitives to no avail. There is an IUiDocField<T> interface floating around. Curiously enough, I did write an interface IDocField<T> some time ago, but it's not in the solution now, so I don't see why it would be causing problems. A: As usual It's always your (my) fault. The app pulls in plugins via a directory using reflection, and it appears there was an old dll in there that was referencing the IDocField<T> interface. It would seem that this wasn't a problem until the workflow designer attempted to probe the assembly for type information that something finally noticed it was referencing something that wasn't there! facepalm
{ "pile_set_name": "StackExchange" }
876 F.2d 103 Unpublished DispositionNOTICE: Sixth Circuit Rule 24(c) states that citation of unpublished dispositions is disfavored except for establishing res judicata, estoppel, or the law of the case and requires service of copies of cited unpublished dispositions of the Sixth Circuit.Alfonzo JONES, Plaintiff-Appellant,v.Ms. Eileen PEOPLES; Ms. Z. Ryans; Ms. Y. Jones,Defendants-Appellees. No. 88-2212. United States Court of Appeals, Sixth Circuit. June 13, 1989. 1 Before RALPH B. GUY and RYAN, Circuit Judges and DAVID D. DOWD, Jr., District Judge.* ORDER 2 Alfonzo Jones, a pro se Michigan plaintiff, appeals the district court's order dismissing his civil rights action apparently filed under 42 U.S.C. Sec. 1983. The case has been referred to a panel of the court pursuant to Rule 9(a), Rules of the Sixth Circuit. Upon examination of the record and briefs, this panel unanimously agrees that oral argument is not needed. Fed.R.App.P. 34(a). 3 Seeking monetary relief in the amount of 250 billion dollars, Jones sued three employees of the Michigan Department of Social Services (DSS), alleging a constitutional violation relating to the denial of certain welfare benefits. Subsequent to DSS's denial of Jones' request for the benefits, an Administrative Law Judge (ALJ) affirmed DSS's denial of the same. Jones filed the instant claim which the district court dismissed as frivolous, Jones appealed. 4 Upon consideration, we conclude that the district court properly dismissed the complaint as frivolous. Even if Jones' complaint is construed liberally, Haines v. Kerner, 404 U.S. 519, 520-21 (1972) (per curiam); Brooks v. Seiter, 779 F.2d 1177, 1179-80 (6th Cir.1985), it appears beyond doubt that Jones could prove no set of facts which would entitle him to relief. See Ana Leon T. v. Federal Reserve Bank, 823 F.2d 928, 930 (6th Cir.) (per curiam), cert. denied, 108 S.Ct. 333 (1987). Although Jones asserted the existence of a constitutional violation, he never addressed even the basic elements of any cause of action. Hence, having failed to allege any factual basis for his conclusory allegations of unconstitutional conduct, Jones failed to state a cognizable claim for relief. See Morgan v. Church's Fried Chicken, 829 F.2d 10, 12 (6th Cir.1987); Chapman v. City of Detroit, 808 F.2d 459, 465 (6th Cir.1986). 5 Accordingly, the order of the district court is hereby affirmed. Rule 9(b)(5), Rules of the Sixth Circuit. * The Honorable David D. Dowd, Jr., U.S. District Judge for the Northern District of Ohio, sitting by designation
{ "pile_set_name": "FreeLaw" }
Thermal behavior of biodegraded lime wood. The effects of the soft-rot fungus Trichoderma viride Pers., on the thermal behavior of lime wood (Tillia cordata Mill.) were investigated. The lime wood pieces were inoculated with the fungus over a 12-week period. At pre-established time intervals two samples were withdrawn from the medium and analyzed by thermogravimetry and differential calorimetry, and the results were correlated with mass loss. Fungal activity was indicated by continuous decrease of sample mass. Modification of the wood because of the presence of the fungus was evidenced by structural changes that affected its thermal properties, both in respect to the hydrophilicity of the wood (evidenced mainly in desorption process) and in its decomposition behavior. The shape of DTG curves depends on the exposure time of wood to the action of microorganisms. The peak temperature assigned to the decomposition of wood components increases, while the global kinetic parameters for the main peak decrease with increasing exposure time of the wood to the attack by microorganisms. The increased characteristic temperatures of water desorption and cellulose decomposition processes and lower thermal stability could be explained by newly formed structures, mainly the oxidized ones.
{ "pile_set_name": "PubMed Abstracts" }
Q: Disable a button for a particular tab I have two tabs:- <div class="modal-body"> <form name="myForm" novalidate="novalidate"> <ul class="nav nav-tabs"> <li class="active"><a data-toggle="tab" href="#basicInfo">Info</a></li> <li><a data-toggle="tab" href="#view">View Details</a></li> </ul> <div class="tab-content"> <div id="basicInfo" class="tab-pane fade in active modal-table-div"> ..... </div> <div id="view" class="tab-pane modal-table-div fade"> ..... </div> </div> And a Delete and Add button button: <div class="modal-footer"> <button type="button" class="btn btn-danger">Delete</button> <button type="button" class="btn btn-success">Add</button> </div> What I want is when I click on the 'view details' tab the delete button and add button got disabled and viceversa.How should I achieve that? A: I would add a class diableButton to the link that shall trigger the disable function, use the code below. This line $(this).find("a").hasClass("diableButton") will then ask if our link has the class. $('.nav-tabs li').click(function() { if ($(this).find("a").hasClass("diableButton")) { $('.modal-footer button').prop("disabled", true); } else { $('.modal-footer button').prop("disabled", false); } }) <script src="https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js"></script> <script src="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js"></script> <link href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css" rel="stylesheet" /> <div class="modal-body"> <form name="myForm" novalidate="novalidate"> <ul class="nav nav-tabs"> <li class="active"><a data-toggle="tab" href="#basicInfo">Info</a></li> <li><a data-toggle="tab" class="diableButton" href="#view">View Details</a></li> </ul> <div class="tab-content"> <div id="basicInfo" class="tab-pane fade in active modal-table-div"> ..... </div> <div id="view" class="tab-pane modal-table-div fade"> ..... </div> </div> <div class="modal-footer"> <button type="button" class="btn btn-danger">Delete</button> <button type="button" class="btn btn-success">Add</button> </div>
{ "pile_set_name": "StackExchange" }
We just loved the re-designed iOS 7 which was released earlier this week and we are sure it will attract many people to buy the Apple iPhone running on the amazing iOS 7. Check out the the new features and design here – iOS 7 Features If you are one of the new iPhone users, then this post is just for you. Check out these must have applications on your new iPhone for 2013: Google Search for iPhone is not only a simple app to explore the world’s biggest search engine, but it a package containing various extremely useful apps and features. The Voice feature allows you to search by speaking your query, and believe us that it works perfectly, leaving Apple’s voice assistant Siri far behind. Google Goggles allow you to search about something by simply clicking a picture of that thing. So in case you have no idea about a product or anything, just click a picture and Google it. Another new feature is the Google Now, which gives you updates and information when you want it and get answers before you ask. Yes, we know that it’s a paid application but occasionally it is available for free on the AppStore and this is an application which we cannot miss. WhatsApp Messenger is the most popular cross-platform instant messaging application for smartphones. It allows you to send texts, voice messages, images, videos and locations to your friends and family who have WhatsApp Messenger installed on their smartphones. It is the biggest competitor to the Blackberry Messenger (BBM). It is the number one app on the AppStore and is available for various mobile platforms including iOS, Android, Blackberry, Windows Phone, Nokia Symbian, Nokia S40. Viber allows you to call, text and send photos/videos worldwide – for free! Similar to WhatsApp Messenger, it doesn’t require you add anyone to your friends list. The best part is free calling with HD sound quality, call anyone accross the globe for free. The only thing required by both of you is Viber and a working internet connection i.e. WiFi or Data Services(2G/3G/4G). This free software also gives you message and missed call alerts, even if Viber or your internet is off. Another amazing thing is that Viber is available for your PC too. So in case if you wish to call anybody who doesn’t have a smartphone, just ask him to download Viber for their laptop or PC from here – Download Viber for PC. Never get lost again because now you can get the world maps in your pocket. Google Maps are the most comprehensive, accurate and easy to use maps, which are linked to Google’s search engine. Get voice guided and turn-by-turn directions while you are travelling by your own car, public transport or while walking. You can sync with your computer’s maps with your iPhone by simply signing-in to your account and can also discover places to eat, drink and shop. These maps will guide you even in the remotest areas across the globe. Truecaller is the world’s largest collaborative phone directory which allows you to find people anywhere in the world by looking up their phone number or name. This free software also gives you suggestions about the people whom you may know and whose number is not saved on your phone. Truecaller can be used to know the name of any stalker or person who is unnecessarily calling or messaging you. It also helps you to know who called if you weren’t available to take the call. Just copy the number from your call history and look it up in the Truecaller app. What’s the most annoying thing about Apple’s Safari browser? Yes, it’s the inability to run flash-based websites, videos and animations. Adobe flash player for iPhone is not available on the AppStore, but you can still run these flash-based websites using the Puffin Web Browser. Apple may not release the flash player for iOS in the coming future because the flash-based applications pose a great threat to the AppStore. Zomato is very popular website among the foodies which provides information, menu, photographs and rating of a large number of restaurants, pubs, bars and lounges in India, United Kingdom, U.A.E., Philippines, Qatar etc. They are expanding their base in different countries and provide you with all information about any food joint directly on your phone. You can simply search for a place, locality or cuisine or allow Zomato to suggest you some good places. The app is linked with Google Maps and allows you to easily navigate to your favorite food joint. You may even call the place by click of a button. Zomato is a must-have application on your iPhone in case you are a food lover. We are sure there are free software and applications which you love and want to recommend to others, do let us know in the comments below.
{ "pile_set_name": "Pile-CC" }
"Permethrin is all natural," said Travis McAlpin, Senior VP of Getting Ticked Apparel, "It's the same stuff you would use for lice shampoo or you would put on your dog to keep wood ticks and such off of him and fleas." Getting Ticked Apparel uses a company called Insect Shield to treat their clothing. The treated clothing keeps the insects away for 70 washes. The McAlpins started their business after Kevin McAlpin started using the treated clothing at his utility work apparel company. "So Insect Shield partnered with them and they went ahead and started providing it for people," said Mark McAlpin, Midwest Regional VP for Getting Ticked Apparel, "We [the McAlpins] decided well, why not? Why can't we provide it for people like us; the fisherman, the camper, the landscaper?" The McAlpins say they want to expand their line to include more women's clothing and garments for dogs. "I do a lot of camping and what's nice is it brought the enjoyment back to it," said Mark. Ticked Off Apparel is available at Big B's Bait & Tackle in Plymouth. You can also find it online, by clicking here, or by contacting Mark McAlpin at tickedoffclothing14@gmail.com.
{ "pile_set_name": "Pile-CC" }
Q: Clang Cannot Find Conversion Operator In the following code clang complains that there exist no conversion operator: class A{ public: operator int () const {return i;} A(int i_): i(i_) {} template<class B> friend auto operator * (const B& l, A&& r) -> decltype(l * int(std::move(r))){ return l * int(std::move(r)); } int i; }; This happens with all clang versions 6-9, see https://godbolt.org/z/ELuRHp. The error message is as follows: <source>:11:19: error: cannot convert 'typename std::remove_reference<A &>::type' (aka 'A') to 'int' without a conversion operator -> decltype(l * int(std::move(r))){ ^~~~~~~~~~~~~~~~ The same code compiles with gcc 7-9 just fine, so I'm wondering if this is a bug in clang or maybe the code is not correct. Edit: A shorter version of the same error, which was provided by @daniel-langr, can be found here https://godbolt.org/z/Krnh27. The original code example is a simplified version of a class in our code base, hence the unnecessary decltype. A: This looks like a clang bug. From unqualified name lookup: For a name used anywhere in class definition (including base class specifiers and nested class definitions), except inside a member function body, a default argument of a member function, exception specification of a member function, or default member initializer, where the member may belong to a nested class whose definition is in the body of the enclosing class, the following scopes are searched: a) the body of the class in which the name is used until the point of use ... According to the above, your user-defined conversion function must be visible in the trailing return type. Here is another example of a member function which works fine on gcc but does not compile on clang. void f(A a, decltype(int(A)) {}
{ "pile_set_name": "StackExchange" }
Q: CSS absolute position alignment I have a login form on my website that displays when a user clicks a button. It is a div that floats over other content. It only takes up a small portion of the page (directly below the sign in link). It all works fine apart from one small thing. It displays aligned to the left of the sign in link (i attempted a diagram below). |sign in| |sign in stuff here| I actually want it to look like this (align to the right of the sign in link):                 |sign in| |sign in stuff here| This is my HTML: <div class="clear"> <a class="button" id="SignInBtn" href="#" onclick="toggleSignInBox(); return false;"><span id="spanSignIn">Sign In / Register <img src="../../Content/shared/arrow_down.png" border="0" /></span></a> </div> <div id="signinbox" style="display:none;"> <p>Who would you like to sign in with?</p> <p>Google</p> <p>Yahoo</p> <p>Other</p> </div> And the CSS for the sign in box: signinbox {background-color:#C1DEEE; padding:10px; z-index:1; position: absolute; top:66px; } Is it possible to do this in just CSS? Thanks A: Wrap the signin info inside another div and call it inner-signin then position that relative to the absolute positioned outter div. You may also have to set the width on the absolute positioned outter div. div.inner-signinbox { position: relative; right: 20px; } signinbox { width: 250px; //ADD A WIDTH background-color:#C1DEEE; padding:10px; z-index:1; position: absolute; top:66px; } If that does not work, why not just add a "left" property to the signingbox to set the horizontal position as well as the vertical. Is there a reason you don't can't absolute position the element with x and y?
{ "pile_set_name": "StackExchange" }
Simultaneous drinking and gambling: a risk factor for pathological gambling. The aim of the current study was to determine the effect of simultaneous drinking and gambling on negative consequences from gambling. Data was analyzed from a national telephone survey of 2631 US residents aged 18 or older. Males were more likely than females to drink while gambling. Simultaneous drinking and gambling was more closely associated with video keno, pull tabs, dice (not in a casino) and casino gambling than with other types of gambling. Those who drank while gambling were more likely to be problem gamblers, even when holding constant frequency of gambling, size of the average win or loss, and average alcohol consumption. Those gamblers who are drinkers, but did not drink while gambling, had a prevalence of problem gambling of close to zero. They had a lower prevalence of problem gambling than gamblers who didn't drink alcohol at all in the past year, and a much lower prevalence than those who drank while gambling. These results were interpreted to mean that simultaneous drinking and gambling is an indicator of a more reckless gambler. The results did not support the theory that gambling while under the influence of alcohol causes more risky gambling behavior.
{ "pile_set_name": "PubMed Abstracts" }
At about 0510 (UTC) on 16 March 2011, Oliva, a Maltese registered bulk carrier ran aground on the north-west coast of Nightingale Island in the Tristan Da Cunha Group. Oliva was on a loaded passage from Santos, Brazil to China. The vessel sustained severe bottom damage to almost all of her water ballast tanks that resulted in the vessel developing a 12º list to port.
{ "pile_set_name": "Pile-CC" }
(See attached file: BAProjects36.doc) - BAProjects36.doc
{ "pile_set_name": "Enron Emails" }
Volodymyr Bahaziy Volodymyr (Vladimir, Wladimir) Panteleimonovych Bahasiy (Bagaziy, Bagasij, Bahasij), (1902, Ryabovka village, Ukraine — 21 February 1942, Kiev, Babyn Yar) was a Ukrainian nationalist affiliated with the Andriy Melnyk's faction of the Organization of Ukrainian Nationalists and head of Kiev City Administration under German occupation in October 1941 - January 1942. He was a professional pedagogue, taught in a Jewish school, and later was a postgraduate student at Kiev Pedagogical Institute. In September 1941, when the Germans occupied Kiev, Oleksandr Ohloblyn who knew him for years invited him at the meeting where representatives of OUN (Andriy Melnyk's faction) formed the new Kiev city administration. Although Bahaziy was supported by a large group, the OUN representatives mistrusted him and agreed to appoint him a deputy to Ohloblyn who became the city mayor. Very soon, however, Bahaziy gained favor of both OUN people (for his active participation in the activities of the Ukrainian National Council) and the German military leaders. Claims that he was personally present during the execution of Jews in Babyn Yar were later proven to be untrue. In October 1941 Ohloblyn retired and Bahaziy was appointed the new Kiev mayor. As mayor of Kiev, Bahaziy encountered the bitter opposition of Erich Koch, the brutal Nazi administrator of Reichskommissariat Ukraine. At a speech before journalists Bahaziy praised OUN leaders and proclaimed that "the eyes of all Ukrainians are turned toward Melnyk." A German officer begged the journalists not to disseminate this remark for fear of inflaming Nazi authorities. In January 1942 he was arrested and accused of various crimes, including: threatening the pro-Russian bishop of Kiev; theft of German property in order to aid the Ukrainian nationalist cause; being a leader of the OUN-M; attempting to secure the control of the Ukrainian police. He was very soon executed in Babyn Yar along with other Ukrainian nationalists, although his wife was left unaware of his death and kept bringing him packages to Kiev prison until summer 1942. References John Armstrong (1963). Ukrainian Nationalism. New York: Columbia University Press, pp. 114–116. Київська влада під німецькою окупацією — in Ukrainian. О. Кучерук. Чин Володимира Багазія (ч. 1) О. Кучерук. Чин Володимира Багазія (ч. 2) О. Кучерук. Чин Володимира Багазія (ч. 3) Category:1902 births Category:1942 deaths Category:People from Volochysk Raion Category:People from Volhynian Governorate Category:Organization of Ukrainian Nationalists politicians Category:Mayors of Kiev Category:Ukrainian collaborators with Nazi Germany Category:Ukrainian nationalists Category:Ukrainian people of World War II Category:Ukrainian politicians before 1991 Category:Holocaust perpetrators in Ukraine Category:Reichskommissariat Ukraine Category:History of Kiev Category:Ukrainian people executed by Nazi Germany
{ "pile_set_name": "Wikipedia (en)" }
Normal or induced secretory patterns of luteinising hormone and follicle-stimulating hormone in anoestrous gonadotrophin-releasing hormone-immunised and cyclic control heifers. The objective was to determine the effect of gonadotrophin-releasing hormone (GnRH), GnRH analogue (GnRH-A) or oestradiol administration on luteinising hormone (LH) and follicle-stimulating hormone (FSH) release in GnRH-immunised anoestrous and control cyclic heifers. Thirty-two heifers (477 +/- 7.1 kg) were immunised against either human serum albumin (HSA; controls; n = 8), or a HSA-GnRH conjugate. On day 70 after primary immunisation, control heifers (n = 4 per treatment; day 3 of cycle) received either (a) 2.5 micrograms GnRH or (b) 2.5 micrograms of GnRH-A (Buserelin) and GnRH-immunised heifers (blocked by GnRH antibody titre; n = 6 per treatment) received either (c) saline, (d) 2.5 micrograms GnRH, (e) 25 micrograms GnRH or (f) 2.5 micrograms GnRH-A, intravenously. On day 105, 1 mg oestradiol was injected (intramuscularly) into control (n = 6) and GnRH-immunised anoestrous heifers with either low (13.4 +/- 1.9% binding at 1:640; n = 6) or high GnRH antibody titres (33.4 +/- 4.8% binding; n = 6). Data were analysed by ANOVA. Mean plasma LH and FSH concentrations on day 69 were higher (P < 0.05) in control than in GnRH-immunised heifers (3.1 +/- 0.16 vs. 2.5 +/- 0.12 ng LH ml-1 and 22.5 +/- 0.73 vs. 17.1 +/- 0.64 ng FSH ml-1, respectively). The number of LH pulses was higher (P < 0.05) in control than in GnRH-immunised heifers on day 69 (3.4 +/- 0.45 and 1.0 +/- 0.26 pulses per 6 h, respectively). On day 70, 2.5 micrograms GnRH increased (P < 0.05) LH concentrations in control but not in GnRH-immunised heifers, while both 25 micrograms GnRH and 2.5 micrograms GnRH-A increased (P < 0.05) LH concentrations in GnRH-immunised heifers, and 2.5 micrograms GnRH-A increased LH in controls. FSH was increased (P < 0.05) in GnRH-immunised heifers following 25 micrograms GnRH and 2.5 micrograms GnRH-A. Oestradiol challenge increased (P < 0.05) LH concentrations during the 13-24 h period after challenge with a greater (P < 0.05) increase in control than in GnRH-immunised heifers. FSH concentrations were decreased (P < 0.05) for at least 30 h after oestradiol challenge. In conclusion, GnRH immunisation decreased LH pulsatility and mean LH and FSH concentrations. GnRH antibodies neutralised low doses of GnRH (2.5 micrograms), but not high doses of GnRH (25 micrograms) and GnRH-A (2.5 micrograms). GnRH immunisation decreased the rise in LH concentrations following oestradiol challenge.
{ "pile_set_name": "PubMed Abstracts" }
WHERE IS ‘IDOL’ HEADED? “American Idol” won’t be the biggest show of 2014, but it might be the biggest story. The ratings struggles of the show were big news last year: The No. 1 show for a record eight consecutive years and No. 2 in 2012 fell to No. 7 in the rankings in its 11th season. Worse, the ratings declined more sharply as the year wore on. The finale drew about 14 million viewers – a third fewer than the 2012 finish. Such a tumble for what had been the biggest moneymaker in television led to some serious housecleaning. Judges Nicki Minaj and Mariah Carey were dumped and Randy Jackson was demoted to mentor. It looked like Keith Urban was on the way out, too, with a panel of former “American Idol” favorites taking over. That was before Fox tossed out executive producers Ken Warwick and Nigel Lythgoe and replaced them with Swedish producer Per Blankens. Blankens scrapped the former-contestants idea, kept Urban and added former judge Jennifer Lopez and longtime friend of the show Harry Connick Jr. The promos for Season 12, which premieres Jan. 15, have been pushing the camaraderie of the new judging trio, hoping to erase memories of last year’s dysfunctional quartet and make itself look more like the happiest place on Earth: “The Voice.” The question “American Idol” will face this year is whether the judges were the problem, or whether the viewers are simply tired of it. Either outcome – continued slide or revival – “AI” will be a newsmaker. We tend to greet the new year with such optimism, more full than usual with belief in the yet-unsullied future. And it's the same way in Televisionland, where 2014 arrives with new and returning shows filled with promise – because they haven't had a chance to disappoint us yet. TV fans are lucky in this regard: We actually get two new years. There's the one in September, when the “TV year” starts, and then there is the more conventional new year, which TV labels its “midseason.” In many ways, this second new year is the better one. The stronger shows from the fall have survived, and they'll be joined by a smaller but (we hope) stouter group of new offerings. A bunch of old favorites start new seasons, too, joining the fall favorites that are coming out of holiday hibernation. The next two months ought to be enjoyable, if busy, ones for TV fans. Here's a guide to help you get through it all. NEW SHOWS Five to watch … “Intelligence” CBS, premieres Jan. 7 – A far-from-perfect show, but one with a cool premise and lots of room to improve. Josh Holloway (Sawyer from “Lost”) stars as a modern Six Million Dollar Man – a spy with a special chip that connects his brain directly to the Internet. Holloway is great, as is Meghan Ory (Ruby from “Once Upon a Time”) as the Secret Service agent charged with protecting Holloway and his chip. The action sequences are strong, although the show takes itself too seriously. If the writers loosen up, this could be a hit. “Chicago P.D.” NBC, Jan. 8 – We expected NBC to try to cash in on the popularity of “Chicago Fire,” but we didn't expect the new show to be so much better. “Chicago P.D.” is not a thinly disguised soap opera like its predecessor, but a sharp police drama. Jason Beghe stars as an any-means-necessary sergeant of suspect loyalties who nonetheless heads an elite squad. Sophia Bush is a tough sell as a streetwise young cop, but the rest of the cast is strong. “True Detective” HBO, Jan. 12 – Looking for a fun hour on Sunday nights? Look elsewhere, because “True Detective” is a big plate of Southern-fried grim with some dark sauce on the side. Matthew McConaughey and Woody Harrelson star as a pair of Louisiana lawmen recalling a serial-murder case that they worked nearly 20 years before. The story moves back and forth from past to present, from a conventional story to a pair of unsettling confessionals. The lead actors are brilliant: McConaughey as a nearly psychotic misfit and Harrelson as an almost archetypically conventional TV detective with secrets of his own. Grim, yes, but fascinating. “Broad City” Comedy Central, Jan. 22 – Men don't always have to be the stupid ones. Abbi Jacobson and Ilana Glazer bring a 30-minute version of their popular Web series to television. It's part “Flight of the Conchords” smart-dumb comedy and part “Workaholics” dumb-dumb comedy, and it works in both realms. “Fleming: The Man Who Would be Bond” BBC America, Jan. 29 – I haven't had a chance to see this miniseries, but the previews and its pedigree make it look like a show stopper. Dominic Cooper stars as Ian Fleming, the author who created James Bond, drawing on his own experience as a naval intelligence officer. The four-part series shows ushow Fleming based Bond on his life – and his fantasies. … and five to skip “Killer Women” ABC, Jan. 7 – The title is the best part about this new series, which stars Tricia Helfer as a Texas Ranger. Those hoping for some Quentin Tarantino-esque offbeat drama will be disappointed to discover a standard-issue female-cop series. In fact, fans of the late “In Plain Sight” will find “Killer Women” very familiar, if not as good. “Enlisted” Fox, Jan. 8 – After punching a superior, a combat-veteran Army sergeant is redeployed to Florida and sentenced to lead a misfit platoon that includes his two loser brothers. An episode of this comedy will have you longing for the heady days of “McHale's Navy” and “C.P.O. Sharkey.” “The Spoils of Babylon” IFC, Jan. 9 – As timely as a Pet Rock, and just about as funny. A pretty amazing cast – Will Ferrell, Tobey Maguire, Kristen Wiig, Tim Robbins, Jessica Alba, Val Kilmer – star in a spoof of 1970s and '80s miniseries. We might excuse the time lag if there were more genuine laughs, but this feels like it was thrown together in a couple of drunken bouts in someone's hot tub. It would have been better as a five-minute short on the website FunnyOrDie.com. “Looking” HBO, Jan. 19 – This “daring” series about gay men in San Francisco will have you nodding off in no time. The characters are gay, they live in San Francisco … and that's about it. If you thought “The L Word” was bad – and it was – this is worse. User Agreement Keep it civil and stay on topic. No profanity, vulgarity, racial slurs or personal attacks. People who harass others or joke about tragedies will be blocked. By posting your comment, you agree to allow Orange County Register Communications, Inc. the right to republish your name and comment in additional Register publications without any notification or payment.
{ "pile_set_name": "Pile-CC" }
(************************************************************************) (* v * The Coq Proof Assistant / The Coq Development Team *) (* <O___,, * INRIA - CNRS - LIX - LRI - PPS - Copyright 1999-2012 *) (* \VV/ **************************************************************) (* // * This file is distributed under the terms of the *) (* * GNU Lesser General Public License Version 2.1 *) (************************************************************************) (* Evgeny Makarov, INRIA, 2007 *) (************************************************************************) Require Export NAddOrder. Module NMulOrderProp (Import N : NAxiomsMiniSig'). Include NAddOrderProp N. (** Theorems that are either not valid on Z or have different proofs on N and Z *) Theorem square_lt_mono : forall n m, n < m <-> n * n < m * m. Proof. intros n m; split; intro; [apply square_lt_mono_nonneg | apply square_lt_simpl_nonneg]; try assumption; apply le_0_l. Qed. Theorem square_le_mono : forall n m, n <= m <-> n * n <= m * m. Proof. intros n m; split; intro; [apply square_le_mono_nonneg | apply square_le_simpl_nonneg]; try assumption; apply le_0_l. Qed. Theorem mul_le_mono_l : forall n m p, n <= m -> p * n <= p * m. Proof. intros; apply mul_le_mono_nonneg_l. apply le_0_l. assumption. Qed. Theorem mul_le_mono_r : forall n m p, n <= m -> n * p <= m * p. Proof. intros; apply mul_le_mono_nonneg_r. apply le_0_l. assumption. Qed. Theorem mul_lt_mono : forall n m p q, n < m -> p < q -> n * p < m * q. Proof. intros; apply mul_lt_mono_nonneg; try assumption; apply le_0_l. Qed. Theorem mul_le_mono : forall n m p q, n <= m -> p <= q -> n * p <= m * q. Proof. intros; apply mul_le_mono_nonneg; try assumption; apply le_0_l. Qed. Theorem lt_0_mul' : forall n m, n * m > 0 <-> n > 0 /\ m > 0. Proof. intros n m; split; [intro H | intros [H1 H2]]. apply lt_0_mul in H. destruct H as [[H1 H2] | [H1 H2]]. now split. false_hyp H1 nlt_0_r. now apply mul_pos_pos. Qed. Notation mul_pos := lt_0_mul' (only parsing). Theorem eq_mul_1 : forall n m, n * m == 1 <-> n == 1 /\ m == 1. Proof. intros n m. split; [| intros [H1 H2]; now rewrite H1, H2, mul_1_l]. intro H; destruct (lt_trichotomy n 1) as [H1 | [H1 | H1]]. apply lt_1_r in H1. rewrite H1, mul_0_l in H. order'. rewrite H1, mul_1_l in H; now split. destruct (eq_0_gt_0_cases m) as [H2 | H2]. rewrite H2, mul_0_r in H. order'. apply (mul_lt_mono_pos_r m) in H1; [| assumption]. rewrite mul_1_l in H1. assert (H3 : 1 < n * m) by now apply (lt_1_l m). rewrite H in H3; false_hyp H3 lt_irrefl. Qed. (** Alternative name : *) Definition mul_eq_1 := eq_mul_1. End NMulOrderProp.
{ "pile_set_name": "Github" }
The trigeminal mesencephalic nucleus, main sensory nucleus, and rostral part of the spinal sensory nucleus of cats will be stereotaxically explored with extracellular microelectrodes to determine the location and firing patterns of single neurons which respond to passive movement of the condylar head of the mandible within the temporomandibular joint. Latency measurements will be made to determine the location of the cell bodies of first-order neurons by elctronically stimulating the TMJ mechanoreceptors. The response patterns of these neurons will be analyzed with a digital computer. The analysis will be compared statistically with similar analyses derived from single neurons in the ventral posteromedial nucleus of the thalamus. This nucleus is thought to contain third-order projection neurons for kinesthesia of the temporomandibular joint. The results will be used to illuminate the mechanisms whereby mechanoreceptors in the tempormandibular joint single relative position of the jaw during masticatory movements.
{ "pile_set_name": "NIH ExPorter" }
Sex differences in the relationship between inflammatory and hemostatic biomarkers and metabolic syndrome: British 1958 Birth Cohort. Circulating levels of C-reactive protein (CRP), fibrinogen, fibrin D-dimer, tissue plasminogen activator antigen (t-PA) and von Willebrand factor (VWF) are associated with incident coronary heart disease (CHD). However, their associations with metabolic syndrome and its components in large populations of men and women have not been well defined. We compare the sex associations of these biomarkers with established CHD risk factors, metabolic syndrome and its components in a large cohort. 8302 men and women aged 45 years from the British 1958 birth cohort provided a blood sample. Analyses were restricted to 3457 men and 3464 women with complete data on all risk factors and no history of cardiovascular disease. Multiple regression analyses adjusted for smoking, social class, alcohol consumption and variables related to biomarker measurement error. Adjusted sex differences in levels of all biomarkers (except VWF) varied according to presence/absence of metabolic syndrome, its components and obesity (BMI ≥30 kg m(-) (2)). Associations in women were up to twice as strong for CRP, fibrinogen and t-PA with markers of obesity (body mass index, waist circumference), blood pressure, blood lipids and metabolic syndrome. D-dimer showed weaker associations and less heterogeneity by sex. There was no evidence of sex interaction in associations with VWF. Associations between CRP, fibrinogen and t-PA and metabolic syndrome and its components were stronger in women than in men. Understanding the reasons for these differences across sex will be important in understanding the pathophysiology of cardiovascular and metabolic disease in men and women.
{ "pile_set_name": "PubMed Abstracts" }
Mechanisms of caspase activation and inhibition during apoptosis. Caspases are central components of the machinery responsible for apoptosis. Recent structural and biochemical studies on procaspases, IAPs, Smac/DIABLO, and apoptosome have revealed a conserved mechanism of caspase activation and inhibition. This article reviews these latest advances and presents our current understanding of caspase regulation during apoptosis.
{ "pile_set_name": "PubMed Abstracts" }
Stuart Higgins Stuart Higgins (born c.1956) is a British public relations consultant and former newspaper editor. In 1972 Higgins left school in Kingswood, on the outskirts of Bristol, and began his career as a reporter at the South West News, an agency founded by Roland Arblaster.He began working for The Sun in 1979 as their West Country reporter. He was arrested in 1982 by the police after being found with a Sun photographer "testing security" at Highgrove House, home of Charles, Prince of Wales. At one point, Kelvin MacKenzie printed Higgins' direct phone number in The Sun, billed him as the "human sponge" and asked readers to call Higgins to "get things off their chest". In 1994, Higgins succeeded MacKenzie as editor of the newspaper. In 1996, Higgins wrote a front page story about an intimate video purporting to feature Diana, Princess of Wales with James Hewitt. The video turned out to be a hoax. Higgins left The Sun in June 1998. On 11 November 2003, Labour MP Clive Soley, using parliamentary privilege, alleged that News International had paid £500,000 'hush money' to a female employee who had accused Higgins of sexual harassment during his time at The Sun. Soley also accused Rebekah Wade (now Brooks), then the newspaper's editor, of writing a threatening letter to the MP in order to discourage him from researching the issue. Higgins subsequently set up his own public relations company, but sold the company in 2007. In February 2013, it was reported that Higgins was in Pretoria, South Africa assisting athlete Oscar Pistorius, accused of murdering his girlfriend Reeva Steenkamp, in dealing with the press. References Category:1950s births Category:Living people Category:English newspaper editors Category:English male journalists Category:British public relations people
{ "pile_set_name": "Wikipedia (en)" }
Q: Adding checked attribute via jQuery I am using the following widget http://www.erichynds.com/examples/jquery-ui-multiselect-widget/demos/ It has worked great so far, but I need some help in adding attributes. In using Firebug, I've noticed that by simply clicking on the checkbox the checked attribute does not appear as I would expect it to. In my code, I've modified the widget, I've been able to add code to remove the attribute of checked. this.removeAttribute(\'checked\'); this.checked=false; if the item was checked beforehand. I've been successful in using this code this.setAttribute(\'checked\', \'checked\'); this.checked=true; if the item was unchecked when the page loads. My problem is coming when I need to be able to utilize both sets of code on the checkbox, I've attempted the following onclick="if($(this).attr(\'checked\') == \'true\') { this.setAttribute(\'checked\', \'checked\'); this.checked=true; } else { this.removeAttribute(\'checked\'); this.checked=false; } the code will remove the attribute of checked (if checked before hand on page load), but when I attempt to click on the checkbox to add the attribute (if not checked on page load), nothing happens. Thanks for any help, and sorry for my poor coding. A: In jQuery for removing an attribute use this.removeAttr('checked'); and for setting an attribute use this.attr('checked', 'checked'); A: $(this).prop('checked',false) or $(this).prop('checked',true)
{ "pile_set_name": "StackExchange" }
Neuronal VEGF expression correlates with angiogenesis in postnatal developing rat brain. When exposed to chronic sublethal hypoxia the developing brain responds with increases in permeability and angiogenesis. Vascular endothelial growth factor (VEGF) may mediate this response. Here, we present data on the localization of VEGF in the rat brain cortex during postnatal development and its correlation to vascularization. We reared newborn rats under normoxic conditions and in hypoxic chambers (FiO(2) 9.5%), removed them at postnatal days (P) 3, 8, 13, 24, and 33 and prepared the cortical brain tissue for immunohistochemistry, in situ hybridization (ISH), Western blot analyses and vessel density counting. When compared to age-matched controls, hypoxic-reared animals displayed a significant increase in platelet endothelial cell adhesion molecule 1 (PECAM-1) protein levels, cerebral microvascular lumen diameter and number and density of vessels (number of capillaries per area). In control animals, ISH and immunohistochemistry revealed that localization of VEGF is restricted almost exclusively to cortical neurons at early stages of development. As the vascular bed begins to stabilize, predominant VEGF expression switches to maturing glial cells which invest vessels while neuronal expression is reduced to a basal level. In hypoxic animals, early localization of VEGF is also restricted to cortical neurons, however, during later developmental stages, glial cells express elevated levels of VEGF protein and high neuronal expression also persists. Thus chronic sublethal hypoxia disrupts the temporal-spatial expression of VEGF, which correlates with continuing hypoxia-driven angiogenesis.
{ "pile_set_name": "PubMed Abstracts" }
Plans & Projects The City owns, operates, and plans for infrastructure like streets, sidewalks, bike facilities, bridges, parking, parks, and water and sewer pipes to meet community needs today and in the future. Other services go beyond the basics to provide amenities that increase quality of life, including recreation, libraries and educational programs, housing and social services, public spaces, streetscaping, and public art. The City of Salem accomplishes these tasks by developing plans and implementing projects. You can find information about the City of Salem’s current plans and projects from the links below.
{ "pile_set_name": "Pile-CC" }
She was preceded in death by her parents, James and Hester (Cain) Lindsey; her husband, William Francis Miller; a son, James William Miller; five brothers, Edgar, Frank, Fred, Beryl and Richard Lindsey; three sisters, Wilma Huffman, Edna Crane and Grace Mohr; and a grandchild. A funeral service will be conducted at 1 p.m. Tuesday at Jessen Funeral Home, Whiteland Chapel, 729 U.S. 31 North. Visitation will be from 11 a.m. until service time Tuesday at the funeral home. Burial will be at Greenlawn Cemetery in Franklin.
{ "pile_set_name": "Pile-CC" }
The present invention relates to a piston for an internal combustion engine, having a piston head, a piston skirt, and a circumferential recess configured between the piston head and the piston skirt. The present invention furthermore relates to a method for the production of such a piston. A piston of this type is known, for example, from DE 44 46 726 A1, and is also referred to as a “piston having a thermally uncoupled piston skirt.” Such pistons are characterized by great strength and by great heat resistance, because of the thermal uncoupling of piston head and piston skirt. Their relatively great construction height, which results from a minimum height of the ring-shaped recess, required due to process technology, is disadvantageous.
{ "pile_set_name": "USPTO Backgrounds" }
The incorporation of increasing numbers of discrete devices into progressively smaller integrated circuits remains an important challenge in the manufacture of Very Large Scale Integration (VLSI) structures. For example, the implementation of complementary metal-oxide semiconductor (CMOS) technology into integrated circuits usually involves imparting a prescribed set of manufacturing attributes to the integrated circuit, such as selected dopant concentrations, channel lengths, interconnect dimensions, contact shapes, or other pertinent attributes, which collectively permit the integrated circuit to provide a desired function. Many of the desired features in VLSI structures may be formed using photolithographic methods. Briefly, and in general terms, a photolithographic mask (or reticle) is formed that includes a desired pattern corresponding to a particular masking step for the structure. The pattern generally includes optically transparent areas and optically attenuating areas that are suitably arranged on an optically transparent supporting substrate. The mask may then be positioned proximate to an illumination system and a layer of an illumination-sensitive photoresist material applied to a semiconductor wafer. The illumination system projects illumination radiation through the optically transmissive portions of the mask and onto the photoresist material, which suitably changes the properties of the photoresist material. Subsequent development of the exposed photoresist material thus permits the selective differentiation between exposed and non-exposed areas in the photoresist material so that the desired pattern may be subsequently formed on the semiconductor wafer. When a wavelength of the illumination radiation is greater than a minimum feature size expressed on the mask, various optical effects may adversely affect the quality of features formed on a semiconductor structure. For example, a mask used to form a memory device array may include patterns having different orientations, such as a first set of generally horizontal features in an array portion of the memory device, and a second set of generally vertical and/or mixed features in a peripheral logic region. Although the illumination system may permit the first set of features to be accurately resolved at a first focal distance, undesired optical aberrations (including, for example, astigmatism) in the illumination system generally permit the second set of resolvable features to be accurately resolved only at a second focal distance that is different from the first focal distance. In one commonly employed method, a focal distance is selected for the illumination system that is intermediate between the first focal distance and the second focal distance so that the first set and the second set of features are projected from the mask and onto the wafer to yield a device pattern on the wafer having a correspondingly intermediate pattern resolution. As device features continue to decrease in size, however, the foregoing optical compensation method may be unable to generate device patterns at an acceptable resolution level. Therefore, there presently exists an urgent need in the art for optical compensation methods, systems, and devices applicable to sub-resolution photolithography that permit aggressive reductions in device feature size.
{ "pile_set_name": "USPTO Backgrounds" }
This invention relates to a sharpness emphasizing method of a reproduction picture for use in a picture reproducing machine such as a color scanner, a color facsimile, or the like. In a conventional picture reproducing machine, a sharpness emphasizing method of a reproduction picture is carried out by using picture signals to be processed or circumferential information of the picture signals. The former case has a disadvantage, that is, the sharpness emphasis effect is obtained only in the scanning direction of the cylinder's circumference, and hence such a method cannot be applied independently to a color scanner for plate-making, or the like. In the latter case, as shown in FIG. 1, a light beam 1 obtained by scanning an original picture optically, is divided into two components by a half mirror 2. Each light beam propagates along a light axis 3a or 3b through an aperture 5a or 5b having an opening distance d.sub.1 or d.sub.2, which is formed in a mask 4a or 4b. Each light beam through the opening 5a or 5b is incident to a photoelectric element 6a or 6b which converts the light beam into a signal. Thus the obtained signal is then converted into a density signal in a logarithmic amplifier 7a or 7b including a preamplifier, thereby obtaining a picture signal A or B. The picture signal A through the smaller aperture 5a is a so-called sharp signal whose sharpness is to be emphasized. The picture signal B through the larger aperture 5b is usually called an unsharp signal which includes the circumferential information of the sharp signal A. However, in the embodiment shown in FIG. 1, in fact, the light beam through the aperture 5a is color-separated into red, green and blue colors by half mirrors to obtain three picture signals A.sub.R, A.sub.G and A.sub.B, and the picture signal A.sub.G is selected as the picture signal A. In order to emphasize the sharpness of a recording signal by using the sharp signal A (A.sub.G) and the unsharp signal B, the unsharp signal B is subtracted from the sharp signal A to obtain an unsharp masking signal C in a differential amplifier 8. Then, the unsharp masking signal C is added to the sharp signal A (A.sub.R, A.sub.G or A.sub.B) in a summing amplifier 9 which outputs a sharpness-emphasized picture signal D (D.sub.R, D.sub.G or D.sub.B), as shown in FIG. 2. This sharpness emphasizing method of the picture signal is now widely used. However, this method requires a special system having an optical system and an electric operational circuit, for obtaining the unsharp signal B, which is inconvenient and high cost. Further, in this method, by varying the shape of the aperture 5b of the mask 4b the sharpness in certain directions may be emphasized, and by varying the opening distance d.sub.2 of the aperture 5b the sharpness range may be varied. However, various masks are required for these variations. The opening distance d.sub.1 of the aperture 5a of the mask 4a for the sharp signal A is determined depending on the resolving power of the sharp signal A. When the distance d.sub.1 of the aperture 5a is varied according to a reproducing magnification and so forth, the distance d.sub.2 of the aperture 5b must be changed, and accordingly sets of masks 4a and 4b must be prepared depending on the resolving power of the sharp signal A. The sharpness emphasizing operation will be explained theoretically in connection with space frequency-response curves shown in FIG. 3. There are shown two slit functions f(A) and f(B) having widths d.sub.1 ' and d.sub.2 ', corresponding to the aperture sizes d.sub.1 and d.sub.2 of the apertures 5a and 5b are shown in FIG. 3a. In order to obtain the space frequency-response curves, or the spectrum distributions F(A) and F(B), which includes a space frequency range sensible to the eyes of human beings, the slit functions f(A) and f(B) are performed by Fourier transformation, as shown in FIG. 3b wherein F(u) means a spectrum value corresponding to a space frequency u. As shown in FIG. 2, the unsharp masking signal C is A-B, and the sharpness-emphasized picture signal D is A+C. Thus, the spectrum distributions F(C) and F(D) corresponding to the unsharp masking signal C and the sharpness-emphasized picture signal D are expressed as F(A)-F(B) and F(A)+F(B), as shown in FIG. 3b. Such spectrum distributions are shown in the X axis direction, as shown in FIG. 3a, and the same spectrum distributions are obtained in the Y axis direction. In the X=Y axis direction, the similar spectrum distribution is obtained, as shown in FIG. 3c wherein the aperture size d may be d.sub.1 ' or d.sub.2 ', but the points wherein F(u) equals naught, are different. In practice, in this case, the distribution may be considered as almost the same as the one in the X or the Y direction. Therefore, on the contrary, the slit functions f(x) may be obtained from the spectrum distribution corresponding to the desired sharpness emphasizing characteristics in the reverse manner. Consequently, as shown in FIG. 4, wherein d is the opening size of the aperture or the width of the scanning line, from the spectrum distribution F(D') of the sharpness-emphasized picture signal D' the spectrum distribution F(C') of the unsharp masking signal C' is given by F(D')-F(A), and the spectrum distribution F(B') of the ideal unsharp signal B' is obtained by (F(A)-F(C'). Then, the spectrum distribution F(B') is performed by reverse Fourier transformation to obtain the slit function f(B') corresponding to the ideal unsharp signal B'. According to the slit function f(B') obtained the aperture 5b of the mark 4b is formed, and the transmittance of the light through such an aperture 5b is continuously reduced radially from its center according to the slit function f(B'). In FIG. 4 is shown one example of a wave form of such a slit function, and, in practice, the wave form is exactly determined from the slit function. In this method, a plurality of masks, each having such an aperture, must be prepared in advance, depending on the opening size d.sub.1 of the aperture. However, since the aperture size is minute, and the variation of the light transmittance of the aperture is effected by using the photographic technique, in practice, it is quite difficult to control the light transmittance of the minute aperture area.
{ "pile_set_name": "USPTO Backgrounds" }
## 2017-09-10 #### python * [allenai / allennlp](https://github.com/allenai/allennlp):An open-source NLP research library, built on PyTorch. * [tensorflow / agents](https://github.com/tensorflow/agents):A library of RL tools * [NVIDIA / DeepRecommender](https://github.com/NVIDIA/DeepRecommender):Deep learning for recommender systems * [ansible / awx](https://github.com/ansible/awx):AWX Project * [satwikkansal / wtfpython](https://github.com/satwikkansal/wtfpython):A collection of interesting, subtle, and tricky Python snippets. * [khanrc / tf.gans-comparison](https://github.com/khanrc/tf.gans-comparison):Implementations of (theoretical) generative adversarial networks and comparison without cherry-picking * [xoreaxeaxeax / sandsifter](https://github.com/xoreaxeaxeax/sandsifter):The x86 processor fuzzer * [mazen160 / struts-pwn_CVE-2017-9805](https://github.com/mazen160/struts-pwn_CVE-2017-9805):An exploit for Apache Struts CVE-2017-9805 * [rg3 / youtube-dl](https://github.com/rg3/youtube-dl):Command-line program to download videos from YouTube.com and other video sites * [vulnersCom / api](https://github.com/vulnersCom/api):Vulners Python API wrapper * [pytorch / pytorch](https://github.com/pytorch/pytorch):Tensors and Dynamic neural networks in Python with strong GPU acceleration * [tensorflow / models](https://github.com/tensorflow/models):Models built with TensorFlow * [python / cpython](https://github.com/python/cpython):The Python programming language * [vinta / awesome-python](https://github.com/vinta/awesome-python):A curated list of awesome Python frameworks, libraries, software and resources * [fchollet / keras](https://github.com/fchollet/keras):Deep Learning library for Python. Runs on TensorFlow, Theano, or CNTK. * [ofek / hatch](https://github.com/ofek/hatch):A modern project, package, and virtual env manager for Python * [django / django](https://github.com/django/django):The Web framework for perfectionists with deadlines. * [mli / gluon-tutorials-zh](https://github.com/mli/gluon-tutorials-zh):通过MXNet/Gluon来动手学习深度学习 * [LewisVo / Awesome-Linux-Software](https://github.com/LewisVo/Awesome-Linux-Software):🐧 A list of awesome applications, software, tools and other materials for Linux distros. * [scikit-learn / scikit-learn](https://github.com/scikit-learn/scikit-learn):scikit-learn: machine learning in Python * [ablator / ablator](https://github.com/ablator/ablator):Ablator is a Service that enables you to roll out functionalities at your own pace, and perform good A/B testing. * [soimort / you-get](https://github.com/soimort/you-get):⏬ Dumb downloader that scrapes the web * [XX-net / XX-Net](https://github.com/XX-net/XX-Net):a web proxy tool * [donnemartin / system-design-primer](https://github.com/donnemartin/system-design-primer):Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards. * [studioml / studio](https://github.com/studioml/studio):Studio: Simplify and expedite model building process #### swift * [mergesort / FeedbackEffect](https://github.com/mergesort/FeedbackEffect):A μ library for playing sounds and providing haptic feedback with ease * [inquisitiveSoft / XCAssetPacker](https://github.com/inquisitiveSoft/XCAssetPacker):A command line tool for converting a folder of images into an .xcasset package for Xcode * [lhc70000 / iina](https://github.com/lhc70000/iina):The modern video player for macOS. * [Kofktu / KUIPopOver](https://github.com/Kofktu/KUIPopOver):Easy to use PopOver in iOS * [olucurious / Awesome-ARKit](https://github.com/olucurious/Awesome-ARKit):A curated list of awesome ARKit projects and resources. Feel free to contribute! * [vsouza / awesome-ios](https://github.com/vsouza/awesome-ios):A curated list of awesome iOS ecosystem, including Objective-C and Swift Projects * [nmdias / FeedKit](https://github.com/nmdias/FeedKit):An RSS, Atom and JSON Feed parser written in Swift * [smdls / C0](https://github.com/smdls/C0):2D Animation Tool for macOS. * [insidegui / WWDC](https://github.com/insidegui/WWDC):The unofficial WWDC app for macOS * [shadowsocks / ShadowsocksX-NG](https://github.com/shadowsocks/ShadowsocksX-NG):Next Generation of ShadowsocksX * [raywenderlich / swift-algorithm-club](https://github.com/raywenderlich/swift-algorithm-club):Algorithms and data structures in Swift, with explanations! * [dkhamsing / open-source-ios-apps](https://github.com/dkhamsing/open-source-ios-apps):📱 Collaborative List of Open-Source iOS Apps * [ProjectDent / ARKit-CoreLocation](https://github.com/ProjectDent/ARKit-CoreLocation):Combines the high accuracy of AR with the scale of GPS data. * [matteocrippa / awesome-swift](https://github.com/matteocrippa/awesome-swift):A collaborative list of awesome swift resources. Feel free to contribute! * [CosmicMind / Material](https://github.com/CosmicMind/Material):A Material Design library for creating beautiful applications. * [SwiftKickMobile / SwiftMessages](https://github.com/SwiftKickMobile/SwiftMessages):A very flexible message bar for iOS written in Swift. * [ReactiveX / RxSwift](https://github.com/ReactiveX/RxSwift):Reactive Programming in Swift * [RobertGummesson / BuildTimeAnalyzer-for-Xcode](https://github.com/RobertGummesson/BuildTimeAnalyzer-for-Xcode):Build Time Analyzer for Swift * [February12 / YLImagePickerController](https://github.com/February12/YLImagePickerController):选择相册和拍照 支持多种裁剪 * [danielgindi / Charts](https://github.com/danielgindi/Charts):Beautiful charts for iOS/tvOS/OSX! The Apple side of the crossplatform MPAndroidChart. * [vapor / vapor](https://github.com/vapor/vapor):💧 A server-side Swift web framework. * [patchthecode / JTAppleCalendar](https://github.com/patchthecode/JTAppleCalendar):The Unofficial Apple iOS Swift Calendar View. iOS calendar Library. iOS calendar Control. 100% Customizable * [artemnovichkov / iOS-11-by-Examples](https://github.com/artemnovichkov/iOS-11-by-Examples):👨🏻‍💻 Examples of new iOS 11 APIs * [sergdort / CleanArchitectureRxSwift](https://github.com/sergdort/CleanArchitectureRxSwift):Example of Clean Architecture of iOS app using RxSwift * [CosmicMind / Samples](https://github.com/CosmicMind/Samples):Sample projects using Material, Graph, and Algorithm. #### javascript * [fastify / fastify](https://github.com/fastify/fastify):Fast and low overhead web framework, for Node.js * [Okazari / Rythm.js](https://github.com/Okazari/Rythm.js):A javascript library that makes your page dance. * [maierfelix / Iroh](https://github.com/maierfelix/Iroh):☕ Dynamic analysis tool - Intercept, record and analyze JavaScript at runtime * [wojtekmaj / react-pdf](https://github.com/wojtekmaj/react-pdf):Easily display PDF files in your React application. * [stasm / innerself](https://github.com/stasm/innerself):A tiny view + state management solution using innerHTML * [vuejs / vue](https://github.com/vuejs/vue):A progressive, incrementally-adoptable JavaScript framework for building UI on the web. * [GoogleChrome / puppeteer](https://github.com/GoogleChrome/puppeteer):Headless Chrome Node API * [mikeal / r2](https://github.com/mikeal/r2):HTTP client. Spiritual successor to request. * [toniov / gcal-cli](https://github.com/toniov/gcal-cli):Google Calendar command line tool for Node.js * [facebook / react](https://github.com/facebook/react):A declarative, efficient, and flexible JavaScript library for building user interfaces. * [ApoorvSaxena / lozad.js](https://github.com/ApoorvSaxena/lozad.js):Highly performant, light ~0.5kb and configurable lazy loader in pure JS with no dependencies for images, iframes and more * [twbs / bootstrap](https://github.com/twbs/bootstrap):The most popular HTML, CSS, and JavaScript framework for developing responsive, mobile first projects on the web. * [idyll-lang / idyll](https://github.com/idyll-lang/idyll):Interactive Document Language * [mzabriskie / axios](https://github.com/mzabriskie/axios):Promise based HTTP client for the browser and node.js * [facebookincubator / create-react-app](https://github.com/facebookincubator/create-react-app):Create React apps with no build configuration. * [evenchange4 / micro-medium-api](https://github.com/evenchange4/micro-medium-api):Microservice for fetching the latest posts of Medium with GraphQL. * [resin-io / etcher](https://github.com/resin-io/etcher):Flash OS images to SD cards & USB drives, safely and easily. * [airbnb / javascript](https://github.com/airbnb/javascript):JavaScript Style Guide * [nitin42 / react-imgpro](https://github.com/nitin42/react-imgpro):📷 Image Processing Component for React * [nodejs / node](https://github.com/nodejs/node):Node.js JavaScript runtime ✨ 🐢 🚀 ✨ * [hakimel / reveal.js](https://github.com/hakimel/reveal.js):The HTML Presentation Framework * [callemall / material-ui](https://github.com/callemall/material-ui):React Components that Implement Google's Material Design. * [denysdovhan / wtfjs](https://github.com/denysdovhan/wtfjs):A list of funny and tricky JavaScript examples * [facebook / react-native](https://github.com/facebook/react-native):A framework for building native apps with React. * [tanepiper / takeoff](https://github.com/tanepiper/takeoff):An opinionated rapid development environment using docker for convenience. #### go * [coyove / goflyway](https://github.com/coyove/goflyway):HTTP tunnel in Go * [coreos / bbolt](https://github.com/coreos/bbolt):An embedded key/value database for Go. * [golang / go](https://github.com/golang/go):The Go programming language * [ethereum / go-ethereum](https://github.com/ethereum/go-ethereum):Official Go implementation of the Ethereum protocol * [jirfag / go-queryset](https://github.com/jirfag/go-queryset):100% type-safe ORM for Go (Golang) with code generation and MySQL, PostgreSQL, Sqlite3, SQL Server support. GORM under the hood. * [gin-gonic / gin](https://github.com/gin-gonic/gin):Gin is a HTTP web framework written in Go (Golang). It features a Martini-like API with much better performance -- up to 40 times faster. If you need smashing performance, get yourself some Gin. * [avelino / awesome-go](https://github.com/avelino/awesome-go):A curated list of awesome Go frameworks, libraries and software * [kubernetes / kubernetes](https://github.com/kubernetes/kubernetes):Production-Grade Container Scheduling and Management * [boltdb / bolt](https://github.com/boltdb/bolt):An embedded key/value database for Go. * [fatedier / frp](https://github.com/fatedier/frp):A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet. * [gogits / gogs](https://github.com/gogits/gogs):Gogs is a painless self-hosted Git service. * [mholt / caddy](https://github.com/mholt/caddy):Fast, cross-platform HTTP/2 web server with automatic HTTPS * [alexellis / derek](https://github.com/alexellis/derek):derek - a serverless 🤖 to manage PRs and issues * [alexellis / faas](https://github.com/alexellis/faas):Functions as a Service (OpenFaaS) - a serverless framework for Docker & Kubernetes * [astaxie / build-web-application-with-golang](https://github.com/astaxie/build-web-application-with-golang):A golang ebook intro how to build a web with golang * [gopherchina / meetup](https://github.com/gopherchina/meetup):meetup in China * [gohugoio / hugo](https://github.com/gohugoio/hugo):A Fast and Flexible Static Site Generator built with love in GoLang. * [syncthing / syncthing](https://github.com/syncthing/syncthing):Open Source Continuous File Synchronization * [grafana / grafana](https://github.com/grafana/grafana):The tool for beautiful monitoring and metric analytics & dashboards for Graphite, InfluxDB & Prometheus & More * [moby / moby](https://github.com/moby/moby):Moby Project - a collaborative project for the container ecosystem to assemble container-based systems * [esimov / stackblur-go](https://github.com/esimov/stackblur-go):A fast almost Gaussian Blur implementation in Go * [cznic / file](https://github.com/cznic/file):Package file handles write-ahead logs and space management of os.File-like entities. * [containous / traefik](https://github.com/containous/traefik):Træfik, a modern reverse proxy * [minio / minio](https://github.com/minio/minio):Minio is an open source object storage server compatible with Amazon S3 APIs * [go-kit / kit](https://github.com/go-kit/kit):A standard library for microservices.
{ "pile_set_name": "Github" }
Little Logo Little Logo Little Logo is a simplified dialect of the Logo programming language. Specifically, it is modeled after UCB Logo, the de facto reference implementation nowadays. Unfortunately, UCB Logo suffers from an irregular syntax with lots of exceptions. As Little Logo is made for fun, I went for a simpler, uniform language. It loses to the original in many respects, but wins in others. Pros Little Logo is free form. If you were to feed this source code to UCB Logo: print 3 You would receive two error messages in return: not enough inputs to print You don't say what to do with 3 Little Logo, on the other hand, will do what you expect. Expressions are statements. In Lisp, Python and most (all?) curly brace languages, a stand-alone expression is a valid statement. That means you can call a function for its side effects, ignoring the return value, and docstrings don't need to be special-cased. To top it all, it makes for simpler syntax. Little Logo follows this model, unlike its illustrious predecessor. In addition, Little Logo takes advantage of this by making several procedures return a meaningful value that don't do so in UCB Logo, most importantly MAKE. Clean, portable semantics. While Little Logo is very close to the host language, the interpreter architecture is simple and very general; it should be trivial to port to any reasonably high-level language. Cons No TO ... END. That may be a staple of Logo, but it's a line-oriented construct that has to be special-cased, and it's confusing to boot, as it doesn't follow the same rules as the rest of the language (as the UCB Logo manual admits in the introduction). You do get user-defined words, though -- see below. No infix arithmetic. Unfortunately, that would be difficult to implement with the current interpreter architecture. To compensate, Little Logo has sane aliases for certain operators. (GREATEREQUALP? seriously? What's wrong with GTE?) No optional function arguments either, also due to the simplistic architecture. Status As of 2011-05-18, the PHP implementation largely works, implementing over 60 primitives, not counting aliases. As it stands, it is able to run this simple script: ; Compute a square root through the Newton-Raphson method. ; Not a good show of Little Logo's capabilities, but I couldn't come ; up with anything more interesting. By the way, SQRT is implemented. ; This won't work in UCBLogo due to its lack of an ABS function. make "a 42 ; Number to extract square root from. make "precision 0.000001 make "x quotient :a 2 make "prev quotient :a :x while [lessp :precision abs difference :x :prev] [ make "prev :x make "x quotient sum :x quotient :a :x 2 ] pr :x The choice of primitives is a bit haphazard, but does include most (all?) control structures, including the "question mark" form of template-based iteration, most list manipulation primitives, some logic and arithmetic. As of 2011-11-12, Little Logo also supports user-defined words, in a form inspired by the "named slot" form of template iteration, with a hint or two taken from Scheme: LOCAL turned out to be a little can of worms, so it's not implemented. You'll have to settle for LOCALMAKE. Implementation details The prototype and so far only implementation of Little Logo is written in PHP. Why? It looked like a fun thing to try. And it was! Moreover, it turns out several Logo primitives map very well onto PHP's, which made the implementation especially clean. FIRST, for example, was straightforward. Same for ISEQ and most array operations. That said, some Logo operations make no sense in this implementation, for example LISTTOARRAY (since Little Logo uses native PHP arrays throughout); others are redundant -- LISTP and ARRAYP do the same thing. As of 2012-09-25, Little Logo features an instruction count limit parameter designed to prevent DDoS attacks in case you plan to run the interpreter over the Web -- it kicks in much sooner than PHP's max execution time. The default value is 20000, and you can (re)set it manually before running a piece of Logo code. Also pay attention to avenues for code injection.
{ "pile_set_name": "Pile-CC" }
Q: php while loop submit button <?php $sel22 = mysql_query("SELECT id1nev, id2nev, id2, accept FROM barat WHERE id1= '$kariidje' AND accept = '1' ") or die("CANNOT FETCH DATA FOR ADMIN " . mysql_error()); if (mysql_num_rows($sel22) > 0) { $i=0; while ($data22 = mysql_fetch_array($sel22)) { $i++; ?><tr> <td> <?php include 'elemek/connection.php'; $idkitfogadel = $data22['id2']; if(isset($_POST["submitelutasit"])){ $updatebaratt1 = "DELETE FROM barat WHERE id1 = $kariidje and id2 = $idkitfogadel"; mysql_query($updatebaratt1); //header("Location: friends.php"); } ?> <form id="form<?php echo $i; ?>" method="POST" action="#"> <Button type="SUBMIT" name="submitelutasit" id="submitelutasit<?php echo $i;?>" value="!"/></button> </form> </td> <td align="center"> <a>Something</a> </td> </tr> <?php } This is my code in my page. The problem is if I press the button in any line its delete all my data and not only what i want. Each line each button when I press a button its delete that line where is it. This is what i want. I cant solve this problem (sad). Thank you A: I will just assume that you are just playing around, and that's not even near to the production code. Add input field to your form with id2 so you can use it later. <form id="form<?php echo $i; ?>" method="POST" action="#"> <input type="hidden" name="id2" value="<?php echo $data22['id2'] ?>"> <Button type="SUBMIT" name="submitelutasit" id="submitelutasit<?php echo $i;?>" value="!"/></button> </form> And use it like this: $idkitfogadel = $_POST['id2']; Inside your if(isset($_POST["submitelutasit"])) statement. I'm sure that little kitty died somewhere right now :(
{ "pile_set_name": "StackExchange" }
/* * Copyright (C) 2007-2013 German Aerospace Center (DLR/SC) * * Created: 2014-10-21 Martin Siggel <martin.siggel@dlr.de> * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ /* * This file is automatically created from tigl.h on 2017-05-26. * If you experience any bugs please contact the authors */ package de.dlr.sc.tigl3; import java.util.ArrayList; public enum TiglSymmetryAxis { TIGL_NO_SYMMETRY(0), TIGL_X_Y_PLANE(1), TIGL_X_Z_PLANE(2), TIGL_Y_Z_PLANE(3); private static ArrayList<TiglSymmetryAxis> codes = new ArrayList<>(); static { codes.add(TIGL_NO_SYMMETRY); codes.add(TIGL_X_Y_PLANE); codes.add(TIGL_X_Z_PLANE); codes.add(TIGL_Y_Z_PLANE); } private final int code; private TiglSymmetryAxis(final int value) { code = value; } public static TiglSymmetryAxis getEnum(final int value) { return codes.get(Integer.valueOf(value)); } public int getValue() { return code; } };
{ "pile_set_name": "Github" }
Previously, coating type magnetic recording media have been prepared by coating non-magnetic supports with a coating comprising organic polymer binders and magnetic materials of ferromagnetic powders dispersed therein. In recent years, with the increased demand for high density recording, magnetic recording media of the so-called thin metal film type which are free of binders and which have thin ferromagnetic metal films formed by paper deposition methods (such as vacuum deposition, sputtering and ion plating), or plating methods (such as electroplating and electroless plating) as magnetic layers, have attracted attention and partly utilized. In particular, the vacuum deposition method does net require waste fluid treatment which is necessary in the plating method. Further, the manufacturing processes involved in vacuum deposition are simple, and the deposition rate of films is high. This method therefore has merit. Methods for producing magnetic films, having a coercive force and a squareness which are desirable for magnetic recording media, by the vacuum deposition and oblique incidence vapor deposition methods are described in U.S. Pat. Nos. 3,342,632 and 3,342,633. Major problems concerning magnetic recording media having thin ferromagnetic metal films include weather resistance, running properties and durability. Magnetic recording media move at a high speed compared to the magnetic head during recording, reproducing and erasing of magnetic signals. Running the media must be carried out smoothly and stably, and at the same time, abrasion or breakage due to contact with the head must not occur. In view of these problems, there is a need for lubricating layers or protective layers on the thin ferromagnetic metal films as means for improving their running properties and durability. The protective layers of the magnetic recording media of the thin metal film type include layers formed by applying thermoplastic resins, thermosetting resins, fatty acids, metal salts of fatty acids, fatty acid esters or alkyl phosphates dissolved in organic solvents. For example, such protective layers are disclosed in JP-A-60-69824 (the term "JP-A" as used herein means an "unexamined published Japanese patent application") and JP-A-60-85427. Recently, a technique of improving the durability of the media by using compounds having branched perfluoroalkenyl groups has been developed (JP-A-61-107528). Investigations of the application of perfluoroalkyl polyether compounds have also been extensively conducted, and U.S. Pat. No. 3,778,308 proposes providing a perfluoropolyether on a thin ferromagnetic metal film. Further, JP-B-60-10368 (the term "JP-B" as used herein means an "examined Japanese patent publication") describes a perfluoropolyether of the terminal modification type in which one or both termini of the perfluoropolyether chain are modified with polar groups such as carboxyl groups. Furthermore, there is the report that a multi-chain type perfluoropolyetheramide obtained by dehydration condensation of a compound having a plurality of amine groups and a perfluoropolyether chain having a carboxyl group at one terminus thereof was tested as a lubricating agent for disk-like magnetic recording media of the thin metal film type (Sugiyama et al., the 34th National Meeting, the Lubrication Society of Japan, B.multidot.28; Preliminary Reports issued on October, 1989, p. 425). This compound results in fairly good running properties and durability, but has the undesirable effect of reducing the coefficient of static friction. Improvements have been therefore desired. As described above, the magnetic recording media of the thin metal film type shown in the prior art have the problems that the running properties and durability are insufficient under severe conditions of high or low humidity, and that the electromagnetic characteristics deteriorate due to spacing loss between the head and the recording medium caused by the thickness of the protective or lubricating layer. These problems have limited the practical applications of the magnetic recording media of the thin metal film type.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Can we merge [android-tabs] and [android-tablayout]? Can we merge these tags? Both are being used for TabLayout. Questions tagged android-tabs: 1,200. Questions tagged android-tablayout: 1,532. A: Actually, android-tabs is vague and may refer to at least two UI element: android-tablayout and android-tabhost. So my previous opinion on making them synonyms may be a mistake. It may be best to re-tag manually. Indeed, both tags cover the same Android UI element. I concur with TylerH comment, we should make android-tabs a synonym of the explicit android-tablayout. If you have 5 points in the tag (or if you're a moderator), you can vote for it on https://stackoverflow.com/tags/android-tablayout/synonyms.
{ "pile_set_name": "StackExchange" }
{ "_args": [ [ { "name": "resolve", "raw": "resolve@1.1.7", "rawSpec": "1.1.7", "scope": null, "spec": "1.1.7", "type": "version" }, "/Volumes/case/workspace/silk/core-device/pub" ] ], "_from": "resolve@1.1.7", "_id": "resolve@1.1.7", "_inCache": true, "_installable": true, "_location": "/resolve", "_nodeVersion": "4.2.1", "_npmUser": { "email": "substack@gmail.com", "name": "substack" }, "_npmVersion": "3.4.1", "_phantomChildren": {}, "_requested": { "name": "resolve", "raw": "resolve@1.1.7", "rawSpec": "1.1.7", "scope": null, "spec": "1.1.7", "type": "version" }, "_requiredBy": [ "/" ], "_resolved": "http://registry.npmjs.org/resolve/-/resolve-1.1.7.tgz", "_shasum": "203114d82ad2c5ed9e8e0411b3932875e889e97b", "_shrinkwrap": null, "_spec": "resolve@1.1.7", "_where": "/Volumes/case/workspace/silk/core-device/pub", "author": { "email": "mail@substack.net", "name": "James Halliday", "url": "http://substack.net" }, "bugs": { "url": "https://github.com/substack/node-resolve/issues" }, "dependencies": {}, "description": "resolve like require.resolve() on behalf of files asynchronously and synchronously", "devDependencies": { "tap": "0.4.13", "tape": "^3.5.0" }, "directories": {}, "dist": { "shasum": "203114d82ad2c5ed9e8e0411b3932875e889e97b", "tarball": "https://registry.npmjs.org/resolve/-/resolve-1.1.7.tgz" }, "gitHead": "bb37f0d4400e4d7835375be4bd3ad1264bac3689", "homepage": "https://github.com/substack/node-resolve#readme", "keywords": [ "resolve", "require", "node", "module" ], "license": "MIT", "main": "index.js", "maintainers": [ { "email": "mail@substack.net", "name": "substack" } ], "name": "resolve", "optionalDependencies": {}, "readme": "ERROR: No README data found!", "repository": { "type": "git", "url": "git://github.com/substack/node-resolve.git" }, "scripts": { "test": "tape test/*.js" }, "version": "1.1.7" }
{ "pile_set_name": "Github" }
define("ace/mode/logiql_highlight_rules",["require","exports","module","ace/lib/oop","ace/mode/text_highlight_rules"], function(require, exports, module) { "use strict"; var oop = require("../lib/oop"); var TextHighlightRules = require("./text_highlight_rules").TextHighlightRules; var LogiQLHighlightRules = function() { this.$rules = { start: [ { token: 'comment.block', regex: '/\\*', push: [ { token: 'comment.block', regex: '\\*/', next: 'pop' }, { defaultToken: 'comment.block' } ] }, { token: 'comment.single', regex: '//.*' }, { token: 'constant.numeric', regex: '\\d+(?:\\.\\d+)?(?:[eE][+-]?\\d+)?[fd]?' }, { token: 'string', regex: '"', push: [ { token: 'string', regex: '"', next: 'pop' }, { defaultToken: 'string' } ] }, { token: 'constant.language', regex: '\\b(true|false)\\b' }, { token: 'entity.name.type.logicblox', regex: '`[a-zA-Z_:]+(\\d|\\a)*\\b' }, { token: 'keyword.start', regex: '->', comment: 'Constraint' }, { token: 'keyword.start', regex: '-->', comment: 'Level 1 Constraint'}, { token: 'keyword.start', regex: '<-', comment: 'Rule' }, { token: 'keyword.start', regex: '<--', comment: 'Level 1 Rule' }, { token: 'keyword.end', regex: '\\.', comment: 'Terminator' }, { token: 'keyword.other', regex: '!', comment: 'Negation' }, { token: 'keyword.other', regex: ',', comment: 'Conjunction' }, { token: 'keyword.other', regex: ';', comment: 'Disjunction' }, { token: 'keyword.operator', regex: '<=|>=|!=|<|>', comment: 'Equality'}, { token: 'keyword.other', regex: '@', comment: 'Equality' }, { token: 'keyword.operator', regex: '\\+|-|\\*|/', comment: 'Arithmetic operations'}, { token: 'keyword', regex: '::', comment: 'Colon colon' }, { token: 'support.function', regex: '\\b(agg\\s*<<)', push: [ { include: '$self' }, { token: 'support.function', regex: '>>', next: 'pop' } ] }, { token: 'storage.modifier', regex: '\\b(lang:[\\w:]*)' }, { token: [ 'storage.type', 'text' ], regex: '(export|sealed|clauses|block|alias|alias_all)(\\s*\\()(?=`)' }, { token: 'entity.name', regex: '[a-zA-Z_][a-zA-Z_0-9:]*(@prev|@init|@final)?(?=(\\(|\\[))' }, { token: 'variable.parameter', regex: '([a-zA-Z][a-zA-Z_0-9]*|_)\\s*(?=(,|\\.|<-|->|\\)|\\]|=))' } ] } this.normalizeRules(); }; oop.inherits(LogiQLHighlightRules, TextHighlightRules); exports.LogiQLHighlightRules = LogiQLHighlightRules; }); define("ace/mode/folding/coffee",["require","exports","module","ace/lib/oop","ace/mode/folding/fold_mode","ace/range"], function(require, exports, module) { "use strict"; var oop = require("../../lib/oop"); var BaseFoldMode = require("./fold_mode").FoldMode; var Range = require("../../range").Range; var FoldMode = exports.FoldMode = function() {}; oop.inherits(FoldMode, BaseFoldMode); (function() { this.getFoldWidgetRange = function(session, foldStyle, row) { var range = this.indentationBlock(session, row); if (range) return range; var re = /\S/; var line = session.getLine(row); var startLevel = line.search(re); if (startLevel == -1 || line[startLevel] != "#") return; var startColumn = line.length; var maxRow = session.getLength(); var startRow = row; var endRow = row; while (++row < maxRow) { line = session.getLine(row); var level = line.search(re); if (level == -1) continue; if (line[level] != "#") break; endRow = row; } if (endRow > startRow) { var endColumn = session.getLine(endRow).length; return new Range(startRow, startColumn, endRow, endColumn); } }; this.getFoldWidget = function(session, foldStyle, row) { var line = session.getLine(row); var indent = line.search(/\S/); var next = session.getLine(row + 1); var prev = session.getLine(row - 1); var prevIndent = prev.search(/\S/); var nextIndent = next.search(/\S/); if (indent == -1) { session.foldWidgets[row - 1] = prevIndent!= -1 && prevIndent < nextIndent ? "start" : ""; return ""; } if (prevIndent == -1) { if (indent == nextIndent && line[indent] == "#" && next[indent] == "#") { session.foldWidgets[row - 1] = ""; session.foldWidgets[row + 1] = ""; return "start"; } } else if (prevIndent == indent && line[indent] == "#" && prev[indent] == "#") { if (session.getLine(row - 2).search(/\S/) == -1) { session.foldWidgets[row - 1] = "start"; session.foldWidgets[row + 1] = ""; return ""; } } if (prevIndent!= -1 && prevIndent < indent) session.foldWidgets[row - 1] = "start"; else session.foldWidgets[row - 1] = ""; if (indent < nextIndent) return "start"; else return ""; }; }).call(FoldMode.prototype); }); define("ace/mode/matching_brace_outdent",["require","exports","module","ace/range"], function(require, exports, module) { "use strict"; var Range = require("../range").Range; var MatchingBraceOutdent = function() {}; (function() { this.checkOutdent = function(line, input) { if (! /^\s+$/.test(line)) return false; return /^\s*\}/.test(input); }; this.autoOutdent = function(doc, row) { var line = doc.getLine(row); var match = line.match(/^(\s*\})/); if (!match) return 0; var column = match[1].length; var openBracePos = doc.findMatchingBracket({row: row, column: column}); if (!openBracePos || openBracePos.row == row) return 0; var indent = this.$getIndent(doc.getLine(openBracePos.row)); doc.replace(new Range(row, 0, row, column-1), indent); }; this.$getIndent = function(line) { return line.match(/^\s*/)[0]; }; }).call(MatchingBraceOutdent.prototype); exports.MatchingBraceOutdent = MatchingBraceOutdent; }); define("ace/mode/logiql",["require","exports","module","ace/lib/oop","ace/mode/text","ace/mode/logiql_highlight_rules","ace/mode/folding/coffee","ace/token_iterator","ace/range","ace/mode/behaviour/cstyle","ace/mode/matching_brace_outdent"], function(require, exports, module) { "use strict"; var oop = require("../lib/oop"); var TextMode = require("./text").Mode; var LogiQLHighlightRules = require("./logiql_highlight_rules").LogiQLHighlightRules; var FoldMode = require("./folding/coffee").FoldMode; var TokenIterator = require("../token_iterator").TokenIterator; var Range = require("../range").Range; var CstyleBehaviour = require("./behaviour/cstyle").CstyleBehaviour; var MatchingBraceOutdent = require("./matching_brace_outdent").MatchingBraceOutdent; var Mode = function() { this.HighlightRules = LogiQLHighlightRules; this.foldingRules = new FoldMode(); this.$outdent = new MatchingBraceOutdent(); this.$behaviour = new CstyleBehaviour(); }; oop.inherits(Mode, TextMode); (function() { this.lineCommentStart = "//"; this.blockComment = {start: "/*", end: "*/"}; this.getNextLineIndent = function(state, line, tab) { var indent = this.$getIndent(line); var tokenizedLine = this.getTokenizer().getLineTokens(line, state); var tokens = tokenizedLine.tokens; var endState = tokenizedLine.state; if (/comment|string/.test(endState)) return indent; if (tokens.length && tokens[tokens.length - 1].type == "comment.single") return indent; var match = line.match(); if (/(-->|<--|<-|->|{)\s*$/.test(line)) indent += tab; return indent; }; this.checkOutdent = function(state, line, input) { if (this.$outdent.checkOutdent(line, input)) return true; if (input !== "\n" && input !== "\r\n") return false; if (!/^\s+/.test(line)) return false; return true; }; this.autoOutdent = function(state, doc, row) { if (this.$outdent.autoOutdent(doc, row)) return; var prevLine = doc.getLine(row); var match = prevLine.match(/^\s+/); var column = prevLine.lastIndexOf(".") + 1; if (!match || !row || !column) return 0; var line = doc.getLine(row + 1); var startRange = this.getMatching(doc, {row: row, column: column}); if (!startRange || startRange.start.row == row) return 0; column = match[0].length; var indent = this.$getIndent(doc.getLine(startRange.start.row)); doc.replace(new Range(row + 1, 0, row + 1, column), indent); }; this.getMatching = function(session, row, column) { if (row == undefined) row = session.selection.lead if (typeof row == "object") { column = row.column; row = row.row; } var startToken = session.getTokenAt(row, column); var KW_START = "keyword.start", KW_END = "keyword.end"; var tok; if (!startToken) return; if (startToken.type == KW_START) { var it = new TokenIterator(session, row, column); it.step = it.stepForward; } else if (startToken.type == KW_END) { var it = new TokenIterator(session, row, column); it.step = it.stepBackward; } else return; while (tok = it.step()) { if (tok.type == KW_START || tok.type == KW_END) break; } if (!tok || tok.type == startToken.type) return; var col = it.getCurrentTokenColumn(); var row = it.getCurrentTokenRow(); return new Range(row, col, row, col + tok.value.length); }; this.$id = "ace/mode/logiql"; }).call(Mode.prototype); exports.Mode = Mode; });
{ "pile_set_name": "Github" }
Archernis Archernis is a genus of moths of the family Crambidae. Species Archernis albicostalis Hampson, 1913 Archernis argocephala Lower, 1903 Archernis callixantha Meyrick, 1886 Archernis capitalis (Fabricius, 1794) Archernis dolopsalis (Walker, 1859) Archernis eucosma Turner, 1908 Archernis flavidalis Hampson, 1908 Archernis fulvalis Hampson, 1913 Archernis fulvalis Hampson, 1899 Archernis humilis (Swinhoe, 1894) Archernis leucocosma Turner, 1908 Archernis lugens (Warren, 1896) Archernis mitis Turner, 1937 Archernis nictitans (Swinhoe, 1894) Archernis obliquialis Hampson, 1896 Archernis scopulalis (Walker, 1865) References Category:Spilomelinae Category:Crambidae genera Category:Taxa named by Edward Meyrick
{ "pile_set_name": "Wikipedia (en)" }