text
stringlengths
0
6.48M
meta
dict
'use strict'; // B.2.3.3 String.prototype.big() require('./_string-html')('big', function(createHTML){ return function big(){ return createHTML(this, 'big', '', ''); } });
{ "pile_set_name": "Github" }
Wednesday, July 31, 2013 Our unexpected night visitor, a rat that ate through our bedroom screen door, led us to look for a better rat trap. Our search resulted in a high-tech, battery-poweredRat Trapthat zaps rodents rather than crushing them. The device works because of a new type of lithium battery that reviewers are saying kills tons of rats in their barns and farms before needing to be replaced. The latest technology of disposable AA Lithium Batteries last 9 times longer than previous versions. These batteries no longer contain cadmium so they are also less toxic than the first generation of lithium batteries. We are excited about this new technology because we think it could make Hawaii energy independent. Why? Hawaii’s perpetual sunshine is great for getting electricity from solar panels, but the problem is how to store all the electricity produced during daylight for use after the sun goes down. When we had a solar panel in Hilo, the sunlight filled the battery before lunch. The rest of the day was wasted electricity production. If rechargeable car batteries could store 10 times more electricity than they do now, it would solve the problem. Electric cars batteries would provide weeks of driving instead of hours and big energy users like data storage farms, bakeries, and other manufacturing could become viable in Hawaii with large amounts of electricity stored from low cost solar power. A power company in Oregon istesting a giant new type of lithium batteryto help stabilize their local power grid. When these new types of batteries become more widely available, Hawaii residents will be able to generate more low cost solar power and the island’s money spent on imported oil could instead be used to improve the land and everyone’s quality of life. Thursday, July 18, 2013 Bread is expensive in Hawaii and often hard to find fresh, so it was easy to note that my gout attacks occurred after eating a lot of bread. When researching the relationship between wheat and gout in November 2012, we could find no evidence that wheat caused gout, but we decided to try a wheat free diet anyway. Though many people report immediate weight loss on a wheat free diet, we both put on 10 lbs. The wonderful upside has been no gout attacks and the swelling and inflammation I usually have in my feet is gone. The spaces between my toes, where I usually get gout, is now much smaller as are the joints in my fingers. Though gluten intolerance is often seen as a digestive problem, eating wheat can also cause joint inflammation, skin problems, and respiratory distress without a person having digestive symptoms. Dr. Kenneth Fine, a researcher at Entero Lab, uses stool samples, rather than blood tests, to detect antibodies in the digestive tract from a reaction to gliadin. His research has found that 35% of Americans cannot tolerate wheat and more than 80% have genes types that are more likely to have problems with wheat. Instead of wheat pasta, we now eat brown rice pasta. We also replaced wheat tortillas, bread, and pancakes with our own dough consisting of rice flour and ground flax. Ground flax makes dough easier to roll out, so we don’t have to use additives like guar gum or xantham gum. We use almond flour and coconut flour to make cookies and pie crusts. (We use maple syrup and fruit as sweeteners.) We also add green pea and buckwheat (which is not wheat in spite of its name) flours, which are actually fruits, in our tortilla and pancake dough. The wheat-free diet is challenging as one must totally avoid wheat because the immune response to the gliadin protein can last up to 6 months each time wheat is consumed. It took us about 6 months for our bread craving to stop and we are just starting to feel that a wheat-free diet is worth all the trouble. We have found wheat in all sorts of products, even some yogurts and cheeses. We cut back on our almond flour and nut consumption to get back down to the weight we were before we started the no-wheat diet. From a gout perspective, getting rid of wheat has been wonderful. For the first time since I can remember, my feet and toes are not swollen. Our skin has changed remarkably; it looks younger and tauter. Our hair looks glossier, but that may be just from eating so much flax. Experiences of other 50-something guys is that it takes 4 years to get the ultimate benefit of a flat stomach. Though our bellies have shrunk, we still have 10 more pounds to lose to gain the full benefit of being wheat-free. Friday, July 12, 2013 When we first moved to the Kohala plains near Kawaihae Bay on Hawaii Island, our friends warned us about the fierce winds that blow constantly. They claimed the sparse population along parts of the Kohala coast is partly from the neverending wind. We have lived in windy places before, on the mountains of Colorado and the plains of East Texas, so we were not worried about it. Actually we were looking forward to some wind after living in Kailua Kona under the shadow of Hualalai Volcano which blocks the trade winds. It turns out that there are often months between the strongwinds in Kohala and much of the time it is only mildly breezy or completely still. However, when the famous winds start to blow, they are indeed unique. They start up in an instant; one second it is calm and the next second there is a 45 mile an hour gale that can last a week or two. Sometimes it is a steady wind and other times there are ferocious gusts that sound like a hurricane. But unlike a hurricane, the winds are dry and they actually lower the humidity. These fierce winds are called mumuku. Captain Vancouver, who visited Hawaii Island in 1793, mentioned the dangers of the mumuku winds to ships in Kawaihae Bay. The mumuku rush furiously down the valley between Kohala and Mauna Kea mountains. They are apparently foretold by an illuminated streak in the sky which can only be seen inland in Waimea, where it is said the mumuku winds originate. We were almost knocked down by the strong gusts of wind this winter which feel like a jet engine blast. The mumuku are without a doubt the strongest gusts of wind we have ever experienced. Though we enjoy being tossed around and feeling the incredible power of the wind now and then, we have learned to have great respect for these Kohala winds. On mumuku days we change the route of our daily walk to avoid being killed by flying coconuts or huge tree branches crashing down on us. We have seen trees split into pieces by the wind, branches strewn on the ground, and waves whipped into a frenzy. Driving on the Queen Ka’ahumanu Highway can be dangerous in these ferocious winds and we can’t even imagine how a motorcycle or bicycle can handle the gusts. The Hawaiian word for wind is makani, but the Hawaiians had unique names to distinguish the different types of winds and their locality on the island. Ulumano are the strong southeastern winds in Ka’u and Puna. ‘Alahonua are the light breezes in Hilo. Naulu is the sea breeze that brings sudden rain to Kohala and Apa’apa’a are the strong winds that parch Kohala. Having lived in Hilo and Kona, and now Kohala, we can attest to the dramatic differences in the winds in each place. Living on Hawaii Island in the summer without air conditioning makes any sudden breezes an incredible delight and we have come to enjoy the mumuku when they arrive.
{ "pile_set_name": "Pile-CC" }
Attention has been paid to human internal body fat in view of health maintenance. Specifically, increase in the internal body fat promotes adult diseases for example, and therefore monitoring the internal body fat can lead to prevention of these diseases and problems. There is an index called BMI for evaluating such internal body fat. Since BMI can be obtained from height and weight of a patient, it is readily used as a index for obtaining information on the internal body fat. Another index for assessing the patient's internal body fat is body fat ratio. Recently, a variety of body fat meters capable of obtaining the body fat ratio are available on the market. By using these body fat meters, the body fat ratio as an indicator of the state of internal body fat can be obtained easily at home for example. Incidentally, among the internal body fat, the visceral fat is believed to be a factor in particular contributing to various complications of heart diseases, diabetes, and so on. For this reason, the visceral fat is considered to be an important factor in view of health maintenance. Here, the BMI and the body fat ratio described above are information obtained as an average data on the internal body fat as existing in the whole body. Therefore, even if BMI or the body fat ratio gives a value which does not indicate any health problems, it is not necessarily possible to determine if there is any health problem in relation with the visceral fat. Information on the visceral fat can be obtained through a diagnosing method such as abdominal tomography by means of CT scanning, MRI and so on. Such a method allows direct observation of the abdomen itself, making possible to obtain accurate information on the visceral fat. However, such a diagnosis using CT scanning or the like is only possible with a large scale apparatus installed at a major hospital, and the results can be obtained only after a certain length of time necessary for measurement and data analysis. In addition, highly specific expertise is required for the operation of the apparatus and the data analysis. Therefore, the method is not available as a handy means for obtaining visceral fat information at home for example. It is therefore an object of the present invention to provide a visceral fat determining device that can be used easily at home or the like, for obtaining information on visceral fat.
{ "pile_set_name": "USPTO Backgrounds" }
Thallium perfusion and cardiac enzyme abnormalities in patients with familial hypertrophic cardiomyopathy. Twelve patients of five families with familial hypertrophic cardiomyopathy were examined. Within each family, the older patients showed dilation or diminished contraction of the left ventricle by echocardiography or angiocardiography more frequently than did younger patients. LDH1 fraction (lactic dehydrogenase isoenzyme) and MB-CPK (creatinine phosphokinase isoenzyme) were increased in 7 of 10 patients. Thallium-201 myocardial scintigraphy showed perfusion defect or hypoperfusion in 9 of 10 patient. Eleven cases demonstrated remarkable hypertrophy at the macroscopic level. Marked fibrosis was observed in all 5 of the 11 patients whose histologic findings were obtained. In two necropsy cases, disarray was found throughout the right and left ventricles and the pattern of fibrosis was massive. These findings were different from those of ordinary hypertrophic cardiomyopathy. It is possible that each patient with familial hypertrophic cardiomyopathy may develop more prominent thallium and enzyme abnormalities as he becomes older, regardless of whether he develops a dilated cardiomyopathy picture.
{ "pile_set_name": "PubMed Abstracts" }
1. Technical Field of the Invention The invention relates to an assembly tool for a securing system comprising: an elongate profiled-section element having a top side which is provided with two flanges which delimit a longitudinal slot, and which profiled-section element also has a base lying opposite the top side, an elongate nut body of a width which is less than the width of the longitudinal slot in the profiled-section element and a length which is greater than the width of the longitudinal slot in the profiled-section element, which nut body also has a top side, an underside and, surrounding it, two short sides and two long sides, the nut body also being provided with a bore and on the underside being provided with a downwardly projecting spring. During assembly, the longitudinal axis of the nut body is brought into line with the longitudinal slot, and the nut body is introduced into the profiled-section element between the flanges with the underside facing towards the base of the profiled-section element, so that the spring engages on the base of the profiled-section element. Then, the nut body is rotated in order to engage behind the flanges, with the spring pressing the nut body towards the top side of the profiled-section element and onto the flanges. 2. Prior Art A securing system of the type described above is known, for example, from EP 0 516 321. In a securing system of this type, it is known to introduce the nut body into the profiled-section element by hand. In the process, the nut body is pushed between the flanges of the profiled-section element, counter to the spring force, using one or more fingers, and then the nut body is rotated, an operation which generally requires two fingers. Arranging a nut body in a profiled-section element by hand in this way is laborious and in practice causes problems on account of the frequently small size of the nut bodies used and the small slot width of the profiled-section element, with the result that the space available for the fingers during introduction and rotation of the nut is small. One or more fingers can become trapped. The opposite force exerted by the spring also makes it more difficult to introduce and rotate the nut body. It is an object of the invention to facilitate the mounting of the nut body in a profiled-section element in a system of this nature.
{ "pile_set_name": "USPTO Backgrounds" }
A basic doctrine of reproductive biology, which states that mammalian females lose the capacity for germ-cell renewal during fetal life, has only recently been successfully challenged by Johnson et al., (2004) Nature 428: 145. Johnson et al. are the first to conclusively demonstrate that juvenile and adult mouse ovaries possess mitotically active germ cells that, based on rates of oocyte degeneration and clearance, sustain oocyte and follicle production in the postnatal mammalian ovary. It has been recently determined that the precursors of germ cells are not confined exclusively to the ovaries. Germ cell marker genes have now been identified in cells derived from bone marrow. In addition, transplantation of bone marrow to a conditioned host allowed for bone marrow cell development into new oocytes within the ovary. Umbilical cord blood from newborn infants is a known reservoir of stem cells that may contribute to a variety of somatic cell lineages, including hematopoietic precursors (for reviews see Korbling and Anderlini 2001 Blood 98: 2900-2908; Ho and Punzel, 2003 J Leukoc Biol 73: 547-555; Sanchez-Ramos 2002 J Neurosci Res 69: 880-893; Lee 2004 Blood 103:1669-75). Cord blood samples are easily and safely collected and may be stored for future therapeutic use (Rogers and Casper 2004 Sexuality, Reproduction & Menopause 2: 64-70); further, their availability to individual patients offers a potential source of perfectly-matched donor cells. It was heretofore unknown whether peripheral blood, such as cord blood also contained germ cell precursors.
{ "pile_set_name": "USPTO Backgrounds" }
Q: How to capture or reroute navigation voice stream There is a problem when using Google Navigation on Android with a Bluetooth device. Navigation sends the audio for the turn-by-turn instructions over the A2DP stream. I have a Motorola T605 Bluetooth car kit and it supports HFP and A2DP. I often just listen to the old fashioned car radio though. In this scenario I never hear turn-by-turn directions because my live A2DP stream is being sent to the radio AUX input but I am listening to the radio instead. My app has a feature where it reads out SMS messages to me. I have it set up so you can pick the stream you want to use for this. I prefer using AudioManager.STREAM_VOICE_CALL since it uses a dedicated separate speaker on the T605. I have looked into a few ways to handle this: 1) Reroute notifications to Bluetooth SCO instead of A2DP. I have not fund a way to do this. I am able to send TTS messages I create over this path and it works great (I have an SMS reader built into my app). I tried activating SCO but the turn-by-turn instructions stream moves to the phone internal speaker instead of the voice call stream like I would prefer. 2) Capture the navigation messages and echo them back over the SCO path. I can't find a way to intercept or capture the navigation stream though. Does Google Navigation use the TTS engine or its own methods to create the voice output? It would be great to just get the directions in a text string since I could easily send that to the TTS engine and route it where I want like I do with SMS strings. You can see my app source here: http://code.google.com/p/a2dpvolume/ Any thoughts? A: Unfortunately I think you're SOOL when it comes to rerouting the navigation messages to BT SCO. I would expect the navigation app to use either the TTS or NOTIFICATION stream type to play the messages, and both of those stream types follow the MEDIA routing strategy (for NOTIFICATIONs that is at least typically true when there's no active voice call). Although the behavior is up to each vendor to decide, my guess is that you'll find that in most implementations streams that follow the MEDIA routing strategy won't ever be routed to BT SCO, except during an ongoing voice call that is routed to BT SCO. The best you could do in terms of routing is to force the routing to the loudspeaker, or to "anything but A2DP" (which means wired headset if one is attached, or the loudspeaker otherwise). Here's how you could do that (I haven't verified that this works on every phone out there): Class audioSystemClass = Class.forName("android.media.AudioSystem"); Method setForceUse = audioSystemClass.getMethod("setForceUse", int.class, int.class); // 1 == FOR_MEDIA, 10 == FORCE_NO_BT_A2DP (FORCE_SPEAKER would be 1). setForceUse.invoke(null, 1, 10);
{ "pile_set_name": "StackExchange" }
378 Pa. 1 (1954) Allega, Appellant, v. Eastern Motor Express Co., Inc. Supreme Court of Pennsylvania. Argued March 31, 1954. May 24, 1954. Before STERN, C.J., STEARNE, JONES, BELL, MUSMANNO and ARNOLD, JJ. *2 V.J. Rich and Randall J. McConnell, Jr., with them Samuel J. Margiotti, Margiotti & Casey, Dickie, McCamey, Chilcote, Reif & Robinson, for Angelo Allega. Bruce R. Martin, with him Dalzell, Pringle, Bredin & Martin, for Eastern Motor Express Co. et al. OPINION BY MR. JUSTICE ARNOLD, May 24, 1954: These trespass actions arise out of a right angle collision between the automobile owned and driven by appellant and a tractor trailer driven by appellee, Cale, as the employe of appellee, Eastern Motor Express Co., Inc. A verdict as to the other defendant, Zurcher Truck Lines, Inc., was entered because of failure to prove agency. Appellant had as passengers his parents, who were killed, and his brother, who was injured. In one action, appellant sued for his own damages, and in another sued as administrator of his parents' estates. His brother also sued for personal injuries. In the actions *3 by the brother and the administrator, appellant was made an additional defendant. For these appeals the pertinent facts are: Allegheny and Western Avenues in the city of Pittsburgh intersect at right angles, the intersection being controlled by traffic lights which at the time of the accident were blinking red for Western Avenue traffic and yellow for Allegheny Avenue traffic. Thus, vehicles on Western Avenue were obliged to come to a stop before proceeding into the intersection and those on Allegheny Avenue could proceed without stopping but "with caution." Appellant was driving on Allegheny Avenue, and when 20 or 25 feet from the nearest curb line of the intersection he saw appellees' trailer some 75 feet from the intersection, approaching from his right on Western Avenue at a speed of 30 to 35 miles per hour. At this point appellant reduced his speed to 10 miles per hour, assumed that appellee would stop, and proceeded into the intersection without again looking to his right or paying any further heed to the actions of the trailer. The trailer continued into the intersection and struck appellant's automobile at about the middle of the intersection. The court entered a compulsory nonsuit in appellant's individual action because of his contributory negligence, but left to the jury the question of his liability as additional defendant in the other actions; that is, the jury was allowed to determine whether appellant's negligence was a substantial factor of harm in the accident.[1] The jury found that it was not, whereupon *4 appellees moved for a new trial which was granted solely on the question of the additional defendant's liability with them. The court gave as its reason for the new trial that it erred in not declaring as a matter of law that appellant's negligence was a substantial factor of harm. Appellant appeals from both orders. That appellant was negligent as a matter of law cannot be seriously questioned. Although he had the technical right of way and had a right to assume that the duty owed him would be performed (Martin v. Gall, 370 Pa. 258, 87 A. 2d 925), yet he did not have the right to proceed blindly into the intersection, oblivious of the actions of one he already knew was proceeding towards the intersection in the manner of this appellee. In sustaining a nonsuit Justice BELL stated for a unanimous Court in Lewis v. Quinn, 376 Pa. 109, 113, 101 A. 2d 282: "The signal to cross is not a `command to go, but a qualified permission,' and the qualification is `to proceed lawfully and carefully,' as a prudent man would under the circumstances, which certainly requires looking to the right and left before entering upon the intersecting street. To hold otherwise, and as contended by defendants, would be to relieve drivers from vigilance and careful driving at street intersections, and license them to drive blindly where traffic is most dangerous. It would greatly increase the peril of street crossings for both pedestrians and motorists. It is for this reason that we would emphasize the fact that so far as the degree of care required of motorists or other drivers at street intersections is concerned, there has been no change in the law of negligence by the introduction of traffic officers and signals." This was not even the case of a "green light" in his favor but one plainly demanding that he proceed *5 "with caution."[2] Undoubtedly if he had continued to observe the trailer, he could not but have known that it would not stop — contrary to his unjustified assumption; and the accident would not then have occurred without contributory negligence on his part. Under these circumstances, nonsuit was entirely proper: Byrne v. Schultz, 306 Pa. 427, 160 A. 125; Lewis v. Quinn, 376 Pa. 109, 101 A. 2d 382. Neither was there error in the grant of a new trial as to the matter of liability among the original and additional defendants. Under the facts, the court was in error in permitting the jury to determine that appellant's negligence was not a substantial factor of harm in the accident. As we have stated, his negligence necessarily had to be declared as a matter of law, which the court did, and it was also necessarily a substantial factor of harm in the accident, which fact also should have been declared by the court. "It is the duty of the court to determine whether, upon the facts which are admitted, . . . or reasonably inferable from the evidence, the actor's conduct is a substantial factor in bringing about harm to another, unless the question is open to a reasonable difference of opinion, in which case it is to be left to the jury: "Restatement, *6 Torts, § 434; Murphy v. Neely, 319 Pa. 437, 179 A. 439. The several orders are affirmed. NOTES [1] "It is the duty of the court to determine whether, upon the facts which are admitted, . . . or reasonably inferable from the evidence, the actor's conduct is a substantial factor in bringing about harm to another, unless the question is open to a reasonable difference of opinion, in which case it is to be left to the jury.": Restatement, Torts, § 434. [2] "(a) It shall be unlawful for the driver or operator of any vehicle, street car, or trackless trolley omnibus to disobey the directions of any traffic signal placed in accordance with the provisions of this act, unless otherwise directed by a peace officer. "(f) Flashing yellow or caution signals. — A signal when illuminated by rapid intermittent yellow flashes shall indicate `Caution'.. . . "(g) . . . a signal when illuminated by rapid intermittent red flashes shall require the operators of all vehicles and street cars and trackless trolleys to observe the same regulations as for through traffic stop signs and signs at stop intersections. . . .": Act of 1929 P.L. 905, as amended, 75 PS § 635.
{ "pile_set_name": "FreeLaw" }
“Across the board [constitutional environmental rights] allow for more collective agreement. They would help prevent polarizing the discussion when talking about other environmental issues; we’d all start at the same– — place. Right now the question is ‘are [environmental rights] even important?’. But once they’d be part of the constitution, it would allow us to get past that first question of importance. We’d never have to preface discussions with whether or not they are important and why [….] we’d just get to talk about solving those environmental issues.” 2) What do you think people in Edmonton can and/or should do to further the cause of environmental rights? (Directly/Indirectly?) “Have patience. A lot of people are just starting to recognize the importance of environmental rights, whereas [other] people have devoted their whole lives. Right now there is a ‘coming of age’. We need more discussion with Edmonton experts. Edmonton is a huge importer of knowledge and exporter of experts, we have incredible people in the science and humanities side who have actively made [environmental issues] part of their business culture. There were previous conversations that bent towards ‘the environment versus entrepreneurship’. But now you’re seeing more, [both] as an international and local trend, if you want to succeed in business, be it from office culture all the way to pleasing shareholders and eliminating risk, you have to include and address environmental issues. So people should just be patient and keep working towards those goals in whatever way they can.” 3) What are you (or your organization/business/group) doing to further the cause of environmental rights? “For the last 10 years the business I am a part of, EcoAmmo, has worked to help people see where they can fit environmental improvements in their decisions, projects, etc. The aim of [EcoAmmo] is to move towards greater sustainability….so we come from place where we see environmental rights as important. We create an outlet for change by leading by example to improve where we live. For example, our focus is with ‘green’ building and efficiency. In Edmonton, we expanded the city’s market for green building choices, and so that is how I think we further the cause of environmental rights.” 4) 110 nations around the world recognize their citizens’ right to a healthy environment. Why do you think Canada hasn’t done this yet? “We [Canadians] think we are so ‘resource rich’ because we see nature all the time. [So] by default we think we already exist in a healthy environment, and think we don’t need the help … — –I think the Alberta government just started using the words ‘climate change’ about 600 days ago. In the previous conservative government we could not say climate change. But thankfully this has changed, the government is only now addressing the issue. Also, we [the people] are still so polarized in how we talk, and we don’t challenge our government. We don’t see the major challenges that will become more common from an environmental health and wellness issue. We just don’t see it in ‘our backyard’ we haven’t felt it first hand enough yet.” 5) Would you be willing to sign the ‘Blue Dot Pledge” (*at http://bluedot.ca/join-us/), joining the over 100,000 Canadians, and declare that you “[b]elieve every Canadian deserves the right to a healthy environment”? . “Yes. Absolutely.” For more information on the work Ms. Budeniuk does, please visit EcoAmmo’s website at http://www.ecoammo.com. Also, Ms. Budeniuk is currently running for Edmonton city councillor for ward 11. So to stay informed of her campaign, follow her on twitter @votebrandy.
{ "pile_set_name": "Pile-CC" }
Q: Alternative to "echo" withe less code/characters? As per the title, is there a quicker way to display something in PHP without using echo, so for example is you are using GET[1] taking code from a parsed parameter "1" and displaying it to the screen. A: there are shorthand echo statements that looks like: <?=$_GET[1]?> although you must have this feature turned on. short-open-tag
{ "pile_set_name": "StackExchange" }
Q: powerquery: importing & transforming data from all Excel files in a folder where two tables on the same sheet I am trying to use PowerQuery to load and transform data contained in each "Sheet1" of a number of files in a folder. The issue i am having is that there are two tables in "Sheet1" and I don't know how to combine the two tables, and keep the shared Date/Weekday titles. I have searched to no avail on the internet. I have found no reference to PowerQuery importing and transforming data, from all Excel files in a folder, where there are TWO tables in the same sheet. I include an image of the two tables and the desired output (First two rows for layout). Note: Range Sheet1!"A2:B2" is merged. Any help gratefully received. A: Thank you. That was part of my VBA solution below. I came up with two solutions in the end. Solution 1: VBA script: Looped through Excel files in a folder and found the relevant table headings. then used current region to copy paste to an added sheet e.g. ''Code to loop files then... Set rngAdm = Worksheets("Figures").Range("A:B").Find("Daily Admissions", lookat:=xlPart) If Not rngAdm Is Nothing Then 'Add sheet for creating Admissions table Sheets.Add.Name = "Adm" 'Grab data and paste across rngAdm.CurrentRegion.Copy Sheets("Adm").Range("A1") 'Clear merged cell Range("A1:B2").UnMerge 'Code to transform...... I then wrote some script to transform into a clean data set and make into a table. Solution 2: Powerquery -Loop over files in folder with two queries, using the remove rows>remove alternate rows feature to specify the pattern to pull the tables of interest out separately,then transforming the data, then merging the two queries. It was the ability to specify patterns for start row and number of rows to keep i was unaware of, hidden behind the remove rows heading. Notes: I used VBA to loop through the source folder and rename the files so they were in the correct order for loading. I then used the following two excellent posts to identify and remove duplicates: http://forum.powerpivotpro.com/forums/topic/power-query-remove-duplicates-keep-highest-id/ http://www.excelguru.ca/blog/2015/12/09/identify-duplicates-using-power-query/ By grouping on ID, combining sort [Date] asc, sort [Index] desc and removing duplicates [ID], i was able to keep just the last imported row of each duplicate set. Q
{ "pile_set_name": "StackExchange" }
LIPNUR Belalang __NOTOC__ The LIPNUR Belalang (grasshopper in Indonesian) was a military trainer aircraft built in small numbers in Indonesia in the late 1950s. It was essentially a Piper Cub converted to give it a low wing. Variants Belalang 85 - single prototype Belalang 90 - five production aircraft Belalang 90A - 75 kW (100 hp) Continental O-200 engine replacing 67 kW (90 hp) Continental C-90-12F of earlier versions, sliding canopy, revised undercarriage. Specifications (90A) References Taylor, John W. R. Jane's All The World's Aircraft 1965-66. London: Sampson Low, Marston, 1965. Category:1950s Indonesian military trainer aircraft
{ "pile_set_name": "Wikipedia (en)" }
Q: Akka-Http: How to TestProbe a request I have a request whose response depends on an actor reply. I am trying to test it in this way: val myActor:TestProbe = TestProbe() val route = new MyRoute() { override def myServiceActor:ActorRef = { myActor.ref } }.route "return a query result for GET" in { Get("/foo") ~> route ~> check { myActor.expectMsg(ExecuteFoo()) myActor.reply(FOO) responseEntity shouldEqual toJsonEntity(RequestResult(FOO)) } } I get correctly that expectMsg is verified but the reply is asynchronous respect to the responseEntity check. In this case the test fails. Is there a way to wait for the reply? A: You're on the right track using a TestProbe. The key is to separate the combination of running the request and then checking it (which you are doing as 1 step via check) into two explicit steps. First run it, then do any stubbing on the TestProbe and lastly, make your checks. The updated code for your sample would look like this: val result = Get("/foo") ~> route ~> runRoute myActor.expectMsg(ExecuteFoo()) myActor.reply(FOO) check { responseEntity shouldEqual toJsonEntity(RequestResult(FOO)) }(result) You can see there that I'm first using runRoute to simple run the route without performing any checks. I assign this value to result as I will need this later to perform any checks. Then, you can safely do your stubbing against the TestProbe. At this point, it's already received the message and is waiting for your calls to verify what message it got and how to respond. Then, when done with that, we can call check, passing an explicit result (the one from runRoute) to that call instead of relying on an implicit. If you follow this approach, you should be able to properly test routes that call an actor, using a TestProbe to do so.
{ "pile_set_name": "StackExchange" }
We are Latter-day Messengers and Advocates for Jesus Christ and His Gospel Restored. Sunday, February 12, 2006 The Press and Prophets--A Long History In Utah The battle between the press an prophets is not at all limited to the European press and the prophet Mohamed. America’s own home grown prophets have been lampooned, as far back as the 1870's. Pat Bagley the editorial cartoonist with The Salt Lake Tribune asks: What do you get when you mix a prophet, unflattering portrayals of said prophet and a furious debate regarding the responsible exercise of free speech? The birth of The Salt Lake Tribune. Today’s Tribune is tame by even its own historical standards; however, there was a time when it cut its teeth on the Mormon Prophet Brigham Young. Shortly after colonizing the Salt Lake Valley, Brother Brigham taught the Saints to eschew Babylon, i.e., The United States of America. His focus was to become economically self sufficient, as well as politically self sufficient in order to build their Zion out west. Others within the flock, felt differently, and wanted to open up economic intercourse with Babylon, creating a win/win situation. One of these pro-business leaders was William Godbe, a Mormon in good standing, until he ran afoul of Brigham Young’s counsel of self-sufficiency. In the late 1860's, just as the Saints were settling into the Salt Lake Valley, Godbe and his followers started up a rival newspaper to the Church’s Deseret News. It started as the Mormon Tribune, but soon became the Salt Lake Tribune, the forerunner of today’s Tribune. The first editions of the Salt Lake Tribune, were not necessarily anti-Mormon as much as they were pro-business; however, that soon changed once a trio of Kansans ruffians took control of the Tribune in 1873: Excommunicated in 1871, Godbe and like-minded confederates opened a rival newspaper to the LDS Church's Deseret News. It was called The Mormon Tribune, but was soon renamed The Salt Lake Tribune. Initially, The Tribune wasn't anti-Mormon. It trumpeted the virtues of capitalism and integration into the economic life of the nation. But things soon turned nasty. When three Kansans took control of the paper in 1873, the gloves came off. Delighting in poking the dominant culture with a sharp stick, The Tribune never met a polygamy story it didn't like. But its special venom was reserved for Brigham Young. Hence began a life long rivalry between the official Church publication of the Deseret News, and the Salt Lake Tribune, which for many years was overtly anti-Mormon in its coverage; however, it did seem to harbor a particular hatred for the Prophet Brigham Young, whom it described as: "He was illiterate, and he has made frequent boast that he never saw the inside of a schoolhouse. His habit of mind was singularly illogical, and his public addresses the greatest farrago of nonsense that ever was put in print. He prided himself on being a great financier, and yet all of his commercial speculations have been conspicuous failures. He was blarophant and pretended to be in daily intercourse with the Almighty, and yet he was groveling in his ideas and the system of religion he formulated was well nigh Satanic.” These descriptions of Brigham Young, make the recent cartoon caricatures of Mohamed seem mild by comparison. The Mormon response, in comparison to the lunacy of some Islamic fundamentalists, was also rather mild: This being America, The Tribune was free to print material insulting to a revered prophet (it was also apparently free to make up words like "blarophant"). The days when Mormons would spill type into the street for such an offense were apparently over. For years Mormon umbrage at a free-but-irresponsible press was limited to sermons urging members to subscribe to the Deseret News and not that scurrilous anti-Mormon rag. My grandmother remembered hearing such admonishments in her East Millcreek ward. She said it made sneaking a peek at the Trib just that much more of a guilty pleasure. Even today, there is a distinct flavor and feeling amongst some within the shadows of the everlasting hills between the two Salt Lake daily newspapers. Still, how refreshing the Mormons of yesteryear or even today do not take to the streets burning beehives in effigy for perceived assaults by the press against revered religious figures. Certain folks in Islam should take note. Update 7:15 a.m. A quick question for Pat. As I recall you prepared for your career by lampooning some pretty funny cartoons at the Daily Universe at The Lord's University, about the same time I attended. So, how on earth did you end up at such a heathen publication as the Salt Lake Tribune? Does your bishop and stake president know about this?
{ "pile_set_name": "Pile-CC" }
Q: CytoscapeJS calling setState function in React I am trying to make a nodemap, visualized with cytoscapejs in react. When trying to run the following code i get the error "this.handleTextChange is not a function". Is it not allowed to call a function from within a const? It compiles just fine, but when clicking a node, the error occurs. import React from 'react'; const cytoscape = require( 'cytoscape' ); const cycola = require( 'cytoscape-cola' ); cytoscape.use( cycola ); export class NodeBox extends React.Component { constructor( props ) { super( props ); this.componentDidMount = this.componentDidMount.bind( this ); this.state = { description: '' } this.handleTextChange = this.handleTextChange.bind(this); } handleTextChange(text){ this.setState({description: text}); } componentDidMount() { const cy = cytoscape( { container: document.getElementById( 'cy' ), boxSelectionEnabled: false, elements: this.props.elements[0], style: cytoscape.stylesheet() .selector('node') .css({ 'label': 'data(name)', 'width':'data(size)', 'height':'data(size)', 'border-width':'3', 'border-color': '#618b25', 'background-fit':'cover', 'background-image': 'data(img)' }) .selector('edge') .css({ 'curve-style': 'unbundled-bezier', 'control-point-distance': '20px', 'control-point-weight': '0.5', // '0': curve towards source node, '1': towards target node. 'width': 1, // 'line-color': '#618B25', 'target-arrow-color': '#618B25', 'target-arrow-shape': 'triangle' }) }, 'layout':{ 'name': 'cola', 'maxSimulationTime': 0 } ); cy.panningEnabled( false ); cy.on('tap', 'node', function(evt){ var node = evt.target; if (node.id() !== 1){ console.log(node.data('description')); this.handleTextChange(node.data('description')); } }); cy.panningEnabled( false ); } render() { return <div> <div style ={{'height':300, 'width':'100%'}} id="cy"> </div><h1 id="desc" style={{textAlign:"center"}}>{this.state.description}</h1></div>; } } Is there any other way to work around this without setting state? A: 1) You don't need to bind componentDidMount to this. So, remove the following this.componentDidMount = this.componentDidMount.bind( this ); 2) Use arrow function to lexically bind this, the value of this remains the same as the context in which the arrow function is defined. So, change to the following cy.on('tap', 'node',(evt) => { var node = evt.target; if (node.id() !== 1){ console.log(node.data('description')); this.handleTextChange(node.data('description')); } }); Aside : Most emitters (like EventEmitter in Node, jQuery listeners, or Cytoscape) are going to use Function.apply() to set this in the callback to the emitter object --- which is why (2) is necessary.
{ "pile_set_name": "StackExchange" }
style clothes for men (119) research more new ware about your web shop currently!many of us offers many style clothes for men sell with extraordinary low price.that’azines real along the way of you to definitely seek the products you want inside our online store.lots of style clothes for men can be found on tbdress, a respected online store from china.and all merchandise listed here take pleasure in good high quality.fashion design and premium quality make them the very best style clothes for men you ever seen.throughout anyplace on the planet, we offer you the rapidly produce assistance.retail outlet this on our online store.
{ "pile_set_name": "Pile-CC" }
Many ball games either require or are enhanced by devices which restrict the movement of the ball. For example, most baseball playing fields include a backstop located behind home plate consisting of a vertical screen, commonly extending toward first and third base for some distance, and often with an overhead roof component. The purpose is to prevent the ball from leaving the immediate area of play when thrown or struck into the backstop. The result is one of both utility and safety since spectators may locate behind the backstop for protection. In most instances these barriers are permanent structures consisting of steel chain link or wire screens supported by steel or wood frames. Although this type of construction is generally durable, it is also relatively expensive. Furthermore, the barrier normally must be utilized where originally built since relocation is difficult. The fields on which they are constructed often may not be utilized for other sports or activities due to the physical restrictions which they impose. For example, permanent baseball backstops can impede the seasonal use of otherwise large open areas for soccer or football. Semi-portable devices are known, such as backstops and cages with wheels attached thereto. Other relatively small devices have been built without permanent attachment to the ground to allow for manual relocation. U.S. Pat. No. 4,072,295 to Roberts (1976) discloses a foldable, transportable backstop. However, the ease and speed of relocation of such existing devices is arguable. The practice of many ball games is also aided by the use of projectile arresting devices. Baseball pitchers can practice without a catcher by throwing balls into a backstop or screen. Similarly, a batter may hit balls off a tee into such devices. Pitchers and batters often practice together in a cage-like enclosure which restricts the flight of the ball to a predetermined limited area. Many such practice devices are at least semi-portable. The most common construction consists of netting suspended between rigid support posts or frames which are in turn often stabilized by tension guys to the ground plane. As an example, U.S. Pat. No. 3,593,997 to Boehner (1971) discloses a batting cage of this type of construction. In actual use this type of construction imposes several disadvantages. Balls may strike the rigid material resulting in damage over the long term. The rigid materials can also cause high energy rebounding of the ball resulting in a safety hazard or other undesirable performance characteristics. High energy rebounding can also be caused by the tautness of the screen or its supporting ropes or cords. Such construction can be difficult to assemble and adjust to the desired shape. Also, these structures can tend to lose shape and stability with use. U.S. Pat. No. 4,127,267 to Bay and DiMarco (1977) discloses a device with improved energy absorbing capability over previous devices. This is accomplished by removing rigid materials from the path of the projectiles and by hanging the netting relatively loosely from its supporting frame. This device also returns to its proper shape by gravity after impact by the projectile. These improvements, however, are the result of a collapsible support which is relatively complicated, heavy, and expensive to manufacture. The primary disadvantages of currently known projectile arresting devices utilized as screens, backstops, nets, and cages for the purpose of restricting the flight of a game ball during the playing or practicing of sports such as baseball, soccer, golf and tennis are summarized as follows: 1. They are often permanent structures which are difficult to relocate and expensive to construct. PA0 2. Portable devices are often heavy and otherwise difficult to assemble and transport. PA0 3. Many devices tend to loose their shape and stability after use. PA0 4. Rigid elements are subject to damage when struck by projectiles. PA0 5. Rigid elements tend to reflect projectiles without dissipating kinetic energy leading to potentially unsafe operating conditions. PA0 6. Taut screens and highly tensioned support ropes and cords tend to reflect projectiles without dissipating kinetic energy leading to potentially unsafe operating conditions. PA0 7. Devices which address some of the previously mentioned disadvantages are expensive to manufacture. PA0 1. All rigid materials are located outside of the potential path of the projectiles. PA0 2. The barrier which arrests the flight of the projectiles is completely flexible. PA0 3. The potential for high energy rebound of the projectile is minimized. PA0 4. The kinetic energy of the projectile is absorbed and dissipated safely by the response of the device to the impact of the projectile. PA0 5. The device retains its original shape after repeated use. PA0 6. Assembly and disassembly of the device is easy and does not require skilled labor, special tools, or equipment. PA0 7. The device can quickly and easily relocated. PA0 8. The materials of construction for the device may be extremely light in weight. PA0 9. The materials of construction are commonly available; the manufacture does not require skilled labor nor sophisticated equipment or processes; and, consequently, the device is very inexpensive.
{ "pile_set_name": "USPTO Backgrounds" }
Scott Avett of the Avett Brothers: On Punk Rock, Rick Rubin and Social Distortion One would be hard pressed to find more honest music than what the Avett Brothers are crafting these days. With songs about lost love, alcoholism, familial bonds and everything in between, the Avett Brothers have their collective finger on the pulse of the common man. Their lyrics are relatable and their delivery is genuine. In speaking with Scott Avett his enthusiasm for his music and his appreciation for the continued support from the fans keep him and his brother, Seth, working at a high level. Reserved, humble and polite, Scott discusses inspiration, the significance of winning awards and gives his pick on who would win in a street fight between Charles Bronson and Chuck Norris. OC Weekly: First off, congrats on your big Americana Music Association award for Duo/Group of the Year. What's the significance of winning something like that? Scott Avett: Well, I guess there have been different perspectives for me throughout performing and getting into the realm where awards are even talked about or even around. I think that they need to be looked at as extremely unimportant unless you get one and then you need to be aware of how important that can be or how much it can mean, not just to you, but for people that support what you do and love what you do and really make an effort to see that sort of advancement...So it's kinda like any praise from anyone - you don't have to have that to carry on, by any means, but at the same time if that sort of thing if is to come to you there is all the room in the world to be gracious. Kinda like, [awards] only means something if they come to you, if they don't [the awards] don't mean a thing. We are careful to be extremely, extremely appreciative of when they come because it always seems to be a surprise when you get praise, especially in the form of an award for something you just were going to do regardless. You guys have a show coming up Saturday here in Orange County and the bill is pretty punk heavy. While there may be punkish elements to parts of your catalog you guys certainly aren't a punk band. Speaking to that, what was your earliest exposure to punk rock when you were coming up? Well, as far as early exposure, it wasn't as direct to what really great punk was. We got kind of an indirect draw...For me, guys like Mike Patton, later forms of Glenn Danzig were things that were turning me on. I wasn't aware of Black Flag. I don't even know if I can be specific with genres. We grew up in the country and we just got these tracks and were told 'This is hardcore, this is punk rock, this is metal." I didn't even really know, I just think you can kind of throw a lot of things into the punk realm. I remember going to a Jesus Lizard and Helmet show in the early 90's that was really inspiring to me. And once again, you know, Helmet, I don't think falls into punk rock nor Jesus Lizard. I know their attitude sure was as punk rock as it could be. They were just really, really abrasive and great. How did this billing come about? We had been invited to play some shows with Social Distortion that weren't on the West Coast maybe a couple of years ago and we couldn't make it happen because we couldn't afford to make it happen. We had been on tour and they were like isolated shows where we would have to take the whole group, fly out and get out there and we couldn't make it happen. It was really, really hard not to let it happen because it was such an honor and would've been amazing. So, when it came back around and this time it was like, 'Hey, we could swap off. You'll do a show in Nashville and we'll do a show in California.' It'll be kinda like flipping each others home turf and we jumped all over it. Have you spoken or met with Mike Ness before? I have not, but I know his solo record that came out years ago was an awesome presence for me and a couple of friends. These musicians friends of mine were big fans and we can relate to Mike because punk rock and early country have so many similarities. For us, goin' on the road with BR549 there were guys that were out on that tour that came to see the show and they really could have done without us for sure. They were rockabilly guys, punk rock guys and you know they weren't always pleasant and we'd just do our thing, put it out there and move on. I feel like with Mike Ness, his music and what he does out there seems to be in the same vein and in the same spirit that we and BR549 or many of the country/rockabilly/punk country and some even folk, these days, put out there. The term "Punkgrass" has sometimes been used to describe the Avett Brothers sound. Where did this term come about? I have no idea. It was more about early on when we were playing a lot more erratic and fast. We would do bluegrass tunes and we had some that were originals that we delivered with a lot of angst and a lot of speed. That was at a time that we were living with a lot more angst, I mean we are talking like seven or eight years ago and back then I think that term got thrown out a lot more. I think that there is a broader approach that we take now. Up until the Autumn of 2001 you and your brother were in a band called Nemo which was described as a "neo-punk" band. With most everything out of print and no audio to be found online what can you tell us about the band's sound? We were a five-piece, basically two big stacks, two guitars, a bass, a drummer and me singing. It was pretty straightforward. One guitar, a Gibson, was played with a really low, sludge-y sound and the other was more of a screaming sound that my brother played and we did do quite a bit of harmonies. There was a lot of melodic singing, but there was also lot of screaming. At some point, there will be an EP that will be re-released that we never got out. I hope it will be out in the next year or so. They are working on it now. [The EP] was the best example of what that sound was. I would say that if we would have kept going down that path we probably would have had a similar sound to that of someone like The Mars Volta. There were definitely a lot of changes throughout the music, but we also had a Southern rock feel to it that came out some. I and Love and You was your first album on a major and marked your first time working with Rick Rubin. You are finishing up the sophomore effort and Rubin was back at the helm. What was round two like? The biggest difference in this record is our trust with Rick has grown many, many steps to the point where we trust each other's judgment and work so we're left to work at our pace. The other difference is we brought well over 20 songs to the table and instead of just recording what we needed for an album we decided to record everything to its completion so all 23 or 24 songs were recorded. We are now finished and working in postproduction with basically well over an album's worth of work, probably two. Not to say there are going to be two albums, but to say there has been many more songs to come from it because of that efficiency, work and trust. Any album name or release date in mind? No album name yet and we don't have a release date, but my guess would be that it will be released sometime in the first half of 2012. Final question: Who would win in a street fight - Chuck Norris or Charles Bronson? Oh man. Umm...Charles Bronson. No doubt. Why? Because I think he would be willing to bite somebody's nose off or something. Charles Bronson is a dangerous man. You can just see it. You can see it in his eyes and you can see it in his mustache. No offense to Chuck Norris.
{ "pile_set_name": "Pile-CC" }
Q: Sort column in pandas, then sort another column while maintaining previous column sorted So I have some data on lots of publicly traded stock. Each data row contains an id, a date, and some other information. Naturally, a stock might appear many times in the dataframe (i.e Google might have several entries that correspond to different dates at which the price was updated). I want to be able to sort the ids, then for each sorted block, sort the dates. NOTE: sorting is done in ascending order for the sake of the example. id date price 0 123 2015/01/13 x 1 114 2017/02/15 y 2 12 2016/12/02 z 3 123 1996/04/26 w 4 114 2014/02/23 u 5 114 1995/05/25 v Sorting the ids gives: id date price 0 12 2016/12/02 z 1 123 2015/01/13 x 2 123 1996/04/26 w 3 114 2017/02/15 y 4 114 2014/02/23 u 5 114 1995/05/25 v Sorting the dates WHILE the ids are fixed gives: id date price 0 12 2016/12/02 z 1 123 1996/04/26 w 2 123 2015/01/13 x 3 114 1995/05/25 v 4 114 2014/02/23 u 5 114 2017/02/15 y A: It seems you need DataFrame.sort_values: df['date'] = pd.to_datetime(df['date']) df = df.sort_values(['id','date']) print (df) id date price 2 12 2016-12-02 z 5 114 1995-05-25 v 4 114 2014-02-23 u 1 114 2017-02-15 y 3 123 1996-04-26 w 0 123 2015-01-13 x Or if id column is string: df['id'] = df['id'].astype(str) df['date'] = pd.to_datetime(df['date']) df = df.sort_values(['id','date']) print (df) id date price 5 114 1995-05-25 v 4 114 2014-02-23 u 1 114 2017-02-15 y 2 12 2016-12-02 z 3 123 1996-04-26 w 0 123 2015-01-13 x You can also sort one column descending and another ascending: df['id'] = df['id'].astype(str) df['date'] = pd.to_datetime(df['date']) df = df.sort_values(['id','date'], ascending=[False, True]) print (df) id date price 3 123 1996-04-26 w 0 123 2015-01-13 x 2 12 2016-12-02 z 5 114 1995-05-25 v 4 114 2014-02-23 u 1 114 2017-02-15 y
{ "pile_set_name": "StackExchange" }
Good Website to Buy Runescape 3 Gold Cheap with 10% Off While Comaneci was the product cheap rs gold of a state system, Ms. Douglas is part of a social system that should perhaps be the next reality show right after Dance Moms. There is a wowfactor to the similarity of the tugofwar between trainers, parents, and little girls raised both to perform and be ruthless in their dedication to the sport, rather than emotional or social ties.. Bert le Clos celebrates his son Chad's swimming gold in style. He tells BBC's Clare Balding: "Unbelievable, unbelievable, unberrrleevable. I've never been so happy in my life. "I was very psyched," Swanson said of the clearance, which came after Brigham missed her first try. "I knew when she missed her first one that I'd be in first place and that was a huge deal. Garber) was trying to get me to calm myself down. GAME FOUR: Garden City 38 Throckmorton 36 OT. My! MY !! It was a contest that those who were there to see it will not soon forget. Garden City is a very talented team. I recently enrolled my daughter at Gold Medal Gymnastics and she just loves it. My daughter is 5 years old and when I walked in I knew that we had found a fit for her. The place is owned and operated by Amanda Borden, former Olympic medalist 1996 and for one, there are several instructors that have a specific class that they see for each session. In a 2002 study, Solomon and a colleague also linked Antarctica ozone hole to a strengthening of winds that circle the continent in summer, causing net cooling over most of Antarctica but extreme warming over the West Antarctic Peninsula. She has also written several books. In The Coldest March, published in 2002, she reconstructed the weather during British explorer Robert Scott 1911 expedition to Antarctica to argue that abnormally cold conditions and not incompetence led to the deaths of Scott and his crew. On Monday, though, his attention was squarely focused on Southern Maryland. He and his modest entourage began at Patuxent River Naval Air Station before heading to the College of Southern Maryland campus in Prince Frederick. Then, Robinson and Kirk inspected the rolling out of the sod at stillinprogress Regency Furniture Stadium in Waldorf. Looking to ourselves, as adults we feel good when the work we do is appreciated and acknowledged, and become increasingly frustrated if we feel taken for granted. Video games provide that constant reinforcement and reward. Another source of appeal for many games is that they grant a feeling of control and competency. In order to celebrate the coming Father's Day, Rs3gold.com will offer customer up to 10% off for rs products from June 14 to June 23, 2017. Please choose the following coupons: 10% off code"HER10" for order value more than $300 9% off code"HER9" for order value between $80 and $300 8% off code"HER8" for order value between $30 and $80 7% off code"HER7" for order value less than $30 While 8% off code "NEW8RS" for all rs products is also available. Meanwhile,10% off code "RSGACC" for RS 2007 ACCOUNT is available as well.
{ "pile_set_name": "Pile-CC" }
In vitro Assessment of Adsorbents to Counteract Lead Toxicity in Ruminal Fermentation Department of Animal Science, College of Abouraihan, University of Tehran, Tehran, Iran Abstract An in vitro gas production technique was used to evaluate the effects of different adsorbents on the gas production parameters of lead-exposed diet. Ruminal fluid, obtained from fistulated sheep (3-4 years of age and 40±5 kg BW), and experimental diets samples, 200 ± 0.2 mg DM, were incubated in 100 mL glass bottles. To each bottle, one of the following treatments was applied: 1) control (no Pb and adsorbent), 2) 15 mg/kg DM Pb as Pb acetate and no adsorbent, 3) 15 mg/kg DM Pb as Pb acetate and 3% activated carbon, 4) 15 mg/kg DM Pb as Pb acetate and 3% nanoclay and 5) 15 mg/kg DM Pb as Pb acetate and 3% bentonite. Supplementation of ruminal medium with 15 ppm Pb significantly (P<0.01) decreased total and rate of gas production at all incubation times. Rate and total gas production were significantly (P<0.05) higher for nanoclay compared to control and the other adsorbents treatments. Lead inclusion decreased organic matter digestibility (OMD), net and metabolizable energy contents and short chain fatty acids production (P<0.01). Among the adsorbents, nanoclay showed to be more effective on ruminanl fermentation parameters and improved rate and total gas production. Both primary and secondary lead–zinc smelters have been implicated in producing lead toxicity in cattle, buffalo and goat reared around these industrial units (Radostits et al. 2000; Swarup et al. 2006). The higher lead levels in animals reared around such industrial activities are mainly due to ingestion of pasture contaminated with lead as well as inhalation of lead particles (Mohajeri et al. 2014). These toxic trace elements hinder rumen fermentation, thereby decreasing the productivity of ruminants. Forsberg (1977) showed that the elements can causing 50% inhibition of in vitro rumen fermentation. Ions of heavy metals may also inhibit activity of some ruminal enzymes (Faixova and Faix, 2002). Despite of this fact that the effect of heavy metal contamination on rumen fermentation has been previously reported (Faixova and Faix, 2002; Forsberg, 1977), based on our survey it appears no literature on the effect of adsorbents supplementation on ruminal fermentation parameters of sheep chronically exposed to lead contamination. Therefore, the present study was aimed to assess the effect of different adsorbent supplements on in vitro ruminal fermentation parameters. MATERIALS AND METHODS In this study an in vitro gas production technique (Menke et al. 1979) was used to estimate fermentation parameters, organic matter digestibility (OMD), net energy (NE) and metabolizable energy (ME) contents and short chain fatty acids (SCFA) production. Ruminal fluid obtained from 4 fistulated sheep (3-4 years of age and 40±5 kg BW) 3 h after morning feeding was mixed and strained through 4 layers of cheesecloth into a pre-warmed thermos and transported to the laboratory. The lambs were fed a total mixed ration (60:40 forage:concentrate; DM basis) and 0.6% mineral and vitamin premix. The lambs were fed twice daily at 0700 and 1900 hours and had free access to water. Incubation medium was prepared as described by Menke et al. (1979). Sample from experimental diets, each of 200 ± 0.2 mg DM, were incubated in 100 mL glass bottles in which 30 mL of the incubation medium was added. To each bottle, one of the following experimental treatments was applied: 1) control (no Pb and adsorbent), 2) 15 mg/kg DM Pb as Pb acetate and no adsorbent, 3) 15 mg/kg DM Pb as Pb acetate and 3% activated carbon, 4) 15 mg/kg DM Pb as Pb acetate and 3% nanoclay and 5) 15 mg/kg DM Pb as Pb acetate and 3% bentonite. Samples were incubated in triplicate and cumulative gas production was monitored at 2, 4, 6, 8, 10, 12, 15, 19, 24, 30, 36, 48, 72 and 96 h post-incubation. Three bottles with incubation medium only, were used as blanks to correct the gas production values for gas release from the rumen contents. The gas production data were fitted to the following model introduced by France et al. (2000): A= b × [1 – e –c(t-L)] Where: A: volume of gas production at time t. b: asymptotic gas production (based on mL/200 mg DM). c: rate of gas production per hour from the slowly fermentable feed fraction b. Time lag (L): discrete lag time prior to gas production. The rate of gas production (RGP) at 4 and 6 h was calculated from recorded volumes of gas produced before and after these times (Vázquez-Armijo et al. 2011). For example, RGP at 4 h was calculated as: Data were analyzed as a completely randomized design using the MIXED procedure of SAS (2004). Duncan multiple range test was used to detect statistical significance between treatments using a significance level of 0.05. RESULTS AND DISCUSSION Rate of gas production (mL/200 mg DM) in different incubation times are presented in Table 1. Lead-polluted non- supplemented batch (group 2) had lower rate of gas production compared to the groups supplemented with adsorbents and the control (P< 0.01). Gas production volumes (mL/200 mg DM) in different incubation times of experimental groups are shown in Table 2. Supplementation of ruminal medium with 15 ppm Pb has significantly (P<0.01) decreased total gas production at all incubation times. Gas production volumes were significantly (P<0.05) higher for nanoclay compared to control and other adsorbents containing groups (Table 2 and Figure 1). Gas production parameters (b, c) and calculated amounts of OMD, ME, NE and SCFA are presented in Table 3. Supplementation of lead adsorbents improved gas production parameters (P<0.01). Among the different adsorbents, the nanoclay was the most effective one on ruminanl fermentation parameters. However, there were no significant differences between the different treatments regarding the fractional rate of gas production (c). Lead inclusion led to reduction in OMD, NE, ME contents and SCFA production (P<0.01). Heavy metals prevent rumen fermentation, thereby decreasing the productivity of ruminants. Forsberg (1977) believed that these elements may be inhibitory to both the fermentative activity and the growth of microorganisms present in the rumen. In this study, inclusion of lead to ruminal fermentation bottleshad an reducing effect on the measured fermentation parameters. Table 1 Effect of adsorbents addition to lead-exposed diets on rate of gas production at different incubation times The means within the same row with at least one common letter, do not have significant difference (P>0.05). SEM: standard error of the means. In agreement with our results, prior studies showed that exposure to Pb affected rumen metabolism by forming lipid soluble organometallic compounds that inhibit the growth and respiration of micro-organisms (Chaudhary et al. 2006). Surveys conducted by Phillips et al. (2011) have shown that exposure to Pb led to a reduction in the digestion of long particles because of a toxic effect on rumenmicro-organisms. Regarding our study the main finding was a much lower production of total gas and volatile fatty acids (VFA) in the rumen fluid of contaminated with Pb compared to the control and adsorbents supplemented groups. In this regards, Varadyova et al. (2006a) observed depressed the gas and methane production, production of VFA and altered the fermentation pattern in ruminal fermentation of sheep grazing in an area polluted. Marounek andJoch (2014), observed decreased molar proportion of acetate with increasing concentrations of lead in rumen cultures. In this study production of VFA in cultures containing Pb, Hg, Cd and As at 50 µg/mL was decreased by 15.9, 40.0, 29.1 and 35.6%, respectively. The elements in increasing order of toxicity based on the inhibition of VFA production at 50 µg/mL were Pb, Cd, As and Hg. The corresponding ranking of trace elements toxicity, based on the inhibition of gas evolution reported by Forsberg (1977) was Pb, As, Cd and Hg. Probably as a consequence of inhibition the microbial activity and the methanogenic population appeared not to be fully able to consume hydrogen produced in bacterial and protozoan communities (Varadyova et al. 2006b). In anaerobic digestion medium, Chen et al. (2008) demonstrated that the toxic effect of heavy metals is attributed to disruption of enzyme function and structure by binding of the metals with thiol and other groups on protein molecules or by replacing naturally occurring metals in enzyme prosthetic groups. Change in fermentation pattern (Varadyova et al. 2007) and protozoan counts (Hristov et al. 2001) by clay sorbent has been documented previously. In this study addition of different absorbents ameliorated toxic effects of lead and improved ruminal fermentation parameters. With consistent to our results, in study of Varadyova et al. (2006a), addition of bentonite to fermentation bottles containing lead tended to enhance production of total and rate of gas production. Supplementation with 1.5% of dietary DM clay decreased the adverse effects of lead contamination. These results are in agreement with those reported in ruminants by Khalifeh et al. (2012) who found that, addition of bentonite led to a significant increase in gas production rate constant and organic matter digestibility. Also, activated carbon has been used as an adsorbent for removal of heavy metal pollutants from wastewater and has proved to be effective (Gueu et al. 2007; Okpareke et al. 2009). However, in our study with using different adsorbents, nanosized clay, was more effective for removal of Pb from ruminal medium and has better improvement for fermentation parameters than natural adsorbents. This is partly because of their large surface areas and high activities caused by the size-quantization effect (Hua et al. 2012). With agreement with our results, Muhammad and Munawar (2007) mentioned that nano zeolite Y is an effective adsorbent for Pb removal. In another study by Rasouli et al. (2012) low silica nano-zeolite X be much suitable adsorbent for the removal of Pb from aqueous solution. Recent studies suggested that many nanosized clay exhibit very favorable sorption to heavy metals in terms of high capacity and selectivity, which would result in deep removal of toxic metals to meet increasingly strict regulations (Deliyanni et al. 2009). CONCLUSION In conclusion exposure to Pb affected rumen function, reducing rate and total gas production and energy and fatty acids production. Among the different adsorbents, nanosized clay was found to be much suitable adsorbent for the removal of Pb from ruminal medium. ACKNOWLEDGEMENT The authors would like to acknowledge the financial support of University of Tehran for this research. Forsberg C.W. (1977). Effects of heavy metals and other trace elements on the fermentative activity of the rumen microflora and growth of functionally important rumen bacteria. Canadian J. Microbiol. 24, 298-306. France J., Dijkstra J., Dhanoa M.S., López S. and Bannink A. (2000). Estimating the extent of degradation of ruminants feeds from a description of their gas production profiles observed in vitro: derivation of models and other mathematical considerations. British. J. Nutr. 83, 43-150.
{ "pile_set_name": "Pile-CC" }
Q: browser window height = div height - 80px I am trying to make a template where I have a header bar of height 80px. And followed by a slider of height equal to browser window height. For setting the slider height equal to browser window height I am using the following jQuery code. jQuery(function(){ jQuery('#sequence') .css({'height': ((jQuery(window).height()))+'px'}); jQuery(window).resize(function(){ jQuery('#sequence') .css({'height': ((jQuery(window).height()))+'px'}); }); }); It's working great & re-sizing the slider height. My header bar height is 80px and I want to re-size my slider height something like this. browser window height = slider height - 80px(header bar height) Thanks in advance. A: css({ 'height': ((jQuery(window).height()) - 80) + 'px'});
{ "pile_set_name": "StackExchange" }
Correlation of clinicopathological parameters and biological markers related to apoptosis and proliferative activity with a clinical outcome in squamous cell carcinoma of the larynx treated with concurrent chemoradiotherapy. This study was designed to determine whether biological markers related to apoptosis or proliferative activity are associated with the clinical outcome in patients with squamous cell carcinoma (SCC) of the larynx treated with concurrent chemoradiotherapy. Immunostaining with antibodies specific to p53, bcl-2, bax, and MIB-1 was performed to evaluate expression of these proteins in formalin-fixed, paraffin-embedded specimens of 59 patients treated with concurrent chemoradiotherapy (carboplatin, 100 mg/m2, four to six times every week; total radiation dose of 40-65 Gy over 4-6.5 weeks). Multivariate analysis indicated that nodal status was a significant indicator of overall survival (OS: P = 0.001). Patients with bcl-2 positive tumors had better OS than those with bcl-2 negative tumors in both univariate (P = 0.002) and multivariate analyses (P < 0.001 ). In the univariate analysis, a considerable difference in OS was observed among the expressions of bax (P = 0.077), MIB-1 proteins (P = 0.071). and OS. but the difference was not statistically significant. This study indicates that nodal status is the major prognostic tactor in patients with SCC of the larynx treated with concurrent chemoradiotherapy. These results provide useful information for predicting prognosis. Further analysis of biological factors is needed to evaluate the value as predictive markers.
{ "pile_set_name": "PubMed Abstracts" }
“Make new friends, keep the old. One is silver, the other is gold.”—adage Research conducted by Dr. Dean Ornish and others shows that the happiest and healthiest people are those who are well-connected to friends and family. But, in our mobile society, keeping friends is not always possible. Long-term friendships are wonderful and valuable, but if you don’t make new connections as you get older, your group of friends may diminish due to death and relocation. If you haven’t made new friends in a while, updating your definition of friendship and increasing your skills at meeting people will be worth your while. First, consider what being a friend means to you. Who are your best friends? What qualities do they have? Once you have a clear idea of the kinds of friendships you would enjoy, you can decide to create more of them in your life. This can be done in two ways: • Make changes in your current relationships ask your friends to participate in activities you enjoy, and spend more time with the friends whose style of friendship best complements your own. • Create new friendships --Reach out to coworkers, your neighbors or church members and invite them to accompany you in a favorite activity or for coffee. As an alternative, you may want to join a discussion group focused on literature, film, or painting, or take a class in yoga, or cooking. If you spend time with people who have similar interests, you will soon create new friends. If you find that you don’t have enough friends, here are some guidelines for making new ones. Of course, you can tailor these suggestions to your personal tastes. 1. Get a life. If you want to meet people with whom you have something in common, do things on a regular basis that involve others. Activities can range from taking classes, joining hobby clubs, volunteering, playing a sport or game, hiking, or any pursuit that meets regularly. The people you meet will share your interest, and you’ll have something to talk about and enjoy together. 2. Find interesting, fun people. Being involved in an ongoing activity, and meeting with the same people on a regular basis gives you a chance to get to know them before you decide to pursue a more personal relationship. When you find someone you think is particularly pleasant, spend a little time talking with him or her during or after your activity. Ask questions about the project you are working on, or share experiences and advice. If you both enjoy the conversation, goes well, you can offer to meet before or after the session for coffee. From there, you can begin do more things together, until you’ve established a pattern of friendship. 3. Don’t overlook people you know. While you’re making new friends, don’t forget the people you already know. Is there a favorite family member you’d like to see more often? Call him or her and suggest going for a walk, or to lunch. Are there acquaintances at work, at church, in your neighborhood, involved in your child’s ( or your own) school, or elsewhere with whom you could develop a friendship? Consider reaching out to them. Let these people know that you’d like to share events and activities. Spending quality time with friends is beneficial to your emotional, mental and physical health. If you follow the above steps, you’ll find that it isn’t as difficult as you think to make friends. (Adapted from The Ten Smartest Decisions a Woman Can Make After Forty)
{ "pile_set_name": "Pile-CC" }
A group of 22 dissatisfied village chiefs from the Ensebang/Melikin area in Balai Ringin lodged a police report to stop six logging, plantation and sand extraction companies from encroaching on their land. The identified affected area includes 7,300 hectares between Sg Kerangan and Sg Ensebang Baru and another 1,250 hectares at Balai Ringin area. The chiefs are now seeking help from government authorities to stop the violations. Read below for the rest of the story. ****** Village chiefs lodge police report over land encroachment Posted on February 1, 2012, Wednesday WE WANT OUR RIGHTS ON OUR LAND: The 22 village chiefs from Ensebang/Melikin area in Balai Ringin pose with Alex (fi fth left) in front of Sg. Maong Police Station after lodging a report at the commercial crime unit yesterday. KUCHING: A group of 22 dissatisfied village chiefs from Ensebang/Melikin area in Balai Ringin whose lands had been encroached by logging, plantation and sand extraction companies are now seeking help from government authorities to stop the violation. Yesterday, led by TR Alex Libau, they lodged a police report on the intrusion at the commercial crime unit of Sg Maong police station. When met by The Borneo Post, Alex said the report was made against six companies who started their ‘robbing’ activities before the recent Chinese New Year celebration. To make matters worse, Alex claimed, the village folks were labelled as ‘outsiders’ by the companies. “This has to be stopped at once. We are defending all that belong to us but they are taking everything against our will,” he said. Alex, who is also the chairman of the Ensebang /Melikin development committee, said the companies had been granted Provisional Lease which had made them ‘powerful enough to ransack the land’. He identifi ed the affected areas as 7,300 hectares (18,038 acres) located between Sg Kerangan and Sg Ensebang Baru at Melikin district and another 1,250 hectares (3,088 acres) at Balai Ringin area. “They should consult us as we are the landowners.All the affected villagers are totally dissatisfi ed over the intrusion of the land,” he said. He also said they were never consulted and not given any compensation and even if they did receive some compensation, the amount was way below the rightful amount. Alex also alleged that the companies had felled and taken a large amount of trees and intruded into their ‘Pemakai Menua’ and ‘Pulau Galau’. “Therefore, we strongly demand that the companies also pay compensation for what they have taken from the area and the amount must be fair,” Alex said. On Jan 2, the same group lodged a report at Serian police station on sand extraction at Ensebang river. The report, which was published on Jan 3 (The Borneo Post) also alleged that the company used certain chemicals to process the sand, which were then drained into the river.
{ "pile_set_name": "Pile-CC" }
I'm a very sad love-sources user, I use "2.6.7-rc3-love2" and can't use the more recent "2.6.8-rc2-love3 "Rabid Orange Flamingo"" or even the pitifully outdated "2.6.8-rc2-love1 "Flashy Green Popsicle"" because they dropped the VIA stuff (glx and drm). I first started using love-sources because it was the only ready-made -sources which included these vital drivers. The base 2.6.8-rc2 does not, neither does -mm-anything. Now I've got to add them myself, but am new at the magic of hunk-manipulation and patching. I also don't really know how to get the very latest via kernel patches. The problem, of course, is that I've "fallen in love" with Nick Piggin's patch, for scheduling latency. It just works like magic on this quirky, slow VIA Nehemiah. For the first time, the mouse-pointer doesn't lurch around under load, music plays consistently without skipping, multiple CPU hogging tasks don't take turns doing that funky "scheduler-square-dance" so loved by all the other schedulers. It's a simpler scheduler well suited to this little desktop. It's gone through some updates, reflected in the latest love-sources, just out of reach! I also have a slight, illicit, but unrelenting desire to try some of the other love-ly features as well, such as vesa-tng or vesa-rr, fbsplash, and other fun stuff. I am considering also switching to ext3 because of all the recent latency work gone into it. I haven't actually looked but have you politely asked on the love-sources thread to have it included in the next release? If not then why not? It'll probably get you further than this post. Obviously, and I'm sure you would do this anyway, make sure you give the links to any patches you are politely requesting go into love-sources so they are there ready to be included. I know it means doing something yourself, and as you say, being an American that may be painful, but you never know it might work PS In case you didn't know, love-sources also has an irc channel - #love-sources on freenode. You could also ask in there. There may be a reason they are not included. _________________usefuljaja.com - VPS Tutorials Thanks for your help, of course I have already tried it myself and gotten several errors. Before I dumped them on the forum I just wanted to know if someone had done it already, or if they could guide me to some instruction. It seems that this kernel patching is very much "by the seat of your pants" kind of stuff which is a bit outside of the gentoo mainstream -- therefore I didn't find it likely that there would just be a thread on how to do it laying around. I'll ask on the channel to see if there's a reason they were removed. Quote: I know it means doing something yourself What, are you trying to kill me? UPDATE: Talked to the guys in love-sources... It's a bit more complicated -- I have to use the love-sources version of the via-patch since it's apparently fairly heavily modified... I'll help them help me get it in there, if they want to, maybe they can post it as an add-in optional patch like the vesa.rrc patch..
{ "pile_set_name": "Pile-CC" }
Temperateness (virology) In virology, temperate refers to the ability of some bacteriophages (notably coliphage λ) to display a lysogenic life cycle. Many (but not all) temperate phages can integrate their genomes into their host bacterium's chromosome, together becoming a lysogen as the phage genome becomes a prophage. A temperate phage is also able to undergo a productive, typically lytic life cycle, where the prophage is expressed, replicates the phage genome, and produces phage progeny, which then leave the bacterium. With phage the term virulent is often used as an antonym to temperate, but more strictly a virulent phage is one that has lost its ability to display lysogeny through mutation rather than a phage lineage with no genetic potential to ever display lysogeny (which more properly would be described as an obligately lytic phage). Induction At some point, temperate bacteriophages switch from the lysogenic life cycle to the lytic life cycle. This conversion may happen spontaneously, although at very low frequencies (λ displays spontaneous conversion of 10-8 to 10-5 per cell). In the majority of observed switch events, stressors - such as the cell's SOS response (due to DNA damage) or a change in nutrients - induces the switch. Notes Category:Virology Category:Bacteriophages
{ "pile_set_name": "Wikipedia (en)" }
<?xml version="1.0" encoding="UTF-8"?> <dependenciesRoot> <dependency className="jetbrains.mps.samples.multipleProjections.requestTracking.Language"> <classNode dependClassName="java.lang.Class" /> <classNode dependClassName="java.lang.Override" /> <classNode dependClassName="java.lang.String" /> <classNode dependClassName="java.util.Collection" /> <classNode dependClassName="jetbrains.mps.openapi.editor.descriptor.EditorAspectDescriptor" /> <classNode dependClassName="jetbrains.mps.openapi.intentions.IntentionAspectDescriptor" /> <classNode dependClassName="jetbrains.mps.samples.multipleProjections.requestTracking.editor.EditorAspectDescriptorImpl" /> <classNode dependClassName="jetbrains.mps.samples.multipleProjections.requestTracking.intentions.IntentionsDescriptor" /> <classNode dependClassName="jetbrains.mps.samples.multipleProjections.requestTracking.structure.ConceptPresentationAspectImpl" /> <classNode dependClassName="jetbrains.mps.samples.multipleProjections.requestTracking.structure.StructureAspectDescriptor" /> <classNode dependClassName="jetbrains.mps.smodel.adapter.ids.SLanguageId" /> <classNode dependClassName="jetbrains.mps.smodel.language.LanguageExtensions" /> <classNode dependClassName="jetbrains.mps.smodel.runtime.ConceptPresentationAspect" /> <classNode dependClassName="jetbrains.mps.smodel.runtime.ILanguageAspect" /> <classNode dependClassName="jetbrains.mps.smodel.runtime.StructureAspectDescriptor" /> <classNode dependClassName="org.jetbrains.annotations.NotNull" /> <classNode dependClassName="org.jetbrains.mps.openapi.language.SLanguage" /> <classNode extendsClassName="jetbrains.mps.smodel.language.LanguageRuntime" /> </dependency> </dependenciesRoot>
{ "pile_set_name": "Github" }
INTRODUCTION {#sec1-1} ============ Infertility is a serious health problem that affects about 10% of all families worldwide and possibly more in developing countries.[@ref1] Although assisted reproduction technology has addressed this issue to some extent, it does not solve the underlying problem for infertile couples. Identifying risk factors for subfertility is a serious task for clinicians and researchers. Obesity is a global health problem that has reached epidemic levels not only in Western countries but also in developing countries.[@ref2] In 2008, one in every three adults in the world was overweight and one in every nine was obese, and the increase in the prevalence of obesity has accelerated in the last decade.[@ref3] It has also been reported that there are considerable numbers of overweight and obese infertile couples in their reproductive years,[@ref4] and infertility affects approximately 15% of couples of which 40% is attributed to the male factor.[@ref5] Obesity has been associated with adult male infertility, as measured by a prolonged delay before conception.[@ref6][@ref7][@ref8] It is generally accepted that obesity affects the GnRH-FSH/LH pulse, impairs the function of Sertoli and Leydig cells, and influences the release of sex hormones and of sperm maturation.[@ref9] Serum testosterone, sex hormone-binding globulin (SHBG), and inhibin B are reported to decrease with increasing body mass index (BMI), whereas estradiol increased with increasing BMI.[@ref10][@ref11] Moreover, researchers in recent years[@ref12][@ref13][@ref14] have found obesity in adult men to be linked to low sperm quality. Obese men are 3 times more likely to exhibit a reduction in semen quality than men of a normal weight,[@ref15] and overweight and obesity has been associated with an increased prevalence of azoospermia or oligozoospermia.[@ref16] One large single-clinic study of more than 10000 samples investigated the relationship between male BMI and semen parameters and demonstrated that there was a clear association between obesity and sperm production (volume, concentration, and total sperm count).[@ref17] It has been accepted that obesity is linked to male fertility because of lifestyle changes, internal hormonal environmental alterations, and sperm genetic factors. Obesity negatively affects male reproductive potential not only by reducing sperm quality, but in particularly by altering the physical and molecular structure of germ cells in the testes, which ultimately affects the maturity and function of sperm cells.[@ref18] In contrast, there are other studies that show no significant correlation between BMI and semen parameters (concentration, semen volume, and total sperm motility).[@ref19][@ref20][@ref21] A meta-analysis from MacDonald *et al*.[@ref11] found no evidence of a relationship between BMI and sperm concentration or total sperm count, but there was a negative relationship between testosterone, SHBG, and free testosterone with an increased BMI. However, there are some study limits in these reports such as the small number of obese male subjects and the study populations consisting of multinationals. Therefore, this study was designed to explore the relationship between BMI and sperm parameters in a Northern Chinese Han population. MATERIALS AND METHODS {#sec1-2} ===================== {#sec2-1} ### Study population {#sec3-1} The participants were the male partners of subfertile couples who failed to conceive after 1 year of unprotected intercourse (mean infertile period was 1.20 ± 0.34 years). The participating men were recruited from those attending the Reproductive Medical Center of the First Affiliated Hospital of Zhengzhou University, China and who submitted semen samples for semen analysis or were attending for therapeutic procedures between March 2010 and December 2014. A total of 2384 healthy adult Chinese Han men of reproductive age were considered for the study. The fertility status of their female partners was not considered. Participants who had definitive pathological conditions capable of affecting sperm quality were excluded. These conditions included hypertension, diabetes mellitus, chronic kidney disease, atherosclerosis, orchidectomy for any reason, hypogonadism requiring medical treatment, and testicular cancer. In addition, participants with other factors interfering with male fertility such as heat exposure due to saunas, semen bacterial contamination, and azoospermia and oligozoospermia, which included a history of documented azoospermia or a semen analysis result of sperm concentrations of \<4 spermatozoa per 400 × high power field (which correlates to a sperm concentration of \~1 × 10^6^ ml^−1^), as suggested by the World Health Organization Laboratory Manual for the Examination and Processing of Human Semen 2010,[@ref22] were also excluded. Trained staff described to the participants the hypothesis of the study and obtained their informed consents. All the subjects provided written informed consent and signed a standardized consent form. Research approval for this study was given by the Ethics Committee of the First Affiliated Hospital of Zhengzhou University. ### Questionnaire {#sec3-2} All the participants completed a questionnaire administered by an interviewer after the sperm was collected. The questionnaire covered personal information including background, ethnicity, period of abstinence, lifestyle factors, occupational exposure, genetic risk factors, and reproductive conditions. Subjects were also asked about their highest education level and current occupational status. Information was obtained on their alcohol and smoking intake in the previous week before completing the questionnaire. Smoking habits were calculated as the total number of cigars, pipes, and cigarettes smoked per day. Total weekly alcohol was estimated by combining the wine, beer, and liquor intake. ### Physical examinations {#sec3-3} A complete physical examination, including height (cm) and weight (kg), was performed by trained physicians using the same scale. Height was measured with the participant\'s ears and eyes in the same horizontal line and without shoes and socks. The BMI was estimated as the weight in kilograms divided by the squared height in meters (kg m^−2^). Patients were divided into groups by BMI: underweight \<18 kg m^−2^, normal weight 18--25 kg m^−2^, overweight 25--30 kg m^−2^, and obese \>30 kg m^−2^. The possible status of varicoceles and hydroceles, consistency of the testis, the location of the testis in the scrotum and location of the epididymis were also recorded. ### Sperm collection and analysis {#sec3-4} Each participant was asked to provide a sperm specimen by masturbation into a wide-mouthed plastic container in a private room close to the sperm laboratory after a period of 3--7 days of sexual abstinence. Patients who provided incomplete samples were asked to repeat the process at another time or were excluded from the study. The period of sexual abstinence, spillage (if any), time of year of sperm collection, and history of recent fever were also recorded in the self-completed questionnaires after the sample was delivered. All the sperm samples were kept in a 37°C CO~2~ incubator to allow them to liquefy and facilitate routine sperm analysis as described in the World Health Organization Manual of 2010.[@ref22] The sperm smears were dried in the air, stained, and preserved at room temperature. All the smeared slides were used to determine sperm morphology and assessed by the same technician. The sperm variables used as outcome variables were as follows: sperm concentration (millions per ml), semen volume (ml), total sperm count (concentration × volume, in millions), relative number of sperm with rapid motility (Type A motility, %), relative number of sperm with linear progressive motility (Type B motility, %), percentage of sperm with sluggish motility (Type C motility, %), total motile sperm count (concentration × volume × relative number of type A + B, in millions), and relative number of normal sperm as assessed by morphology. All the sperm analyses were performed by trained laboratory technicians according to the guidelines of the World Health Organization Manual of 2010.[@ref22] The laboratory was placed under strict quality control by trained staff. Laboratory quality controls were performed every week by analyzing the same sperm samples in blind fashion throughout the study. The observations and counting during the sperm analyses were automatic, and the origins of specimens were blinded to avoid bias. ### Statistical analysis {#sec3-5} The data from the questionnaires and physical examinations of the participants were compared between the four BMI categories to identify possible confounders. The potential confounders included age, occupation, level of education, smoking status (moderate, active, none), alcohol intake (moderate, active, none), time of year of sperm collection (April to September or October to March), and duration of sexual abstinence (day). Overall differences in potential confounders, semen volume, total sperm count, sperm concentration, relative numbers of normal morphology, and motile sperm ratio between the four BMI groups were analyzed by one-way analysis of variance. The risk of abnormal sperm quality between the different groups was compared with the use of *t*-test. The SAS 8.3 software package (SAS Institute, Cary, NC, USA) was used to perform data analyses. RESULTS {#sec1-3} ======= A total of 2384 participants were included in the study. Subject characteristics are shown in **[Table 1](#T1){ref-type="table"}**. The average BMI of all subjects was 22.5 ± 2.7 kg m^−2^, and 68 (2.9%) were classified as underweight, 1398 (58.6%) as normal weight, 620 (26.0%) as overweight, and 298 (12.5%) as obese. Of the total participants, 918 (38.4%) men had a BMI of \>25.0 kg m^−2^. Most of the study population did not smoke (81.3%) or drink alcohol (73.1%). No remarkable differences were found among the four BMI groups with respect to the duration of abstinence or semen pH. No differences were observed in the time of year of sperm collection (50.4% provided sperm from October to March and 49.6% from April to September). ###### Characteristics of study population according to the different BMI groups (*n*=2384) ![](AJA-19-234-g001) There are other potentially independent risk factors that may confound or modify the association between BMI and sperm parameters, such as age, occupation, education level, smoking, and alcohol use as shown in **Tables [1](#T1){ref-type="table"}** and **[2](#T2){ref-type="table"}**. Nevertheless, we found no associations between BMI and age, occupation, level of education, smoking status, or alcohol use. However, the results indicated there were significant relationships between BMI and the total sperm count, sperm concentration, total motile sperm, relative amount of type A motility and the relative amount of progressive motility (A + B). The sperm concentration of overweight and obese men was 34.1 ± 12.6 and 33.8 ± 10.8 million, respectively, which was lower than in the subjects with normal BMI. The total sperm count of overweight and obese men was 115.9 ± 33.2 and 113.9 ± 32.8 million, which was also remarkably lower than in men with normal BMI. Total motile sperm count for overweight 43.6 ± 13.3 and obese men 42.8 ± 14.8 was lower than in subjects with normal BMI. Furthermore, the relative amount of type A motility (%) for the overweight (10.3 ± 3.9) and obese individuals (11.9 ± 3.8) was also lower than in subjects with normal BMI. As displayed in **[Table 2](#T2){ref-type="table"}**, the overweight (37.9 ± 7.2) and obese (37.9 ± 8.5) groups had a slightly lower relative amount of progressive motility than the group with normal BMI. No obvious differences were found with normal sperm morphology and sperm volume between the four BMI groups. ###### Sperm analysis results of the men in the different BMI groups (*n*=2384) ![](AJA-19-234-g002) DISCUSSION {#sec1-4} ========== The results of this study demonstrate that BMI is a factor affecting sperm parameters in adult men of infertile couples attending outpatient preconception clinics. Overweight or obese men were more likely to have lower total sperm counts, sperm concentration, total motile sperm, a relative amount of type A motility, and a relative amount of progressive motility (A + B) than men of normal weight. The study did not produce any evidence of an association between BMI and either sperm volume or normal sperm morphology. One previous study indicated that sperm motility was the parameter associated with excess weight and obesity.[@ref14] The Jensen *et al*. group[@ref10] found sperm concentration to be the one sperm parameter associated with BMI. Current findings indicate a negative association between a high BMI and sperm parameters. These are consistent with previous studies performed in Europe and the USA.[@ref23][@ref24][@ref25] Most studies on sperm quality have focused on BMI as the main measure of obesity. However, there are other studies that did not indicate any relationship between BMI and any of the semen parameters.[@ref19][@ref20][@ref21] This study has a number of strengths and weaknesses. The strengths were that the study population was comprised of men from infertile couples trying to conceive who visited a reproductive medical center between March 2010 and December 2014. Sperm collection and analyses were measured at a single center and laboratory, reducing the potential of inter-laboratory variability. In addition, this study included underweight men, unlike the majority of studies published on this issue. The study populations had a large proportion of overweight (26.0%) and obese men (12.5%). The weaknesses of the study are that it was performed in men of infertile couples at a fertility center; therefore, the results may not reflect semen quality in the general population. This limits its external validity; therefore, its results should be interpreted with caution. The reasons for the association between BMI and sperm quality remain unknown, but there are several potential explanations. First, the increased fat of overweight and obese men produces more estrogen from testosterone, which suppresses the hypothalamic and pituitary hormonal secretion and can affect the testes directly.[@ref23] Some studies have also reported the GnRH-LH/FSH pulses of overweight and obese men are different from those of normal weight men, which may impair the functions of the Sertoli and Leydig cells, and then influence the release of sex hormones and sperm maturation.[@ref24][@ref25] High BMI was also found to be associated with high levels of serum leptin, which inhibits testosterone synthesis and may cause poor sperm quality.[@ref26] Second, several studies have demonstrated that overweight and obesity causes insulin resistance and dyslipidemia, of which the latter is associated with increased oxidative stress.[@ref27][@ref28] Oxidative stress is regarded as an independent marker of male factor infertility because it diminishes sperm production and maturation.[@ref29] A study performed in mice showed that obesity could lead to increased oxidative stress and reduction in sperm motility.[@ref30] Third, obesity may increase scrotal temperature because of the large amounts of suprapubic, thigh, and scrotal fat, which can decrease semen quality in adult men.[@ref12] CONCLUSION {#sec1-5} ========== A high BMI is associated with negative effects on sperm quality. Overweight and obese men are more likely to have abnormally low sperm concentrations, total sperm count, total motile sperm count, relative amount of type A motility, and relative amount of progressive motility (A + B) than men with normal weight. Further research is required to evaluate the relationship between male BMI and sperm quality in larger populations. AUTHOR CONTRIBUTIONS {#sec1-6} ==================== YPS conceived of the study, participated in its design, and helped to draft the manuscript. EYW participated in its design, performed the statistical analysis, and drafted the manuscript. YH and QYD handled the recruitment of patients, sample collection, and supervised the clinical aspects of work. GDY supervised all molecular laboratory work. All authors read and approved the final manuscript. COMPETING INTERESTS {#sec1-7} =================== All authors declare no competing interests. The authors thank Qin Yang for her grammatical contribution to this manuscript. This study was supported by the National Natural Science Foundation of China (No. U1304314). This work was also supported by a grant from the Henan Province Department of Education (No. 13A320461) and a grant from the Youth Foundation of the First Affiliated Hospital of Zhengzhou University (2014 EYW).
{ "pile_set_name": "PubMed Central" }
--- abstract: | Learning-assisted automated reasoning has recently gained popularity among the users of , , and . In this paper, we present an add-on to the proof assistant and an adaptation of the system that provides machine learning-based premise selection and automated reasoning also for . We efficiently record the dependencies and extract features from the theorem statements, which form a basis for premise selection. transforms the statements in the various TPTP-ATP proof formats, which are then processed by the ATPs. We discuss the different evaluation settings: ATPs, accessible lemmas, and premise numbers. We measure the performance of on the standard library. The results are combined accordingly and compared with the experiments, showing a comparably high quality of predictions. The system directly benefits users by automatically finding proofs dependencies that can be reconstructed by . bibliography: - 'biblio.bib' title: Premise Selection and External Provers for HOL4 --- HOL4; higher-order logic; automated reasoning; premise selection Introduction ============ The proof assistant [@hol4] provides its users with a full ML programming environment in the LCF tradition. Its simple logical kernel and interactive interface allow safe and fast developments, while the built-in decision procedures can automatically establish many simple theorems, leaving only the harder goals to its users. However, manually proving theorems based on its simple rules is a tedious task. Therefore, general purpose automation has been developed internally, based on model elimination ( [@meson]), tableau ( [@blast]), or resolution ( [@metis]). Although essential to developers, the methods are so far not able to compete with the external ATPs [@eprover; @KovacsCAV13] optimized for fast proof search with many axioms present and continuously evaluated on the TPTP library [@TPTP] and updated with the most successful techniques. The TPTP (Thousands of Problems for Theorem Provers) is a library of test problems for automated theorem proving (ATP) systems. This standard enables convenient communication between different systems and researchers. On the other hand, the system provides a functionality to search the database for theorems that match a user chosen pattern. The search is semi-automatic and the resulting lemmas are not necessarily helpful in proving the conjecture. An approach that combines the two: searching for relevant theorems and using automated reasoning methods to (pseudo-)minimize the set of premises necessary to solve the goal, forms the basis of “hammer” systems such as  [@sledgehammer10] for ,  [@holyhammer] for or for  [@DBLP:journals/corr/KaliszykU13b]. Furthermore, apart from syntactic similarity of a goal to known facts, the relevance of a fact can be learned by analyzing dependencies in previous proofs using machine learning techniques [@malarea], which leads to a significant increase in the power of such systems [@mash]. In this paper, we adapt the system to the system and test its performance on the standard library. The libraries of and are exported together with proof dependencies and theorem statement features; the predictors learn from the dependencies and the features to be able to produce lemmas relevant to a conjecture. Each problem is translated to the TPTP FOF format. When an ATP finds a proof, the necessary premises are extracted. They are read back to as proof advice and given to for reconstruction. An adapted version of the resulting software is made available to the users of in interactive session, which can be used in newly developed theories. Given a conjecture, the function computes every step of the interaction loop and, if successful, returns the conjecture as a theorem: (interactive call) `  load `“`holyHammer`”`; `\ `    val it = (): unit  `\ `  holyhammer “1+1=2“;`\ `    Relevant theorems: ALT_ZERO ONE TWO ADD1`\ `    metis: r[+0+6]#`\ `    val it = |- 1 + 1 = 2: thm`\ `  ` The prover already benefits from export to SMT solvers such as  [@WeberTjark],  [@Z3reconstruction] and  [@tgckckmn-paar14-accepted]. These methods perform best when solving problems from the supported theories of the SMT solver. Comparatively, is a general purpose tool as it relies on ATPs without theory reasoning and it can provide easily[^1] re-provable problem to . The standard distribution has since long been equipped with proof recording kernels [@Wong95recordingand; @DBLP:conf/itp/KumarH12]. We first considered adapting these kernels for our aim. But as machine learning only needs the proof dependencies and the approach based on full proof recording is not efficient, we perform minimal modifications to the original kernel. #### Contributions We provide learning assisted automated reasoning for and evaluate its performance in comparison to that in . In order to do so, we : - Export the data Theorems, dependencies, and features are exported by a patched version of the kernel. It can record dependencies between theorems and keep track on how their conjunctions are handled along the proof. We export the standard libraries (58 types, 2305 constants, 11972 theorems) with respect to a strict name-space rule so that each object is uniquely identifiable, preserving if possible its original name. - Reprove We test the ability of a selection of external provers to reprove theorems from their dependencies. - Define accessibility relations We define and simulate different development environments, with different sets of accessible facts to prove a theorem. - Experiment with predictors Given a theorem and a accessibility relation, we use machine learning techniques to find relevant lemmas from the accessible sets. Next, we measure the quality of the predictions by running ATPs on the translated problems. The rest of this paper is organized as follows. In Section \[sec:palibs\] we describe the export of the and data into a common format and the recording of dependencies in . In Section \[sec:setting\], we present the different parameters: ATPs, proving environments, accessible sets, features, and predictions. We select some of them for our experiments and justify our choice. In Section \[sec:experiments\] we present the results of the experiments, relate them to previous experiments and explain how this affects the users. Finally in Section \[sec:concl\] we conclude and present an outlook on the future work. Sharing HOL data between , and {#sec:palibs} =============================== In order to process and data in a uniform way in , we export objects from their respective theories, as well as dependencies between theorems into a common format. The export is available for any and development. We shortly describe the common format used for exporting both libraries and present in more detail our methods for efficiently recording objects (types, constants and theorems) and precise dependencies in . We will refer to  [@holyhammer] for the details on recording objects and dependencies for formalizations. and share a common logic (higher-order logic with implicit shallow polymorphism), however their implementations differ both in terms of the programming language used ( and respectively), data structures used to represent the terms and theorems (higher-order abstract syntax and de Bruijn indices respectively), and the exact inference rules provided by the kernel. As has been initially implemented in as an extension of , we need to export all the data and read it back into , replacing its type and constant tables. The format that we chose is based on the TPTP THF0 format [@tptpthf0] used by higher-order ATPs. Since formulas contains polymorphic constants which is not supported by the THF0 format, we will present an experimental extension of this format where the type arguments of polymorphic constants are given explicitly. (experimental template) `    tt(name, role, formula)  `\ `  ` The field name is the object’s name. The field role is “ty” if the object is a constant or a type, and “ax” if the object is a theorem. The field formula is an experimental THF0 formula. (Object export from to an experimental format) - Type ` (list,1) `$\rightarrow$` tt(list, ty, $t > $t).` - Constant `(HD,“:’a list -> :’a“) `$\rightarrow$` `\ `  tt(HD, ty, ![A:$t]: (list A > A).`\ `(CONS,“:’a -> :’a list -> :’a list“) `$\rightarrow$` `\ `  tt(CONS ,ty, ![A:$t]: (A > list A > list A).`\ `  ` - Theorem `(HD,“`$\forall$` n:int`\ `t:list[int].`\ `HD (CONS n t) = n“) `$\rightarrow$` `\ `  tt(HD0, ax, (![n:int, t:(list int)]:`\ `    ((HD int) ((CONS int) n t) = n).`\ `    ` In this example, `$t` is the type of all basic types. All names of objects are prefixed by a namespace identifier, that allow identifying the prover and theory they have been defined in. For readability, the namespace prefixes have been omitted in all examples in this paper. Creation of a theory -------------------- In , types and constants can be created and deleted during the development of a theory. These objects are named at the moment they are created. A theorem is a value of type $thm$ and can be derived from a set of basic rules, which is an instance of a typed higher-order classical logic. To distinguish between important lemmas and theorems created by each small steps, the user can name and delete theorems (erase the name). Each named object still present at the end of the development is saved and thus can be called in future theories. There are two ways in which an object can be lost in a theory: either it is deleted or overwritten. As proof dependencies for machine learning get more accurate when more intermediate steps are available, we decided to record all created objects, which results in the creation of slightly bigger theories. As the originally saved objects can be called from other theories, their names are preserved by our transformation. Each lost object whose given name conflicts with the name of a saved object of the same type is renamed. #### Deleted objects The possibility of deleting an object or even a theory is mainly here to hide internal steps or to make the theory look nicer. We chose to remove this possibility by canceling the effects of the deleting functions. This is the only user-visible feature that behaves differently in our dependency recording kernel. #### Overwritten objects An object may be overwritten in the development. As we prevent objects from being deleted, the likelihood of this happening is increased. This typically happens when a generalized version of a theorem is proved and is given the same name as the initial theorem. In the case of types and constants, the internal mechanism already renames overwritten objects. Conversely, theorems are really erased. To avoid dependencies to theorems that have been overwritten, we automatically rename the theorems that are about to be overwritten. Recording dependencies ---------------------- Dependencies are an essential part of machine learning for theorem proving, as they provide the examples on which predictors can be trained. We focus on recording dependencies between named theorems, since they are directly accessible to a user. The time mark of our method slows down the application of any rules by a negligible amount. Since the statements of 951 theorems are conjunctions, sometimes consisting of many toplevel conjuncts, we have refined our method to record dependencies between the toplevel conjuncts of named theorems. (Dependencies between conjunctions) `ADD_CLAUSES: 0 + m = m `$\wedge$` m + 0 = m `$\wedge$` `\ `SUC m + n = SUC (m + n) `$\wedge$` m + SUC n = SUC (m + n)`\ \ `ADD_ASSOC depends on:`\ `  ADD_CLAUSES_c1: 0 + m = m`\ `  ADD_CLAUSES_c3: SUC m + n = SUC (m + n)`\ `  ...` The conjunct identifiers of a named theorem `T` are noted `T_c1`, $\ldots$, `T_cN`. In certain theorems, a toplevel universal quantifier shares a number of conjuncts. We will also split the conjunctions in such cases recursively. This type of theorem is less frequent in the standard library (203 theorems). (Conjunctions under quantifier) `MIN_0: `$\forall$` n. (MIN n 0 = 0) `$\wedge$` (MIN 0 n = 0)` By splitting conjunctions we expect to make the dependencies used as training examples for machine learning more precise in two directions. First, even if a theorem is too hard to prove for the ATPs, some of its conjuncts might be provable. Second, if a theorem depends on a big conjunction, it typically depends only on some of its conjuncts. Even if the precise conjuncts are not clear from the human-proof, the reproving methods can often minimize the used conjuncts. Furthermore, reducing the number of conjuncts should ease the reconstruction. Implementation of the recording {#sec:record} ------------------------------- The type of theorems $thm$ includes a tag field in order to remember which oracles and axioms were necessary to prove a theorem. Each call to an oracle or axiom creates a theorem with the associated tag. When applying a rule, all oracles and axioms from the tag of the parents are respectively merged, and given to the conclusion of the rule. To record the dependencies, we added a third field to the tag, which consists of a dependency identifier and its dependencies. \[exampletag\] (Modified tag type) `  type tag = ((dependency_id, dependencies), `\ `              oracles, axioms)`\ `  type thm = (tag, hypotheses, conclusion)`\ `  ` Since the name of a theorem may change when it is overwritten, we create unmodifiable unique identifiers at the moment a theorem is named. It consists of the name of the current theory and the number of previously named theorems in this theory. As a side effect, this enables us to know the order in which theorems are named which is compatible by construction with the pre-order given by the dependencies. Every variable of type $thm$ which is not named is given the identifier $unnamed$. Only identifiers of named theorems will appear in the dependencies. We have implemented two versions of the dependency recording algorithm, one that tracks the dependencies between named theorems, other one tracking dependencies between their conjuncts. For the named theorems, the dependencies are a set of identified theorems used to prove the theorem. The recording is done by specifying how each rule creates the tag of the conclusion from the tag of its premises. The dependencies of the conclusion are the union of the dependencies of the unnamed premises with its named premises. This is achieved by a simple modification of the `Tag.merge` function already applied to the tags of the premises in each rule. When a theorem $\vdash A\,\wedge\,B$ is derived from the theorems $\vdash A$ and $\vdash B$, the previously described algorithm would make the dependencies of this theorem the union of the dependencies of the two. If later other theorems refer to it, they will get the union as their dependencies, even if only one conjunct contributes to the proof. In this subsection we define some heuristics that allow more precise tracking of dependencies of the conjuncts of the theorems. In order to record the dependencies between the conjuncts, we do not record the conjuncts of named theorems, but only store their dependencies in the tags. The dependencies are represented as a tree, in which each leaf is a set of conjunct identifiers (identifier and the conjunct’s address). Each leaf of the tree represents the respective conjunct $c_i$ in the theorem tree and each conjunct identifier represents a conjunct of a named goal to prove $c_i$. (An example of a theorem and its dependencies) `Th0 (named theorem): A `$\wedge$` B`\ `Th1: C `$\wedge$` (D `$\wedge$` E) `\ `     with dependency tree Tree([Th0],[Th0_c2])`\ \ `This encodes the fact that:`\ `  C depends on Th0. `\ `  D `$\wedge$` E depends Th0_c2 which is B.`\ `  ` Dependencies are combined at each inference rule application and dependencies will contain only conjunct identifiers. If not specified, a premise will pass on its identifier if it is a named conjunct (conjunct of a named theorem) and its dependency tree otherwise. We call such trees passed dependencies. The idea is that the dependencies of a named conjunct should not transmit its dependencies to its children but itself. Indeed, we want to record the direct dependencies and not the transitive ones. For rules that do not preserve the structure of conjunctions, we flatten the dependencies, i.e. we return a root tree containing the set of all (conjunct) identifiers in the passed dependencies. We additionally treat specially the rules used for the top level organization of conjunctions: `CONJ`, `CONJUNCT1`, `CONJUNCT2`, `GEN`, `SPEC`, and `SUBST`. - `CONJ`: It returns a tree with two branches, consisting of the passed dependencies of its first and second premise. - `CONJUNCT1` (`CONJUNCT2`): If its premise is named, then the conjunct is given a conjunct identifier. Otherwise, the first (second) branch of the dependency tree of its premise become the dependencies of its conclusion. - `GEN` and `SPEC`: The tags are unchanged by the application of those rules as they do not change the structure of conjunctions. Although we have to be careful when using `SPEC` on named theorems as it may create unwanted conjunctions. These virtual conjunctions are not harmful as the right level of splitting is restored during the next phase. (Creation of a virtual conjunction from a named theorem) $\forall$` x.x `$\vdash$` `$\forall$` x.x `\ `                                   SPEC [A `$\wedge$` B]`\ $\forall$` x.x `$\vdash$` A `$\wedge$` B `\ `                                   CONJUNCT1`\ $\forall$` x.x `$\vdash$` A` - `SUBST`: Its premises consist of a theorem, a list of substitution theorems of the form $(A=B)$ and a template that tells where each substitution should be applied. When `SUBST` preserves the structure of conjuncts, the set of all identifiers in the passed dependencies of the substitution theorems is distributed over each leaf of the tree given by the passed dependencies of the substituted theorems. When it is not the case the dependency should be flattened. Since the substitution of sub-terms below the top formula level does not affect the structure of conjunctions, it is sufficient (although not necessary) to check that no variables in the template is a predicate (is a boolean or returns a boolean). The heuristics presented above try to preserve the dependencies associated with single conjuncts whenever possible. It is of course possible to find more advanced heuristics, that would give more precise human-proof dependencies. However, performing more advanced operations (even pattern matching) may slow down the proof system too much; so we decided to restrict to the above heuristics. Before exporting the theorems, we split them by recursively distributing quantifiers and splitting conjunctions. This gives rise to conflicting degree of splitting, as for instance, a theorem with many conjunctions may have been used as a whole during a proof. Given a theorem and its dependency tree, each of its conjunctions is given the set of identifiers of its closest parent in this tree. Then, each of these identifiers is also split maximally. In case of a virtual conjunction (see the `SPEC` rule above), the corresponding node does not exist in the theorem tree, so we take the conjunct corresponding to its closest parent. Finally, for each conjunct, we obtain a set of dependencies by taking the union of the split identifiers. (Recovering dependencies from the named theorem Th1) `Th0 (named theorem): A `$\wedge$` B`\ `Th1 (named theorem): C `$\wedge$` (D `$\wedge$` E)`\ `     with dependency tree Tree([Th0],[Th0_c1])`\ \ `  Recovering dependencies of each conjunct`\ `Th1_c0: Th0 `\ `Th1_c1: Th0_c1  `\ `Th1_c2: Th0_c1`\ `  Splitting the dependencies`\ `Th1_c0: Th0_c1 Th0_c2`\ `Th1_c1: Th0_c1 `\ `Th1_c2: Th0_c1` Evaluation {#sec:setting} ========== In this section we describe the setting used in the experiments: the ATPs, the transformation from HOL to the formats of the ATPs, the dependencies accessible in the different experiments, and the features used for machine learning. ATPs and problem transformation ------------------------------- supports the translation to the formats of various TPTP ATPs: FOF, TFF1, THF0, and two experimental TPTP extensions. In this paper we restrict ourselves to the first order monomorphic logic, as these ATPs have been the most powerful so far and integrating them in already poses an interesting challenge. The transformation that uses is heavily influenced by previous work by Paulson [@PaulsonS07] and Harrison [@meson]. It is described in detail in [@holyhammer], here we remind only the crucial points. Abstractions are removed by $\beta$-reduction followed by $\lambda$-lifting, predicates as arguments are removed by introducing existentially quantified variables and the apply functor is used to reduce all applications to first-order. By default uses the tagged polymorphic encoding [@BlanchetteBPS13]: a special tag taking two arguments is introduced, and applied to all variable instances and certain applications. The first argument is the first-order flattened representation of the type, with variables functioning as type variables and the second argument is the value itself. Prover Version Premises -------- --------- ---------- 2.6 96 1.8 128 4.32 32 1.3 128 3.5 32 1.0 128 2.3 32 : \[tab:provers\]ATP provers, their versions and arguments The initially used provers, their versions and default numbers of premises are presented in Table \[tab:provers\]. The experiments [@holyhammer] showed, that different provers perform best with different given numbers of premises. This is particularly visible for the ATP provers that already include the relevance filter SInE [@sine], therefore we preselect a number of predictions used with each prover. Similarly, the strategies that the ATP provers implement are often tailored for best performance on the TPTP library, for the annual CASC competition [@Sutcliffe14]. For ITP originating problems, especially for different strategies are often better, so we run it under the alternate scheduler `Epar` [@DBLP:journals/corr/abs-1301-2683]. Accessible facts ---------------- As has initially been designed for , it treats accessible facts in the same way as the accessibility relation defined there: any fact that is present in a theory loaded chronologically before the current one is available. In there are explicit theory dependencies, and as such a different accessibility relation is more natural. The facts present in the same theory before the current one, and all the facts in the theories that the current one depends on (possibly in a transitive way) are accessible. In this subsection we discuss the four different accessible sets of lemmas, which we will use to test the performance of on. #### Exact dependencies (reproving) They are the closest named ancestors of a theorem in the proof tree. It tests how much could reprove if it had perfect predictions. In this settings no relevance filtering is done, as the number of dependencies is small. #### Transitive dependencies They are all the named ancestors of a theorem in the proof tree. It simulates proving a theorem in a perfect environment, where all recorded theorems are a necessary step to prove the conjecture. This corresponds to a proof assistant library that has been refactored into little theories [@Farmer92littletheories]. #### Loaded theorems All theorems present in the loaded theories are provided together with all the theorems previously built in the current theory. This is the setting used when proving theorems in , so it is the one we use in our interactive version presented and evaluated in Section \[sec:interactive\]. #### Linear order For this experiment, we additionally recorded the order in which the theories were built, so that we could order all the theorems of the standard library in a similar way as theorems are ordered. All previously derived theorems are provided. Features -------- Machine learning algorithms typically use features to define the similarity of objects. In the large theory automated reasoning setting features need to be assigned to each theorem, based on the syntactic and semantic properties of the statement of the theorem and its attributes. represents features by strings and characterizes theorems using lists of strings. Features originate from the names of the type constructors, type variables, names of constants and printed subterms present in the conclusion. An important notion is the normalization of the features: for subterms, their variables and type variables need to be normalized. Various scenarios for this can be considered: - All variables are replaced by one common variable. - Variables are replaced by their de Bruijn index numbers [@US+08]. - Variables are replaced by their (variable-normalized) types [@holyhammer]. The union of the features coming from the three above normalizations has been the most successful in the experiments, and it is used here as well. Predictors ---------- In all our experiments we have used the modified k-NN algorithm [@ckju-pxtp13]. This algorithm produces the most precise results in the experiments for  [@holyhammer]. Given a fixed number ($k$), the k-nearest neighbours learning algorithm finds $k$ premises that are closest to the conjecture, and uses their weighted dependencies to find the predicted relevance of all available facts. All the facts and the conjecture are interpreted as vectors in the $n$-dimensional feature space, where $n$ is the number of all features. The distance between a fact and the conjecture is computed using the Euclidean distance. In order to find the neighbours of the conjecture efficiently, we store an association list mapping features to theorems that have those features. This allows skipping the theorems that have no features in common with the conjecture completely. Having found the neighbours, the relevance of each available fact is computed by summing the weights of the neighbours that use the fact as a dependency, counting each neighbour also as its own dependency Experiments {#sec:experiments} =========== In this section, we present the results of several experiments and discuss the quality of the advice system based on these results. The hardware used during the reproving and accessibility experiments is a 48-core server (AMD Opteron 6174 2.2 GHz. CPUs, 320 GB RAM, and 0.5 MB L2 cache per CPU). In these experiments, each ATPs is run on a single core for each problem with a time limit of 30 seconds. The reconstruction and interactive experiments were run on a laptop with a Intel Core processor (i5-3230M 4 x 2.60GHz with 3.6 GB RAM). Reproving --------- We first try to reprove all the 9434 theorems in the libraries with the dependencies extracted from the proofs. This number is lower than the number of exported theorems because definitions are discarded. Table \[Reproving\_unsplit\] presents the success rates for reproving using the dependencies recorded without splitting. In this experiment we also compare many provers and their versions. For  [@Schulz:LPAR-2013], we also compare its different scheduling strategies [@DBLP:journals/corr/abs-1301-2683]. The results are used to choose the best versions or strategies for the selected few provers. Apart from the success rates, the unique number of problems is presented (proofs found by this ATP only), and  [@Barrett:2011:CVC:2032305.2032319] seems to perform best in this respect. The translation used by default by is an incomplete one (it gives significantly better results than complete ones), so some of the problems are counter-satisfiable. Prover Version Theorem(%) Unique CounterSat -------- ---------- ------------ -------- ------------ `Epar` 3 44.45 3 0 `Epar` 1 44.15 9 0 `Epar` 2 43.95 9 0 `Epar` 0 43.52 2 0 1.3 42.71 44 0 4.32 41.96 8 5 4.40 41.65 1 6 1.8 41.37 14 0 2.6 41.10 14 0 1.8 38.34 6 0 4.40q 35.19 11 5 3.0 34.82 0 0 3.5 31.67 0 0 2.3 29.98 0 0 1.0 25.52 2 35 total 50.96 38 : Reproving experiment on the 9434 unsplit theorems of the standard libary[]{data-label="Reproving_unsplit"} From this point on, experiments will be performed only with the best versions of three provers: ,  [@KovacsCAV13], and  [@DeMoura:2008:ZES:1792734.1792766]. They have a high success rate combined with an easy way of retrieving the unsatisfiable core. The same ones have been used in the experiments for . In Table \[Reproving\_split\], we try to reprove conjuncts of these theorems with the different recording methods described in Section \[sec:record\]. First, we notice that only benefits from the tracking of more accurate dependencies. More, removing the unnecessary conjuncts worsen the results of and . One reason is that and do well with large number of lemmas and although a conjunct was not used in the original proof it may well be useful to these provers.Suprisingly, the percentage of reproved facts did not increase compared to Table \[Reproving\_unsplit\], as this was the case for experiments. By looking closely at the data, we notice the presence of the `quantHeuristics` theory, where 85 theorems are divided into 1538 conjuncts. As the percentage of reproving in this theory is lower than the average (16%), the overall percentage gets smaller given the increased weight of this theory. Therefore, we have removed the quantHeuristic theory in the Basic\* and Optimized\* experiments for a fairer comparison with the previous experiments. Finally, if we compare the Optimized experiment with the similar reproving experiment on 14185 problems [@holyhammer], we notice that we can reprove three percent more theorems in . This is mostly due to a 10 percent increase in the performance of on problems. Basic Optimized Basic\* Optimized\* ------- ------- ----------- --------- ------------- 42.43 42.41 46.23 45.91 39.79 39.32 43.24 42.41 39.59 40.63 43.78 44.18 total 46.74 46.76 50.97 50.55 : Success rates of reproving (%) on the 13910 conjuncts of the standard library with different dependency tracking mechanism.[]{data-label="Reproving_split"} In Table \[Reproving\_theories\] we have compared the success rates of reproving in different theories, as this may represent a relative difficulty of each theory and also the relative performance of each prover. We observe that performs best on the theories `measure` and `probability`, `list` and `finite_map`, whereas and have a higher success rate on the theories `arithmetic`, `real`, `complex` and `sort`. Overall, the high success rate in the `arithmetic` and `real` theories confirms that can already tackle this type of theorems. Nonetheless, it would still benefit from integrating more SMT-solvers’ functionalities on advanced theories based on `real` and `arithmetic`. ------- ------- ------- ------- ------- 61.29 72.97 91.22 27.01 59.74 69.57 77.19 20.85 51.42 64.46 86.84 31.27 total 63.63 75.31 92.10 32.70 ------- ------- ------- ------- ------- : Percentage (%) of reproved theorems in the theories `arithmetic`, `real`, `complex`, `measure`, `probability`, `list`, `sorting` and `finte_map`. []{data-label="Reproving_theories"} ------- ------- ------- ------- ------- 42.16 23.56 34.54 33.07 37.34 21.96 32.72 27.16 54.21 25.62 25.45 43.70 total 55.42 26.77 40.00 45.27 ------- ------- ------- ------- ------- : Percentage (%) of reproved theorems in the theories `arithmetic`, `real`, `complex`, `measure`, `probability`, `list`, `sorting` and `finte_map`. []{data-label="Reproving_theories"} With different accessible sets ------------------------------ In Table \[accessible\_sets\] we compare the quality of the predictions in different proving environments. We recall that only the transitive dependencies, loaded theories and linear order settings are using predictions and that the number of these predictions is adapted to the ability of each provers. The exact dependencies setting (reproving), is copied from Table \[Reproving\_split\] for easier comparison. ED TD LT LO ------- ------- ------- ------- ------- 42.41 33.10 43.58 43.64 39.32 29.56 38.46 38.54 40.63 24.66 31.22 31.20 total 46.76 37.54 50.54 50.68 : Percentage (%) of proofs found using different accessible sets: exact dependencies (ED), transitive dependencies (TD), loaded theories (LT), and linear order (LO)[]{data-label="accessible_sets"} We first notice the lower success rate in the transitive dependencies setting. There may be two justifications. First, the transitive dependencies provide a poor training set for the predictors; the set of samples is quite small and the available lemmas are all related to the conjecture. Second, it is very unlikely that a lemma in this set will be better than a lemma in the exact dependencies, so we cannot hope to perform better than in the reproving experiment. We now focus on the loaded theories and linear order settings, which are the two scenarios that correspond to the regular usage of a “hammer” system in a development: given all the previously known facts try to prove the conjecture. The results are surprisingly better than in the reproving experiment. First, this indicates that the training data coming from a larger sample is better. Second, this shows that the library is dense and that closer dependencies than the exact one may be found by the predictors. It is quite common that large-theory automated reasoning techniques find alternate proofs. Third, if we look at each ATP separately, we see a one percent increase for , a one percent decrease for , and 9 percent decrease for . This correlates with the number of selected premises. Indeed, it is easy to see that if a prover performs well with a large number of selected premises, it has more chance to find the relevant lemmas. Finally, we see that each of the provers enhanced the results by solving different problems. We can summarize the results by inferring that predictors combined with ATPs are most effective in large and dense developments. The linear order experiments was also designed to make a valid comparison with a similar experiment where 39% of theorems were proved by combining 14 methods This number was later raised to 47% by improving the machine learning algorithm. Comparatively, the current 3 methods can prove 50% of the theorems. This may be since the machine learning methods have improved, since the ATPs are stronger now or even because the theories contain a more linear (less dense) development than the libraries, which makes it harder for automated reasoning techniques. Reconstruction {#sec:reconstruction} -------------- Until now all the ATP proved theorems could only be used as oracles inside . This defeats the main aim of the ITP which is to guarantee the soundness of the proofs. The provers that we use in the experiments can return the unsatisfiable core: a small set of premises used during the proof. The HOL representation of these facts can be given to in order to reprove the theorem with soundness guaranteed by its construction. We investigate reconstructing proofs found by on the loaded theories experiments (used in our interactive version of ). We found that could reprove, with a one second time limit, 95.6% of these theorems. This result is encouraging for two reasons: First, we have not shown the soundness of our transformations, and this shows that the found premises indeed lead to a valid proof in HOL. Second, the high reconstruction rate suggest that the system can be useful in practice. Case study ---------- Finally, we present two sets of lemmas found by advised on the loaded libraries. We discuss the difference with the lemmas used in the original proof. The theorem `EULER_FORMULE` states that any complex number can be represented as a combination of its norm and argument. In the human-written proof script ten theorems are provided to a rewriting tactic. The user is mostly hindered by the fact that she could not use the commutativity of multiplication as the tactic would not terminate. Free of these constraints, the advice system returns only three lemmas: the commutativity of multiplication, the polar representation `COMPLEX_TRIANGLE`, and the Euler’s formula `EXP_IMAGINARY`. (In theory `complex`) `Original proof:`\ `val EULER_FORMULE = store_thm(`“`EULER_FORMULE`”`,`\ `  “!z:complex. modu z  exp (i  arg z) = z“,`\ `  REWRITE_TAC[complex_exp, i, complex_scalar_rmul, `\ `  RE, IM, REAL_MUL_LZERO, REAL_MUL_LID, EXP_0, `\ `  COMPLEX_SCALAR_LMUL_ONE, COMPLEX_TRIANGLE]);`\ `              `\ `Discovered lemmas:`\ `COMPLEX_SCALAR_MUL_COMM COMPLEX_TRIANGLE `\ `EXP_IMAGINARY` The theorem `LCM_LEAST` states that any number below the least common multiple is not a common multiple. This seems trivial but actually the least common multiple ($lcm$) of two natural numbers is defined as their product divided by their greatest common divisor. The user has proved the contraposition which requires two calls. The discovered lemmas seem to indicate a similar proof, but it requires more lemmas, namely `FALSITY` and `IMP_F_EQ_F` as the false constant is considered as any other constant in and uses the combination of `LCM_COMM` and `NOT_LT_DIVIDES` instead of `DIVIDES_LE`. Interactive version {#sec:interactive} ------------------- In our previous experiments, all the different steps (export, learning/predictions, translation, ATPs) were performed separately, and simultaneously for all the theorems. Here, we compose all this steps to produce one step, that given a conjecture proves it, usable in any development in an interactive advice loop. It proceeds as follows: The conjecture is exported along with the currently loaded theories. Features for the theorems and the conjecture are computed, and dependencies are used for learning and selecting the theorems relevant to the conjecture. translates the problem to the formats of the ATPs and uses them to prove the resulting problems. If successful, the discovered unsatisfiable core, consisting of the theorems used in the ATP proof, is then read back to , returned as a proof advice, and replayed by . In the last experiment, we evaluate the time taken by each steps on two conjectures, which are not already proved in the libraries. The first tested goal $C_1$ is $gcd\ (gcd\ a\ a)\ (b + a) = (gcd\ b\ a)$, where $gcd\ n\ m$ is the greatest common divisor of $n$ and $m$. It can be automatically proved from three lemmas about $gcd$. The second goal is $C_2$ is $Im(i*i) = 0$, where $Im$ the imaginary part of a complex number. It can be automatically proved from 12 lemmas in the theories `real`, `transc` and `complex`. In Table \[tab:Timer\], the time taken by the export and import phase linearly depends on the number of theorems in the loaded libraries (given in parenthesis), as expected by the knowledge of our data and the complexity analysis of our code. The time shown in the fourth column (“Predict”) includes the time to extract features, to learn from the dependencies and to find 96 relevant theorems. The time needed for machine learning is relatively short. The time taken by shows that the second conjecture is harder. This is backed by the fact that we could not tell in advance what would be the necessary lemmas to prove this conjecture. The overall column presents the time between the interactive call and the display of advised lemmas. The low running times support the fact that our tool is fast enough for interactive use. -------------- ------ ------ ------ ------ ------ -- $C_1$ (2224) 0.38 0.20 0.29 0.01 0.97 $C_2$ (4056) 0.67 0.43 0.59 1.58 3.42 -------------- ------ ------ ------ ------ ------ -- : Time (in seconds) taken by each step of the advice loop[]{data-label="tab:Timer"} Conclusion {#sec:concl} ========== In this paper we present an adaptation of the system for , which allows for general purpose learning-assisted automated reasoning. As uses machine learning for relevance filtering, we need to compute the dependencies, define the accessibility relation for theorems and adapt the feature extraction mechanism to . Further, as we export all the proof assistant data (types, constants, named theorems) to a common format, we define the namespaces to cover both and . We have evaluated the resulting system on the standard library toplevel goals: for about 50% of them a sufficient set of dependencies can be found automatically. We compare the success rates depending on the accessibility relation and on the treatment of theorems whose statements are conjunctions. We provide a command that translates the current goal, runs premise selection and the ATP, and if a proof has been found, it returns a call needed to solve the goal. The resulting system is available at <https://github.com/barakeel/HOL>. Future Work ----------- The libraries of and are currently processed completely independently. We have however made sure that all data is exported in the same format, so that same concepts and theorems about them can be discovered automatically [@tgck-cicm14]. By combining the data, one might get goals in one system solved with the help of theorems from the other, which can then be turned into lemmas in the new system. A first challenge might be to define a combined accessibility relation in order to evaluate such a combined proof assistant library. The format that we use for the interchange of and data is heavily influenced by the TPTP formats for monomorphic higher-order logic [@tptpthf0] and polymorphic first-order logic [@jasmincade2013]. It is however slightly different from that used by Sledgehammer’s `fullthf`. By completely standardizing the format, it would be possible to interchange problems between and . In , theorems include the information about the theory they originate from and other attributes. It would be interesting to evaluate the impact of such additional attributes used as features for machine learning on the success rate of the proofs. Finally, most users call its web interface [@ckju-msc-hh-accepted], rather than locally install the necessary prover modifications, proof translation and the ATP provers. It would be natural to extend the web interface to support . We would like to thank Josef Urban and Michael Färber for their comments on the previous version of this paper. This work has been supported by the Austrian Science Fund (FWF): P26201. [^1]: reconstruction rate is typically above 90%
{ "pile_set_name": "ArXiv" }
Archive for month: January, 2014 Lorell Brown Brandon was born in Woodbury, Tennessee on October 19, 1921 to George Brown, Sr. and Willie D. Alexander Brown, who predeceased her. She departed this life on January 27, 2014. Lorell professed her hope in Christ at an early age. She was a member of Hickory Grove Baptist Church, Readyville, Tennessee and she also attended Water Street Church of Christ, Woodbury, Tennessee. Lorell was united in holy matrimony on July 18, 1939 with Gilbert Richardson Brandon, Sr., who predeceased her after over 55 years of marriage and they were the proud parents of one daughter, Betty Sue Wade, who predeceased her and five sons, Gilbert Brandon, Jr., Clarence Edward Brandon, LeRoy Brandon, Ronnie Burney, and Larry Douglas Brandon. Lorell enjoyed gardening, cooking and quilting. She raised laying hens and proudly sold her brown eggs until her health caused her to leave the farm. Lorell loved her family and she made every sacrifice, along with her husband, to provide for her family. Lorell was a strong woman and she was respectfully referred to as “boss woman” by some members of her family. Her love was the fuel that enabled her children to do the impossible. In lieu of flowers you may make a donation to the children’s ministry at Hickory Grove Baptist Church, 151 Cripple Creek Loop, Readyville, TN 37149. Lorell will lie-in-state Friday, January 31, 2014 from 3 p.m. to 8 p.m. at Rucker Memorial Chapel 1505 Bradyville Pike, Murfreesboro, TN 37130. Family visitation will be Saturday, February 1, 2014 from 10 a.m. to 12 noon with the funeral to follow at 12 noon at Rucker Memorial Chapel. Pastor Wayne Rogers will be the Eulogist. Burial will follow at Evergreen Cemetery. Services have been entrusted to Rucker Memorial Chapel, 615-895-2200 www.ruckermemorialchapel.com Eddie James Tramble, 56, of Murfreesboro, TN, departed this earthly life Sunday, January 5, 2014 at his residence. Mr. Tramble was born in Chattanooga, TN to the late Eddie James and Levie C. Tramble. He was also preceded in death by two sisters Savilla Turner and Rudean Morrison. He is survived by a loving and devoted soulmate Sabrina Williams, daughter LaTisha Johnson, son Eric Mayrell, seven grandchildren, devoted nephew Jeffrey Turner, and devoted play daughters Sade` and Brittney Williams. He is also survived by devoted cousins Calvin and Ann Tramble, a devoted friend Larry Pitts, and a host of other relatives and many friends. Visitation will be Friday, January 10, 2014 from 10am to 12 noon with Memorial Services to follow at Rucker Memorial Chapel. Reverend Tolbert Randolph will be the Eulogist. Services have been entrusted to Rucker Memorial Chapel. 615-895-2200
{ "pile_set_name": "Pile-CC" }
We interrupt this program(me). May 1 remind you that we live in Great Britain, not the United States of America.
{ "pile_set_name": "PubMed Abstracts" }
Food for thought as rivals chew the fat From European Voice's Entre-Nous column 9/11/02, 5:00 PM CET Updated 4/23/14, 8:23 PM CET Last weekend’s UN-sponsored talks between ageing Turkish and Greek Cypriot leaders, Rauf Denktash (78) and Giafcos Clerides (83), may not have proven fruitful but they nonetheless inspired some marvellous reportage. The front page of Cyprus Today insisted on supplying all the details of their encounter, the latest in a series of discussions about settling their decades-old differences before the island joins the EU. The newspaper even revealed what these two gourmands had for lunch: “artichokes and green beans in mushroom sauce, followed by chicken and mushroom cream sauce with fresh pasta, and chocolate biscuits and coffee”. We’re not told if any wine was consumed during the nosh-up but one seasoned observer of Cyprus’ affairs has informed EV the two men have both decided to go easy on the booze in recent years for health reasons. As well as a love of fine food, one of the many things the two supposed foes – who apparently have been known to actually enjoy each other’s company – used to share was a weakness for whisky and peanuts. There is something splendidly parochial about the state-aid investigation launched last week by the European Commission’s competition department into JC Decaux, a French advertising company. The question …
{ "pile_set_name": "Pile-CC" }
Q: How can I query objects with a date field, using a specific month and year? I need to make a gql query against a set of some objects which have a date field. I am very new to python and also the GAE so I am a bit igorant to this. I am looking in the documentation but cannot find quite what I am looking for. Basically I have made the following class method Event.getEventsForMonth(cls, month,year): So I am trying to query my object where the month and year of the date field fall in a specified range. I have tried to create a date object and use that for the comparison but I have had no joy so far. dateto = str(year)+str(month+1)+"01" datefrom = str(year)+str(month)+"01" if month + 1 == 13: dateto = str(year+1)+"01"+"01" query = GqlQuery("SELECT * FROM Event WHERE date >= :datefrom AND date <= :dateto", dateto=dateto, datefrom=datefrom) return query This method to me looks awful, as I am not very up on the core methods I can use from Python inline with the GQL Query. Any help is appreciated Cheers, Andrew A: First, store your dates as DateProperty or DateTimeProperty instances in the datastore. Then, you can do your query something like this: def getEventsForMonth(self, month, year): start_date = datetime.datetime(year, month, 1) if month == 12: end_date = datetime.datetime(year + 1, 1, 1) else: end_date = datetime.datetime(year, month + 1, 1) return Events.all().filter('date >=', start_date).filter('date <=', end_date).fetch(1000)
{ "pile_set_name": "StackExchange" }
This is an "owner version" 5 cabin layout. The owners cabin being on the port side from the stairs all the way to the front. A four cabin layout would simply be the "port side" being mirrored on the starboard side" or a six cabin layout would be the starboard side being mirroed on on the port side. Please visit the download page where there is a more detailed version with explanations.
{ "pile_set_name": "Pile-CC" }
[The effect of prednisolone and ACTH on the in vitro metabolism of human placenta from early pregnancy (author's transl)]. The effects of prednisolone and ACTH on in vitro oxygen consumption and aerobic and anaerobic glycolysis of human placentas of early pregnancy were studied. Oxygen consumption and anaerobic glycolysis were significantly reduced by prednisolone, while ACTH resulted in a significant increase in aerobic glycolysis during the 2 hr experimental period.
{ "pile_set_name": "PubMed Abstracts" }
Mort Drucker Mort Drucker (born March 22, 1929) is an American caricaturist and comics artist best known as a contributor for over five decades in Mad, where he specialized in satires on the leading feature films and television series. In a 1985 Tonight Show appearance, when Johnny Carson asked Michael J. Fox, "When did you really know you'd made it in show business?" Fox replied, "When Mort Drucker drew my head." Early life Drucker was born in Brooklyn, New York City,, with some sources listing his birth date as March 22, 1929 and others as March 29. He attended Brooklyn's Erasmus Hall High School. There he met his future wife Barbara, whom he married shortly after her graduation. The couple moved to Long Island, living in Syosset, where they brought up two daughters, Laurie and Melanie; their family eventually expanded with three grandchildren. Career Drucker entered the comics field by assisting Bert Whitman on the newspaper comic strip Debbie Dean in 1947 when he was 18, based on a recommendation from Will Eisner. He then joined the staff of National Periodical Publications (DC Comics), where he worked as a retoucher. While at DC, Drucker also ghosted "The Mountain Boys", Paul Webb's regular gag panel for Esquire Magazine. Early in the 1950s, Drucker left his DC staff gig and began doing full-time freelance work for a number of comic book publishers such as Dell, Atlas and St. John's, as well as several humor and war titles for his former employer. Mad In the fall of 1956, shortly after the departure of Mad'''s founding editor Harvey Kurtzman, Drucker found his way to Mad. His first visit to the magazine's offices coincided with a World Series broadcast, and publisher Bill Gaines told Drucker that if the Brooklyn Dodgers won the game, he would be given a drawing assignment. The Dodgers won. Capricious though Drucker's alleged audition process may have been, it was a good anecdote. Years later, Gaines unsurprisingly confessed, "We would have hired him anyway." By the time he wound down his Mad career 55 years later, Drucker held the longest uninterrupted tenure of any Mad artist. Drucker has the most bylined articles by any Mad artist who does not also write his own material, with more than 400. Drucker had arrived at the Mad offices with pages from his Hopalong Cassidy comic book work for DC Comics and some of his "Mountain Boys" strips, as well as a humorous "little situation" featuring The Lone Ranger and Tonto that he had specifically drawn for the interview. Though this work was unlike the likenesses and continuities he would become best known for, the Mad staff reacted favorably. The first to review Drucker's portfolio was Mad associate editor Nick Meglin, who admitted, "I didn't spot how great he was at caricatures. Not at first. But then, he wasn't that great then." Drucker himself says that he "just wanted to be an artist ... to get paid for drawing anything," and only started focusing on caricature work because he started getting more of those assignments. "That's when I realized I'd found my calling," said Drucker. At the time of Drucker's arrival, Mad did not regularly feature TV and movie satires. Editor Al Feldstein credited Drucker's style and ability for the decision to start featuring them in every issue. For well over a decade, Mad had difficulty obtaining promotional photos that Drucker could use as source material for his drawings. When he was illustrating Mad parodies, Drucker's colleague Angelo Torres brought a camera into movie theaters and snapped pictures of the screen. Eventually a generation of Mad fans grew up and some became Hollywood publicists, making Drucker's research easier. However, Mad still experienced some interference. When the magazine's parody of The Empire Strikes Back was published in 1980, drawn by Drucker, the magazine received a cease and desist letter from George Lucas' lawyers demanding that the issue be pulled from sale, and that Mad destroy the printing plates, surrender the original art, and turn over all profits from the issue. Unbeknownst to them, George Lucas himself had just sent Mad an effusive letter praising the parody, and declaring, "Special Oscars should be awarded to Drucker and DeBartolo, the George Bernard Shaw and Leonardo da Vinci of comic satire."Taylor, Chris, How Star Wars Conquered the Universe, Hachette Books, 2015, pg. 122 Publisher Gaines mailed a copy of the letter to Lucas' lawyers with a handwritten message across the top: "That's funny, George liked it!" There was no further communication on the matter. Drucker had also worked on the advertising campaign for Lucas' earlier film American Graffiti. In his introduction to the Mad About Star Wars book, Lucas wrote, "I have always defended Mad from my lawyers."Clark, Mark, Star Wars FAQ: Everything Left to Know About the Trilogy That Changed the Movies, Applause Books, 2015 Meglin called Drucker "number one in a field of one." Charles Schulz wrote, "Frankly, I don't know how he does it, and I stand in a long list of admirers ... I think he draws everything the way we would all like to draw." In 2012, referring to Drucker's splash page for Mad's parody of The Godfather, the Comics Reporter's Tom Spurgeon wrote, "The way he draws James Caan's eyebrow is worth some folks' entire careers." In 2012, Drucker discussed his art style, and how he applied it to his Mad assignments: I've always considered a caricature to be the complete person, not just a likeness. Hands in particular have always been a prime focus for me as they can be as expressive of character as the exaggerations and distortions a caricaturist searches for. I try to capture the essence of the person, not just facial features ... I've discovered through years of working at capturing a humorous likeness that it's not about the features themselves as much as the space between the features. We all have two eyes, a nose, a mouth, hair and jaw lines, but yet we all look different. What makes that so is the space between them. The artist is actually creating his own storyboard for the film. I become the "camera" and look for angles, lighting, close-ups, wide angles, long shots-- just as a director does to tell the story in the most visually interesting way he can. My first sketches are as much composition and design ideas as they are character and action images ... I don't want to get too involved in the juicy parts since some of what I'm doing will be modified or discarded as I get further involved in the storytelling. I then stand back and look at the page as a complete unit to make sure it's designed well: "Hmmm, three close-up panels in a row of characters talking. Better change that middle panel to a far shot. Maybe make that panel an open vignette." ... Then I place the facing pages together and look at how the spread holds together, and sometimes make changes based on that. Other work Drucker also remained active for DC, illustrating War Stories, among other titles. Beginning in 1959, he spent four years drawing DC's The Adventures of Bob Hope comic book. Drucker credits this stint as a key moment in his career, because it focused his work on caricature. In 1962, Drucker teamed with the prolific humor writer Paul Laikin on the highly successful JFK Coloring Book (Kanrom Publishers), which sold 2,500,000 copies. Two decades later, Drucker illustrated similar coloring books on Ollie North and Ronald Reagan.Pacific Stars and Stripes, August 24, 1987. His film posters include Universal's American Graffiti (1973), directed by George Lucas with Drucker also drawing the high school yearbook pictures in the film trailer. Drucker also pursued assignments in television animation, movie poster art and magazine illustration, including covers for Time, some of which are in the National Portrait Gallery of the Smithsonian Institution. His album covers include art for the pop band The Bears and the Anthrax album State of Euphoria, as well as humor albums in the vein of his own "JFK Coloring Book" including "The LBJ Menagerie" and "The New First Family, 1968." In addition to books collecting his own work, he has provided illustrations for numerous books by others, including children's books, humor books and satire. He drew the prop cartoons used in the 1957 Broadway musical comedy, Rumple. Between 1984 and 1987, Drucker collaborated with Jerry Dumas (and John Reiner) on the daily comic strip Benchley. Set in the White House, the plot revolved around the fictive character Benchley who acted as the assistant and admirer of contemporary president Ronald Reagan. Dumas commented, "Nobody ever did a strip about the government. It's a wonderful place to set a strip. There's so much room for humor in the White House." Benchley was syndicated by the Register and Tribune Syndicate. In 1990, Drucker designed the Supercup for Target. The following year, for the United Fresh Fruit and Vegetable Association, Drucker and executive Mitchell Erick created the Frugies (pronounced fru-jees) to promote June as National Fresh Fruit and Vegetable Month. The campaign included such characters as Lord Mushroom, Pepe L'Pepper, Penelope Pear and Adam Apple. Awards Mort Drucker's Time covers are in the collection of the National Portrait Gallery. He was recognized for his work with the National Cartoonists Society Special Features Award (1985, 1986, 1987, 1988), its Reuben Award (1987), and induction into the Society's Hall of Fame (2017).http://www.reuben.org/2017/06/10073/ Drucker was awarded an Honorary Doctor of Fine Arts degree from the Art Institute of Boston. BibliographyMAD's Greatest Artists: Mort Drucker by Mort Drucker. Running Press, 2012.Tomatoes from Mars by Arthur Yorinks and Mort Drucker. Di Capua, 1999.Whitefish Will Rides Again! by Arthur Yorinks and Mort Drucker. Di Capua, 1994.Draw 50 Famous Caricatures by Mort Drucker and Lee J. Ames. Doubleday, 1990.The Ronald Reagan Coloring Book by Mort Drucker and Paul Laikin. Andrews and McMeel, 1988.Familiar Faces: The Art of Mort Drucker by David Duncan and Mort Drucker. Stabur Press, 1988.The Ollie North Coloring Book by Mort Drucker and Paul Laikin. Andrews McMeel, 1987.Benchley, Book 1 by Mort Drucker. Blackthorne, 1987.Mort Drucker's MAD Show-Stoppers by Mort Drucker. EC, 1985.What to Name Your Jewish Baby by Bill Adler and Mort Drucker and Arnie Kogen. Dutton, 1969.My Son, the Daughter by Mort Drucker. Kanrom, 1964.Political Wind-Ups by Alexander Roman and Mort Drucker. Kanrom, 1962.JFK Coloring Book by Alexander Roman and Mort Drucker. Kanrom, 1962. Illustrations for books by othersA Book of Jean's Own, Maria Schneider writing as Jean Teasdale. St. Martin's Griffin, 2010.Christopher Lee's Treasury of Terror'', edited by Russ Jones. Pyramid, 1966. References External links Mort Drucker official site Mort Drucker's Mad contributions Tom Richmond: "The Mort Drucker Caricature Story" Category:1929 births Category:American cartoonists Category:American caricaturists Category:Artists from New York City Category:Film poster artists Category:Album-cover and concert-poster artists Category:Living people Category:Mad (magazine) cartoonists Category:People from Brooklyn Category:Jewish American artists Category:Jewish artists Category:Reuben Award winners Category:People from Woodbury, Nassau County, New York Category:Erasmus Hall High School alumni
{ "pile_set_name": "Wikipedia (en)" }
Moroto Cement Limited Moroto Cement Limited (MCL), whose full name is Moroto Cement Industries Limited, is a manufacturer of cement in Uganda with approximately 3000 tonnes per day clinker capacity. Location It was expected that when construction would be completed in 2013, the main factories of the company would be located in Lorukumoi Village, in Rupa Sub-county, in Moroto District, Karamoja sub-region, in Northeastern Uganda. This location lies near the town of Moroto, approximately , by road, northeast of Kampala, the capital of Uganda and the largest city in that country. This location lies approximately , by road, east of the city of Gulu, the largest urban center in Northern Uganda. Overview With an estimated production capacity of 1,000,000 metric tonnes annually, Moroto Cement Limited is expected to be one of the largest manufacturers of cement in Uganda, accounting for about 34 percent of annual national output. Tororo Cement Limited, accounts for another 34 percent. Hima Cement Limited, which produces an estimated 850,000 metric tonnes annually, accounts for the remaining 32 percent. The bulk of MCL's output is expected to go towards the construction of Karuma Power Station, the largest hydro-power station ever undertaken in Uganda's history. , production capacity at the factory in Moroto was estimated at approximately 3,000 metric tonnes daily. History The company was established in 2012. It has carried out feasibility studies on limestone deposits in Moroto District, finding sufficient quantities to last 100 years at maximum production capacity. Construction of the main factory was expected to begin in late 2012 and last approximately one year. Commercial production of cement was expected to begin soon after the factory was commissioned. Start-up costs were estimated at about UGX:1 trillion (about US$400 million at that time). Cancellation of license In March 2017, the Uganda Radio Network, a news agency, reported that the Directorate of Geological Survey and Mines in the Uganda Ministry of Energy and Mineral Development had cancelled the mining license of Moroto Cement Industries Limited, the owner/developers of this project. The reason for the cancellation was given as "failure to start development", four years after being awarded a licence. See also Tororo Cement Limited Hima Cement Limited References External links Website of Tororo Cement Limited Website of Hima Cement Limited East African Cement Prices To Fall With Entry Of New Manufacturers Category:Companies established in 2012 Category:2012 establishments in Uganda Category:Northern Region, Uganda Category:Moroto District Category:Cement companies of Uganda
{ "pile_set_name": "Wikipedia (en)" }
Q: Wie schreibt man Umlaute und scharfes S auf nichtdeutschen Tastaturen? How do you write Umlauts and ß on non-German keyboards? Wie schreibt man Umlaute und ß auf einer US-Tastatur? A: An easy way that requires just a little bit adjusting is using US International layout (it's what I'm using and I love it). There seem to exist different variants: With and without dead keys. Without dead keys, everything is normal, except you get lots of accented letters with AltGr, e.g., AltGr + s is ß, AltGr + p is ö, AltGr + q is ä and AltGr + y is ü. With dead keys the layout becomes more powerful since it allows you to combine diacritics with different letters, e.g., the key that creates a " is a dead key and allows you to put dots over lots of letters: äëüïÿẍ. Same for accents ', ^, ~ and `: áàâã. The downside is that for quotes you need to type an extra space and the occasional bug in applications and desktops. A: Several ways: Switch to a German keyboard layout. No, really. On Windows, you can (after having configured it) switch between layouts by pressing Shift+Alt, so you can just switch when writing the special characters. This way, you just have to memorize where these four keys are, not all the other differences between US and German layout. Use codes: ä, for example, is Alt+0228, at least on Windows. Don't know if you need other keys for other systems. Windows Character Map (charmap.exe) shows the codes for characters. Copy & Paste, as seen on the GL&U chat. A: On Mac OS X you can use: Alt+S = ß Alt+U then A = ä Alt+U then E = ë Alt+U then U = ü (Tested on a UK layout keyboard)
{ "pile_set_name": "StackExchange" }
Impact of prosthesis-patient mismatch on early haemodynamic status after aortic valve replacement. Prosthesis-patient mismatch (PPM) has been reported to impact early haemodynamic status and early mortality after prosthetic aortic valve replacement (AVR) in patients with aortic stenosis (AS). The aim of this study was to assess the impact of PMM on early haemodynamic status after AVR using vasoactive-inotropic dependency index (VDI), postoperative pressures and end-organ perfusion. A total of 183 patients with AS were included in this prospective cohort study, and underwent elective AVR with or without combined coronary artery bypass graft surgery. PPM was defined as a projected indexed effective orifice area of ≤0.85 cm2/m2, and was present in 27.9% of the patients. The primary end-point was the VDI [VDI = vasoactive-inotropic score/mean arterial pressure] measured upon admission to the intensive care unit (POD0) and on the morning of the first postoperative day (POD1). The secondary end-points were the following: mean left atrial pressure, mean central venous pressure, fluid balance, brain natriuretic peptide, troponin I, glomerular filtration rate and lactate levels on POD0 and POD1. No significant differences in VDI were observed between the no PPM and PPM groups on POD0 (0.08 ± 0.48 vs 0.05 ± 0.13, respectively, P = 0.622) or on POD1 (0.09 ± 0.40 vs 0.06 ± 0.13, respectively; P = 0.583). The mean arterial pressure, mean left atrial pressure, central venous pressure, troponin I, glomerular filtration rate and lactate levels did not differ between the two groups on POD0 and POD1, as well as fluid balance and brain natriuretic peptide on POD1. PPM is not associated with early haemodynamic status impairment and end-organ perfusion after AVR. ClinicalTrials.gov number, NCT00699673.
{ "pile_set_name": "PubMed Abstracts" }
Variable phenotype of del45-55 Becker patients correlated with nNOSμ mislocalization and RYR1 hypernitrosylation. Duchenne and Becker muscular dystrophies (DMD and BMD) are muscle-wasting diseases caused by mutations in the DMD gene-encoding dystrophin. Usually, out-of-frame deletions give rise to DMD, whereas in-frame deletions result in BMD. BMD patients exhibit a less severe disease because an abnormal but functional dystrophin is produced. This is the rationale for attempts to correct the reading frame by using an exon-skipping strategy. In order to apply this approach to a larger number of patients, a multi-exon skipping strategy of exons 45-55 has been proposed, because it should correct the mRNA reading frame in almost 75% of DMD patients with a deletion. The resulting dystrophin lacks part of the binding site for the neuronal nitric oxide synthase (nNOSμ), which normally binds to spectrin-like repeats 16 and 17 of the dystrophin. Since these domains are encoded by exons 42-45, we investigated the nNOSμ status in muscle biopsies from 12 BMD patients carrying spontaneous deletions spaning exons 45-55. We found a wide spectrum of nNOSμ expression and localization. The strictly cytosolic mislocalization of nNOSμ was associated with the more severe phenotypes. Cytosolic NO production correlated with both hypernitrosylation of the sarcoplasmic reticulum calcium-release-channel ryanodine receptor type-1 (RyR1) and release of calstabin-1, a central hub of Ca(2+) signaling and contraction in muscle. Finally, this study shows that the terminal truncation of the nNOS-binding domain in the 'therapeutic' del45-55 dystrophin is not innocuous, since it can perturb the nNOS-dependent stability of the RyR1/calstabin-1 complex.
{ "pile_set_name": "PubMed Abstracts" }
Episode Summary At almost the same time Governor Andrew Cuomo was talking in Albany about ways to curb gun violence, there was another burst of gunfire on the streets of Brooklyn. An elderly woman was caught in the crossfire. 90-year-old Gloria Johnson had just left a laundromat on Blake Avenue and was crossing the street on the way to her apartment a block away when a silver car raced by and fired at least four shots toward a group of kids standing on the corner.moreless Important: You must only upload images which you have created yourself or that you are expressly authorised or licensed to upload. By clicking "Publish", you are confirming that the image fully complies with TV.com’s Terms of Use and that you own all rights to the image or have authorization to upload it. Please read the following before uploading Do not upload anything which you do not own or are fully licensed to upload. The images should not contain any sexually explicit content, race hatred material or other offensive symbols or images. Remember: Abuse of the TV.com image system may result in you being banned from uploading images or from the entire site – so, play nice and respect the rules!
{ "pile_set_name": "Pile-CC" }
Acropolis Museum (11) When in 481 BC, the Acropolis was captured by the Persians, the Athenians, knowing the artistic value of the buildings and decorations that were there, did not remain inactive. The iron will to protect their valuable assets was not fully recognized until nearly 25 centuries later when, in the 19th century, during archaeological excavations remains were discovered that had been buried by the Athenians to prevent the Persian looting. In order to avoid further deterioration of these remains, it was decided to house them in the Acropolis Museum, which opened in 1878. The collection, however, is not limited to the remains of the archaic period but includes, with exemplary care for their preservation, several pieces from the classical Greece of Pericles. Thus, the 6th and 5th centuries BC are well represented in the halls of this museum located on the same site as the Acropolis. Of course, you can be sure we will not see all the friezes and decorations extracted from the original buildings but to see all these artistic remains you have to move a few kilometres to the northwest because, contrary to the wishes of the Athenians, most of the rest are in the British Museum in London. The museum was planned by architect Panages Kalkos and, architecturally speaking, it is not a work of art, since, located at the south eastern end, it breaks up the beauty of the Acropolis. The Acropolis Museum with its new display rooms, is considered to be one of the most valuable in the world. Outside, you will find next to the entrance a 5th century BC statue of an owl, symbol of the wisdom of the goddess Athena. From the first to the sixth hall, the museum contains masterpieces from the 6th century BC, the Archaic period. In them, you will see the splendid pediments of several temples illustrating the battles of heroes like Heracles fighting mythological monsters, or those of the ancient temple of Athena in Room V, where the goddess is in central position, beside Zeus, fighting giants, alluding to the victory of the Greeks over the barbarians. Moreover, as a pleasant surprise, it should be noted that some of these friezes still retain polychrome fragments, which will give you a better idea of the original spectacular image of the temples of antiquity. Moreover, in the museum you will find valuable pieces from the origins of Greek sculpture. We refer to the round figure of a Kriophoros (or ram-bearer) from 570 BC This is an example of well-known archaic sculptures of the kuroi and korai, male and female figures respectively of Egyptian influence, characterized by the rigidity of their grimace and position, by the vigour of their bodies and, in the case of the girls, by the work involved in their hairstyles. In Room VI, you will find a collection of korai, for example, from between 550 and 500 BC, and, as you follow the route, you will see the evolution from the stiffness and the mysterious, static smile of archaic times towards greater naturalism in the classical period. Rooms VII, VIII and IX bring together pieces from the Acropolitan stage of Pericles. The sculptures on display belong mainly to the Parthenon, the temple of Athena Nike, and the Erechtheion. The sculptural wonders of the artist Phidias in the metopes and friezes from the Parthenon depicting the Panathenaic procession, with rearing, twisted horses, and a daring and even exaggerated naturalism. The friezes from the temple of Athena Nike also reveal a shift from classicism to a later, more dramatic Hellenistic style. The Goddess is represented in a very human gesture, putting on her sandal, and the sculptor used the technique of drapery whereby the anatomy is seen through the clothing. In the final room, you can admire four of the caryatids of the Erechtheion. They were moved from their original location, the south portico of the temple, to the museum, due to the serious deterioration they were suffering from as a result of the concentrated presence of sulphur in the air in Athens. Another of the caryatids, female statues that were used instead of columns, is in the British Museum in London. The museum has struggled in recent years to recover the large number of pieces that are in collections abroad, especially in the Louvre and the British Museum. The most flagrant case is that of the Elgin marbles, which are famous sculptures from the Parthenon. The Briton, Lord Elgin, bought them at the beginning of the 19th century from the Turkish authorities, who at that time governed the country. Lord Elgin sold them to the British state for the price of 35,000 pounds, with which the debate began. And there are those who favour leaving the works in the British Museum, with the view that there the friezes and sculptures may receive better care than in Greece. However, the Greek government considered it completely illegal to have sold the marbles to the British Government and fervently believe that the marbles should be returned to where they belong, to their origins. The Greek actress and politician Melina Merkoúri was one of the leading activists in the struggle to regain these examples of Greek heritage. Gradually, Athens has recovered some pieces and, therefore, the premises of the Acropolis Museum have been outgrown. Hence, the exhibits are being transferred to a new, larger and expensive complex, which will be the new home of the Museum of the Acropolis, on the southern slope of the mountain. There, the empty rooms are waiting to someday receive the friezes that belonged to them.
{ "pile_set_name": "Pile-CC" }
The present invention relates to silicon nitride ceramic material, e.g., Si3N4. More specifically, the present invention relates to coatings for silicon nitride parts, which resist recession/oxidation (recession resistant coatings) in high temperature, high humidity and high gas flow environments, and methods of making the same. Ceramic materials, which are joined by ionic or covalent bonds, are typically composed of complex compounds containing both metallic and non-metallic elements. Ceramics typically are hard, brittle, high melting point materials with low electrical and thermal conductivity, good chemical and thermal stability, and high compressive strengths. Ceramics, such as silicon nitride, offer excellent high temperature strength and creep resistance and hence are employed in a variety of high temperature demanding applications, such as bearings and valves for internal combustion engines. Additionally, silicon nitride and other various ceramics may be used in 300 to 800 kilowatt gas turbines, e.g., micro-turbines, where the internal components are subjected to the combination of high temperature, high humidity and high gas flows. These micro-turbines are frequently used as specialized power generators for industrial applications. The internal temperatures of ceramic micro-turbines can run at higher temperatures than metal micro-turbines, e.g., 1370 degrees centigrade (C) or higher, and therefore can also run at higher efficiencies, e.g., about 15% higher. One example of a ceramic used in a micro-turbine environment is a silicon nitride compound available from Saint-Gobain Ceramics and Plastics, Inc., of Worcester, Mass., having the trade name NT154(copyright). This material is described in U.S. Pat. No. 4,904,624, which is herein incorporated by reference in its entirety. NT154(copyright) typically is composed of 96% silicon nitride and 4% yttrium, and is also typically subjected to a sintering (densification) process to increase its density and reduce its porosity. In a high temperature and humidity environment, silicon nitrides, and other silicon-based ceramics, will oxidize to form a thin layer of silicon dioxide (SiO2) on its surface. Over time, this silicon dioxide layer can crack or flake off to expose more ceramic to oxidation. As a result, the surface of the ceramic will slowly recede or wear away. This can be especially problematic in cases where ceramic parts must have a wear life of many thousands of hours. One such example of this is in micro-turbines which are designed to run 30,000, 45,000 or more hours. Moreover, in micro-turbine environments, the high gas flow rates exacerbates the problem of ceramic surface recession. That is, the high gas flow continuously strips the silicon dioxide layer away to re-expose the surface to oxidation more rapidly. As a result it is possible in a micro-turbine for the surface of the ceramic to recede at rates of up to 1 mg/sq. cm hour. In other words, a square centimeter of ceramic surface, which is exposed to the environmental conditions within a micro-turbine, can potentially recede or be worn away at the rate of one milligram of thickness per hour. A variety of environmental barrier coatings (EBC) have been employed, using such techniques as physical vapor deposition (PVD) or chemical vapor deposition (CVD), to provide a recession resistant coating for the ceramic. These barrier coatings can potentially reduce the rate of ceramic recession by upwards of an order of magnitude, i.e., a factor of 10. Unfortunately, the coatings are prone to cracking and pealing due to differences in the coefficient of expansion between the layer and the ceramic surface. Based on the foregoing, it is the general object of the present invention to provide an environmental barrier coating for a ceramic, and method of making the coating, which overcomes the problems and drawbacks associated with the prior art. The present invention offers advantages and alternatives over the prior art by providing a recession resistant coated ceramic part. The ceramic part has a ceramic substrate and a recession resistant coating disposed on the substrate. The coating includes a plurality of layers diffusion bonded to each other and to the substrate respectively. The top most layer is characterized by a greater resistance to recession due to oxidation than that of the substrate. Since the layers are diffusion bonded, the problem of separation of layers is greatly alleviated. Additionally, the added resistance of the top most layer to recession due to oxidation greatly reduces the rate of recession of the over all ceramic part. In an alternative exemplary embodiment of the recession resistant coated ceramic part, the layers graduate the effects of thermal expansion between the substrate and the top most layer. Additionally, in another embodiment, the substrate of the recession resistant ceramic part is composed substantially of silicon nitride. An exemplary embodiment of a method of making a recession resistant coated ceramic part in accordance with the present invention includes forming a green porous ceramic part and coating the part with a plurality of layers. The top most layer is characterized by a greater resistance to recession due to oxidation than that of the part. The coated part is then surrounded in a hermetically sealable substance. The sealable substance is then made to conform to the part to form a hermetic seal thereon. The sealed and coated part is subsequently HIP (Hot Isostatically Pressed) processed to simultaneously densify the green part and diffusion bond the plurality of layers to each other and to the part respectively. In an alternative embodiment, the hermetically sealable substance is glass and heat is applied to soften the glass such that the glass conforms to the shape of the part to form a hermetic seal over the part.
{ "pile_set_name": "USPTO Backgrounds" }
Q: How to unit test a filter that uses another filter I am using a filter within a filter. how should I go about with the unit test for this? angular.module('filters') .filter('scUrlHttp', function ($filter) { return function (url) { var result; var startingUrl = 'http://'; var httpsStartingUrl = 'https://'; if ($filter('startsWith')(url, startingUrl) || $filter('startsWith')(url, httpsStartingUrl)) { result = url; } else { result = startingUrl + url; } return result; }; }); A: Filters are just services with Filter suffix. A filter can be stubbed with: var filterStub; beforeEach(() => { filterStub = jasmine.createSpy(); module('app', ($filterProvider) => { $filterProvider.register('startsWith', () => filterStub); }); }); Or: var filterStub; beforeEach(() => { filterStub = jasmine.createSpy(); module('app', { startsWithFilter: filterStub }); }); And another filter can be tested with: var anotherFilter = $filter('scUrlHttp'); filterStub.and.returnValue(true); expect(anotherFilter(...)).toBe(...); expect(filterStub).toHaveBeenCalledWith(...);
{ "pile_set_name": "StackExchange" }
The disclosure relates generally to optical fiber cable support systems and more particularly to a mid-span optical fiber cable support system configured to support a drop cable with preferential bend characteristics while reducing bend strain generated from the mid-span supported drop cable. Optical fiber is increasingly being used for a variety of applications, including but not limited to broadband voice, video, and data transmission. Optical networks may use fiber optic cables in aerial and/or buried applications and each have special needs. For example, aerial applications require hardware such as suspension clamps for hanging the cables under the tension of their own weight along with any environmental effects. In some networks a drop cable may be suspended from the main span cable at a mid-span location to distribute the fiber network outward from the main span cable at the mid-span location.
{ "pile_set_name": "USPTO Backgrounds" }
Værnedamsvej Værnedamsvej is a lively shopping street, linking Vesterbrogade and the beginning of Frederiksberg Allé with Gammel Kongevej on the border between Frederiksberg and Vesterbro in central Copenhagen, Denmark. The street was formerly known for its many specialized food stores, but is now dominated by fashion boutiques and cafés. Tullinsgade is a side street to Værnedamsvej and makes a 90 degree turn before joining Gammel Kongevej. History Before 1733, Værnedamsvej existed as a nameless road section linking Vesterbrogade with Gammel Kongevej. Its name refers to the name of a beer tapper, Werner Dam, who acquired a piece of land and opened a popular beer garden at the site. After his death in 1762, his widow and her new husband ran the place until 1781. The street was also formerly known as Slagtergaden (Literally "The Butchers' Street"), due to its large volume of butchers. Værnedamsvej later became known for its many specialized food and delicacy stores and its Parisian atmosphere. In 2013, the City proposed to pedestrianize the street but the idea was abandoned due to local opposition. Notable buildings and residents The French-language school Lycée Français Prins Henrik has one of its two entrances at No. 13A. Its main entrance is located on Sankt Thomas Plads (Frederiksberg Allé No. 22A) on the other side of the block. It occupies the former premises of Schneekloths Skole. Tullinsgade is home to Copenhagen's smallest hotel, the one-room Central Hotel & Café. The cafés, restaurants, and bars of Værnedamsvej include Café Granola (No. 5), Café Viggo (No. 15), Falernum (No. 16), Les Trois Cochons (No. 10), and Rist Kaffebar (No. 4B). Among the fashion bands that have opened flagship stores in the Værnedamsvej-Tullinsgade neighbourhood are Mads Nørgaard, WoodWood, Soulland and Aesop. The Playtype concept store has specialized in products, exhibitions, and events featuring typography since its opening in 2010. Dora (now No. 6), the interior and design boutique, has been a fixture of Værnedamsvej in two locations since its opening, and is regularly nominated for the prize of Byen Bedst Designbutik. Public art The gable of Værnedamsvej 3 features a mural based on a classical of Storm P drawing. It was painted by Bill Savarese in 1995. Another one is located in nearby Ingemannsvej where he grew up. References External links Category:Shopping streets in Copenhagen Category:Streets in Frederiksberg Category:Streets in Vesterbro/Kongens Enghave
{ "pile_set_name": "Wikipedia (en)" }
// (C) Copyright 2008-10 Anthony Williams // (C) Copyright 2011-2012,2015 Vicente J. Botet Escriba // // Distributed under the Boost Software License, Version 1.0. (See // accompanying file LICENSE_1_0.txt or copy at // http://www.boost.org/LICENSE_1_0.txt) #ifndef BOOST_THREAD_FUTURES_FUTURE_ERROR_CODE_HPP #define BOOST_THREAD_FUTURES_FUTURE_ERROR_CODE_HPP #include <boost/thread/detail/config.hpp> #include <boost/core/scoped_enum.hpp> #include <boost/system/error_code.hpp> #include <boost/type_traits/integral_constant.hpp> namespace boost { //enum class future_errc BOOST_SCOPED_ENUM_DECLARE_BEGIN(future_errc) { broken_promise = 1, future_already_retrieved, promise_already_satisfied, no_state } BOOST_SCOPED_ENUM_DECLARE_END(future_errc) namespace system { template <> struct BOOST_SYMBOL_VISIBLE is_error_code_enum< ::boost::future_errc> : public true_type {}; #ifdef BOOST_NO_CXX11_SCOPED_ENUMS template <> struct BOOST_SYMBOL_VISIBLE is_error_code_enum< ::boost::future_errc::enum_type> : public true_type { }; #endif } // system BOOST_THREAD_DECL const system::error_category& future_category() BOOST_NOEXCEPT; namespace system { inline error_code make_error_code(future_errc e) BOOST_NOEXCEPT { return error_code(underlying_cast<int>(e), boost::future_category()); } inline error_condition make_error_condition(future_errc e) BOOST_NOEXCEPT { return error_condition(underlying_cast<int>(e), boost::future_category()); } } // system } // boost #endif // header
{ "pile_set_name": "Github" }
<AnalogEfexPro2_preset> <filter name="TauronGlobalAdjustments"> <parameter name="strengthFactor" value="37" valueType="float"/> <parameter name="brightness" value="-11" valueType="float"/> <parameter name="contrast" value="-9" valueType="float"/> <parameter name="saturation" value="0" valueType="float"/> <parameter name="DisableFilter" value="0" valueType="float"/> </filter> <filter name="TauronLensDistortion"> <parameter name="defocus_radius" value="25" valueType="float"/> <parameter name="strength" value="-24" valueType="float"/> <parameter name="ChromaStrength" value="0.0700001" valueType="float"/> <parameter name="ChromaType" value="0" valueType="int"/> <parameter name="DisableFilter" value="1" valueType="float"/> </filter> <filter name="TauronBokehEllipse"> <parameter name="radius_mode" value="0" valueType="int"/> <parameter name="apertureType" value="0" valueType="int"/> <parameter name="alpha" value="0" valueType="float"/> <parameter name="apertureRotation" value="0" valueType="float"/> <parameter name="radius" value="0.028" valueType="float"/> <parameter name="outerRadiusFactor" value="2.94677" valueType="float"/> <parameter name="apertureParameter" value="0" valueType="float"/> <parameter name="gamma" value="3.5" valueType="float"/> <parameter name="centerX" value="0.5" valueType="float"/> <parameter name="centerY" value="0.5" valueType="float"/> <parameter name="innerRadiusX" value="0.349206" valueType="float"/> <parameter name="innerRadiusY" value="0.34373" valueType="float"/> <parameter name="upperRadiusPositive" value="0.2" valueType="float"/> <parameter name="lowerRadiusPositive" value="0.07" valueType="float"/> <parameter name="upperRadiusNegative" value="0.2" valueType="float"/> <parameter name="lowerRadiusNegative" value="0.07" valueType="float"/> <parameter name="DisableFilter" value="1" valueType="float"/> </filter> <filter name="DoubleExposure"> <parameter name="TextureFileName" value="" valueType="utf8string"/> <parameter name="TextureType" value="1" valueType="int"/> <parameter name="TextureConvertToWorkingColorSpace" value="1" valueType="int"/> <parameter name="TextureUseThumbnail" value="0" valueType="float"/> <parameter name="centerX" value="0.500165" valueType="float"/> <parameter name="centerY" value="0.501815" valueType="float"/> <parameter name="protectCenter" value="0" valueType="float"/> <parameter name="zoomStrength" value="45" valueType="float"/> <parameter name="rotateStrength" value="0" valueType="float"/> <parameter name="scaleFactor" value="1" valueType="float"/> <parameter name="angle" value="0" valueType="float"/> <parameter name="posX" value="0.5" valueType="float"/> <parameter name="posY" value="0.5" valueType="float"/> <parameter name="exposure" value="132.5" valueType="float"/> <parameter name="exposure_balance" value="2" valueType="float"/> <parameter name="DisableFilter" value="0" valueType="float"/> </filter> <filter name="TauronTextureDirt"> <parameter name="TextureType" value="3" valueType="int"/> <parameter name="TextureConvertToWorkingColorSpace" value="1" valueType="int"/> <parameter name="TextureUseThumbnail" value="0" valueType="float"/> <parameter name="strengthScratch" value="93" valueType="float"/> <parameter name="posXScratch" value="0.5" valueType="float"/> <parameter name="posYScratch" value="0.5" valueType="float"/> <parameter name="ScratchCombo" value="36" valueType="int"/> <parameter name="DisableFilter" value="1" valueType="float"/> </filter> <filter name="TauronLensVignette"> <parameter name="vignetteCenterX" value="0.5" valueType="float"/> <parameter name="vignetteCenterY" value="0.5" valueType="float"/> <parameter name="vigStrength" value="-5" valueType="float"/> <parameter name="vigSize" value="100" valueType="float"/> <parameter name="vigShape" value="4.5" valueType="float"/> <parameter name="DisableFilter" value="0" valueType="float"/> </filter> <filter name="NewFilmType"> <parameter name="filmTypePresets" value="15" valueType="int"/> <parameter name="strength" value="92" valueType="float"/> <parameter name="fade" value="-100" valueType="float"/> <parameter name="grainSliderStrength" value="490" valueType="float"/> <parameter name="grainSliderSoftness" value="0" valueType="float"/> <parameter name="DisableFilter" value="0" valueType="float"/> </filter> <filter name="LevelsAndCurvesFilter"> <parameter name="lacdataRGB" value='&lt;Lac_serialization&gt; &lt;key name="lowNodeX" value="0"/&gt; &lt;key name="lowNodeY" value="0"/&gt; &lt;key name="highNodeX" value="1"/&gt; &lt;key name="highNodeY" value="1"/&gt; &lt;key name="gamma" value="0"/&gt; &lt;key name="intNodeCount" value="0"/&gt; &lt;/Lac_serialization&gt; ' valueType="unknown"/> <parameter name="lacdataSmartBrightness" value='&lt;Lac_serialization&gt; &lt;key name="lowNodeX" value="0"/&gt; &lt;key name="lowNodeY" value="0"/&gt; &lt;key name="highNodeX" value="1"/&gt; &lt;key name="highNodeY" value="1"/&gt; &lt;key name="gamma" value="0"/&gt; &lt;key name="intNodeCount" value="0"/&gt; &lt;/Lac_serialization&gt; ' valueType="unknown"/> <parameter name="lacdataR" value='&lt;Lac_serialization&gt; &lt;key name="lowNodeX" value="0"/&gt; &lt;key name="lowNodeY" value="0"/&gt; &lt;key name="highNodeX" value="1"/&gt; &lt;key name="highNodeY" value="1"/&gt; &lt;key name="gamma" value="0"/&gt; &lt;key name="intNodeCount" value="0"/&gt; &lt;/Lac_serialization&gt; ' valueType="unknown"/> <parameter name="lacdataG" value='&lt;Lac_serialization&gt; &lt;key name="lowNodeX" value="0"/&gt; &lt;key name="lowNodeY" value="0"/&gt; &lt;key name="highNodeX" value="1"/&gt; &lt;key name="highNodeY" value="1"/&gt; &lt;key name="gamma" value="0"/&gt; &lt;key name="intNodeCount" value="0"/&gt; &lt;/Lac_serialization&gt; ' valueType="unknown"/> <parameter name="lacdataB" value='&lt;Lac_serialization&gt; &lt;key name="lowNodeX" value="0"/&gt; &lt;key name="lowNodeY" value="0"/&gt; &lt;key name="highNodeX" value="1"/&gt; &lt;key name="highNodeY" value="1"/&gt; &lt;key name="gamma" value="0"/&gt; &lt;key name="intNodeCount" value="2"/&gt; &lt;key name="intNodeX0" value="0.461111"/&gt; &lt;key name="intNodeY0" value="0.438889"/&gt; &lt;key name="intNodeX1" value="0.727778"/&gt; &lt;key name="intNodeY1" value="0.761111"/&gt; &lt;/Lac_serialization&gt; ' valueType="unknown"/> <parameter name="strength" value="100" valueType="float"/> <parameter name="DisableFilter" value="0" valueType="float"/> </filter> <group name="general"> <key name="name" type="string" value="casca_3"/> <key name="uid" type="string" value="2019-04-26T17:57:34214670061"/> <key name="tags" type="string_array"> <string value="Custom"/> </key> </group> </AnalogEfexPro2_preset>
{ "pile_set_name": "Github" }
Peptic ulcer bleeding following therapeutic endoscopy: a new indication for intravenous esomeprazole. Intravenous (IV) administration of the esomeprazole is a faster way to achieve gastric acid suppression than oral administration of the same agent. Peak suppression following IV administration occurs within hours compared with several days following oral administration. Thus, the IV administration route offers a faster onset of gastric suppression, achievement of intragastric pH closer to target levels, and better bioavailability. Treatment of peptic ulcer bleeding is the newest indication for the IV formulation of esomeprazole. The drug is effective in preventing rebleeds following endoscopic treatment when administered within 24 hours of the procedure as an 80-mg bolus followed by an IV infusion for 72 hours. What remains to be seen is whether oral therapy can be substituted for all, or part, of the 72-hour IV infusion and whether the patient can be discharged from the hospital sooner with similar outcomes.
{ "pile_set_name": "PubMed Abstracts" }
cheats = 3 cheat0_desc = "Infinite Power" cheat0_code = "Z 8 39220 0 0" cheat0_enable = false cheat1_desc = "Infinite Time" cheat1_code = "Z 8 39228 0 0" cheat1_enable = false cheat2_desc = "No Logic" cheat2_code = "Z 8 40078 201 0" cheat2_enable = false
{ "pile_set_name": "Github" }
Technique for quantifying the duration of intravenous anesthetic effect. Several recent studies have analyzed the relationship between pharmacokinetic parameters and the rate of decrease in concentration after discontinuation of a continuous drug infusion. Although these studies have clarified our understanding of those aspects of pharmacokinetics most relevant to anesthesia practice, they do not directly address the issue of the duration of drug effect, which will be a function of both pharmacokinetic and pharmacodynamic variables. This paper extends these concepts by presenting a method to unify pharmacokinetics and pharmacodynamics in a measure of duration of drug effect that is applicable when the drug effect is assessed in a binary, response/no response fashion. The parameter proposed to quantify duration of drug effect is the area under the curve expressing probability of drug effect as a function of time after the agent is discontinued. This parameter is denoted the mean effect time. It is calculated using the logistic (or Hill) equation to relate the probability of drug effect to drug concentration, which in turn can be calculated as a function of time by pharmacokinetic simulation. Mean effect times were calculated for sufentanil, alfentanil, propofol, and midazolam using the logistic equation describing recovery and by assuming that drug blood concentrations during maintenance of anesthesia were sufficient to reduce the probability of responsiveness to surgical stimulation to 10% (C90). Published pharmacokinetic and pharmacodynamic parameters were used for these calculations. These results were compared to the relevant decrement times (as defined in this paper, the time required for the concentration to decrease from C90 to the concentration at which 50% of patients are responsive and/or able to maintain adequate ventilation, denoted C50). It was assumed that C90 and C50 were independent variables. Mean effect times for midazolam and propofol, for which the steepness parameter delta for recovery (responsiveness and adequate ventilation) is less than 4, are significantly greater than the decrement time. Mean effect times for sufentanil and alfentanil (delta = 6 and 10, respectively) are close to decrement times. The discrepancy between mean effect time and decrement time becomes greater as the duration of drug administration increases. The incorporation of pharmacokinetic variability into the calculations had little effect on the results. Context-sensitive half-times or other decrement times have been shown to be the most useful measures of the kinetics of drug concentrations. Mean effect time may be a useful concept for understanding the recovery from drug effects.
{ "pile_set_name": "PubMed Abstracts" }
Q: which namespace class HttpClient should be used in UWP applications? Hey I am developing side project for Universal Windows Platform that will target Windows 10 Mobile phones (mainly). In this app I often ask web service to get and post data with use of HttpClient class. Now I am confused because some examples shows that you should use class HttpClient from namespace: Windows.Web.Http, and some from System.Net.Http. Methods are different between them, but I think you can achieve same results. My question is which namespace I should use while developing such applications? A: Windows.Web.Http is a WinRT API available in all the WinRT programming languages supported: C#, VB, C++/CX and JavaScript. This enables the option to write the same code in the language of your choice. System.Net.Http is a .NET API, and it is only available for C# and VB developers. The new API is better capable handling new methods related to the HTTP protocol, like WebSockets, etc. The new API doesn't have dependencies to some low-level Windows functions, like the current API does. Your question has been answered before , please look this , I hope this would help you .
{ "pile_set_name": "StackExchange" }
Q: Asynchronous network callback code I did not get the job after submitting this piece of work in an interview, but I have no feedback to know what "BAD" things are inside this block of code. The requirements are: Connect to the server on a known port and IP Asynchronously send a message to the server in your choice of format Calculate and display the round trip time for each message and the average round trip time for all messages sent The solution should not be so hard. But I just don't know what's wrong? Bad design? Bad naming? Bad practise? import java.io.BufferedReader; import java.io.DataOutputStream; import java.io.IOException; import java.io.InputStreamReader; import java.net.Socket; import java.net.UnknownHostException; public class EchoClient { private String hostname; private int port; private Socket clientSocket; private BufferedReader inFromUser, inFromServer; private DataOutputStream outToServer; private double averageTime = 0; private int count = 0; public EchoClient(String hostname, int port){ this.hostname = hostname; this.port = port; try { this.clientSocket = new Socket(this.hostname, this.port); } catch (UnknownHostException e) { System.out.println("Connection Error: unknown host"); System.exit(1); } catch (IOException e) { System.out.println("Connection Error: connection refused"); System.exit(1); } try{ this.inFromUser = new BufferedReader( new InputStreamReader(System.in)); this.outToServer = new DataOutputStream(this.clientSocket.getOutputStream()); this.inFromServer = new BufferedReader( new InputStreamReader(this.clientSocket.getInputStream())); } catch (IOException e) { System.out.println("Error on Initializing echoclient"); System.exit(1); } } public void start(){ System.out.println("Connecting to " + hostname + " with port No " + port); String msgSend; try { while ((msgSend = inFromUser.readLine()) != null){ // sendMessage asynchronous sendMessage(msgSend, new Callback(){ // callback function and calculate the average time public void callback(long timeUsed, String msgReceived){ averageTime = (count * averageTime + (timeUsed)) / (count + 1); ++count; System.out.println(msgReceived + " rtt=" + (double)Math.round(timeUsed * 100)/100 + " ms" + " artt=" + (double)Math.round(averageTime * 100)/100 + " ms"); } }); } } catch (IOException e) { System.out.println("Error on reading message from user"); } } private void sendMessage(String message, Callback cb){ Thread sendMessageThread = new Thread(new SendMessageRequest(message, cb)); sendMessageThread.start(); } interface Callback { public void callback(long time, String msg); } class SendMessageRequest implements Runnable{ private String message; private Callback cb; SendMessageRequest(String message, Callback cb){ this.message = message; this.cb = cb; } @Override public void run() { String msgReceived; long timeStart, timeEnd, timeUsed; try { timeStart = System.nanoTime(); outToServer.writeBytes(this.message + '\n'); msgReceived = inFromServer.readLine(); timeEnd = System.nanoTime(); // Calculate the time and get the output timeUsed = (timeEnd - timeStart) / 1000000; cb.callback(timeUsed, msgReceived); } catch (IOException e) { System.out.println("Error on sending message to server"); } } } public static void showUsage(){ System.out.println("Usage: java EchoClient [hostname] [portNo]"); } /** * Entry of the program */ public static void main(String[] args) { String hostname = ""; int port = 0; if (args.length < 2){ showUsage(); System.exit(0); } else{ hostname = args[0]; port = Integer.parseInt(args[1]); } EchoClient client = new EchoClient(hostname, port); client.start(); } } A: I think the biggest problem is the lack of synchronization. You modify the averageTime and count variables in the callback which runs concurrently. You should synchronize the access of this variables. There is a good book on this topic: Read the Java Concurrency in Practice, if you have time read it, it's very useful. Some other things: I don't like inner classes. Reference: Effective Java Second Edition, Item 22: Favor static member classes over. I would also create an EchoClientMain class which contains the main method and parse the command line parameters. Furthermore, I'd move out to a new file the Callback anonymous inner class and I'd create a Statistics class which would be responsible to calculate and maintain the stats. (Check Single responsibility principle on Wikipedia.) Instead of System.exit() you should rethrow the exceptions. This class is not reusable since a simple error stops the whole application. Just create a custom exception class and throw it: try { this.clientSocket = new Socket(this.hostname, this.port); } catch (final UnknownHostException uhe) { throw new EchoClientException("Connection Error: unknown host", uhe); } Let the caller to handle them. In this case the main method should catch the EchoClientException and print its message to the console. try { EchoClient client = new EchoClient(hostname, port); client.start(); } catch (final EchoClientException ece) { System.err.println(ece.getMessage()); } You should NOT connect to the server in the constructor. I'd do it in the start() method. Close the resources. Create a stop() method which close the opened streams. Check at least for null input parameters: Effective Java, Item 38: Check parameters for validity Clean Code by Robert C. Martin is also worth reading. A: I wonder if when they asked for you to send the message asynchronously, they did not want you to launch a second thread. Your second thread does its processing synchronously. Yes its off on another thread, but that may or may not be what they meant by asynchronous. Something like the library here does: https://github.com/sonatype/async-http-client. As palacsint points out, you haven't synchronized the variables. That my have made it look like you didn't know what you were doing. The other thing I don't like is that way you handle errors. I'd shut down the application if an error occours, not write it to standard error and try to keep going. I'd also want to display more information about the error, not the simple fact that it happened.
{ "pile_set_name": "StackExchange" }
Q: The underlying force for creating specialized areas in the cities of developing economies Big cities in developing countries often have streets or quarters that specialize in selling a particular type of good like: books, musical instruments; or giving a specialized service like: haircuts, selling coffee. A prominent example would be the capitals like Hanoi or Bangkok. This almost never happens in cities in developed countries. Barcelona, Spain for example has its services, shops and even supermarkets distributed uniformly along its blocks. How to explain it in simple terms? Is there any economic model that could effectively describe and explain the phenomenon? A: This is an interesting observation that has produced a lot of theoretical and empirical research in industrial organization. In fact this phenomenon also occurs in developed economies, for example with gas stations. It is also not limited to location, the broader questions being why competitors in many markets tend to produce very similar products when they could also choose to differentiate themselves more strongly. A special case of the question is also often applied to politics, where the question is why different parties tend to be very similar to each other (most of the time). Most simple explanations are based on an old and simple game theoretic model by Harold Hotelling called the Hotelling model or linear city model. Applied to politics, this model is behind the predictions of the median voter theorem. You can find a very good explanation of the reasoning behind the model in the links below: http://mindyourdecisions.com/blog/2008/03/25/game-theory-tuesdays-hotelling%E2%80%99s-game-or-why-gas-stations-have-competitors-nearby/ https://en.wikipedia.org/wiki/Location_model#Hotelling.27s_Location_Model https://en.wikipedia.org/wiki/Hotelling's_law
{ "pile_set_name": "StackExchange" }
Lincoln MKX concept breaks cover in Beijing Lincoln is previewing a new global SUV with this MKX concept showcased at the 2014 Beijing Motor Show in China. It represents the first concept developed by Lincoln to premier outside the U.S. borders and from a visual point of view it stands out with its Iron Man-like front fascia. It has been designed with a short rear overhang and sits on massive 21-inch rim. LED headlights and a split-wing grille are at the front while inside the cabin the illumination should be great thanks to the massive panoramic glass surface on the roof. Details about the concept are scarce at the moment but it wouldn’t come as a surprise if this concept is actually based on the Ford Edge concept presented in November last year at the L.A. Auto Show. A production version of the MKX concept is slated to come out sometime next year. [nggallery id=688] Source: Lincoln
{ "pile_set_name": "Pile-CC" }
Why Women Are Discouraged From Becoming Scientists In recent years, concern about the underrepresentation of women in science, particularly the physical and mathematical sciences, has increased, motivated by both equity considerations and the growing shortage of United States scientists and engineers. In contrast to the traditional focus on questions of ability and discrimination, a new issue has come to the fore, namely the assertion by some gender theorists that science is inherently masculine, where masculine is understood as a cultural rath Mary Beth Ruskai Mar 4, 1990 In recent years, concern about the underrepresentation of women in science, particularly the physical and mathematical sciences, has increased, motivated by both equity considerations and the growing shortage of United States scientists and engineers. In contrast to the traditional focus on questions of ability and discrimination, a new issue has come to the fore, namely the assertion by some gender theorists that science is inherently masculine, where masculine is understood as a cultural rather than as a biological construct. Unfortunately, the gender difference debate also has developed in ways that seem to perpetuate stereotypes about science and scientists. Such assertions that science is not creative, that science is not intuitive, or that scientists use numbers as their whole means of discovery are common. Critiques based on such notions not only are incapable of generating constructive criticism, but also may actually contribute to the cultural milieu that discourages women from pursuing careers in science. That stereotypes play an important role in a student's decision to study science becomes evident if one examines statistics on high school physics compiled by the American Institute of Physics (AIP). AIP's figures indicate that in the U.S., 26% of boys study physics, while only 14% of girls study it. While much can be made of the nearly 2:1 ratio of male:female, it is insightful to also consider the complementary data, that is, that 74% of boys and 86% of girls choose not to study physics. Thus, the overwhelming majority of children of both sexes do not study physics. One implication is that, for most children, this decision is made before they have any interaction with a physical scientist. Thus, their decision must arise from whatever perceptions about science, whether true or false, exist in our culture. Another implication is that, even for boys, studying physics is a distinctly nonconformist activity. While the statistics may be less extreme in other fields, the pattern is similar. Girls are less likely to take the advanced math or computer science courses, where they are most likely to encounter an instructor who conveys enthusiasm about mathematics rather than routine skills. Although it may be acceptable for boys to be computer experts in the sense that it is not "unmasculine," such interests are nonetheless regarded as "nerdy," rather than virile or socially attractive. At the adult level, although most engineers are male, it is also true that most men are neither scientists nor engineers. The societal perception of science as eccentric and nonconformist presents a challenge to both sexes. But the point here is not that "men have it tough too," although that may be true. Rather, it is that women face a double social barrier because science is regarded as both unfeminine and nonconformist. Indeed, because of especially strong and longstanding social pressures on girls to conform, the perception of science as eccentric may well be an underestimated factor in its perception as unfeminine. We need to assure that more women have the opportunity to develop their scientific interests and abilities. However, there is an important, but subtle, distinction between this laudable goal and the suggestion that more women scientists are necessary to make scientific careers more socially acceptable for women. It is debatable whether, in a perfect world, 50% of physicists would be women; however, it is certain that more than 50% of women would not be physicists. The acceptability of science as a career for a woman should not be dependent on the percentage of physicists, chemists, or mathematicians who are women. One difficulty with the gender-difference theory is that it necessarily emphasizes normative behavior, while ignoring the much greater differences that exist among individuals within a given category, whether that category is defined by gender, ethnic classification, or some other parameter. Significant gender differences exist only when masculine and feminine are defined in terms of narrow cultural norms, some of which are peculiar to our North American society. There is, no doubt, opportunity for interesting sociological research in this vein; however, there is also a grave danger that studies of gender differences will aggravate the existing emphasis on conformity to the norm, rather than encouraging women to pursue a greater diversity of interests. Gender theorists often describe science as objective, abstract, analytical, unfeeling, and masculine. While science certainly possesses some of these attributes, characterizing it solely in these terms, while ignoring its creative and intuitive sides, constitutes a double error. Not only does it present a very inaccurate picture, but also it sets up a supposed contradiction between scientific values and traditional intuitive, nurturing, feminine ones. For example, abstraction has been described by some gender theorists as the opposite of feminine "connected reasoning," but these theorists ignore the fact that one important consequence of abstract reasoning is the ability to find connections between seemingly dissimilar entities. Or, to be more concrete, consider double-blind drug trials. To read the popular press, one would think they were invented solely to satisfy data-hungry scientists, despite an abundance of evidence that such trials are essential to benefit humans and minimize harm. Indeed, it was the collection of objective data that finally halted the practice of treating breast cancer with debilitating (and unnecessary) radical mastectomies, a procedure that was an intuitively appropriate response to the prevailing theories about the way cancer spread. Finally, one ought not forget that objective measures, including test scores, often played an important role in convincing skeptics of the past that women were capable of many things, such as scientific achievement, at times when female inferiority was commonly regarded as intuitively obvious. Despite my criticisms of the school of gender theory alluded to above, I do think that those who attribute the gender differences we observe to culture are correct. Indeed, studies of both adult women, such as physicist Barbara Wilson's survey of women scientists in various countries, and of children, such as mathematician and math educator Gila Hanna's comparison of math scores of children in 20 different countries, provide ample support for this view. Hanna's work also can be interpreted as supporting the hypothesis that girls and boys may respond differently to good or bad educational practices. (She found a statistically significant sex differential in only one country whose students had very high geometry scores, whereas boys significantly outperformed girls in most countries with low scores, including the U.S.) For example, if boys are more likely to explore things on their own, they may learn to use a computer even in the absence of quality instruction or encouragement. Conversely, there is evidence that girls thrive in high-quality, but gender-neutral, science education environments. High school "intervention programs" and "math anxiety workshops" undoubtedly have a role in our imperfect society, but improving basic math and science education for all students is more important. Emphasizing intervention impresses me as expending a lot of effort trying to cure what ought to be a preventable disease. It is also worth pointing out that the most successful workshops, whether for girls or for ethnic minorities, are those that challenge students rather than those that offer remedial work. Improved basic education not only means development of better essential skills for all students, but also must include programs to encourage and stimulate talented students. That the attrition rates of science students are higher for girls than for boys is a serious concern; but it also is significant that dropout rates are high for both sexes. People studying educational reform have observed that (with the obvious exception of women's colleges) schools with high success rates for women often have above-average retention rates for both sexes. To paraphrase an old adage, "what's good for women is good for science." To summarize, increasing the participation of women in science requires changes in both the educational system and societal perceptions about science. I would en- courage all scientists to involve themselves in both efforts. I do not believe constructive change will result from slick publicity efforts by professional societies. Rather, scientists must seek more opportunities for interactions with nonscientists; individual scientists should make a particular effort to increase their contact with children. We must all try to share our joy and enthusiasm for science with a wider audience. Mary Beth Ruskai is a professor of mathematics at the University of Lowell, Mass.
{ "pile_set_name": "Pile-CC" }
Bruton's tyrosine kinase activity and inositol 1,4,5-trisphosphate production are not altered in DT40 lymphoma B cells exposed to power line frequency magnetic fields. Exposure of wild-type DT40 lymphoma B cells or Bruton's tyrosine kinase (BTK)-deficient DT40 cells reconstituted with the human btk gene to a 1-gauss 60-Hz electromagnetic field (EMF) has been reported to rapidly increase inositol 1,4,5-trisphosphate (Ins 1,4, 5-P3) production (1,2). Here we have used BTK-deficient DT40 B cells reconstituted with the human btk gene to evaluate the reproducibility of these findings. An experimental design with blinded exposures and anti-IgM treatment to induce Ins 1,4,5-P3 production as a positive control, showed no significant effect of a 1-gauss 60-Hz EMF on Ins 1,4,5-P3 production. Because recent work has shown that the activation of BTK was required for EMF-responsiveness (2), we also evaluated the reproducibility of this finding in wild-type DT40 cells. BTK was activated in a dose- and time-dependent manner by treatment with the tyrosine phosphatase inhibitor pervanadate. However, the ability to detect BTK activation, as measured by increased autophosphorylation by immune complex kinase assay, was dependent on the kinase buffer. Using cells from the original investigators, no evidence was obtained to support the hypothesis that exposure to a 1-gauss 60-Hz EMF had a causal effect on protein-tyrosine kinase activities affecting Ins 1,4,5-P3 production.
{ "pile_set_name": "PubMed Abstracts" }
Rev. George Mathen Mission Hospital Rev. George Mathen Mission Hospital aka GMM Hospital is a 70-bed hospital located in Mallappally East, a small town of Pathanamthitta District in the South Indian state of Kerala. It caters to the population of both Mallappally as well as nearby towns and villages such as Keezhvaipur and Padimon. It was established in memory of Rev. George Mathen of the 19th century AD and is managed by the CSI church. GMM Hospital has the stated objective to operate on a non-profit, charity basis and render medical services to the public in General Medicine as well as specialist consultancy and treatment. History The hospital was established in memory of Rev. George Mathen (aka Geevarghese Kathanar) a famous priest and renowned Malayalam grammarian and littérateur of the 19th century, who wrote the first published grammar book in Malayalam and was also known for his care to the poor, needy and oppressed. Today, the hospital is managed by the Diocese of Madhya Kerala of the Church of South India and is located close to the Holy Immanuel CSI Church, Mallappally. Facilities and Services The specialist departments offered by the hospital include Paediatrics, Cardiology, Orthopaedics, Emergency Medicine, Community Medicine and Dermatology. The hospital also features the following facilities/services: Full-day Canteen (operating hours: 6 AM - 8 PM) 24-hours Casualty (Accident and Emergency) Service 24-hours Pharmacy 24-hours Medical Laboratory 24-hours X-ray facility 24-hours Ambulance Service 24-hours Mortuary References Category:Hospitals in Kerala Category:Christian hospitals
{ "pile_set_name": "Wikipedia (en)" }
Phantom Thread: An Ode to Hitchcock There’s a smug satisfaction that one feels when they recognise a reference. It almost seems like a secret that you and the director are sharing with one and another. Recognising a homage, or a reference to another text is a sign that you are an active viewer, rather than a passive one. Noticing the janitor in Scream (1996) is wearing a similar striped sweater to Freddy from A Nightmare on Elm Street (1984). Or spotting that the club at the start of Indiana Jones and the Temple of Doom (1984) is called Club Obi Wan. Proves that you are aware of other texts, but these are very noticeable and are hardly subtle. However, recognising that the speech Jake LaMotta gives in Raging Bull (1980) is from On the Waterfront (1954). Or noticing how De Palma replicates the staircase scene from Battleship Potemkin (1925) in The Untouchables (1987), sets you apart from other viewers. It reassures you of your status of being a cinephile (a devoted moviegoer who is knowledgeable about cinema). Being someone who has extensively studied the history of cinema (two years at college for A Level and a further three years at University), I have researched into the evolution of the art form. I am aware of how the German Expressionism film movement of the twenties influenced the film noir movement of the forties and fifties. I am aware that the nouvelle vague (The French New Wave) led to the birth of New Hollywood in the late sixties and seventies. And I am aware that the Italian Neorealism led to the kitchen sink dramas that blossomed in British cinema during the late fifties and sixties. We wouldn’t have the famous montage from Rocky (1976) if it hadn’t been for the likes of Strike (1925) which gave birth to the concept of the montage. We wouldn’t have the jump-cut if it hadn’t gained popularity through À bout de souffle (1960). The slow motion scenes in The Matrix (1999) wouldn’t have occured if it had not be for Akira Kurosawa’s Seven Samurai (1954). Every film that is shot owes some debt to the films that have came before it. And it shows the level of appreciation that the film director has to reference and pay homage to other films that have touched upon the same subject matter, or share the same similar visual cues. Paul Thomas Anderson’s latest film,Phantom Thread is a cinephile’s dream. Anderson makes numerous references to other directors and films throughout his work. Whether it be in Boogie Nights (1997) with Heather Graham wearing the same heart shaped glasses that Sue Lyon wore in Kubrick’s Lolita (1962). Or the multi-strand and multi-character narrative seen in Magnolia (1999) being an ode to the work of Robert Altman (Nashville and Mash). For Phantom Thread, Anderson has decided to focus on the most famous auteur of them all, Alfred Hitchcock. Phantom Thread’s narrative, involving a young woman being manipulated and controlled by a much older man, who decides what she is to wear and how to look is very reminiscent of Hitchcock’s Vertigo (1959). The narrative of Vertigo concerns Scottie (James Stewart) who becomes obsessed with the haunting memory of a woman he lost (Madeline played by Kim Novak). So when he meets Judy (also played by Novak) who shares very similar likeness to Madeline, he decides to change her appearance in an attempt to recreate her in the image of his lost love. In Phantom Thread, Reynolds Woodcock (Daniel Day-Lewis) is obsessed to some degree of replicating his idea of the perfect woman (his mother). And this is shown by his extensive measuring of Alma’s (Vicky Krieps) body. We are later informed that Reynolds prefers petite, slim build women with “a little bit of a belly” and small breasts. When we see the image of his mother in the wedding dress he made for her, her body shape is very similar to Alma’s. We can also see a reference to Vertigo, in how Reynolds instructs Alma to remove her lipstick (“I like to see your lips”) over dinner. Reynolds dresses Alma’s in certain dresses because he believes he knows best, we see this when she complains about the material of one dress. Again this is a nod to Vertigo when Judy expresses her dislike for the grey suit that Scottie wishes her to wear. I have previously mentioned Reynold’s obsession with his mother, which is a recurring theme throughout Hitchcock films. Most famously recognized in Psycho (1960). Just like the character of Norman Bates (Anthony Perkins) Reynold’s mother shaped his life, and he is devoted to her even though she has been dead for many years. Reynolds’ even hallucinates at one point of the film whilst recovering in bed. That his mother is in the same room, silently gazing upon him with sad, concerned eyes. There is another nod to Psycho, when Reynolds’ peers through a peephole to gaze upon Alma as she models his design for him. Again referencing the voyeuristic nature that many of Hitchcock’s characters had. And like Marion (Janet Leigh) in Psycho, Alma seems unaware that she has become an object of desire in that moment. Another one of Hitchcock’s film that Anderson addresses is Rebecca (1940). The early stages of Reynolds’ and Alma’s relationship is very similar to the portrayal of the second Mrs De Winter (Joan Fontaine) and ‘Maxim’ de Winter (Laurence Olivier) with a whirlwind passionate holiday romance. Reynolds meets Alma whilst on holiday and they begin courting. Things escalate quickly and Reynolds asks Alma to come and live with him to be his muse. In Rebecca, the second Mrs De Winter accepts Maxim’s proposal after she has known him for a very short time. The house where Reynolds lives is very much like the house featured in Rebecca known as Manderley, with it’s large, grand and empty rooms and spiralling staircases. And the character of Cyril (Lesley Manville) seems at times very distrusting, cold and hard to read like the character of Mrs Danvers (Judith Anderson) who delights in terrorizing the second Mrs De Winter. Certain scenes between Manville and Krieps seem to come from the very pages of the Daphne du Maurier novel in which Rebecca was adapted from. Especially when Cyril declares her dislike for Alma. And like the character from Rebecca, we know very little about Alma’s background and her past. It is also worth mentioning how certain lines of dialogue from Phantom Thread echo dialogue in Rebecca. For example when Reynolds states “Kiss me, my girl, before I’m sick.” it seems very similar to Maxim saying “I’m asking you to marry me, you little fool.”. Whether that’s a conscious choice by Anderson, it’s unknown but still it gives a brilliant insight into the similarities of these two characters and their attitudes towards women. I could go on discussing the other references I picked upon but already this is becoming a dissertation. I do highly recommend Phantom Thread whether you’re a hard core cinephile or not. A beautifully crafted film which offers an unique insight into the world of a very unconventional relationship. And if you’re not convinced by the theory that Anderson has made Phantom Thread as an ode to Hitchcock, just take note of the names of the film’s two main characters Reynolds Woodcock and Alma. Alfred Hitchcock’s wife of 54 years was called Alma.
{ "pile_set_name": "Pile-CC" }
Introduction {#sec1} ============ Utilization of sunlight has been considered a promising solution to overcome the exhaustion of fossil fuels.^[@ref1]^ The development of semiconductor photoelectrodes has attracted considerable attention for the efficient conversion of solar energy.^[@ref2]−[@ref6]^ The examination of the semiconductors in photoelectrochemical (PEC) cells is a fast and simple method to characterize their electrochemical behaviors.^[@ref3]^ Although many semiconductors have been examined as photoelectrodes,^[@ref7]−[@ref18]^ most of them have modest PEC efficiencies owing to the narrow visible light absorptions and unavoidable electron--hole recombinations. To decrease the bulk recombination, nanostructures, such as nanoparticles and nanorods, have been studied as photoelectrodes,^[@ref19]^ which can enhance the kinetic parameters of the PEC reactions because of the reduced hole diffusion length. The shape, size, and connection of the nanostructures can affect the charge transport properties and thus, play a critical role in the efficiency of PEC cells. However, these nanostructures exhibit several disadvantages, such as a reduced space charge region and high surface recombination.^[@ref6]^ Therefore, further studies are required to optimize the sizes and shapes of nanostructures for improved PEC performances. Bismuth sulfide (Bi~2~S~3~) has attracted large interest as a sensitizer for photovoltaic and PEC cells owing to its narrow band gap of approximately 1.3 eV and large absorption coefficient.^[@ref19]−[@ref25]^ However, the reported photocurrent is considerably lower than its theoretical maximum (∼30 mA/cm^2^). The recombination at the surface and in the bulk state of Bi~2~S~3~, leads to a lower PEC conversion efficiency. One-dimensional Bi~2~S~3~ structures such as nanorods and nanowires have been studied as photoelectrodes, which can provide the advantages of a reduced hole diffusion length and enhanced charge transport properties.^[@ref26]−[@ref30]^ On the other hand, the Bi~2~S~3~ nanowires must be grown on a conductive substrate to enable efficient interactions for improved PEC properties. As most Bi~2~S~3~ nanowires are prepared as powdered samples, their deposition on substrates is another challenging process.^[@ref31]^ To decrease the interface resistance between the Bi~2~S~3~ nanowire and the conductive substrate, an in situ synthetic method is required. Thus, a simple synthesis on the substrate is required to reduce the fabrication complexity of the PEC devices. In this paper, we report a facile synthesis of a Bi~2~S~3~ nanowire array (Bi~2~S~3~NWA) on a Bi~2~MoO~6~ layer by an in situ hydrothermal method. The Bi~2~S~3~NWA was uniformly fabricated and well connected on the Bi~2~MoO~6~ layer. Structural characterizations were carried out by transmission electron microscopy (TEM), Raman spectroscopy, and X-ray diffraction (XRD). Compared to other Bi~2~S~3~ electrodes, the fabricated Bi~2~MoO~6~/Bi~2~S~3~NWA composite exhibited an increased PEC sulfite oxidation activity, which is attributed mainly to the effective interface obtained by the in situ growth. This unique composite also has dual electrochemical functions, as a light absorber (Bi~2~S~3~NWA) and an electron acceptor (Bi~2~MoO~6~ layer). The generated electron from the Bi~2~S~3~ conduction band rapidly transfers to that of Bi~2~MoO~6~, yielding an enhanced charge separation of Bi~2~S~3~. In addition, the single-crystalline Bi~2~S~3~ nanowire can provide a fast electron pathway through its single domain, which also contributes to the increased PEC activity. Results and Discussion {#sec2} ====================== Fabrication of the Bi~2~MoO~6~/Bi~2~S~3~NWA Composite Electrode {#sec2.1} --------------------------------------------------------------- Bi~2~S~3~NWA was synthesized in situ on the surface of a Bi~2~MoO~6~ film ([Scheme [1](#sch1){ref-type="scheme"}](#sch1){ref-type="scheme"}). The Bi~2~MoO~6~ film was fabricated by a drop-casting method of a precursor solution onto a fluorine-doped tin oxide (FTO) substrate and subsequent annealing at 500 °C for 3 h in air ([Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}a). Bi~2~S~3~NWA was then directly grown on the Bi~2~MoO~6~ film by a hydrothermal reaction (Bi~2~MoO~6~/Bi~2~S~3~NWA). [Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}b shows a scanning electron microscopy (SEM) image of Bi~2~S~3~NWA fabricated on Bi~2~MoO~6~. The nanowires have an average width of 87 ± 14 nm and a length of 1.2 ± 0.2 μm ([Figure S1](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b02111/suppl_file/ao9b02111_si_001.pdf)). ![SEM images and XRD patterns of (a,c) Bi~2~MoO~6~ and (b,d) Bi~2~MoO~6~/Bi~2~S~3~NWA composite on the FTO substrate, respectively.](ao9b02111_0001){#fig1} ![Schematic of the Fabrication of the Bi~2~MoO~6~/Bi~2~S~3~NWA Composite on the FTO Substrate\ Photograph courtesy of J. H. Kim and K. M. Nam. Copyright 2019.](ao9b02111_0007){#sch1} [Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}c,d shows XRD patterns of the Bi~2~MoO~6~ and Bi~2~MoO~6~/Bi~2~S~3~NWA composite films, respectively. The diffraction peaks of Bi~2~MoO~6~ are indexed to the orthorhombic structure (Joint Committee on Powder Diffraction Standards (JCPDS) no. 21-0102), indicating its high crystallinity ([Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}c). [Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}d shows the XRD pattern of the Bi~2~MoO~6~/Bi~2~S~3~NWA composite. New peaks are detected in addition to the Bi~2~MoO~6~ peaks, which correspond to the Bi~2~S~3~ phase (orthorhombic, JCPDS no. 17-0320). Additional phases such as Bi~2~O~3~ and MoO~3~ were not discovered in the XRD patterns ([Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}d). TEM and high-resolution TEM (HRTEM) analyses were carried out to identify the structural composition of the Bi~2~MoO~6~/Bi~2~S~3~NWA composite ([Figures [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"} and [S2](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b02111/suppl_file/ao9b02111_si_001.pdf)). The HRTEM images of an edge of a single Bi~2~S~3~ nanowire show the lattice spacings of 0.25 and 0.20 nm corresponding to the (420) and (002) planes ([Figure S2a,b](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b02111/suppl_file/ao9b02111_si_001.pdf)).^[@ref30],[@ref32]^ The fast Fourier transform patterns indicate the single-crystalline Bi~2~S~3~ nanowire, reflecting the fast crystalline growth toward the \[001\] direction ([Figure S2b](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b02111/suppl_file/ao9b02111_si_001.pdf)). Energy-dispersive X-ray spectrometry of the nanowires showed an average atomic ratio of 39:60 (Bi/S), indicative of the 2:3 atomic composition. A spatial elemental mapping was performed on a Bi~2~S~3~ nanowire to evaluate the distribution of each element ([Figure [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"}c--f). The nanowire was composed of Bi and S in the ratio of 2:3 ([Figure [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"}d,e), while the substrate was composed of Bi and Mo in the ratio of 2:1 ([Figure S2](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b02111/suppl_file/ao9b02111_si_001.pdf)). The elemental mapping confirmed that the Bi~2~S~3~ nanowires were directly grown on the Bi~2~MoO~6~ layer ([Figure S2](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b02111/suppl_file/ao9b02111_si_001.pdf)). ![(a) TEM and (b) HRTEM images of the Bi~2~S~3~ nanowire. (c) Spatial elemental map of the Bi~2~S~3~ nanowire and corresponding elemental distribution maps of (d) Bi (red), (e) S (blue), and (f) Mo (green).](ao9b02111_0002){#fig2} [Figure [3](#fig3){ref-type="fig"}](#fig3){ref-type="fig"} shows Raman spectra of the Bi~2~MoO~6~ and Bi~2~MoO~6~/Bi~2~S~3~NWA composite films in the range of 50--900 cm^--1^. The Raman peaks of the Bi~2~MoO~6~/Bi~2~S~3~NWA composite at 98, 188, 236, and 255 cm^--1^ are in agreement with those of the orthorhombic Bi~2~S~3~ (red line in [Figure [3](#fig3){ref-type="fig"}](#fig3){ref-type="fig"}).^[@ref33]^ Bi~2~MoO~6~ peaks are not observed in the spectrum of Bi~2~MoO~6~/Bi~2~S~3~NWA, indicating that the Bi~2~S~3~ layer is uniformly grown on the surface of the Bi~2~MoO~6~ layer.^[@ref34],[@ref35]^ The surface states of both Bi~2~MoO~6~ and Bi~2~MoO~6~/Bi~2~S~3~NWA films are further characterized by X-ray photoelectron spectroscopy (XPS) ([Figure [4](#fig4){ref-type="fig"}](#fig4){ref-type="fig"}).^[@ref36]^ The two high peaks at 164.1 and 158.8 eV are assigned to Bi 4f ([Figure [4](#fig4){ref-type="fig"}](#fig4){ref-type="fig"}a,b). The S 2s peak at 224.8 eV (S^2--^ in the metal sulfide) is detected only for the Bi~2~MoO~6~/Bi~2~S~3~NWA composite film, but not for the Bi~2~MoO~6~ film ([Figure [4](#fig4){ref-type="fig"}](#fig4){ref-type="fig"}c,d). Therefore, the XRD, SEM, TEM, Raman spectroscopy, and XPS results verify the presence of Bi~2~S~3~NWA on the Bi~2~MoO~6~ surface. ![Raman spectra of Bi~2~MoO~6~ and Bi~2~MoO~6~/Bi~2~S~3~NWA electrodes.](ao9b02111_0003){#fig3} ![XPS spectra of (a) Bi 4f, (c) Mo 3d for Bi~2~MoO~6~, (b) Bi 4f, and (d) Mo 3d and S 2s for the Bi~2~MoO~6~/Bi~2~S~3~NWA electrode.](ao9b02111_0004){#fig4} Sulfide anions (S^2--^) were produced by the decomposition of thiourea during the hydrothermal reaction.^[@ref24]^ Small amounts of Bi^3+^ and Mo^6+^ ions were also generated by the dissolution of Bi~2~MoO~6~ during the reaction. The solubility of Bi~2~S~3~ in an aqueous solution is considerably lower than that of molybdenum sulfide, which have *K*~sp~ values of 1.0 × 10^--97^ and 2.2 × 10^--56^,^[@ref37]−[@ref39]^ respectively. The Bi^3+^ ions reacted more rapidly than the Mo^6+^ ions with S^2--^ ions forming the Bi~2~S~3~. As no additional source of Bi^3+^ was provided during the process, the Bi~2~MoO~6~ layer acted as the Bi^3+^ source for the growth of Bi~2~S~3~ nanowires. As the Bi~2~S~3~ has an extremely low solubility (*K*~sp~ of 1.0 × 10^--97^), the hydrothermal sulfidation of the Bi~2~MoO~6~ may spontaneously follow the etching and regrowth mechanisms proposed by Chen et al.^[@ref38]^ The Bi~2~S~3~ nanowires grow rapidly along the direction vertical to the substrate in a large amount of S^2--^.^[@ref38],[@ref40]^ To obtain a reliable growth, the reaction solution with the Bi~2~MoO~6~ substrate was heated at a relatively low temperature (60 °C for 4 h) in the presence of a large amount of S^2--^ (0.2 M of Na~2~S). The surface of Bi~2~MoO~6~ was initially white, but after the reaction for 4 h, it turned to black brown, indicating the formation of Bi~2~S~3~ ([Figure S3](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b02111/suppl_file/ao9b02111_si_001.pdf)). The Bi~2~S~3~ layer grew larger and then reorganized forming amorphous Bi~2~S~3~ particles, but not nanowires. However, several Bi~2~S~3~ nanowires were grown on the surface of the Bi~2~MoO~6~ electrode at 100 °C for 4 h. Therefore, both large amounts of S^2--^ and a high reaction temperature (above 100 °C) were needed to follow the etching and regrowth mechanisms for the growth of Bi~2~S~3~ nanowires on the Bi~2~MoO~6~ surface. The unreacted Mo^6+^ ions were analyzed by inductively coupled plasma atomic emission spectroscopy. The Mo^6+^ ions remained in the solution throughout the reaction without the formation of a molybdenum sulfide film. PEC Characterization of the Bi~2~MoO~6~/Bi~2~S~3~NW Composite Electrode {#sec2.2} ----------------------------------------------------------------------- Various Bi~2~MoO~6~/Bi~2~S~3~ heterostructures were prepared by well-known synthesis methods to compare the PEC performances of the Bi~2~MoO~6~/Bi~2~S~3~NWA electrodes ([Scheme [2](#sch2){ref-type="scheme"}](#sch2){ref-type="scheme"}). The structures are denoted as Bi~2~MoO~6~/Bi~2~S~3~(Drop) and Bi~2~MoO~6~/Bi~2~S~3~(Dip). Furthermore, pure Bi~2~S~3~ nanowires (Bi~2~S~3~NW) were fabricated by the hydrothermal method for comparison.^[@ref30]^[Figure S4](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b02111/suppl_file/ao9b02111_si_001.pdf) shows SEM images of the Bi~2~MoO~6~/Bi~2~S~3~(Dip), Bi~2~MoO~6~/Bi~2~S~3~(Drop), and Bi~2~S~3~NW electrodes. The Bi~2~MoO~6~/Bi~2~S~3~NWA and Bi~2~MoO~6~/Bi~2~S~3~(Drop) samples were adjusted with Bi~2~S~3~ layers of the same thickness using their UV--visible absorption spectra ([Figure S5](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b02111/suppl_file/ao9b02111_si_001.pdf)). ![Schematic Image of the Preparation of Bi~2~MoO~6~/Bi~2~S~3~ Hetero-Structures\ Photograph courtesy of J. H. Kim and K. M. Nam. Copyright 2019.](ao9b02111_0008){#sch2} A sacrificial reagent, sodium sulfite (Na~2~SO~3~), was used to examine the PEC performance. Sulfite anions (SO~3~^2--^) are an efficient hydroxyl radical (^•^OH) scavenger and react in most diffusion-controlled rates.^[@ref41]^ Therefore, the SO~3~^2--^ oxidation is a suitable model reaction for the measurement of the degree of bulk recombination of the semiconductor. It is considered to provide a surface transfer efficiency of almost 100% during the PEC measurement owing to the fast kinetics at the semiconductor--solution interface.^[@ref42]^ The PEC performances of the electrodes were investigated using linear sweep voltammetry (LSV) for sulfite oxidation (0.1 M Na~2~S + 0.1 M Na~2~SO~3~). The LSV was carried out in the range of −0.9 to −0.1 V versus Ag/AgCl at a scan rate of 20 mV/s with a chopped UV--visible irradiation ([Figures [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"} and [S6](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b02111/suppl_file/ao9b02111_si_001.pdf)). All electrodes successfully generated anodic photocurrents, which confirmed their n-type characteristics. The photocurrent of the Bi~2~MoO~6~/Bi~2~S~3~NWA electrode was 7.6 mA/cm^2^ at −0.2 V (vs Ag/AgCl), while that of Bi~2~MoO~6~/Bi~2~S~3~(Drop), fabricated by drop-casting the Bi~2~S~3~ nanowires onto the Bi~2~MoO~6~ electrode, was 0.8 mA/cm^2^ at the same potential (black bars in [Figure [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"}b). The fabricated Bi~2~MoO~6~/Bi~2~S~3~NWA electrode exhibited highly increased PEC activity compared to the Bi~2~MoO~6~/Bi~2~S~3~(Drop), which is attributed to the effective composite interface obtained by the in situ growth. The photocurrent of the Bi~2~MoO~6~/Bi~2~S~3~(Dip) and Bi~2~S~3~NW were 2.2, and 0.7 mA/cm^2^, respectively, at the same condition (black bars in [Figure [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"}b), which indicates the importance of single-crystalline Bi~2~S~3~ nanowires on the Bi~2~MoO~6~ substrate. The photocurrent of the Bi~2~MoO~6~/Bi~2~S~3~NWA electrode was also several times higher than those of the Bi~2~MoO~6~/Bi~2~S~3~(Drop), Bi~2~MoO~6~/Bi~2~S~3~(Dip), and Bi~2~S~3~NW electrodes under the visible light irradiation (red bars in [Figure [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"}b). ![(a) LSVs of the Bi~2~MoO~6~/Bi~2~S~3~NWA composite under a UV--visible illumination (back side) in a solution of 0.1 M Na~2~SO~3~ and 0.1 M Na~2~S recorded at a scan rate of 20 mV/s and a light intensity of 100 mW/cm^2^. (b) Photocurrent densities of the electrodes having Bi~2~MoO~6~/Bi~2~S~3~ heterostructures under UV--visible (black) and visible (red) illuminations at an applied potential of −0.20 V vs Ag/AgCl. (c) Action spectrum and (d) current--time response curve of the Bi~2~MoO~6~/Bi~2~S~3~NWA composite at an applied potential of −0.50 V vs Ag/AgCl.](ao9b02111_0005){#fig5} [Figure [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"}c presents the action spectrum of the Bi~2~MoO~6~/Bi~2~S~3~NWA electrode, which shows the photocurrent depending on the wavelength, acquired with an interval of 10 nm. The portion of the visible light region (\>425 nm) is about 85%, which matches well with [Figure [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"}a. Furthermore, the band gap was determined using the wavelength of the onset photocurrent. The action spectrum indicates a band gap of 1.35 eV. It is well matched with the absorption spectrum ([Figure S5](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b02111/suppl_file/ao9b02111_si_001.pdf)). The Bi~2~MoO~6~/Bi~2~S~3~NW electrode exhibits an identical onset wavelength as that of Bi~2~S~3~ (about 1.3 eV),^[@ref25]^ which indicates that Bi~2~S~3~NWA is the main absorber for the PEC reaction. The band gaps of the electrodes were also calculated by the Tauc equation.^[@ref43]^ The direct band gaps of the heterostructures (Bi~2~MoO~6~/Bi~2~S~3~(Drop) and Bi~2~MoO~6~/Bi~2~S~3~NWA) are almost identical ([Figure S5](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b02111/suppl_file/ao9b02111_si_001.pdf)), and thus, the band gap difference is not the main factor for the PEC activity in the case of the Bi~2~MoO~6~/Bi~2~S~3~ heterostructures. To evaluate the stability of Bi~2~MoO~6~/Bi~2~S~3~NWA, chronoamperometry was carried out under a UV--visible illumination ([Figure [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"}d). The current transient upon the light irradiation was usually attributed to the dynamic balance of photogenerated electrons and their consumption at the semiconductor--solution interface.^[@ref44],[@ref45]^ This is a characteristic indication of surface recombination even in the sacrificial reagent.^[@ref46]^ Although the Bi~2~MoO~6~/Bi~2~S~3~NW electrode exhibited initial decreases in the photocurrent, the photocurrents stabilized at steady-state values for 2 h in the presence of the sacrificial reagent ([Figure [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"}d). In order to understand the mechanism of the increased PEC activity of the Bi~2~MoO~6~/Bi~2~S~3~NWA electrode, the flat-band potentials of Bi~2~MoO~6~ and Bi~2~S~3~ were measured. The Mott--Schottky (MS) plots were recorded using a Na~2~SO~4~ solution ([Figure [6](#fig6){ref-type="fig"}](#fig6){ref-type="fig"}a,b).^[@ref30]^ The MS plot indicated that the flat-band potential of Bi~2~S~3~ is approximately 0.15 V \[vs normal hydrogen electrode (NHE)\] with an n-type behavior. The flat band potential of Bi~2~MoO~6~, estimated using the MS plot was approximately 0.25 V (vs NHE). The conduction band edge (*E*~CB~) is considered to be more negative than the flat band potentials by approximately 0.1 V.^[@ref23],[@ref30]^ Therefore, the typical *E*~CB~ and valence band edges (*E*~VB~) of Bi~2~S~3~ are approximately 0.05 and 1.40 eV, respectively, (vs NHE), while those of Bi~2~MoO~6~ are approximately 0.15 and 2.95 eV (vs NHE), respectively, which are matched well with the literatures.^[@ref30]^[Figure [6](#fig6){ref-type="fig"}](#fig6){ref-type="fig"}c shows possible photogenerated electron--hole pathways based on the MS plots: (1) electron transfer from the *E*~CB~ of Bi~2~S~3~ to that of Bi~2~MoO~6~, (2) hole transfer from the *E*~VB~ of Bi~2~MoO~6~ to that of Bi~2~S~3~, and (3) electron--hole recombination at the Bi~2~S~3~--Bi~2~MoO~6~ interface. ![Mott--Schottky plots of (a) Bi~2~MoO~6~ and (b) Bi~2~S~3~ obtained by ac impedance--capacitance measurements in a 0.1 M Na~2~SO~4~ solution at 500 Hz. (c) Photogenerated electron--hole pathways between the two semiconductors (Bi~2~MoO~6~ and Bi~2~S~3~).](ao9b02111_0006){#fig6} *E*~CB~ and *E*~VB~ of Bi~2~MoO~6~ are more positive than those of Bi~2~S~3~, favorable for the charge separation of Bi~2~S~3~. The origin of the increased PEC activity of the heterostructure compared to that of the bare Bi~2~S~3~ electrode is attributed to the enhanced charge separation of Bi~2~S~3~ on the Bi~2~MoO~6~ electrode (pathways 1 and 2 in [Figure [6](#fig6){ref-type="fig"}](#fig6){ref-type="fig"}c) under the solar light irradiation. Furthermore, the Bi~2~MoO~6~/Bi~2~S~3~NWA electrode fabricated in situ has an effective interface with a lower resistance (reduced pathway 3 in [Figure [6](#fig6){ref-type="fig"}](#fig6){ref-type="fig"}c) than that of the Bi~2~MoO~6~/Bi~2~S~3~(Drop) electrode. In addition, the Bi~2~S~3~ nanowires can provide fast electrical pathways to Bi~2~MoO~6~ through their single domains, compared to that of the Bi~2~MoO~6~/Bi~2~S~3~(Dip) electrode. Conclusions {#sec3} =========== The Bi~2~MoO~6~/Bi~2~S~3~NWA electrode was prepared by the in situ growth reaction. The Bi~2~S~3~ nanowires were homogeneously grown on the Bi~2~MoO~6~ layer. As no additional source of Bi^3+^ was provided during the process, the Bi~2~MoO~6~ layer acted as the substrate and the Bi^3+^ source for the synthesis of Bi~2~S~3~ nanowires. The spontaneous growth of Bi~2~S~3~ nanowires from the Bi~2~MoO~6~ by the etching and regrowth mechanisms provided a suitable interaction with the Bi~2~MoO~6~ substrate. The fabricated Bi~2~MoO~6~/Bi~2~S~3~NWA electrode exhibited an increased PEC activity compared to other electrodes. The increase in activity was attributed mainly to three factors: (1) increased electron separation of Bi~2~S~3~ on the Bi~2~MoO~6~ layer as *E*~CB~ and *E*~VB~ of Bi~2~MoO~6~ were more positive than those of Bi~2~S~3~, encouraging charge separation of Bi~2~S~3~, (2) a suitable interface obtained by the in situ synthetic method, and (3) single-crystalline Bi~2~S~3~ nanowires which provided a fast electron pathway through the nanowire. Methods {#sec4} ======= Materials {#sec4.1} --------- An FTO- coated glass (TEC 15, WY-GMS) was used as the substrate for the thin-film electrode. Bi(NO~3~)~3~·5H~2~O (99.999%, Sigma-Aldrich) and (NH~4~)~6~Mo~7~O~24~·4H~2~O (99.98%, Sigma-Aldrich) were used as metal precursor salts. Thiourea (≥99%, Sigma-Aldrich), hydrochloric acid (36.5%, Junsei), ethylene glycol (≥99%, Sigma-Aldrich), isopropyl alcohol (99.5%, Junsei), sodium sulfite (≥98%, Sigma-Aldrich), sodium sulfate (99.0%, Daejung Chemicals), and sodium sulfide nonahydrate (96.0%, Junsei) were used as received. Deionized water was used as the solvent in all electrochemical experiments. Fabrication of the Bi~2~MoO~6~ Film on FTO {#sec4.2} ------------------------------------------ FTO substrates were cleaned in deionized water and ethanol, and then sonicated in ethanol for at least 1 h. Drop-casting was carried out to fabricate the thin-film electrodes. A solution of 15 mM Bi~2~MoO~6~ precursor (an atomic ratio of Bi/Mo of 2:1) in ethylene glycol was prepared and then applied onto the FTO substrate (15 mM, 200 μL). The prepared film was annealed at 500 °C for 3 h (with a ramp time of 3 h) in air to form the Bi~2~MoO~6~ thin film. Fabrication of Bi~2~S~3~NWA on Bi~2~MoO~6~/FTO {#sec4.3} ---------------------------------------------- Bi~2~S~3~ nanowires were directly grown on the surface of the Bi~2~MoO~6~ layer using an in situ hydrothermal reaction. The Bi~2~MoO~6~ layer on the FTO substrate was horizontally placed into a 50 mL Teflon-lined stainless-steel autoclave. A reaction solution was prepared by adding thiourea (7.9 mmol) into deionized water (30 mL). The reaction solution was transferred into an autoclave, and then heated in an electric oven at 140 °C for 4 h. The resulting Bi~2~MoO~6~/Bi~2~S~3~NWA composite electrode was dried at 50 °C in air. When the reaction solution was maintained at 140 °C for 48 h, Bi~2~S~3~ nanowires were grown directly on the surface of the FTO substrate. The nanowires fully covered the FTO substrate, and the majority were slightly tilted on the substrate. The Supporting Information is available free of charge on the [ACS Publications website](http://pubs.acs.org) at DOI: [10.1021/acsomega.9b02111](http://pubs.acs.org/doi/abs/10.1021/acsomega.9b02111).Detailed methods, TEM and SEM images, LSV curves, XRD patterns, and UV--visible spectra of the electrodes ([PDF](http://pubs.acs.org/doi/suppl/10.1021/acsomega.9b02111/suppl_file/ao9b02111_si_001.pdf)) Supplementary Material ====================== ###### ao9b02111_si_001.pdf The authors declare no competing financial interest. This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (NRF-2017R1E1A1A01074224 and 2019R1A4A1028007), and Pusan National University Research Grant, 2019.
{ "pile_set_name": "PubMed Central" }
Q: How to set permissions so two users can work on the same hg repository? Ubuntu: Jaunty Mercurial: 1.3.1 Access: ssh (users john and bob) File permission: -rw-rw---- 1 john john 129276 May 17 13:28 dirstate User: bob Command: 'hg st' Response: **abort: Permission denied: /our/respository/.hg/dirstate** Obviously mercurial can't let bob see the state because the file it needs to read belongs to me. So I change the permissions to allow bob to read the file and everything is fine, up until I next try to do something, whence the situations are reversed. Now he owns the file and I can't read it. So I set up a "committers" group and both john and bob belong to the group, but still mercurial fiddles with the ownership and permissions whenever one or other commits. Furthermore whenever one or other of us adds a file to the repository the file is owned exclusively by the committer. That's fine by me since I'm familiar enough with chmod but it presents a major problem to bob when I neglect to grant him permission. I guess we just need a post-commit hook for that; but just to include this symptom... How do we configure it so two different logins in the same group can commit to the same repository over ssh? A: You need to set the "group sticky bit" on all the relevant directories. That permissions bit says that any file or directory created in those directories should have group ownership of the parent directory's group, not of the creating user's primary group. You can set things right by going to the top level of your whole repo (hg root) and running these commands: chgrp -R committers . chmod -R ug+=rwX . find . -type d -print0 | xargs -0 chmod 2775 # or 2770 if other can't read That first command gives group ownership back to committers for all files and directories. The second command makes sure owners and group members can read and write all files and directories and that they can descend all directories. The third command lists only the directories (omitting files) and then sets the stick group bit on them. After you're done the permissions for directories will look like: rwxrwsr-x You only have to do this once, and if you do it before creating the repo you don't need to use find at all since the sticky group bit will be inherited by all directories. It was done the same way for CVS and svn back in the olden days. A: using unix groups: see the filesystem method here.
{ "pile_set_name": "StackExchange" }
Enterovirus 71 in Taiwan. The enterovirus 71 (EV71) outbreak in Taiwan in 1998 proved fatal in many children. A seroepidemiological study performed prior to the 1998 outbreak showed pre-epidemic (1997) EV71 seroprevalence rates to be about 60-70% in adults and children older than 6 years of age. A retrospective case review carried out from 1980-81 identified 16 cases of hand, foot and mouth disease associated with central nervous system involvement, two of whom died soon after hospitalization. There were 405 severe cases and 78 deaths reported in the 1998 epidemic, and dozens of fatal EV71 cases were still reported from 2000 to 2002. A stage-based management strategy was developed to reduce fatality, but most survivors of brainstem encephalitis with cardiopulmonary failure have neurologic sequelae and impaired cognition. Continuous clinical and laboratory surveillance of EV71 disease is required to enable earlier implementation of control and prevention measures. Development of EV71-specific antiviral therapy, a novel class of imidazolidinones, and development of a vaccine are ongoing.
{ "pile_set_name": "PubMed Abstracts" }
1)/9 Let g = -77 - -81. Let 1/3*n**2 - 1/3*n**3 + 0 + 1/3*n - 1/3*n**g = 0. Calculate n. -1, 0, 1 Let a(x) be the third derivative of 9*x**6/40 + 7*x**5/5 + 21*x**4/8 + x**3 + 5*x**2 - x. Determine r so that a(r) = 0. -2, -1, -1/9 Let i be 46/(-161) + 68/42. Factor -i*p**2 - 7/6*p + 1/6*p**5 - 1/3 + 1/3*p**4 - 1/3*p**3. (p - 2)*(p + 1)**4/6 Let f be 5/((-10)/(-6)) - 3. Let o(m) be the second derivative of -1/6*m**4 + 0*m**5 + 0 + 1/15*m**6 + m + 0*m**3 + f*m**2. Factor o(r). 2*r**2*(r - 1)*(r + 1) Let l be (-1)/((0 - -1)/(-6)). Suppose 90 + 27 = 5*j + 3*r, -5*j - 4*r = -121. Factor l*g**2 - 13*g - j*g**3 - 2*g**4 + 13*g - 10*g**4. -3*g**2*(g + 2)*(4*g - 1) Let t(n) be the third derivative of -n**8/60480 - n**7/5040 - n**6/1080 - n**5/30 - 2*n**2. Let d(p) be the third derivative of t(p). Factor d(q). -(q + 1)*(q + 2)/3 Suppose 7 = 3*x - 2*a, -4*x - x + a = -14. Let w(q) be the third derivative of 1/330*q**6 + 0*q + 0*q**4 + 0 - q**2 - 1/33*q**x + 1/110*q**5. Factor w(z). 2*(z + 1)**2*(2*z - 1)/11 Let m be (-48)/(-126) + (-18)/(-14) + -1. Let v = 79/15 - 23/5. Let 4/3*q**2 - v - m*q = 0. Calculate q. -1/2, 1 Let g be (-2)/(-12)*3*2/3. Factor k**3 + 2/3 - g*k**4 - 1/3*k**2 - k. -(k - 2)*(k - 1)**2*(k + 1)/3 Let b(c) = -12*c**3 - 9*c**2 + 12*c + 9. Let l(k) = -3*k**3 - 2*k**2 + 3*k + 2. Let o(f) = -4*b(f) + 15*l(f). Factor o(q). 3*(q - 1)*(q + 1)*(q + 2) Let i(s) be the second derivative of 7*s**5/90 - 8*s**4/27 + 11*s**3/27 - 2*s**2/9 - 22*s. Factor i(z). 2*(z - 1)**2*(7*z - 2)/9 Let n be (2/(-30))/((-1)/6). Factor -n*f + 2/5*f**2 + 2/5*f**3 - 2/5. 2*(f - 1)*(f + 1)**2/5 Let y(f) = f + 8. Let j be -7 + 1/1 + 1. Let a be y(j). Factor a + t**2 - 3 - t. t*(t - 1) Suppose -a + 48 = -40. Let u = a + -260/3. Factor 4/3*y + 0 - u*y**2 + 1/3*y**3. y*(y - 2)**2/3 Let l be 14/(-91) - (-72)/(-39) - -7. Let q(u) be the third derivative of 0*u**3 + 3*u**2 + 1/300*u**6 + 0*u**l + 0 + 1/525*u**7 + 0*u**4 + 0*u. Factor q(g). 2*g**3*(g + 1)/5 Let q = 197 - 1377/7. Factor 8/7*p**3 - 6/7*p + 0*p**2 - q. 2*(p - 1)*(2*p + 1)**2/7 Let p be 0 + ((-20)/(-4) - 2 - 3). Let y(a) be the second derivative of p*a**2 + 2*a - 1/10*a**5 + 2/21*a**3 + 5/42*a**4 + 0. Factor y(z). -2*z*(z - 1)*(7*z + 2)/7 Let b(d) be the second derivative of -d**6/50 + d**5/100 + 2*d**4/15 + 2*d**3/15 - 5*d. Factor b(p). -p*(p - 2)*(p + 1)*(3*p + 2)/5 Let k be 210/55 + -4 + (-46)/(-11). Let l(u) be the third derivative of -1/360*u**6 - 3*u**2 + 1/180*u**5 - 1/18*u**3 + 0*u + 0 + 1/72*u**k. Factor l(i). -(i - 1)**2*(i + 1)/3 Let c(h) = -14*h**3 + 12*h**2 + 12*h. Let o(q) = -5*q**3 + 4*q**2 + 4*q. Let r(x) = 3*c(x) - 10*o(x). Find y such that r(y) = 0. -1/2, 0, 1 Suppose -2*g = 2*w - 6, -5 = -3*g - 6*w + w. Solve -5*j**2 + 41*j**2 - 22*j**4 - 2*j**4 - 18*j**g - 16 - 24*j + 46*j**3 = 0 for j. -2, -2/3, 1 Factor -2/5*n**4 + 0 + 6/5*n**3 - 4/5*n**2 + 0*n. -2*n**2*(n - 2)*(n - 1)/5 Let n(x) be the first derivative of x**4/38 + 8*x**3/57 + 5*x**2/19 + 4*x/19 - 21. Find o such that n(o) = 0. -2, -1 Let n(z) be the third derivative of 1/150*z**5 - 1/100*z**6 + 0 + 3*z**2 - 1/840*z**8 + 0*z**3 + 0*z**4 + 1/175*z**7 + 0*z. Find g, given that n(g) = 0. 0, 1 Let w = 28 + -26. Factor 1/2*f + 3/2*f**3 - 3/2*f**w - 1/2*f**4 + 0. -f*(f - 1)**3/2 Let j = -173/7 + 25. Determine z, given that -j*z - 2/7 + 2/7*z**2 + 2/7*z**3 = 0. -1, 1 Let z(t) be the first derivative of 3*t**5/5 + 3*t**4/2 - 3*t**2 - 3*t + 9. Factor z(m). 3*(m - 1)*(m + 1)**3 Suppose 0 = -12*z - 12*z + 5*z. Suppose -1/3*o**3 + 5/6*o**4 - 1/2*o**5 + 0 + 0*o**2 + z*o = 0. Calculate o. 0, 2/3, 1 Let p = -9/152 - -179/456. Let -2/3*k**2 - 1/6*k + 1/3*k**4 + 1/3 - 1/6*k**5 + p*k**3 = 0. Calculate k. -1, 1, 2 Suppose 5*v = 3*t - 6, t = 5*v - 1 + 3. Find f such that -1/2*f**4 - 1/2*f**5 + 0 + 3/2*f**3 + f + 5/2*f**t = 0. -1, 0, 2 Let w(d) = -481*d**3 + 32*d**2 + 84*d + 7. Let j(g) = -480*g**3 + 33*g**2 + 84*g + 6. Let b(u) = 5*j(u) - 6*w(u). Factor b(k). 3*(2*k - 1)*(9*k + 2)**2 Let l(s) be the first derivative of -s**6/2 + 3*s**5/5 + 3*s**4/4 - s**3 - 10. Factor l(k). -3*k**2*(k - 1)**2*(k + 1) Let m(u) be the first derivative of -u**5/390 + u**3/39 - 5*u**2/2 + 4. Let h(p) be the second derivative of m(p). Factor h(z). -2*(z - 1)*(z + 1)/13 Let i = -9 + 37/4. Factor 0*x + i*x**3 - 1/4*x**2 + 0. x**2*(x - 1)/4 Let u(d) = -6*d. Let p be u(-2). Let z be (-238)/51*p/(-14). Let 0*s - 2/5*s**2 + 0 + 2/5*s**z + 0*s**3 = 0. What is s? -1, 0, 1 Let i(f) be the first derivative of -45*f**4/2 - 38*f**3 - 64*f**2/5 - 8*f/5 + 15. Factor i(z). -2*(z + 1)*(15*z + 2)**2/5 Let u(i) be the first derivative of i**5/150 - i**4/10 + 3*i**3/5 - 2*i**2 + 1. Let v(l) be the second derivative of u(l). Find f such that v(f) = 0. 3 Let -6/5*x - 1/5*x**2 - 9/5 = 0. What is x? -3 Factor -3*x**3 + 0*x + x**3 - 2*x - 4*x**2. -2*x*(x + 1)**2 Let z be 2/19 - 2244/(-3230). Determine j so that 0 + 8/5*j**3 + z*j + 2/5*j**4 + 2*j**2 = 0. -2, -1, 0 Solve 457*o**3 + 2*o**2 - 2 + 0 - o - 456*o**3 = 0 for o. -2, -1, 1 Let p(o) be the second derivative of o**7/105 - o**6/50 + o**4/60 - 3*o. Factor p(u). u**2*(u - 1)**2*(2*u + 1)/5 Factor -3*z + 6*z**2 - 4*z**3 + 5*z**3 + 12*z. z*(z + 3)**2 Solve 4/5*g**2 + 2/5*g**3 + 0*g + 0 = 0 for g. -2, 0 Let a(m) be the third derivative of -m**2 + 0*m + 1/96*m**6 + 0*m**4 - 1/280*m**7 - 1/120*m**5 + 0 + 0*m**3. Let a(v) = 0. What is v? 0, 2/3, 1 Suppose -3 = -2*p - 11. Let u be (p - -11)*(2 - 1). What is z in -2*z**2 + u*z**3 - 3*z**4 - z**4 - z**4 = 0? 0, 2/5, 1 Let k = 8 + -8. Suppose k*j = -3*j. Factor -6 + 4*z + 6*z - z - 3*z**2 + j. -3*(z - 2)*(z - 1) Let s(m) be the first derivative of -m**4/4 + m**3/3 - 6. What is w in s(w) = 0? 0, 1 Factor 18/7 - 16/7*i**3 - 48/7*i + 44/7*i**2 + 2/7*i**4. 2*(i - 3)**2*(i - 1)**2/7 Let w(l) be the third derivative of -l**8/30240 + l**6/3240 + 3*l**4/8 - 4*l**2. Let g(s) be the second derivative of w(s). Determine v so that g(v) = 0. -1, 0, 1 Let s(i) be the second derivative of -i**7/21 - i**6/5 - 3*i**5/10 - i**4/6 - 3*i. Factor s(b). -2*b**2*(b + 1)**3 Let m(z) = -4*z**2 + 2*z - 2. Let p(w) = 17*w**2 - 7*w + 8. Let d(i) = 9*m(i) + 2*p(i). Find r, given that d(r) = 0. 1 Let q be ((-14)/(-21))/((-2)/(-4)) + -1. Find a, given that 1/3 + 0*a**2 - 2/3*a - q*a**4 + 2/3*a**3 = 0. -1, 1 Factor -3*s - s**5 - 16*s**2 - 12*s**3 - 16*s**2 + 22*s**2 - 6*s**4. -s*(s + 1)**3*(s + 3) Let i = 5455/7 + -779. Solve -2/7*j + 0 - i*j**2 = 0. -1, 0 Let p(r) be the second derivative of -r**4/48 + 8*r. Factor p(n). -n**2/4 Let a(u) be the third derivative of -1/36*u**4 + 1/60*u**5 + 0 + 0*u - 1/360*u**6 + 0*u**3 - 2*u**2. Factor a(y). -y*(y - 2)*(y - 1)/3 Factor 0 - 1/5*a**2 - 4/5*a + 1/5*a**4 + 4/5*a**3. a*(a - 1)*(a + 1)*(a + 4)/5 Let y(v) be the third derivative of 1/20*v**5 + 1/2*v**3 + 0*v + 0 + 2*v**2 + 1/4*v**4. Let y(t) = 0. Calculate t. -1 Suppose 0 = 4*f - 1 + 5. Let n be 2/(-10) + f/(-5). Factor -1/2*y + n - 1/2*y**2. -y*(y + 1)/2 Let v(q) be the first derivative of -q**4 - 13. Solve v(z) = 0 for z. 0 Factor 3*c + 12/5*c**2 + 6/5 + 3/5*c**3. 3*(c + 1)**2*(c + 2)/5 Let h(f) be the second derivative of 3*f**4/5 - 8*f**3/3 + 8*f**2/5 + 4*f - 5. Factor h(q). 4*(q - 2)*(9*q - 2)/5 Let h(j) be the third derivative of j**6/780 + 7*j**5/390 + j**4/26 - 41*j**2. Factor h(k). 2*k*(k + 1)*(k + 6)/13 Let u(a) be the second derivative of -a**6/240 - a**5/80 - a**3/6 - a. Let y(f) be the second derivative of u(f). Factor y(x). -3*x*(x + 1)/2 Suppose 2 = p - 1. Factor -3*h**5 - 16*h**2 + 3*h**4 - 2*h**p + 5*h**3 + 13*h**2. -3*h**2*(h - 1)**2*(h + 1) Let p be ((-30)/9)/5*-6. Suppose -p*j + f + 11 = 0, -3 = -5*j + f + 11. Factor -9*t + t - 4 + 4*t**j - 5*t**2 - 5*t**3. -(t + 1)*(t + 2)**2 Let w(h) be the third derivative of 1/20*h**5 + 0*h + h**3 - h**2 - 9/8*h**4 + 0 - 3/70*h**7 + 23/40*h**6 - 1/8*h**8. Let w(i) = 0. Calculate i. -1, 2/7, 1/2, 1 Factor 1 + y - 1/4*y**2 - 1/4*y**3. -(y - 2)*(y + 1)*(y + 2)/4 Let s(j) = j + 9. Let k be s(-6). Factor 3*u**2 - 9*u**4 + 13*u**3 - 2*u - u**k - 4*u. -3*u*(u - 1)**2*(3*u + 2) Let j = 32 + -30. Factor -1/3*i**j - 2/3*i + 0. -i*(i + 2)/3 Let p = -741 - -5191/7. Determine n, given that 26/7*n**2 - p*n + 0 - 40/7*n**3 = 0. 0, 1/4, 2/5 Let z(q) be the first derivative of -2*q**3/7 - 10*q**2/7 - 6*q/7
{ "pile_set_name": "DM Mathematics" }
26 So.3d 507 (2008) CARL WAYNE HAMMONDS v. STATE. No. CR-06-1834. Court of Criminal Appeals of Alabama. April 25, 2008. Decision of the Alabama Court of Criminal Appeals Without Published Opinion Rehearing denied.
{ "pile_set_name": "FreeLaw" }
Q: Where are examples for using SLDS Dueling Listbox? In my components I want to use the Dueling-picklist from the LIGHTNING DESIGN SYSTEM. On the website there is no example code but just this BETA note. I need examples for the markup and how to add functionality to it. Did anyone implement this already? A: I've found this example of another developer's implementation of a dueling picklist: https://www.linkedin.com/pulse/dueling-picklists-lightning-component-yogaraj-kv-1/ and the code for the example is at: https://github.com/yogarajkv/DuelingPicklist_Lookup-Lightning/tree/master/aura A: I have implemented this design twice - my second effort is much more performant and functional. https://github.com/rapsacnz/DualSelect Here's what it looks like: You can: Drag from source to destination Drag from destination to source Dragging will attempt to put the item where you dropped it. Drag to reorder in any list Shift select several items in source or destination, then use the arrow buttons to move to either source or destination Highlight an item and use the up / down buttons to move up and down.
{ "pile_set_name": "StackExchange" }
{ "author": "", "name": "serverstats", "version": "0.0.0", "repository": { "type": "git", "url": "git://github.com/einaros/ws.git" }, "engines": { "node": ">0.4.0" }, "dependencies": { "express": "2.x" }, "devDependencies": {}, "optionalDependencies": {} }
{ "pile_set_name": "Github" }
.class abstract Landroid/support/v4/content/ModernAsyncTask; .super Ljava/lang/Object; # annotations .annotation system Ldalvik/annotation/MemberClasses; value = { Landroid/support/v4/content/ModernAsyncTask$AsyncTaskResult;, Landroid/support/v4/content/ModernAsyncTask$WorkerRunnable;, Landroid/support/v4/content/ModernAsyncTask$InternalHandler;, Landroid/support/v4/content/ModernAsyncTask$Status; } .end annotation .annotation system Ldalvik/annotation/Signature; value = { "<Params:", "Ljava/lang/Object;", "Progress:", "Ljava/lang/Object;", "Result:", "Ljava/lang/Object;", ">", "Ljava/lang/Object;" } .end annotation # static fields .field private static final CORE_POOL_SIZE:I = 0x5 .field private static final KEEP_ALIVE:I = 0x1 .field private static final LOG_TAG:Ljava/lang/String; = "AsyncTask" .field private static final MAXIMUM_POOL_SIZE:I = 0x80 .field private static final MESSAGE_POST_PROGRESS:I = 0x2 .field private static final MESSAGE_POST_RESULT:I = 0x1 .field public static final THREAD_POOL_EXECUTOR:Ljava/util/concurrent/Executor; .field private static volatile sDefaultExecutor:Ljava/util/concurrent/Executor; .field private static sHandler:Landroid/support/v4/content/ModernAsyncTask$InternalHandler; .field private static final sPoolWorkQueue:Ljava/util/concurrent/BlockingQueue; .annotation system Ldalvik/annotation/Signature; value = { "Ljava/util/concurrent/BlockingQueue", "<", "Ljava/lang/Runnable;", ">;" } .end annotation .end field .field private static final sThreadFactory:Ljava/util/concurrent/ThreadFactory; # instance fields .field private final mCancelled:Ljava/util/concurrent/atomic/AtomicBoolean; .field private final mFuture:Ljava/util/concurrent/FutureTask; .annotation system Ldalvik/annotation/Signature; value = { "Ljava/util/concurrent/FutureTask", "<TResult;>;" } .end annotation .end field .field private volatile mStatus:Landroid/support/v4/content/ModernAsyncTask$Status; .field private final mTaskInvoked:Ljava/util/concurrent/atomic/AtomicBoolean; .field private final mWorker:Landroid/support/v4/content/ModernAsyncTask$WorkerRunnable; .annotation system Ldalvik/annotation/Signature; value = { "Landroid/support/v4/content/ModernAsyncTask$WorkerRunnable", "<TParams;TResult;>;" } .end annotation .end field # direct methods .method static constructor <clinit>()V .locals 9 new-instance v0, Landroid/support/v4/content/ModernAsyncTask$1; invoke-direct {v0}, Landroid/support/v4/content/ModernAsyncTask$1;-><init>()V sput-object v0, Landroid/support/v4/content/ModernAsyncTask;->sThreadFactory:Ljava/util/concurrent/ThreadFactory; new-instance v0, Ljava/util/concurrent/LinkedBlockingQueue; const/16 v1, 0xa invoke-direct {v0, v1}, Ljava/util/concurrent/LinkedBlockingQueue;-><init>(I)V sput-object v0, Landroid/support/v4/content/ModernAsyncTask;->sPoolWorkQueue:Ljava/util/concurrent/BlockingQueue; new-instance v1, Ljava/util/concurrent/ThreadPoolExecutor; const/4 v2, 0x5 const/16 v3, 0x80 const-wide/16 v4, 0x1 sget-object v6, Ljava/util/concurrent/TimeUnit;->SECONDS:Ljava/util/concurrent/TimeUnit; sget-object v7, Landroid/support/v4/content/ModernAsyncTask;->sPoolWorkQueue:Ljava/util/concurrent/BlockingQueue; sget-object v8, Landroid/support/v4/content/ModernAsyncTask;->sThreadFactory:Ljava/util/concurrent/ThreadFactory; invoke-direct/range {v1 .. v8}, Ljava/util/concurrent/ThreadPoolExecutor;-><init>(IIJLjava/util/concurrent/TimeUnit;Ljava/util/concurrent/BlockingQueue;Ljava/util/concurrent/ThreadFactory;)V sput-object v1, Landroid/support/v4/content/ModernAsyncTask;->THREAD_POOL_EXECUTOR:Ljava/util/concurrent/Executor; sget-object v0, Landroid/support/v4/content/ModernAsyncTask;->THREAD_POOL_EXECUTOR:Ljava/util/concurrent/Executor; sput-object v0, Landroid/support/v4/content/ModernAsyncTask;->sDefaultExecutor:Ljava/util/concurrent/Executor; return-void .end method .method public constructor <init>()V .locals 2 invoke-direct {p0}, Ljava/lang/Object;-><init>()V sget-object v0, Landroid/support/v4/content/ModernAsyncTask$Status;->PENDING:Landroid/support/v4/content/ModernAsyncTask$Status; iput-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mStatus:Landroid/support/v4/content/ModernAsyncTask$Status; new-instance v0, Ljava/util/concurrent/atomic/AtomicBoolean; invoke-direct {v0}, Ljava/util/concurrent/atomic/AtomicBoolean;-><init>()V iput-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mCancelled:Ljava/util/concurrent/atomic/AtomicBoolean; new-instance v0, Ljava/util/concurrent/atomic/AtomicBoolean; invoke-direct {v0}, Ljava/util/concurrent/atomic/AtomicBoolean;-><init>()V iput-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mTaskInvoked:Ljava/util/concurrent/atomic/AtomicBoolean; new-instance v0, Landroid/support/v4/content/ModernAsyncTask$2; invoke-direct {v0, p0}, Landroid/support/v4/content/ModernAsyncTask$2;-><init>(Landroid/support/v4/content/ModernAsyncTask;)V iput-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mWorker:Landroid/support/v4/content/ModernAsyncTask$WorkerRunnable; new-instance v0, Landroid/support/v4/content/ModernAsyncTask$3; iget-object v1, p0, Landroid/support/v4/content/ModernAsyncTask;->mWorker:Landroid/support/v4/content/ModernAsyncTask$WorkerRunnable; invoke-direct {v0, p0, v1}, Landroid/support/v4/content/ModernAsyncTask$3;-><init>(Landroid/support/v4/content/ModernAsyncTask;Ljava/util/concurrent/Callable;)V iput-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mFuture:Ljava/util/concurrent/FutureTask; return-void .end method .method static synthetic access$000(Landroid/support/v4/content/ModernAsyncTask;)Ljava/util/concurrent/atomic/AtomicBoolean; .locals 1 iget-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mTaskInvoked:Ljava/util/concurrent/atomic/AtomicBoolean; return-object v0 .end method .method static synthetic access$100(Landroid/support/v4/content/ModernAsyncTask;)Ljava/util/concurrent/atomic/AtomicBoolean; .locals 1 iget-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mCancelled:Ljava/util/concurrent/atomic/AtomicBoolean; return-object v0 .end method .method public static execute(Ljava/lang/Runnable;)V .locals 1 sget-object v0, Landroid/support/v4/content/ModernAsyncTask;->sDefaultExecutor:Ljava/util/concurrent/Executor; invoke-interface {v0, p0}, Ljava/util/concurrent/Executor;->execute(Ljava/lang/Runnable;)V return-void .end method .method private static getHandler()Landroid/os/Handler; .locals 2 const-class v1, Landroid/support/v4/content/ModernAsyncTask; monitor-enter v1 :try_start_0 sget-object v0, Landroid/support/v4/content/ModernAsyncTask;->sHandler:Landroid/support/v4/content/ModernAsyncTask$InternalHandler; if-nez v0, :cond_0 new-instance v0, Landroid/support/v4/content/ModernAsyncTask$InternalHandler; invoke-direct {v0}, Landroid/support/v4/content/ModernAsyncTask$InternalHandler;-><init>()V sput-object v0, Landroid/support/v4/content/ModernAsyncTask;->sHandler:Landroid/support/v4/content/ModernAsyncTask$InternalHandler; :cond_0 sget-object v0, Landroid/support/v4/content/ModernAsyncTask;->sHandler:Landroid/support/v4/content/ModernAsyncTask$InternalHandler; monitor-exit v1 return-object v0 :catchall_0 move-exception v0 monitor-exit v1 :try_end_0 .catchall {:try_start_0 .. :try_end_0} :catchall_0 throw v0 .end method .method public static setDefaultExecutor(Ljava/util/concurrent/Executor;)V .locals 0 .annotation build Landroid/support/annotation/RestrictTo; value = { .enum Landroid/support/annotation/RestrictTo$Scope;->LIBRARY_GROUP:Landroid/support/annotation/RestrictTo$Scope; } .end annotation sput-object p0, Landroid/support/v4/content/ModernAsyncTask;->sDefaultExecutor:Ljava/util/concurrent/Executor; return-void .end method # virtual methods .method public final cancel(Z)Z .locals 2 iget-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mCancelled:Ljava/util/concurrent/atomic/AtomicBoolean; const/4 v1, 0x1 invoke-virtual {v0, v1}, Ljava/util/concurrent/atomic/AtomicBoolean;->set(Z)V iget-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mFuture:Ljava/util/concurrent/FutureTask; invoke-virtual {v0, p1}, Ljava/util/concurrent/FutureTask;->cancel(Z)Z move-result v0 return v0 .end method .method protected varargs abstract doInBackground([Ljava/lang/Object;)Ljava/lang/Object; .annotation system Ldalvik/annotation/Signature; value = { "([TParams;)TResult;" } .end annotation .end method .method public final varargs execute([Ljava/lang/Object;)Landroid/support/v4/content/ModernAsyncTask; .locals 1 .annotation system Ldalvik/annotation/Signature; value = { "([TParams;)", "Landroid/support/v4/content/ModernAsyncTask", "<TParams;TProgress;TResult;>;" } .end annotation sget-object v0, Landroid/support/v4/content/ModernAsyncTask;->sDefaultExecutor:Ljava/util/concurrent/Executor; invoke-virtual {p0, v0, p1}, Landroid/support/v4/content/ModernAsyncTask;->executeOnExecutor(Ljava/util/concurrent/Executor;[Ljava/lang/Object;)Landroid/support/v4/content/ModernAsyncTask; move-result-object v0 return-object v0 .end method .method public final varargs executeOnExecutor(Ljava/util/concurrent/Executor;[Ljava/lang/Object;)Landroid/support/v4/content/ModernAsyncTask; .locals 2 .annotation system Ldalvik/annotation/Signature; value = { "(", "Ljava/util/concurrent/Executor;", "[TParams;)", "Landroid/support/v4/content/ModernAsyncTask", "<TParams;TProgress;TResult;>;" } .end annotation iget-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mStatus:Landroid/support/v4/content/ModernAsyncTask$Status; sget-object v1, Landroid/support/v4/content/ModernAsyncTask$Status;->PENDING:Landroid/support/v4/content/ModernAsyncTask$Status; if-eq v0, v1, :cond_0 sget-object v0, Landroid/support/v4/content/ModernAsyncTask$4;->$SwitchMap$android$support$v4$content$ModernAsyncTask$Status:[I iget-object v1, p0, Landroid/support/v4/content/ModernAsyncTask;->mStatus:Landroid/support/v4/content/ModernAsyncTask$Status; invoke-virtual {v1}, Landroid/support/v4/content/ModernAsyncTask$Status;->ordinal()I move-result v1 aget v0, v0, v1 packed-switch v0, :pswitch_data_0 new-instance v0, Ljava/lang/IllegalStateException; const-string/jumbo v1, "We should never reach this state" invoke-direct {v0, v1}, Ljava/lang/IllegalStateException;-><init>(Ljava/lang/String;)V throw v0 :pswitch_0 new-instance v0, Ljava/lang/IllegalStateException; const-string/jumbo v1, "Cannot execute task: the task is already running." invoke-direct {v0, v1}, Ljava/lang/IllegalStateException;-><init>(Ljava/lang/String;)V throw v0 :pswitch_1 new-instance v0, Ljava/lang/IllegalStateException; const-string/jumbo v1, "Cannot execute task: the task has already been executed (a task can be executed only once)" invoke-direct {v0, v1}, Ljava/lang/IllegalStateException;-><init>(Ljava/lang/String;)V throw v0 :cond_0 sget-object v0, Landroid/support/v4/content/ModernAsyncTask$Status;->RUNNING:Landroid/support/v4/content/ModernAsyncTask$Status; iput-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mStatus:Landroid/support/v4/content/ModernAsyncTask$Status; invoke-virtual {p0}, Landroid/support/v4/content/ModernAsyncTask;->onPreExecute()V iget-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mWorker:Landroid/support/v4/content/ModernAsyncTask$WorkerRunnable; iput-object p2, v0, Landroid/support/v4/content/ModernAsyncTask$WorkerRunnable;->mParams:[Ljava/lang/Object; iget-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mFuture:Ljava/util/concurrent/FutureTask; invoke-interface {p1, v0}, Ljava/util/concurrent/Executor;->execute(Ljava/lang/Runnable;)V return-object p0 nop :pswitch_data_0 .packed-switch 0x1 :pswitch_0 :pswitch_1 .end packed-switch .end method .method finish(Ljava/lang/Object;)V .locals 1 .annotation system Ldalvik/annotation/Signature; value = { "(TResult;)V" } .end annotation invoke-virtual {p0}, Landroid/support/v4/content/ModernAsyncTask;->isCancelled()Z move-result v0 if-eqz v0, :cond_0 invoke-virtual {p0, p1}, Landroid/support/v4/content/ModernAsyncTask;->onCancelled(Ljava/lang/Object;)V :goto_0 sget-object v0, Landroid/support/v4/content/ModernAsyncTask$Status;->FINISHED:Landroid/support/v4/content/ModernAsyncTask$Status; iput-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mStatus:Landroid/support/v4/content/ModernAsyncTask$Status; return-void :cond_0 invoke-virtual {p0, p1}, Landroid/support/v4/content/ModernAsyncTask;->onPostExecute(Ljava/lang/Object;)V goto :goto_0 .end method .method public final get()Ljava/lang/Object; .locals 1 .annotation system Ldalvik/annotation/Signature; value = { "()TResult;" } .end annotation iget-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mFuture:Ljava/util/concurrent/FutureTask; invoke-virtual {v0}, Ljava/util/concurrent/FutureTask;->get()Ljava/lang/Object; move-result-object v0 return-object v0 .end method .method public final get(JLjava/util/concurrent/TimeUnit;)Ljava/lang/Object; .locals 1 .annotation system Ldalvik/annotation/Signature; value = { "(J", "Ljava/util/concurrent/TimeUnit;", ")TResult;" } .end annotation iget-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mFuture:Ljava/util/concurrent/FutureTask; invoke-virtual {v0, p1, p2, p3}, Ljava/util/concurrent/FutureTask;->get(JLjava/util/concurrent/TimeUnit;)Ljava/lang/Object; move-result-object v0 return-object v0 .end method .method public final getStatus()Landroid/support/v4/content/ModernAsyncTask$Status; .locals 1 iget-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mStatus:Landroid/support/v4/content/ModernAsyncTask$Status; return-object v0 .end method .method public final isCancelled()Z .locals 1 iget-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mCancelled:Ljava/util/concurrent/atomic/AtomicBoolean; invoke-virtual {v0}, Ljava/util/concurrent/atomic/AtomicBoolean;->get()Z move-result v0 return v0 .end method .method protected onCancelled()V .locals 0 return-void .end method .method protected onCancelled(Ljava/lang/Object;)V .locals 0 .annotation system Ldalvik/annotation/Signature; value = { "(TResult;)V" } .end annotation invoke-virtual {p0}, Landroid/support/v4/content/ModernAsyncTask;->onCancelled()V return-void .end method .method protected onPostExecute(Ljava/lang/Object;)V .locals 0 .annotation system Ldalvik/annotation/Signature; value = { "(TResult;)V" } .end annotation return-void .end method .method protected onPreExecute()V .locals 0 return-void .end method .method protected varargs onProgressUpdate([Ljava/lang/Object;)V .locals 0 .annotation system Ldalvik/annotation/Signature; value = { "([TProgress;)V" } .end annotation return-void .end method .method postResult(Ljava/lang/Object;)Ljava/lang/Object; .locals 5 .annotation system Ldalvik/annotation/Signature; value = { "(TResult;)TResult;" } .end annotation const/4 v4, 0x1 invoke-static {}, Landroid/support/v4/content/ModernAsyncTask;->getHandler()Landroid/os/Handler; move-result-object v0 new-instance v1, Landroid/support/v4/content/ModernAsyncTask$AsyncTaskResult; new-array v2, v4, [Ljava/lang/Object; const/4 v3, 0x0 aput-object p1, v2, v3 invoke-direct {v1, p0, v2}, Landroid/support/v4/content/ModernAsyncTask$AsyncTaskResult;-><init>(Landroid/support/v4/content/ModernAsyncTask;[Ljava/lang/Object;)V invoke-virtual {v0, v4, v1}, Landroid/os/Handler;->obtainMessage(ILjava/lang/Object;)Landroid/os/Message; move-result-object v0 invoke-virtual {v0}, Landroid/os/Message;->sendToTarget()V return-object p1 .end method .method postResultIfNotInvoked(Ljava/lang/Object;)V .locals 1 .annotation system Ldalvik/annotation/Signature; value = { "(TResult;)V" } .end annotation iget-object v0, p0, Landroid/support/v4/content/ModernAsyncTask;->mTaskInvoked:Ljava/util/concurrent/atomic/AtomicBoolean; invoke-virtual {v0}, Ljava/util/concurrent/atomic/AtomicBoolean;->get()Z move-result v0 if-nez v0, :cond_0 invoke-virtual {p0, p1}, Landroid/support/v4/content/ModernAsyncTask;->postResult(Ljava/lang/Object;)Ljava/lang/Object; :cond_0 return-void .end method .method protected final varargs publishProgress([Ljava/lang/Object;)V .locals 3 .annotation system Ldalvik/annotation/Signature; value = { "([TProgress;)V" } .end annotation invoke-virtual {p0}, Landroid/support/v4/content/ModernAsyncTask;->isCancelled()Z move-result v0 if-nez v0, :cond_0 invoke-static {}, Landroid/support/v4/content/ModernAsyncTask;->getHandler()Landroid/os/Handler; move-result-object v0 const/4 v1, 0x2 new-instance v2, Landroid/support/v4/content/ModernAsyncTask$AsyncTaskResult; invoke-direct {v2, p0, p1}, Landroid/support/v4/content/ModernAsyncTask$AsyncTaskResult;-><init>(Landroid/support/v4/content/ModernAsyncTask;[Ljava/lang/Object;)V invoke-virtual {v0, v1, v2}, Landroid/os/Handler;->obtainMessage(ILjava/lang/Object;)Landroid/os/Message; move-result-object v0 invoke-virtual {v0}, Landroid/os/Message;->sendToTarget()V :cond_0 return-void .end method
{ "pile_set_name": "Github" }
Q: MapFragment does not show map I've looked through the documentation and I can't find any reason why the MapFragment only shows a grey screen with the Google logo on the lower left hand side. In my manifest, I have the appropriate meta-data on the application level (GMS version number and the api key). The module gradle file has all the needed dependencies. The error might be in the java code, which is as follows: import android.content.pm.PackageManager; import android.location.Location; import android.location.LocationListener; import android.os.Bundle; import android.support.annotation.NonNull; import android.support.annotation.Nullable; import android.support.v4.app.ActivityCompat; import android.support.v4.app.FragmentActivity; import android.support.v4.content.ContextCompat; import com.google.android.gms.common.ConnectionResult; import com.google.android.gms.common.api.GoogleApiClient; import com.google.android.gms.location.LocationServices; import com.google.android.gms.maps.CameraUpdateFactory; import com.google.android.gms.maps.GoogleMap; import com.google.android.gms.maps.OnMapReadyCallback; import com.google.android.gms.maps.SupportMapFragment; import com.google.android.gms.maps.model.LatLng; import com.google.android.gms.maps.model.MarkerOptions; import com.google.android.gms.maps.model.Polyline; import com.google.android.gms.maps.model.PolylineOptions; public class MapsActivity extends FragmentActivity implements OnMapReadyCallback, GoogleApiClient.ConnectionCallbacks, GoogleApiClient.OnConnectionFailedListener, LocationListener { private GoogleMap mMap; private Polyline polyline; private PolylineOptions mPLO; private GoogleApiClient mGoogleApiClient; private boolean mLocationPermissionGranted; private static final int PERMISSIONS_REQUEST_ACCESS_FINE_LOCATION = 1; private Location mLastKnownLocation; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.activity_maps); // Obtain the SupportMapFragment and get notified when the map is ready to be used. mGoogleApiClient = new GoogleApiClient.Builder(this) .enableAutoManage(this /* FragmentActivity */, this /* OnConnectionFailedListener */) .addConnectionCallbacks(this) .addApi(LocationServices.API) .build(); mGoogleApiClient.connect(); } /** * Manipulates the map once available. * This callback is triggered when the map is ready to be used. * This is where we can add markers or lines, add listeners or move the camera. In this case, * we just add a marker near Sydney, Australia. * If Google Play services is not installed on the device, the user will be prompted to install * it inside the SupportMapFragment. This method will only be triggered once the user has * installed Google Play services and returned to the app. */ @Override public void onMapReady(GoogleMap googleMap) { mMap = googleMap; LatLng sydney = new LatLng(-33.852, 151.211); mMap.addMarker(new MarkerOptions().position(sydney) .title("Marker in Sydney")); mMap.moveCamera(CameraUpdateFactory.newLatLng(sydney)); //mPLO = new PolylineOptions().geodesic(true);; //polyline = mMap.addPolyline(mPLO); // Turn on the My Location layer and the related control on the map. // updateLocationUI(); // Get the current location of the device and set the position of the map. //getDeviceLocation(); } @Override public void onConnected(@Nullable Bundle bundle) { SupportMapFragment mapFragment = (SupportMapFragment) getSupportFragmentManager() .findFragmentById(R.id.map); mapFragment.getMapAsync(this); } @Override public void onConnectionSuspended(int i) { } @Override public void onConnectionFailed(@NonNull ConnectionResult connectionResult) { } @Override public void onLocationChanged(Location location) { // mPLO.add(new LatLng(location.getLatitude(), location.getLongitude())); } @Override public void onProviderDisabled(String s) { } @Override public void onProviderEnabled(String s) { } @Override public void onStatusChanged(String s, int i, Bundle bundle) { } private void getDeviceLocation() { if (ContextCompat.checkSelfPermission(this.getApplicationContext(), android.Manifest.permission.ACCESS_FINE_LOCATION) == PackageManager.PERMISSION_GRANTED) { mLocationPermissionGranted = true; } else { ActivityCompat.requestPermissions(this, new String[]{android.Manifest.permission.ACCESS_FINE_LOCATION}, PERMISSIONS_REQUEST_ACCESS_FINE_LOCATION); } // A step later in the tutorial adds the code to get the device location. } /** * Handles the result of the request for location permissions. */ @Override public void onRequestPermissionsResult(int requestCode, @NonNull String permissions[], @NonNull int[] grantResults) { mLocationPermissionGranted = false; switch (requestCode) { case PERMISSIONS_REQUEST_ACCESS_FINE_LOCATION: { // If request is cancelled, the result arrays are empty. if (grantResults.length > 0 && grantResults[0] == PackageManager.PERMISSION_GRANTED) { mLocationPermissionGranted = true; } } } updateLocationUI(); } /** * Updates the map's UI settings based on whether the user has granted location permission. */ private void updateLocationUI() { if (mMap == null) { return; } /* * Request location permission, so that we can get the location of the * device. The result of the permission request is handled by a callback, * onRequestPermissionsResult. */ if (ContextCompat.checkSelfPermission(this.getApplicationContext(), android.Manifest.permission.ACCESS_FINE_LOCATION) == PackageManager.PERMISSION_GRANTED) { mLocationPermissionGranted = true; } else { ActivityCompat.requestPermissions(this, new String[]{android.Manifest.permission.ACCESS_FINE_LOCATION}, PERMISSIONS_REQUEST_ACCESS_FINE_LOCATION); } if (mLocationPermissionGranted) { mMap.setMyLocationEnabled(true); mMap.getUiSettings().setMyLocationButtonEnabled(true); } else { mMap.setMyLocationEnabled(false); mMap.getUiSettings().setMyLocationButtonEnabled(false); mLastKnownLocation = null; } } } The logcat shows the following errors 234-31464/com.gjd.capstone E/Google Maps Android API: Authorization failure. Please see https://developers.google.com/maps/documentation/android-api/start for how to correctly set up the map. 03-12 15:30:12.967 30234-31464/com.gjd.capstone E/Google Maps Android API: In the Google Developer Console (https://console.developers.google.com) Ensure that the "Google Maps Android API v2" is enabled. Ensure that the following Android Key exists: API Key: <Redacted> Android Application (<cert_fingerprint>;<package_name>): 47:B9:AC:D7:30:4D:AB:2D:6E:29:06:99:24:B1:7C:07:95:0A:8B:96;com.gjd.capstone I have even looked into the developers console to see if the api was disabled, it wasn't. I'm still not sure what to do. I'm not sure if "Google Maps Android API v2" is enabled, I couldn't find the option for it. A: I have found the solution to my problem. After I created the MapsActivity, I changed the the package of the java file but I did not change the package name in the dev console.
{ "pile_set_name": "StackExchange" }
Ask HN: Can someone please review my code? - saq7 I recently did a work sample in Rails for a company which I will not name. I felt pretty good about it when submitting it, but I was ultimately rejected. They did not provide any feedback because they wanted to keep the hiring process under wraps, and I respect that. The problem still remains that I have no idea what I did wrong or what I need to do to improve.<p>So I want to ask you to review the code and let me know what you think. I will not post this work on a public site, because I want to respect the wishes of the company.<p>So my idea is to post it on bitbucket in a private repo and if you wish to review it, I will add you to the repo. I understand this is a lot to ask for when asking for feedback on the internet, and if there is a more straight forward way I have overlooked, please let me know.<p>My goal here is to understand what I did wrong and improve while still respecting the wish for secrecy by the original company.<p>Thanks a lot in advance<p>[edit]<p>I posted this request here and on reddit and I got same feedback - post the code on github. So I have done so. It can be found here https:&#x2F;&#x2F;github.com&#x2F;saq7&#x2F;rails-work-sample&#x2F; ====== mtmail The changes probably solved the feature request(s) and it looks Rails-like and a lot of engineers would've coded in the same style. Reading the instructions ( _), especially "Your presentation should be something you're proud of. The user-experience and aesthetic aspects should be well considered." I'd say they were looking for candidates who simply spend more time on the project. More CSS changes, more refactoring, maybe giving them a list of things you wish you had time to solve. Entirely possible it's not code related at all. Them waiting for another candidate, somebody impressed them more for non-technical/coding reasons, hiring freeze the manager doesn't want to admit or internal discussions about the job role. All you can do is send a nice email asking for feedback. If they don't provide that, move on. _) Took just 2 clicks to see the deleted files. It's possible to delete files from repositories including history. ~~~ saq7 Thanks a lot for the feedback. I know that files can be deleted and from history as well. I figured if I left those files in, a reviewer could find them and keep it away from someone who didn't care enough to look. Thinking back to it, not the best idea, I guess. ------ based2 [https://www.reddit.com/r/codereview/](https://www.reddit.com/r/codereview/) ------ dudul You seem to care a lot about the "feelz" of a company that rejected you without providing any feedback to help you improve. Just post the thing on github (or public bitbucket) and paste a link here. Unless you signed a NDA regarding their hiring process, you don't owe them anything at this point. ~~~ saq7 yeah, the folks over at reddit said the same thing. I have uploaded it to github and posted a link in the submission text ------ sharemywin Did you use any of this crap? if not your code probably wasn't hip enough. [http://code.tutsplus.com/tutorials/ruby-on-rails-study- guide...](http://code.tutsplus.com/tutorials/ruby-on-rails-study-guide-blocks- procs-and-lambdas--net-29811) ~~~ saq7 Though I know about Procs, Lambdas, and Blocks, I did not use any of them, because there was no real need to. My goal when completing the work sample was write concise and readable code. Though there might have been places where these constructs might have been useful ~~~ sharemywin And I got down voted for being spot on. Also don't forget automated unit tests no automated unit tests no job.
{ "pile_set_name": "HackerNews" }
Roonwit, thanks for bringing the puzzle together with the info we have from Deathly Hallows. It all really seems to fit that Credence, if a Dumbledore would belong to a cousin's family. The only other explanation I would see if him being the son of Albus or Aberforth, where the mother would not have stayed with the father but gone away or returned to the US. I think we can rule out Albus, as he does not seem the type for a one-night-stand. even though his break up with Grindelwald could leave from for him seeking someone else, he seems to be gay and not bisexual. As for Aberforth. I don't know whether he would seek solice in a woman's arms after losing his mother and then sister. But still it does not feel quite right. All in all, the cousin-family seems more Rowling's style. As to why Grimmson killed Irma it would help to keep Credence isolated so Grindelwald can continue to lure him and he wouldn't want Credence learning about his supposed sister (Irma would think that Leta was his sister unless she realized the babies were swapped before she gave him to the Barebones). I think he is also using Credence's emotions. He is desparate to know about his background. Snatching away his one link to the past, isolates him even more and we see how much is emotions flare up when he attacks Grimmson. Grindelwald is carefully influencing him on all levels. "Of course it is all in your head, but why on Earth should that mean it isn't real?" ~Dumbledore (DH) ... I think he is also using Credence's emotions. He is desparate to know about his background. Snatching away his one link to the past, isolates him even more and we see how much is emotions flare up when he attacks Grimmson. Grindelwald is carefully influencing him on all levels. That could certainly explain why Irma was so quickly assassinated. Who knows what she might have said (like "yes, I knew that Leta switched the infants. I switched them back")? Even if that double switch did not occur, she would be identifying him (rightly or wrongly) as Corvus. If Credence believed he was a Lestrange, he would be turning to Leta, not to Grindelwald for help. That would not be helpful to Grindelwald. Hmmm, I hadn't even considered the option of a double switch taking place. Irma does seem like one who would have her eyes everywhere, so the possibility is there. And yes, either way it would be important to make sure she does not say even more. I guess Grindelwald was happy for her saying she was not his mother but not more than that. Rowling spends quite a long time on that whole story with Leta's brother. So it feels like it is not just a dead-end story. Whether Grindewald is correct or not about him being a Dumbledore, it feels like there is more to be found on that sinking ship, than the switch. Or do you think it will turn out to be like the tale around Hagrid's brother, that was a nice detour but not much more? I think he is also using Credence's emotions. He is desparate to know about his background. Snatching away his one link to the past, isolates him even more and we see how much is emotions flare up when he attacks Grimmson. Grindelwald is carefully influencing him on all levels. Yes. Now I consider it again, Credence is looking for Irma because of his birth certificate so Grindelwald needs him to find her or he will just keep looking, but then he needs to cut that link to the past as well once she confirms she was only a servant.Grindelwald seems very good at manipulating people, for example the directions in the script (Scene 114 in the amphitheatre) say Grindelwald "is deliberately playing on the unstable YOUNG RED-HAIRED WITCH'S feelings" resulting in her raising her wand which provokes the jumpiest young auror to attack first and kill her. I think he has been doing the same thing with Queenie. At first I wondered if there was something in the tea she had at Grindelwald's stolen house (the over eager teapot put me in mind of Umbridge trying to persuade Harry to drink his tea) but I now think he was just playing on her emotions as well. I think it is unlikely that Rosier found her and came to her rescue by accident when she got lost in the back streets, thus starting to win her over with kindness, and the bit of Grindelwald's speech in the amphitheatre (Scene 112) ending "--and for love" is deliberately addressed at Queenie and has the result that she is "now heart and soul his...".I think Grindelwald was right when he described Queenie as an innocent - she does what feels right at the time without thinking through the consequences and presumably just hoping that everything will turn out alright. So for example she wants to marry Jacob so enchants him and effectively kidnaps him, seemingly without thinking about how Jacob would feel about it when the enchantment was removed, how Newt would react when they turn up without warning, and what happens afterwards. It is obvious (to us at least) that they can't go back to New York without being arrested, so I assume she was relying on Newt to let them stay in his house afterwards because I doubt she planned how to get married beyond perhaps expecting Newt to arrange or just it turning up at the Ministry and asking. She also goes to Paris without being able to speak French and without a plan B if the French Ministry doesn't know where Tina is.Also in the amphitheatre she seems to think that Grindelwald's world will solve her problem and goes without thinking about what happens if Jacob doesn't want to come or gets incinerated by the fire to get to situation that might eventually bring a world were she can marry Jacob but which Jacob doesn't want to be a part of and also seemingly forgetting that Grindelwald tried to have her sister executed. I also wonder if the fact that she and Tina aren't talking added to her problems, as I can see Tina as a steadying influence and at least pointing out the likely consequences of her actions. That could certainly explain why Irma was so quickly assassinated. Who knows what she might have said (like "yes, I knew that Leta switched the infants. I switched them back")? Even if that double switch did not occur, she would be identifying him (rightly or wrongly) as Corvus. If Credence believed he was a Lestrange, he would be turning to Leta, not to Grindelwald for help. That would not be helpful to Grindelwald. I think a double switch is unlikely due to Leta's flower throttling Corvus's name on the family tree. I also think Leta would notice a switch back, given Corvus's constant crying, and Irma would have asked her about it if she noticed the babies were swapped, also Yusuf Kama would presumably be dead from the unbreakable vow for failing to kill Credence if he is actually Corvus. Roonwit, you bring up very good points abut Queenie. She seems immature. Maybe Tina become her parent when they were orphaned and she has become so used to her sister being there to be the adult she herself just hid away from reality around her in her own little world. As I said before, her inability or disinterest to keep her legilimency skills in check, even when asked, already put me on edge. In a way it's nice to see Newt use that against her when she comes to call on him without invitation. But thinking this futher, what does Grindelwald hope to gain from her? Her legilmency skills? Seeing people feel her doing it, there is no stealth to her skill and she does not seem to have any control over it. I think a double switch is unlikely due to Leta's flower throttling Corvus's name on the family tree. I also think Leta would notice a switch back, given Corvus's constant crying, and Irma would have asked her about it if she noticed the babies were swapped, also Yusuf Kama would presumably be dead from the unbreakable vow for failing to kill Credence if he is actually Corvus. I am releaved to read your words. It makes sense what you outline so I am happy to take it Credence is not Corvus. Grindelwald on the other hand will have a little more work to do before I fully believe his words though. "Of course it is all in your head, but why on Earth should that mean it isn't real?" ~Dumbledore (DH) But thinking this futher, what does Grindelwald hope to gain from her? Her legilmency skills? Seeing people feel her doing it, there is no stealth to her skill and she does not seem to have any control over it. I don't think people do feel her reading minds, but she generally doesn't try to hide what she hears, and normally replies or reacts as if it was normal speech. I think Grindelwald has already used Queenie to read what Credence is thinking which is actually a bit strange because Grindelwald generally seems to read people and know how to manipulate them without help (unless he is just being extra cautious because it is important). Of course she could also serve a hostage or leverage if Tina or Newt get too close, though Grindelwald to be careful which of his own thoughts she "hears" because I doubt she would like the whole truth, and similarly for some of his followers. Hmm, I thought all three of the quartet at some point asked her to stop in the first film , even before she commented. But I'll have to go over the screenplay to be sure (I've ordered them as I'd really like to get more into the details). Perhaps, it's because they get to know how it feels as she is so close? As I read your words about Grindelwald having to be careful of his thoughts. I would suspect he knows to block his thoughts. We do not know if Albus by this point has learnt to be a legilimens, but even so he is dealing with too many wizards to not guard his thoughts. This does make me wonder though if Queenie could become a Snape-like character. She seems to have followed Grindelwald of her own choice (although possibly influenced by him) but at some point she will probably realise that he is not creating the wordl she wants. Could she become a double agent (when she finally grows up more)? Could she end up helping the others from the inside in some way? She does not seem to be as strong as Snape, but that could be the ace up her sleeve, that they do not expect her to double cross. "Of course it is all in your head, but why on Earth should that mean it isn't real?" ~Dumbledore (DH) As I read your words about Grindelwald having to be careful of his thoughts. I would suspect he knows to block his thoughts. We do not know if Albus by this point has learnt to be a legilimens, but even so he is dealing with too many wizards to not guard his thoughts. I am sure he does control his thoughts, and was doing so during his speech at the amphitheatre, but the question is can he do that consistently which is something that even Voldemort wasn't entirely successful at. This does make me wonder though if Queenie could become a Snape-like character. She seems to have followed Grindelwald of her own choice (although possibly influenced by him) but at some point she will probably realise that he is not creating the wordl she wants. Could she become a double agent (when she finally grows up more)? Could she end up helping the others from the inside in some way? She does not seem to be as strong as Snape, but that could be the ace up her sleeve, that they do not expect her to double cross. I think it is difficult to predict how she might behave - in the first film she did a very good job of rescuing Jacob, finding the others and getting them out of MACUSA, but she seemed rather out of her depth in this film. Thus she could probably do great things in the right circumstances and right frame of mind, but might struggle in others. I have also realized that if Credence really is a Dumbledore then Albus could have suspected Leta's switch and who Credence really was. This is because in this case he may well have known that his relatives (ie. baby Credence and his aunt - the screenplay says he is with his aunt) were travelling to America and that they were presumed lost after their ship sank, but when he saw Leta's Boggart he might have connected the two and checked the passenger list (possibly from muggle sources) to find that Leta was on the same ship, and realized the babies might have been switched because Leta is less likely have been haunted by the death of an unknown baby.This leads to the question of why Dumbledore "sent" Newt to New York? Was it because Grindelwald was there or because Credence was? I think legilimency and blocking it is a skill closely linked to your emotions. Similar to maintaining a patronus if you can keep your emotions in check your blocking of legilimency should be easier and more consistent than when you lose control of your emotions. We see this happen with Snape, when Harry breaks through his defence for a quck glimpse when Snape is flustered. I have also realized that if Credence really is a Dumbledore then Albus could have suspected Leta's switch and who Credence really was. This is because in this case he may well have known that his relatives (ie. baby Credence and his aunt - the screenplay says he is with his aunt) were travelling to America and that they were presumed lost after their ship sank, but when he saw Leta's Boggart he might have connected the two and checked the passenger list (possibly from muggle sources) to find that Leta was on the same ship, and realized the babies might have been switched because Leta is less likely have been haunted by the death of an unknown baby.This leads to the question of why Dumbledore "sent" Newt to New York? Was it because Grindelwald was there or because Credence was? Yes, they really tip-toe around that don't they? Newt and Albus come so close to actually saying why Albus sent him, but of course Rowling is just teasing us. To me I cannot think of anything else but the whole Credence question that would warrant Albus leading Newt down the trail. Unless he had caught wind of Grindelwald being there undercover? As to Leta's boggart. It makes sense that Albus could have chickened on to what the boggart was representing. For one, possibly there some legilimency happening here? And secondly I think that the tale of the Lestrange's wuld be known amongst the teachers in some form or another, if not even around the school. Leta is retaliating to the kids meanness, yet the way McGonagall handles it makes me think there is some understanding of the story behind her character. This leads to the question of why Dumbledore "sent" Newt to New York? Was it because Grindelwald was there or because Credence was? First of all, hi! Long time no chat. Remember me? Second of all, THIS. So much THIS!!! I would imagine, knowing Dumbledore, a little of both. I think Credence is more likely. The question then becomes HOW Dumbledore would have known either were there. Grindelwald was in disguise, but is there a way Dumbledore could have known his general whereabouts because of the blood pact? Some kind of blood magic trace? Second of all, Credence: I would imagine Dumbledore was tuned into his existence because of the evidence of an Obscurus in NYC showing up in the news -- things other people wouldn't have seen necessarily, but Dumbledore would have read between the lines, like he did with the death of the Muggle at the beginning of GoF, and intuited the presence of the Obscurus. Haunted by the guilt over Ariana's death, would he have been interested in tracking the Obscurus in order to help prevent another disaster? Or to look at how he could have saved his sister? I was chatting with a co-worker and we wondered whether Credence was a Dumbledore, but not a "real" Dumbledore. As in, could Grindelwald have somehow used the blood pact to create a brother for Albus (like a clone, using blood magic -- think Voldemort's SnakeBaby Homunculus Body in GoF)? Can wizards create life? If they can transfigure a teacup into a mouse, and if Voldemort could create a living vessel for his spirit, I think we have to assume they can. I was chatting with a co-worker and we wondered whether Credence was a Dumbledore, but not a "real" Dumbledore. As in, could Grindelwald have somehow used the blood pact to create a brother for Albus (like a clone, using blood magic -- think Voldemort's SnakeBaby Homunculus Body in GoF)? Can wizards create life? If they can transfigure a teacup into a mouse, and if Voldemort could create a living vessel for his spirit, I think we have to assume they can. Hello I am not sure whether wizards are capable of creating or transfiguring a human being or not, but if Grindelwald had been able to do this, why would he not know Credence in the first FB story and even seemed to be wondering if Modesty, the little girl, were the Obscurial. On the other hand, he very much prizes the vial of mixed blood, and it hard to imagine that is strictly sentimentality that motivates him.Why does he need it? what does he intend to do with it? what are its powers? JKR has deliberately withheld such information. The question then becomes HOW Dumbledore would have known either were there. Grindelwald was in disguise, but is there a way Dumbledore could have known his general whereabouts because of the blood pact? Some kind of blood magic trace? I wonder if he even needs that. We know that Dumbledore is very astute (at least in later life) in recognising magic signature. I believe he comments on this in Half-Blood Prince that he knows how Tom Riddle thinks and casts spells. I would not be surprised if he has kept an eye on Grindelwalds movements im part also in the traces he leaves behind. Just because nobody in MCUSA suspects Graves is not who he seems to be, does not mean that Dumbledore might not recognise little things in reports, whether these be in newspapers or he learns tidbits through the British Ministry or other ways. Haunted by the guilt over Ariana's death, would [Albus] have been interested in tracking the Obscurus in order to help prevent another disaster? Or to look at how he could have saved his sister? I think Ariana's death will play a big role in his actions. And I have a feeling it might also be shapingn Grindelwald's actions in a way. He has seen with her how powerful raw magical energy is, and maybe thinks he hasl learnt some things through his experience with her to "help" him "guide" Credence. Likewise Albus will be driven by her loss, to stop others from meeting a similar fate. Obscurus or not, he will have seen how devastating it is for someone who is trying to suppress their magical abilities. As to Credence being the borther. I guess it is really said in the movie, so I'll have to swallow that pill. The huge time-line problem aside. one thing does make sense: All the Dumbledore children's name's start with an 'A'. So in that respect he slots in – even if it is just a detail that fits. The only thing I can see that only half fits is that Percival would have fallen in love – or was charmed/forced/jinxed – by a female inmate at Azkaban. We still face hin having died by the time Kendra dies (I believe the Dumbledore children are described as orphaned when that event occurs), but it's a little easier to overcome than him and Kendra already being apart several years by that time. I don't know how wizarding law would handle Kendra having another child after Percival's imprisonment (or death) as to which surname the child would receive – otherwise that might be a possibility too, I guess. I am not sure whether wizards are capable of creating or transfiguring a human being or not, but if Grindelwald had been able to do this, why would he not know Credence in the first FB story and even seemed to be wondering if Modesty, the little girl, were the Obscurial. On the other hand, he very much prizes the vial of mixed blood, and it hard to imagine that is strictly sentimentality that motivates him.Why does he need it? what does he intend to do with it? what are its powers? JKR has deliberately withheld such information. I agree. The body Pettigrew forms with Voldemort help, is only interim and it seems like it would not survive. Seeing Credence does not already exist as a soul it seems unlikely Grindelwald could have used a similar approach to Voldemort's resurrection. I think the vial is a safety for Grindelwald. At the end of the film Albus hints that he might be able to destroy it. Just like a horcrux is a safety for the soul, the blood-pact is an object that provides safety that neither can touch the other. Might it even be the destruction of the blood vial that later helps Dumbledore figure out howto destroy horcruxes? "Of course it is all in your head, but why on Earth should that mean it isn't real?" ~Dumbledore (DH) The question then becomes HOW Dumbledore would have known either were there. Grindelwald was in disguise, but is there a way Dumbledore could have known his general whereabouts because of the blood pact? Some kind of blood magic trace? I wonder if he even needs that. We know that Dumbledore is very astute (at least in later life) in recognising magic signature. The problem here is that I think he would have to be on the scene or nearby to detect magical traces and I doubt that he went to New York as I suspect that might count as acting against Grindelwald which the blood pact stops (this may also be part of why his instructions to Newt are indirect; telling him about the trafficed Thunderbird knowing it would take Newt to New York, and later telling him that Credence is in Paris) and he doesn't want to add to the suspicions that the British Ministry already have about him. I think Dumbledore is simply getting reports of unusual activity through his international contacts such as the young Ilvermorny professor that encourages Flamel to go to the cemetery (though it may be Flamel who is leading the group), and he could well have deduced the presence of an Obscurus in New York from the events there. In addition the newspaper montage at the start of the first film implies that the magical newspapers are speculating about the possibility of Grindelwald being in New York by ending with a newsprint picture of the Statue of Liberty. As to Credence being the borther. I guess it is really said in the movie, so I'll have to swallow that pill. The huge time-line problem aside. one thing does make sense: All the Dumbledore children's name's start with an 'A'. So in that respect he slots in – even if it is just a detail that fits. The only thing I can see that only half fits is that Percival would have fallen in love – or was charmed/forced/jinxed – by a female inmate at Azkaban. We still face hin having died by the time Kendra dies (I believe the Dumbledore children are described as orphaned when that event occurs), but it's a little easier to overcome than him and Kendra already being apart several years by that time. I don't know how wizarding law would handle Kendra having another child after Percival's imprisonment (or death) as to which surname the child would receive – otherwise that might be a possibility too, I guess. It is implied rather than stated in the film with Grindelwald (who could be lying) being part of the source so I am treating it as possible but not certain. If it is true that Credence is Albus' brother then he is most likely Percival's son - Kendra would have be alive 2 years after she is supposed to have died, but it would just take Rita to be wrong about Albus being an orphan when Kendra died and a loose interpretation of him being "head of the family" for Percival to be alive long enough to father another child, presumably as you suggest with another inmate of Azkaban or possibly a visitor. It would also explain why there was no mention of another Dumbledore child in the HP books, which would be obvious if it was Kendra's, much less so a child of Azkaban, possibly with an unidentified father. I think the vial is a safety for Grindelwald. At the end of the film Albus hints that he might be able to destroy it. Just like a horcrux is a safety for the soul, the blood-pact is an object that provides safety that neither can touch the other. Might it even be the destruction of the blood vial that later helps Dumbledore figure out howto destroy horcruxes? I agree that the vial is protecting Grindelwald. We don't know the consequences of breaking a blood pact but I suspect it is bad enough to stop him acting directly against Grindelwald (would it make sense for it to result in a blood curse?). However I doubt it will be easy for Dumbledore to destroy the vial safely without it counting as breaking the pact. It is probably protecting Dumbledore from Grindelwald as well though perhaps not if he acts through another person of Dumbledore's blood. As to Credence being the borther. I guess it is really said in the movie, so I'll have to swallow that pill. The huge time-line problem aside. one thing does make sense: All the Dumbledore children's name's start with an 'A'. So in that respect he slots in – even if it is just a detail that fits. The only thing I can see that only half fits is that Percival would have fallen in love – or was charmed/forced/jinxed – by a female inmate at Azkaban. We still face hin having died by the time Kendra dies (I believe the Dumbledore children are described as orphaned when that event occurs), but it's a little easier to overcome than him and Kendra already being apart several years by that time. I don't know how wizarding law would handle Kendra having another child after Percival's imprisonment (or death) as to which surname the child would receive – otherwise that might be a possibility too, I guess. That's why I'm thinking blood magic might be a possibility - it solves the time line problem. But you're right -- if Grindelwald did create Credence, he should have known where he was -- unless he used the blood to create Credence but didn't stick around to see him born, etc. The shipwreck situation muddies those waters (pun intended). Although they also raise some other questions, like... who was WITH Credence on the boat when he was swapped with Corvis? Another possibility, if it's not a blood magic situation, is that Kendra was maybe expecting Aurelius before she died, which would make him a lot younger than the other Dumbledores (though the age is still problematic -- could a wizard be put in some kind of stasis?). We still don't know who put him on the boat and was accompanying him. I like the idea of Bathilda Bagshot being somehow involved -- I'd love to meet her in a future movie. Side note... do you guys think Corvis is officially drowned and dead? Or do you think there's a possibility he survived and will make a future appearance? I am not sure whether wizards are capable of creating or transfiguring a human being or not, but if Grindelwald had been able to do this, why would he not know Credence in the first FB story and even seemed to be wondering if Modesty, the little girl, were the Obscurial. On the other hand, he very much prizes the vial of mixed blood, and it hard to imagine that is strictly sentimentality that motivates him.Why does he need it? what does he intend to do with it? what are its powers? JKR has deliberately withheld such information. I agree. The body Pettigrew forms with Voldemort help, is only interim and it seems like it would not survive. Seeing Credence does not already exist as a soul it seems unlikely Grindelwald could have used a similar approach to Voldemort's resurrection. I think the vial is a safety for Grindelwald. At the end of the film Albus hints that he might be able to destroy it. Just like a horcrux is a safety for the soul, the blood-pact is an object that provides safety that neither can touch the other. Might it even be the destruction of the blood vial that later helps Dumbledore figure out howto destroy horcruxes? Yeah, that's my chief problem with my theory. But I'm thinking about whether he could have used the blood to create Credence using a surrogate (Ew, sorry) -- and then came back later, tracking him using the blood to witch hunter's home, but was unable to figure out which person in the home was the Dumbledore (kind of like the Trace knew where Harry lived, but not who cast a specific spell). Roonwit, your thought how a broken blood-pact could turn into a blood-curse intrigues me. It would be typical Rowling to introduce the two notions seemingly unrelated but close together to later make us go "doh, they're right next to each other!" But then if true, how on earth did Dumbledore get out of that one without turning that curse on him when getting rid of the vial. Or … is Dumbledore defeating, yet not killing Grindelwald the loophole? I.e. Dumbledore finds a way to weaken or interpret the pact in a way that allows him to imprison him for all intents and purposes unharmed (seeing Grindelwald lives quite a long life even though imprisoned). We have seen with the unbreakable vow that the used words in the vow are extremely important. Snape knew to use the loopholes. We don't know if words are spoken when the blood pact is made, but there might be other features to this bit of magic that could offer loopholes. Twiddlethosedials, let's say for a moment that Credence past is fishy or there are reasons to keep it well underwraps. A ship-wreck is a perfect way to indeed muddy the waters (great pun!). Even Leta swapping the babies could be influenced by someone staging the whole thing, whether through blatant means such as the imperius (followed by implanting false memories like Riddle did to his uncle) or by more subtle means. But then why would they lose track of the child unless someone else was trying to shield him after catching wind of what might have occurred (Dumbledore did that by placing Harry with his Muggle-family). I'd love to see Bagshot too. I think she would an interesting character. But if she were on the boat, it would be weird that she would survive whilst the (swapped) baby dies. Though you could be right: we don't know if the baby was rescued unknown to Leta. But then again we have the family tree declaring she killed him. Oh the circles we are running! "Of course it is all in your head, but why on Earth should that mean it isn't real?" ~Dumbledore (DH)
{ "pile_set_name": "Pile-CC" }
Home Theater Wiring Solution So, you’ve just wall mounted your new flat-screen TV, and everything looks perfect…. except for those cables trailing down the wall below it. Just because you didn’t run in-wall cables, that doesn’t mean you have to live with messy-looking exposed home theater wires. Meet the Wiring Solution, a unique home theater cable concealer that is designed specifically to hide cords that run between wall mounted HDTVs and the entertainment centers stationed below them. The home theater Wiring Solution is a conduit-like cord organizer that holds up to 10 cables, and only requires two small screws for installation. It’s also very low-profile; because it protrudes only 1 inch from the wall, it doesn’t attract much attention. Best of all, the Wiring Solution is built to blend in: it’s available in two finishes, smooth and textured, to match the surfaces of either flat or knockdown/stucco finished walls, and comes pre-primed so you can paint it the same color as your walls (a foam paintbrush is even included in the kit). Made from ultra light medium density fiber board, the Wiring Solution is available in 3 different lengths to span any TV-to-entertainment-center distance: 12, 20 or 30 inches. Comments One Comment on Home Theater Wiring Solution […] Wall Outlet Plates will be banished! Say hello, to touch screw-less plates, dimmers, Home Theater specialized wall plates with built in HDMI, A/V, VGA and Multimedia. If you are wondering if we have […] If you found this post useful, please HIT LIKE or Please leave a comment, I would love to hear your opinion on this blog post Name (required) Email Address (required) Website If you found this post useful, please HIT LIKE or Please Leave a Comment, we'd love to hear your opinion on this blog post
{ "pile_set_name": "Pile-CC" }
Comparison of spinal magnetic resonance imaging and myelography in cancer patients. Spinal involvement by systemic malignancy is common, and often leads to extradural compression of the spinal cord and/or nerve roots by metastases. Rapid, anatomically accurate diagnosis is essential to the successful management of these patients. We compared spinal magnetic resonance imaging (MRI) with conventional myelography in a series of 31 cancer patients being evaluated for myelopathy (N = 10), or back/radicular pain (N = 21). All patients were evaluated between April 1985 and July 1986, and underwent both studies within ten days of each other (median, two days). MRI was performed on a 0.5 Tesla Technicare unit with a body surface coil, and results compared with standard contrast myelography. All studies were reviewed separately and in a "blinded" fashion. MRI and myelography were comparable in detecting large lesions that produced complete subarachnoid block (five of ten patients with myelopathy, three of twenty-one patients with back/radicular pain). In 19 of 31 patients, smaller but clinically significant extradural lesions were found. In nine of 19 cases, these lesions were demonstrated equally well by both modalities; in nine of 19 cases, these lesions were demonstrated by myelography alone; in one of 19, a lesion was demonstrated by MRI alone. Given our current technology, myelography appeared superior to MRI as a single imaging modality. However, MRI may be an alternative in patients where total myelography is technically impossible or unusually hazardous.
{ "pile_set_name": "PubMed Abstracts" }
Id: Youdao.YoudaoDict Name: YoudaoDict AppMoniker: youdaodict Version: 8.9 Publisher: Youdao Author: Youdao License: YoudaoDict License Description: Youdao Dictionary has typical acoustic translation, smart screen word identification, real-time synchronization with network up-to-date vocabulary, and other word look-up features. Tags: "dictionary,dict,cloud,online" InstallerType: exe Installers: - Arch: x64 Url: https://download.ydstatic.cn/cidian/static/8.9/20200523/YoudaoDictSetup.exe Sha256: e182894fa94c73757ea78cb2a39403b52e4678fff5f605f23c49c766fe529b61 Switches: Silent: /S SilentWithProgress: /S
{ "pile_set_name": "Github" }
Q: If autocommit is false in postgres will transaction be automatically roll backed I am pretty new to model layer just need clarification that in our code if autocommit is false like Connection conn = DBUtil.getConnection(userDb); conn.setAutoCommit(false); And we get an exception which is not related to postgres like if (response.getValue() != null) { conn.commit(); } Where response object is arbitrary value,does the transaction be roll backed automatically in postgres. Thanks A: It depends. If a connection is closed, the transaction should be rolled back by the database. If you're using a connection pool, the transaction should be rolled back by the pool, when the connection is returned. However this can depend on the driver, as well as the connection pool, so you should explicitly do commits and rollbacks instead of relying on the driver or the pool.
{ "pile_set_name": "StackExchange" }
Q: How can I sell a lot of items? Yesterday, I was trying to knock off the ? Markers in Skellige. You may know, a lot of them are smuggler caches, so I loot a buttload of armors and swords. When I'm so full I can't carry more, I go and sell the stuff to an armorer or Smith closeby. Thing is, I'm now high level and I get expensive items, so last night, I had to run all over the world to find a Smith that had enough coin to take my 60th chestplate of the flaming rose. Is there somewhere I could go that will always have the money to buy off my armors and swords, or should I just say screw it and dismantle everything I find? PS Sorry for life story. A: From what I am finding, there is no place that has an infinite amount of coins. No one has mentioned in this Steam post that there is a merchant that has infinite coins (I know a Steam post isn't the best source, buts all I could really find). It looks like the best place to go is Oxenfurt and Novigrad because of the number of merchants there, but even they run out of money. It looks like after 5 days their coins restock. I found a Reddit that suggests a trick. I'll attempt to summarize what you have to do: Go to the bottle vendor in Novigrad. He is on the north shoreline. He sells his bottles for one Crown each. Buy all his bottles. Do this as much as you would like. His stock replenishes instantly after leaving the trade screen so you can continue to do this. Sell all your junk to the bottle merchant once he has enough money. Go to the loanshark near the fast travel sign near Novigrad's south gate. The loanshark has an instantly replenishing supply of Florens he sells for 3 Crowns each (which is apparently the same as a bank). Buy enough Florens to sell him your bottles to make your money back. Go to the bank in Novigrad Square and exchange the Florens for Crowns. Whether or not this has been patched or they altered the time line of when the stock of each merchant involved works I'm not sure, but it's worth a shot. I'm not sure if it's really worth the time and effort though.
{ "pile_set_name": "StackExchange" }
Walker was killed in the 300 block of West King Street and was found a few hours later, according to police. Kashawn Flowers(Photo: Submitted) Charging documents state that Flowers, a Southside gang member, killed Walker because he thought Walker was a member of the West End gang. There was bad blood between the two gangs, according to police. "Flowers admitted to shooting the victim in the head and said he was happy about it," Detective Anthony Fetrow wrote in charging documents. Buy Photo Investigators gather at the scene of a fatal shooting in the 300 block of West King St. Monday, August 18, 2014. Bill Kalina - bkalina@yorkdispatch.com(Photo: Bill Kalina, The York Dispatch) Flowers, who is currently incarcerated in a Luzerne County Prison, is charged with homicide and prohibited possession of a firearm. Homicide: Police went to the 300 block of West King Street just before 6 a.m. the day when Walker's body was found. Walker was shot in the back of his head and his lower leg, and there were three .45 caliber casings found near his body, charging documents state. His last movements were caught on surveillance footage as he walked east there just before 2:40 a.m. Walker was in the area visiting family, police have said. Prior to Walker's death there were a string of shootings in the area. Police said there were shootings in the city's west end on Aug. 15, 16, and 17 of that year and that all the .45 caliber casings found matched the ones found at the homicide scene, court documents state. Three days after the homicide, police responded to another shooting incident in the 200 block of Grantley Street. A Toyota Corolla crashed into a home, and the two men inside fled, according to authorities. Flowers' smartphone was found in the vehicle. On the phone, there was a photo taken on Aug. 13, 2014, of him with what appeared to be a .45 caliber handgun in his waistband, according to authorities. He also had a photo of the cemetery plot of Joseph "Plaga" Gomez Jr., a Southside associate, who was killed April 13, 2013, officials said. Flair Griggs, 16 at the time, shot 17-year-old Gomez in self-defense outside the McDonald's on South George Street in April 2013. He was sentenced to three to seven years in prison for illegal firearm possession and reckless endangerment. "This further added fuel to the back and forth beef between South Side and West Side," Fetrow wrote in court documents. "Flowers admitted that he was feeling emotional about Plaga's death and he was going to shoot the next person he saw in the west end," Fetrow wrote in charging documents. Flowers was described as a "known shooter," who was usually lurking and looking for "the opposition," officials said. Police said Flowers also liked to brag. Police said he admitted to this person that he thought Walker was associated with the city's west end, which he was not. Another associate told police that Flowers borrowed a gun from a gang member and he admitted to the killing when he returned the gun after the shooting, court documents state. In addition to the shooting, police said Flowers' criminal history does not allow him to have a firearm. Flowers remains in SCI Retreat, serving a three-year, one-month, to seven-year sentence for aggravated assault, according to state Department of Corrections spokeswoman Sue McNaughton. McNaughton said his earliest parole date is Feb. 28. Even if he were to get paroled, his homicide charge would keep him in prison because bail was denied for Flowers, according to online court records. His preliminary hearing is scheduled for Feb. 22 at District Judge Joel Toluba's office. — Reach Christopher Dornblaser at cdornblaser@yorkdispatch.com or on Twitter at @YDDornblaser
{ "pile_set_name": "Pile-CC" }
1996 Indy 200 at Walt Disney World The 1996 Indy 200 at Walt Disney World was the first round of the 1996 Indy Racing League, and the inaugural event for the Indy Racing League, who initiated the American open-wheel split that would last for 12 years. The race was held on January 27, 1996, at the Walt Disney World Speedway in Bay Lake, Florida. The race was won by a rookie driver, Buzz Calkins, after leading 130 laps. Future Indy Racing League and NASCAR champion Tony Stewart also made his Indy car debut, finishing second after a late-race duel with Calkins. Report Pre-Race The first event for the breakaway Indy Racing League would take place at Walt Disney World Speedway, a brand new venue inaugurated on November 28, 1995. Testing began immediately, with tire sessions by Firestone and Goodyear followed by an open test on December 4–8 with 11 drivers taking part. On December 6, a tentative entry list was published, with 18 car-driver combinations, including 1990 Indianapolis 500 winner Arie Luyendyk, Indianapolis track record holder Roberto Guerrero, 1995 Indianapolis 500 pole sitter Scott Brayton and two drivers that had driven full-time in the IndyCar World Series that year, Eddie Cheever and Eliseo Salazar. They were joined by a handful of rookie drivers headlined by former Formula 1 race winner Michele Alboreto and 1995 Formula Atlantic champion Richie Hearn. None of the top-16 drivers in the two previous IndyCar seasons would take part in this inaugural event. World of Outlaws multi-champion Steve Kinser had tested with Foyt, aiming for an IRL ride, but the deal fell through. Further testing followed from January 9–19, with 20 drivers taking part at some point. On January 13, Butch Brickell broke two vertebrae in a hard crash at Turn 1, and was ruled out of the event, although he remained entered. In the meantime, five new signings were made (John Paul Jr., Scott Sharp, Robbie Buhl, Lyn St. James and the fastest man during testing, Buddy Lazier), boosting the driver count to 21 when a new entry list, with Brickell out of action and Tony Turco's entry withdrawn because of sponsorship issues, was released. Paul Jr., however, was not able to test, as his car lacked an engine, with PDM Racing having to retort to a Buick-powered Team Menard back-up car to race at Orlando. On the last day of testing, Team Menard tried Tony Stewart, the first driver to have conquered the USAC Triple Crown, and promptly signed him for the season. Out of the track, the animosity between the IRL and the IndyCar World Series (CART) had been fueled by the 25/8 Rule, perceived by CART teams as an measure to lock them out of the Indianapolis 500. Tensions escalated on December 19, when CART announced the creation of the U. S. 500, an event at Michigan International Speedway that would be held on Memorial Day, in direct opposition to the Indianapolis 500, and on January 11, when A. J. Foyt filed a $5 million suit against CART for anti-competitive practices. On 4 January, Oldsmobile was announced as the first engine supplier of the 4.0 V8 engine formula that the IRL was set to use from 1997. Five days later, Andy Evans bought the remaining share of Dick Simon in Scandia/Simon Racing, which would still compete under that name at Walt Disney World. That left A. J. Foyt as the only full-time owner from the 1995 season to compete at Orlando. Practice and qualifying On Wednesday, January 24, Tempero/Giuffre Racing entered David Kudrave in a second car, before rookie orientation began. Also, A. J. Foyt Enterprises entered Mike Groff in a third car on Thursday before the start of practice. Richie Hearn led the first day of practice with a 181.827 mph lap, with Buddy Lazier in close pursuit. They would be the only drivers to dip into the 180 mph mark during the weekend, with Roberto Guerrero in third at just 179.292 mph. Bill Tempero, whose best lap was a 152.207 mph, and Rick DeLorto, clearly off the pace at just 107.223 mph in the best of his 30 laps, failed to complete their driver's tests and were not cleared to drive, as well as Jim Buick, who did not took to the track despite being present. On Friday morning practice, Eliseo Salazar clipped the wall at the exit of Turn 3 and lost control of the car, crashing into the front-straight inside wall and right side into the outside wall on Turn 1. In the last impact, a stabilizing rod went through his cockpit, penetrating his right leg. Salazar was transported by helicopter to Orlando Regional Medical Center, where he underwent surgeries for a fractured femur and thigh injuries, being listed afterwards in stable condition. Buddy Lazier led the session with a lap at 181.800 mph, followed by Richie Hearn and Arie Luyendyk. Lazier, who had not started higher than 16th in his previous 55 Indy car races, qualified on pole with a best lap of 181.388 mph. Hearn fell just short of the 181 mph mark, settling for second on his first Indy car qualifying session. Seasoned veterans Guerrero and Luyendyk, who used a back-up car that would be later renumbered, qualified third and fourth, in front of Scott Sharp and five further rookies. As expected by the nuances of their stock block engine, Team Menard struggled in qualifying, but, with just 67 laps of winter testing, Tony Stewart surprised by outqualifying his more established teammates, Eddie Cheever and Scott Brayton. John Paul Jr., whose only winter running had been a few laps in Brickell's car in early December, had the only incident of the session after brushing the wall in Turn 2, completing only one timed lap at 160 mph. Unlike Stewart and Groff, who ran on competitive race cars, other drivers at the bottom of the field suffered from the lack of mileage: Johnny O'Connell, who passed his driver test in the morning after just 64 laps in the last day of testing, got stuck at 167 mph; Johnny Parsons, without any laps at speed during winter testing, barely went over 153 mph, and David Kudrave, with no previous mileage whatsoever, qualified even slower at just 146.353 mph, a 35 mph, 4.5 second deficit over Lazier's time. On raceday, he would be black flagged after just four laps. On Friday afternoon practice, held after qualifying, Eddie Cheever and Richie Hearn collided and crashed at Turn 1 when Cheever went low on Hearn's path. Both drivers were unhurt, but their chassis were damaged beyond repair, and had to use spare cars. They were allowed to start the race at the back of the field, after taking part in a 15-minute special warm-up session. Because of their lack of a competitive spare car, Della Penna had to reach a deal with Pagan Racing to use Roberto Guerrero's back-up unit. The Colombian was now due to start on the front row because of Hearn's demotion, which left Buzz Calkins as the best placed rookie in the 5th spot. Like Lazier, Scott Sharp had a much improved career-best grid spot in the 2nd row, having never started higher than 13th, Changed to a backup car for the race, following a crash in a practice session after qualifying. Failed to qualify or withdrew Eliseo Salazar - for Scandia/Simon Racing Rick DeLorto R - for DeLorto Motorsports Bill Tempero - for Tempero/Giuffre Racing Race Packed grandstands, estimated at 50,742 espectators, witnessed the grand opening of the Indy Racing League on Saturday. The start lacked a proper alignment of the rows, as only the first two rows and a couple of others in the back were loosely side by side before Lazier started to accelerate entering Turn 4, and almost all the field saw the green flag in single file. Roberto Guerrero was caught off-guard by Lazier's getaway, and Arie Luyendyk passed him for second place entering Turn 1. On Lap 10, Tony Stewart completed his first overtake on Davey Hamilton for sixth, and had worked his way up to third when the caution came out on Lap 18. Richie Hearn had already gained 12 positions and was running in 7th place when a sway bar adjuster broke on his car, causing him to spin at the exit of Turn 1. Stewart overtook Luyendyk at the restart on Lap 24 and grabbed the lead five laps later. Lazier began to lose pace with a loose right front upright, and just after being passed by Luyendyk for second place on Lap 37, he headed to the pits, where Hemelgarn's crew spent a minute and a half sorting out the problem. In a later pit stop, his team choose to take parts from Stéphan Grégoire's car, already retired after suffering gearbox issues in his pit stop while running ninth, and put them in Lazier's car. However, handling issues persisted, and Lazier dropped out before the halfway point. Around Lap 30, Buzz Calkins started mounting a charge towards the front, overtaking Scott Sharp on Lap 32, Roberto Guerrero on Lap 35 and Arie Luyendyk on Lap 51. Heavy traffic after the pit stops helped him catch Tony Stewart on Lap 55, and Calkins took the lead on Lap 66, just before the second round of pit stops. While heading to the pits, Luyendyk ran out of fuel, and his car stalled while exiting the pit box, needing a push start. Traffic, solid pace and a fast pit stop by Calkins, executed two laps after Stewart's, allowed him to open a huge gap: on Lap 84, only Stewart (15.3 seconds behind) and Guerrero (17.2 seconds) were still on the lead lap, and by the halfway mark, a cautious Stewart was 21 seconds behind Calkins, before the Menard driver reacted in order to not lose a lap, staying within 15 seconds of the leader. Behind him, Luyendyk began to regain ground, steadily climbing up to 7th place on Lap 127. However, his gearbox was under strain after the pit issues, and the Byrd/Leberle-Treadway driver lost all gears during his third stop, forcing him to retire. Rookie Stan Wattles was running on fourth place, after overtaking Davey Hamilton on Lap 35 and having stayed out of trouble. On Lap 147, shortly after a pit stop, he spun on Turn 2 and hit the inside wall, in what he described as "a rookie mistake". The ensuing caution allowed Stewart to cut back the gap on Calkins, and Robbie Buhl, who had not made his third stop, gained five places pitting under caution, rejoining in third place over Michele Alboreto, Roberto Guerrero, who suffered a brief stall in his pit stop, and Hamilton. Further back, Eddie Cheever had gotten up to ninth place, his progress having been hampered by the same handling issues that had forced his teammate Scott Brayton to retire from the race. With lapped cars in between, Calkins opened again a small gap of 3 seconds over Stewart. On Lap 178, Davey Hamilton crashed out of sixth place after a sudden mechanical failure on Turn 2. The race restarted on Lap 184, and Cheever, who had passed Johnny O'Connell 20 laps before, took seventh place over Scott Sharp. The Foyt driver was trying to get it back when both drivers collided on Lap 189, in a crash that resembled the one Cheever and Hearn had the day before, with Cheever on the outside of Turn 1 this time. Calkins made it safely through the scene of the crash, but Stewart encountered the safety vehicles and debris on his path, and had to swerve to avoid hitting them, brushing the outside wall at low speed in the process. Stewart was able to continue and, when the race was restarted with six laps to go, he began hounding Calkins for the lead. Eventually, Stewart ended losing some ground and, despite a late charge, Buzz Calkins took the checkered flag by eight tenths of a second. Calkins had won in his first Indy car start, becoming the first American driver to do so, in a feat only equalled by Formula 1 world champions Graham Hill at the 1966 Indianapolis 500 and Nigel Mansell at the 1993 Australian FAI IndyCar Grand Prix. The circumstances of the Split and the perceived lower standard of the IRL field, however, lessened his achievement. Also, this would end up being Calkins' single win in Indy car racing. Tony Stewart settled for second in what was his first start in an open-wheel, single seater race car, and Robbie Buhl also scored his first Indy car podium, improving on the sixth place he got at the 1993 Toyota Grand Prix of Long Beach. Mike Groff equalled his sixth place in the 1994 Valvoline 200 at Phoenix, while Lyn St. James scored what would be her only top-10 finish in Indy car racing, with an 8th-place finish. Race Statistics Lead changes: 6 among 6 drivers Standings after the race Drivers' Championship standings Note: Only the top five positions are included for the standings. References External links IndyCar official website www.indy200.com at Internet Archive Wayback Machine Indy 200 At Walt Disney World Indy 200 at Walt Disney World Walt Disney World Category:Events at Walt Disney World
{ "pile_set_name": "Wikipedia (en)" }
Granulocyte-mediated airway edema in guinea pigs. To determine the role of polymorphonuclear leukocytes (PMNs) in the airway edema that accompanies airway inflammation, we studied the effects of a 1-h exposure to 2 ppm toluene diisocyanate (TDI) on tracheal extravasation of Evans blue dye and on the concentration of PMNs in the tracheal wall. Tracheal Evans blue content was significantly increased by TDI exposure (53.6 +/- 8.0 micrograms/g tracheal tissue (mean +/- SE) for animals exposed to TDI and 16.3 +/- 2.0 for animals exposed to air, P less than 0.0025) as were both the intravascular and extravascular concentration of PMNs in tracheal sections (intravascular PMNs were 28.0 +/- 8.4 X 10(3) cells/mm3 for TDI and 1.5 +/- 1.5 X 10(3) for air, P less than 0.025, extravascular PMNs were 10.9 +/- 4.5 X 10(3) for TDI and 0 for air, P less than 0.05). PMN depletion with vinblastine or with hydroxyurea abolished both the increase in tracheal Evans blue extravasation and the increase in the concentration of intravascular and extravascular PMNs in animals exposed to TDI. PMN depletion with hydroxyurea did not significantly inhibit the increase in tracheal Evans blue extravasation caused by intravenous histamine. Administration of donor PMNs to animals depleted of PMNs with hydroxyurea reconstituted the TDI-induced increase in tracheal Evans blue extravasation (80.4 +/- 17.3 micrograms/g tissue (mean +/- SE) in animals exposed to TDI vs. 21.3 +/- 2.9 in animals exposed to air, P less than 0.025) and in the intravascular concentration of PMNs in tracheal sections [18.5 +/- 3.4 X 10(3) cells/mm3 (mean +/- SE) in animals exposed to TDI vs. 1.3 +/- 1.3 X 10(3) in animals exposed to air, P less than 0.0025].(ABSTRACT TRUNCATED AT 250 WORDS)
{ "pile_set_name": "PubMed Abstracts" }
This invention relates generally to the art of slide fastener manufacture, and more specifically to a device for holding a slider for the assemblage therethrough of a pair of slide fastener stringers. The device, herein termed a slider holder, is designed in particular to hold sliders for the assemblage therethrough of slide fastener stringers which have been attached to desired parts of garments or other articles. Slider holders heretofore developed and used in the industry for the above mentioned purpose usually include a locking lever which is adapted to releasably engage the pull tab of each slider to lock the same in a prescribed assembly position on the device. The locking lever yieldingly pivots between its slider locking and unlocking positions as each slider is manipulated onto and away from the assembly position. According to this prior art construction the slider is often locked rather insecurely. Thus, as a pair of stringers already attached to an article are threaded through the channeled body of the slider locked on the prior art slider holder, the slider tends to shake or, worse yet, to be detached altogether from the holder due to the weight of the article.
{ "pile_set_name": "USPTO Backgrounds" }
Nasopalatine duct cyst (NPDc): one case report. NPDc arises from embryological tissue. It is classified among the epithelial non-odontogenic cysts according to the 1992 WHO histological typing of odontogenic tumors. The purpose of our report was to provide details about the pathophysiology, diagnosis and treatment of NPDc. A 25 year-old male was referred by his practitioner regarding to an intermittent palatal swelling for 6 months. Diagnosis of NPDc was suggested on the basis of computed tomography (CT-scan). Excision was performed under general anaesthesia. There was no post-operative complication. Histological features confirmed an inflamed NPDc. Follow up was 22 months, without relapse. NPDc occurs in approximately 1% of the population and forms approximately 12% of all jaw cyst tumors. NPDc may occur at any age, but main cases are seen between 40 and 60 years old. It has a slight male predilection. Black and white people are equally involved. NPDc is normally asymptomatic, unless it is infected. The most common symptom is swelling, usually in the anterior part of palate's midline. Diagnosis is based on radiographic and histological results. Treatment of choice is enucleation.
{ "pile_set_name": "PubMed Abstracts" }
08 to the nearest integer? 75 What is 10520 to the power of 1/3, to the nearest integer? 22 What is 1770685 to the power of 1/3, to the nearest integer? 121 What is 276515 to the power of 1/10, to the nearest integer? 4 What is the cube root of 41857 to the nearest integer? 35 What is 483359 to the power of 1/2, to the nearest integer? 695 What is the sixth root of 195696 to the nearest integer? 8 What is the third root of 4701612 to the nearest integer? 168 What is the square root of 9948601 to the nearest integer? 3154 What is 1312810 to the power of 1/3, to the nearest integer? 109 What is 1437816 to the power of 1/9, to the nearest integer? 5 What is 978612 to the power of 1/2, to the nearest integer? 989 What is the third root of 669452 to the nearest integer? 87 What is the fourth root of 239898 to the nearest integer? 22 What is the cube root of 87512 to the nearest integer? 44 What is the cube root of 39699 to the nearest integer? 34 What is the cube root of 2440080 to the nearest integer? 135 What is the cube root of 188780 to the nearest integer? 57 What is the cube root of 2027665 to the nearest integer? 127 What is the cube root of 2417056 to the nearest integer? 134 What is the seventh root of 1840605 to the nearest integer? 8 What is the seventh root of 240322 to the nearest integer? 6 What is the third root of 9420312 to the nearest integer? 211 What is 592176 to the power of 1/2, to the nearest integer? 770 What is 6284140 to the power of 1/9, to the nearest integer? 6 What is the cube root of 2915292 to the nearest integer? 143 What is 3287740 to the power of 1/2, to the nearest integer? 1813 What is the ninth root of 123629 to the nearest integer? 4 What is the cube root of 4503302 to the nearest integer? 165 What is 2496078 to the power of 1/2, to the nearest integer? 1580 What is 28585 to the power of 1/10, to the nearest integer? 3 What is the square root of 2414517 to the nearest integer? 1554 What is the fourth root of 4679925 to the nearest integer? 47 What is 3032211 to the power of 1/10, to the nearest integer? 4 What is 353930 to the power of 1/2, to the nearest integer? 595 What is the square root of 390963 to the nearest integer? 625 What is the fourth root of 7056003 to the nearest integer? 52 What is the third root of 2837265 to the nearest integer? 142 What is 268239 to the power of 1/3, to the nearest integer? 64 What is 5067847 to the power of 1/2, to the nearest integer? 2251 What is the tenth root of 342476 to the nearest integer? 4 What is 1754073 to the power of 1/5, to the nearest integer? 18 What is the cube root of 547917 to the nearest integer? 82 What is 6332212 to the power of 1/2, to the nearest integer? 2516 What is 144053 to the power of 1/5, to the nearest integer? 11 What is the square root of 17278185 to the nearest integer? 4157 What is the cube root of 366697 to the nearest integer? 72 What is the sixth root of 433471 to the nearest integer? 9 What is the sixth root of 408777 to the nearest integer? 9 What is 733639 to the power of 1/2, to the nearest integer? 857 What is the square root of 43326890 to the nearest integer? 6582 What is 178197 to the power of 1/2, to the nearest integer? 422 What is the fifth root of 10599816 to the nearest integer? 25 What is 1788735 to the power of 1/8, to the nearest integer? 6 What is the tenth root of 203790 to the nearest integer? 3 What is the square root of 109489 to the nearest integer? 331 What is 102043 to the power of 1/7, to the nearest integer? 5 What is 7540518 to the power of 1/2, to the nearest integer? 2746 What is the cube root of 2386136 to the nearest integer? 134 What is 333277 to the power of 1/8, to the nearest integer? 5 What is 497364 to the power of 1/4, to the nearest integer? 27 What is 3390822 to the power of 1/9, to the nearest integer? 5 What is 3791338 to the power of 1/2, to the nearest integer? 1947 What is 672094 to the power of 1/9, to the nearest integer? 4 What is the cube root of 127089 to the nearest integer? 50 What is 3875580 to the power of 1/3, to the nearest integer? 157 What is 916562 to the power of 1/9, to the nearest integer? 5 What is the cube root of 1863731 to the nearest integer? 123 What is 174868 to the power of 1/2, to the nearest integer? 418 What is the square root of 462846 to the nearest integer? 680 What is the cube root of 3323143 to the nearest integer? 149 What is the square root of 18780 to the nearest integer? 137 What is the cube root of 3963140 to the nearest integer? 158 What is 11801882 to the power of 1/2, to the nearest integer? 3435 What is 46150 to the power of 1/2, to the nearest integer? 215 What is 11711273 to the power of 1/10, to the nearest integer? 5 What is 25567429 to the power of 1/3, to the nearest integer? 295 What is the square root of 121268 to the nearest integer? 348 What is the eighth root of 479020 to the nearest integer? 5 What is 260722 to the power of 1/3, to the nearest integer? 64 What is the cube root of 32503183 to the nearest integer? 319 What is 2065508 to the power of 1/5, to the nearest integer? 18 What is the cube root of 11429951 to the nearest integer? 225 What is the cube root of 1731197 to the nearest integer? 120 What is 44818 to the power of 1/2, to the nearest integer? 212 What is 6810445 to the power of 1/2, to the nearest integer? 2610 What is 269059 to the power of 1/3, to the nearest integer? 65 What is the square root of 1786237 to the nearest integer? 1337 What is 15886 to the power of 1/3, to the nearest integer? 25 What is 1204920 to the power of 1/6, to the nearest integer? 10 What is the eighth root of 236672 to the nearest integer? 5 What is the eighth root of 7305676 to the nearest integer? 7 What is 259159 to the power of 1/2, to the nearest integer? 509 What is the square root of 996144 to the nearest integer? 998 What is 716743 to the power of 1/8, to the nearest integer? 5 What is the third root of 22875783 to the nearest integer? 284 What is 2270339 to the power of 1/2, to the nearest integer? 1507 What is the third root of 92197 to the nearest integer? 45 What is 288577 to the power of 1/2, to the nearest integer? 537 What is the third root of 168169 to the nearest integer? 55 What is the cube root of 1700360 to the nearest integer? 119 What is 719999 to the power of 1/2, to the nearest integer? 849 What is 3296626 to the power of 1/8, to the nearest integer? 7 What is the fifth root of 23371173 to the nearest integer? 30 What is the square root of 16108706 to the nearest integer? 4014 What is the third root of 16979 to the nearest integer? 26 What is 5792633 to the power of 1/10, to the nearest integer? 5 What is 1053142 to the power of 1/2, to the nearest integer? 1026 What is 77590 to the power of 1/7, to the nearest integer? 5 What is the square root of 2826140 to the nearest integer? 1681 What is 22356748 to the power of 1/3, to the nearest integer? 282 What is the third root of 13340420 to the nearest integer? 237 What is 635597 to the power of 1/3, to the nearest integer? 86 What is the cube root of 23158274 to the nearest integer? 285 What is 142854 to the power of 1/2, to the nearest integer? 378 What is the cube root of 160496 to the nearest integer? 54 What is the square root of 247916 to the nearest integer? 498 What is the third root of 1079202 to the nearest integer? 103 What is 1991840 to the power of 1/4, to the nearest integer? 38 What is the third root of 5335113 to the nearest integer? 175 What is 5601030 to the power of 1/3, to the nearest integer? 178 What is the fifth root of 164842 to the nearest integer? 11 What is the third root of 271205 to the nearest integer? 65 What is the seventh root of 401730 to the nearest integer? 6 What is the cube root of 7087037 to the nearest integer? 192 What is 68597 to the power of 1/2, to the nearest integer? 262 What is the square root of 13231525 to the nearest integer? 3638 What is the cube root of 215918 to the nearest integer? 60 What is the fourth root of 6251838 to the nearest integer? 50 What is 6324923 to the power of 1/3, to the nearest integer? 185 What is the cube root of 411075 to the nearest integer? 74 What is the ninth root of 206140 to the nearest integ
{ "pile_set_name": "DM Mathematics" }
1. Field of the Invention The invention relates to well drilling and completion, and to an apparatus and methods for use with expandable tubulars. Generally, the invention relates to a liner hanger and a method of hanging a liner. 2. Background of the Related Art In the oil and gas exploration and production industry, bore holes are drilled in the earth to access hydrocarbon-bearing formations. The drilled bores are lined with steel tubing, known as casing or liner, which is cemented in the bore. After a certain depth is reached, drilling is halted and a well casing is lowered down the wellbore and cemented in place. Typically, drilling resumes in the wellbore until a next predetermined depth is reached. At this stage, drilling is halted and a liner is lowered down the well casing. The liner is suspended from the well casing or from a previous string of liner by a liner hanger which utilizes slips and cones and acts between the liner and the well casing. The purpose of casing and liner is to provide support to the wellbore and facilitate isolation of certain parts of the wellbore. The liner can be set mechanically or hydraulically. A typical apparatus for setting a liner in a well casing includes a liner hanger and a running tool. The running tool is provided with a valve seat obstruction which will allow fluid pressure to be developed to actuate the slips in order to set the liner hanger in the well casing. Once the liner hanger has been set, the running tool is rotated anti-clockwise to unscrew the running tool from the liner hanger and the running tool is then removed. A recent trend in well completion has included expandable tubular technology. Both slotted and solid tubulars can be expanded in situ to enlarge a fluid path through the tubular and also to fix a smaller tubular within the inner diameter of a larger tubular therearound. Tubulars are expanded by the use of a cone-shaped mandrel or by an expansion tool with expandable, fluid actuated members disposed on a body and run into the wellbore on a tubular string. During expansion of a tubular, the tubular walls are expanded past their elastic limit. Examples of expandable tubulars include slotted screen, joints, packers, and liners. FIG. 1 is an exploded view of an exemplary expansion tool 100. The expansion tool 100 has a body 102 which is hollow and generally tubular with connectors 104 and 106 for connection to other components (not shown) of a downhole assembly. The connectors 104 and 106 are of a reduced diameter compared to the outside diameter of the longitudinally central body part of the tool 100. The central body part has three recesses 114 to hold a respective roller 116. Each of the recesses 114 has parallel sides and extends radially from a radially perforated tubular core (not shown) of the tool 100. Each of the mutually identical rollers 116 is somewhat cylindrical and barreled. Each of the rollers 116 is mounted by means of an axle 118 at each end of the respective roller and the axles are mounted in slidable pistons 120. The rollers are arranged for rotation about a respective rotational axis which is parallel to the longitudinal axis of the tool 100 and radially offset therefrom at 120-degree mutual circumferential separations around the central body. The axles 118 are formed as integral end members of the rollers and the pistons 120 are radially slidable, one piston 120 being slidably sealed within each radially extended recess 114. The inner end of each piston 120 is exposed to the pressure of fluid within the hollow core of the tool 100 by way of the radial. perforations in the tubular core. In this manner, pressurized fluid provided from the surface of the well, via a tubular, can actuate the pistons 120 and cause them to extend outward and to contact the inner wall of a tubular to be expanded. Additionally, at an upper and a lower end of the expansion tool 100 are a plurality of non-compliant rollers 103 constructed and arranged to initially contact and expand a tubular prior to contact between the tubular and fluid actuated rollers 116. Unlike the compliant, fluid actuated rollers 116, the non-compliant rollers 103 are supported only with bearings and they do not change their radial position with respect to the body portion of the tool 100. One use for expandable tubulars is to hang one tubular within another. For example, the upper portion of a liner can be expanded into contact with the inner wall of a casing in a wellbore. In this manner, the bulky and space-demanding slip assemblies and associated running tools can be eliminated. One problem with expandable tubular technology used with liners relates to cementing. Cementing is performed by circulating the uncured cement down the wellbore and back up an annulus between the exterior of the liner and the borehole therearound. In order for the cement to be circulated, a fluid path is necessary between the annulus and the wellbore. Hanging a liner in a wellbore by circumferentially expanding its walls into casing seals the juncture and prevents circulation of fluids. In order to avoid this problem, liners must be either temporarily hung in a wellbore or, more preferably, partially expanded prior to cementing whereby the liner is suspended in the casing but a fluid path remains back to the surface of the well. The problem is usually addressed by partially expanding the liner in order to hang it in the wellbore and then finishing the expansion after the cementing is done but prior to the curing of the cement. However, the tools for expanding tubulars are typically designed to expand the tubular in a circumferential fashion and cannot be effectively used to only partially expand the tubular. Therefore, there is a need for a liner hanger apparatus and method that permits a liner to be hung in a well and also permits a fluid path around the liner, at least temporarily. There is a further need for a liner hanger that can be partially expanded into a casing but leaves a fluid path therearound. Additionally, there is a need for improved expandable liner hangers with a means for circulating fluids therearound. Therefore, there is a need for a liner hanger appartus and method that permits a liner to be hung in a well and also permits a fluid path around the liner, at least temporarily. There is a further need for a liner hanger that can be partially expanded into a casing but leaves a fluid path therearound. Additionally, there is a need for improved expandable liner hangers with a means for circulating fluids therearound.
{ "pile_set_name": "USPTO Backgrounds" }
Late Night Listener Xbox One Console and Controller Bundle Skin For gaming winning coverage you can count on, choose the Late Night Listener Xbox One Console and Controller Bundle Skin. The Liquid Blue Late Night Listener Controller Skin is a premium decal printed in stunning, vibrant color and carefully crafted to fit your Xbox One Console and Controller Bundle perfectly. Our Microsoft Xbox One Console and Controller Bundle Skins offer easy on, easy off personalization that won't interfere with any of the buttons on your controllers. Step up your game today with the Late Night Listener Xbox One Console and Controller Bundle Skin!
{ "pile_set_name": "Pile-CC" }
Clinical characteristics and outcomes of critically ill cancer patients with septic shock. To evaluate the clinical characteristics and outcomes of critically ill cancer patients with septic shock. Prospective, observational cohort study. Medical-surgical intensive care unit (ICU) at the Instituto Nacional de Cancerología located in Mexico City from January 2008 to February 2010. There were no interventions. Eighty-two consecutive cancer patients with septic shock aged over 18 years were prospectively included and evaluated. During the study period, 620 critically ill cancer patients were admitted to ICU. Ninety-four patients were evaluated for septic shock at the request of ward onco-hematologists or surgeon oncologist responsible for the patient. After being evaluated by the intensivists, 82 patients were admitted to the ICU. Of the 82 patients, 56 (68.3%) had solid tumours and 26 (31.7%) had hematological malignancy. The most frequent sites of infection were: abdominal (57.3%) and respiratory (35.8%). Cultures were positive in 41 (50%) patients. The 63.4% of the patients had three or more organ dysfunctions on the day of their admission to the ICU. Cox multivariate analysis identified the Sequential Organ Failure Assessment (SOFA) score [hazard ratio (HR): 1.11; 95% confidence interval (95% CI): 1.02-1.19, P=0.008) and performance status (PS)≥2 (HR: 1.84; 95% CI: 1.03-3.29, P=0.040) as independent predictors of death to 3 months. The ICU mortality rate was 41.5% (95% CI: 31-52%). The variables associated with increased mortality were the degree of organ dysfunction determined by SOFA score at ICU admission and PS≥2.
{ "pile_set_name": "PubMed Abstracts" }
The Revington (Mens Pairs)\, Jackson (Womens Pairs)\, Gerald ine (Mens Teams) and McMenamin (Womens Teams) are for Intermediate A and M aster Grades only. The Pairs are on Saturday and the Teams on Sunday. Th e Venue has to be confirmed. Entries to CBAI on 01-4929666\, info@cbai.ie or http ://competitions.cbai.ie/
{ "pile_set_name": "Pile-CC" }
divided by 23. 21 Let q = 46 - -44. What is the remainder when q is divided by 14? 6 Let i be 1 + (1 + 3 - 33). What is the remainder when 17 is divided by (21/i)/(6/(-40))? 2 Let z(m) = -23*m + 3. Let v be z(3). Let u be v/(-14) + 16/56. Suppose u*o = 256 + 129. What is the remainder when o is divided by 20? 17 Let i(d) = 81*d**2 + d + 8. Calculate the remainder when i(4) is divided by 77. 76 Suppose 22*u + y + 106 = 27*u, u - 20 = -y. Calculate the remainder when 608 is divided by u. 20 What is the remainder when 34 is divided by (-134)/(-8) + 3 - 9/(-36)? 14 Suppose w = -f - 18, -2*f + 6*w - w = 15. What is the remainder when 6/(1*f/(-80)) is divided by 5? 2 Suppose 11*t - 8*t = 162. What is the remainder when t is divided by 20? 14 Let t(k) = 3*k + 57. Calculate the remainder when t(17) is divided by (-3)/((-3)/2) + 35. 34 Let n = -132 - -155. Suppose 0 = -2*f + p + 5, 5*f = -p + 2 + 14. Suppose n = y - f*h, y + 7*h - 5 = 4*h. Calculate the remainder when 25 is divided by y. 11 Let o(g) = -g**3 + 3*g**2 - 2. Let f be o(2). Suppose 39 = f*q + q. Suppose 0 = -0*p + p - 36. Calculate the remainder when p is divided by q. 10 Suppose 5 + 11 = v. Let h = -1003 + 1047. Calculate the remainder when h is divided by v. 12 Let s = -482 - -499. Calculate the remainder when 371 is divided by s. 14 Let b = 309 + -150. What is the remainder when b is divided by 18? 15 Suppose -2*w - 12 = w. Let l(p) = -3*p - 8. Let x be l(w). What is the remainder when 23 is divided by -1*x*(-1 + 0)? 3 Suppose 3*i - 21 = 3*p - 411, -2*p - 5*i = -288. What is the remainder when p is divided by 82? 52 Let s(w) = 20*w**2 + 1. Calculate the remainder when s(1) is divided by 5. 1 Calculate the remainder when 295 is divided by 2 + -2 + -6 + 18 + 0. 7 Let n(b) = -b**3 + 2*b**2 - b. Let z be n(1). Let c(s) = s**3 + s**2 - 2*s + 37. Let p be c(z). Let k = -20 + p. What is the remainder when 50 is divided by k? 16 Suppose 3*v = 6*v - 27. Let k = 7 + v. What is the remainder when ((-2)/(-4))/((-8)/(-976)) is divided by k? 13 Suppose 9*p = 8*p + 2. Let s be (14/(-4))/((-3)/(-12)). What is the remainder when 21 is divided by (p - s)/(14/7)? 5 Let q = 1986 + -1901. What is the remainder when q is divided by 28? 1 Let t(i) = 3*i - 33*i**2 - 3*i + 1 + 87*i**2. Let x be t(2). Suppose -5*o - 5*c + 181 = -84, 4*o - c = x. Calculate the remainder when o is divided by 14. 12 Let x = -10 - 12. What is the remainder when (-302)/(-15) - x/(-165) is divided by (7/3)/(6/18)? 6 Suppose 2*f + 28 = -2*s + 90, -5*f + 101 = 3*s. Let p(l) = -l - 3. Let c be p(-6). Calculate the remainder when (-472)/(-36) - c/s is divided by 4. 1 Let h = 72 - 2. Calculate the remainder when h is divided by 175/(-70)*((-144)/10 + 0). 34 Suppose -5*f + 13*f - 144 = 0. What is the remainder when f is divided by (4/(-6) + 0)*(-105)/14? 3 Let j be 121 - (-1 - (1 - 1)). What is the remainder when 79 is divided by (-9)/(-12) - j/(-8)? 15 Let j = 104 + -74. What is the remainder when 87 is divided by j? 27 Let c be (((-1647)/6)/(-9))/((-3)/(-6)). Let f = -1 + c. Calculate the remainder when f is divided by 21. 18 Suppose 0 = -43*z + 32*z + 14124. What is the remainder when z is divided by 19? 11 Let s = 12 + 47. Suppose -3*j - 8 = 3*v - s, 5*j = 3*v + 101. What is the remainder when 113 is divided by j? 18 Let v = 1377 + -981. Calculate the remainder when v is divided by 40. 36 Let f = 239 + -228. Calculate the remainder when 48 is divided by f. 4 Suppose 0 = -2*x + 5*d - 2*d + 3, 5*x = d + 14. Suppose -f = 2*q - 24, 3*f - 52 = q + x*q. Let h = 3 - -36. What is the remainder when h is divided by f? 19 Suppose i = -5*i + 30. Calculate the remainder when 383/7 + 4/14 is divided by 96/i - 2/10. 17 Let m = 53 - 33. What is the remainder when 478/8 + 1/4 + -2 is divided by m? 18 Suppose 4*p = 12, 4*n = n + 2*p + 141. What is the remainder when 2/(-6)*(-3 - (6 + 570)) is divided by n? 46 Let x be 1 - ((2 - 6) + -11). Suppose -2*h + x = 2*c, 10 = 2*c + h - 5*h. Calculate the remainder when 20 is divided by c. 6 Calculate the remainder when 138 is divided by -31*(16/(-4))/4. 14 Let s(k) = 6*k + 1. Let f be (-20)/(-6)*42/35. What is the remainder when s(2) is divided by -1 - (-5)/(f + -3)? 1 Let w(z) = -z**3 - 10*z**2 - 17*z + 22. What is the remainder when 117 is divided by w(-8)? 27 Let w = 33 - 1. Let r = -409 - -426. Calculate the remainder when w is divided by r. 15 Suppose -133 - 42 = -25*g. Calculate the remainder when 13 is divided by g. 6 Let l(o) = o**2 + 4*o - 112. What is the remainder when 43 is divided by l(9)? 3 Suppose -3*u - 2*c + 245 - 6 = 0, 0 = -5*c - 25. Suppose 3*o - u = -26. What is the remainder when o + 3/(6/(-8)) is divided by 9? 6 Let p(r) be the third derivative of r**4/24 - r**3 + 9*r**2. What is the remainder when 57 is divided by p(22)? 9 Let i be (36 + 0)*5/20. Calculate the remainder when 57 is divided by (-1 - i/(-6))*58. 28 Let q be (-6)/(-4)*(-80)/30. Calculate the remainder when 27 - ((-4)/q - 4) is divided by 8. 6 Let s(h) = 7*h - 137. Calculate the remainder when 76 is divided by s(24). 14 Suppose 76*v - 2009 = 35*v. What is the remainder when v is divided by ((-78)/4)/(6/(-8))? 23 Let n(c) be the first derivative of -c**4/4 + 16*c**3/3 - 13*c**2/2 + 17*c - 6. Calculate the remainder when n(15) is divided by 17. 13 Suppose 4*w + w = -c + 75, 4*w - 4*c - 84 = 0. Let j = w - 16. Let u = 19 - j. What is the remainder when 35 is divided by u? 16 Let w(y) be the first derivative of y**3/3 - y**2/2 - y - 225. Suppose -n - 15 = 4*n. What is the remainder when w(n) is divided by 7? 4 Let l be (-1)/(5/((-15)/(-3))). What is the remainder when (l + -1)/((8/(-110))/4) is divided by 23? 18 Suppose 0 = o - 0*o - 4. Let b(w) = 26 + 8*w - 44 - 4*w. What is the remainder when b(8) is divided by o? 2 Suppose 2*d + 3*g = 7*d - 559, 4*d - 446 = 3*g. Calculate the remainder when d is divided by 29. 26 Suppose 4*g - 5*z = 1326, -5*z - 312 - 346 = -2*g. Let i = -224 + g. Calculate the remainder when i is divided by 19. 15 Let r(y) be the first derivative of 5*y**3/3 + 11*y**2/2 - 4*y - 5. Let l be r(7). Calculate the remainder when (-1 + -1)*l/(-12) is divided by 18. 17 Let i(s) = s + 78. Let y = -35 + 52. What is the remainder when i(-47) is divided by y? 14 Let u = -241 + 255. Calculate the remainder when 14 is divided by u. 0 Let d(k) = -3*k - 4. Suppose -83 = 3*i + 3*f + 7, 2*f - 10 = 0. What is the remainder when (-325)/i - ((-4)/7)/(-2) is divided by d(-3)? 4 Suppose 0 = u - 3*u + 370. What is the remainder when u is divided by 62? 61 Let g = -94 + 155. Let f = -5 - -9. Suppose -f*k + 4*n + 68 = 0, 4*n = -4*k + 5*k - 5. Calculate the remainder when g is divided by k. 19 Let v = -33 - -47. Suppose 2*o - 2*m - 34 = 0, o + 15*m + 15 = 12*m. Calculate the remainder when v is divided by o. 5 Suppose m - 3*f - 8 = -1, -2*f + 43 = 3*m. Let v(u) = -21*u - 4. What is the remainder when v(-2) is divided by m? 12 Suppose 5*g = 7 + 28. Let z(j) = 13*j - 10. What is the remainder when z(5) is divided by g? 6 Let c be (-6)/4*10/(-3). Suppose -n = -c*y - 0*y - 64, 4*n - 208 = 4*y. What is the remainder when n is divided by 13? 10 Let a = -7 + 11. Let o = a + -9. Calculate the remainder when (15 - (o + 2))/1 is divided by 7. 4 Suppose -6*i = -35 - 445. Calculate the remainder when i is divided by 79. 1 Let y(f) = f**3 - 2*f**2 + 4*f + 13. What is the remainder when y(0) is divided by 7? 6 Suppose 3*g + 4*i + 28 = 102, i = -4*g + 77. What is the remainder when 35 is divided by g? 17 Suppose 245 - 92 = 4*y - d, -y - 3*d + 48 = 0. Let w be 0*(-1 - -2) + 29. Suppose 5*m - w - 21 = 0. Calculate the remainder when y is divided by m. 9 Suppose -225 - 4014 = -9*n. What is the remainder when 476 is divided by n? 5 Suppose -4*b + 4*z + 168 = 0, z - 255 + 69 = -5*b. Let d(t) = -t**2 + 12*t - 6. Calculate the remainder when b is divided by d(10). 10 Let z be (6/(-1))/((-3)/8). Let v = -12 + z. Suppose 4*g + 48 = v*b, 0 = -2*b - 5*g + 15 + 2. What is the remainder when 42 is divided by b? 9 Let j = -1407 - -1418. What is the remainder when 395 is divided by j? 10 Suppose -2 = -2*p + p. Suppose -d + 34 = 4*g, -2*g = -p*d - g + 23. Let n(s) = -8*s - 7. Calculate the remainder when n(-4) is divided by d. 11 Let j(r) = -r**3 + 6*r**2 + 13*
{ "pile_set_name": "DM Mathematics" }
Q: PHP Redeclare error when using .htaccess auto_prepend_file I have a file called config.php in which I include different files with functions in them, using require_once. When I try to auto prepend config.php using .htaccess stored in the project root, I get a redeclare error in every file that has functions in it. Is there a way of fixing this or including config.php without getting this error? A: Okay, I figured a solution using foreach and glob. I don't know if it's efficient or not, but it seems to work. // Include all files in X directory foreach (glob('X\*.php') as $file) { $script = basename($_SERVER['SCRIPT_NAME']); $filename = basename($file); if ($script != $filename) { include_once $file; } } This code is in the auto prepended file.
{ "pile_set_name": "StackExchange" }
Help clean up the Volusia end of the St. Johns River on April 12 Welp, it's that time of year again: Spring cleaning. What better place to start than the St. Johns River? Volusia County is seeking volunteers for an April 12 sprucing of their section of our state's lengthiest waterway. Last year, crews cleaned up four tons of debris from the river, but there's no reason we can't pick up five tons this year - RIGHT, GANG? So get out your best debris-pickin' gloves and show up Saturday April 12 to one of the following starting points: Ninemile Point Park at the west end of Ninemile Point Road, Pierson Butler Street Boat Ramp at the east end of Butler Street, Astor DeLeon Springs State Park, 601 Burts Park Road, DeLeon Springs Ed Stone Park, 2990 W. State Road 44, DeLand French Avenue boat launch/Starks Landing, where French Avenue meets the St. Johns River, Orange City Lake Monroe Park, 975 S. U.S. 17-92, DeBary Lemon Bluff boat ramp, 907 Lemon Bluff Road, Osteen Lake Harney Woods subdivision at the end of Boat Ramp Road in southwest Volusia Note: while you don't have to preregister via the Volusia County website to be a part of the cleanup effort, if you do, you get a free T-shirt and reusable shopping bag. For further info, hit up Darrell Abrahamson at 386-736-5927, ext. 12424. See you on those grassy banks!
{ "pile_set_name": "Pile-CC" }
Q: Slice polygon into n-pieces I'm working on a polygon slicing algorithm and found a solution to slice a polygon into n-parts. The problem is that I just know the lines where the polygon needs to be cutted and these are from a voronoi diagram. Is there any existing algorithm to cut a polygon into n-parts by having the lines where it needs to be cutted? Heres a picture to show what I have already: The blue polygon needs to get sliced at the red lines to get (in this case) 7 smaller polygons. Any idea how to solve this the most efficient way? A: You can find intersections of your polygon with every cell of Voronoi diagram using, for example, Clipper library. AFAIK, it allows to clip polygon against open voronoi cell (polyline) Edit After quick check: library can only clip polyline by closed polygon, returning part of polyline that is inside the polygon. It cannot find part of polygon, cut by polyline (and it is ambiguous operation, of course). So bounded voronoi diagram would be needed.
{ "pile_set_name": "StackExchange" }
**To the Editor:** We took a great interest in reading the paper that analyzed cancer risks of residents living near nuclear power plants (NPPs) in South Korea (the KREEC-R Study) ([@B1]). This is the first and the only prospective cohort study on this topic in Korea, and even one of the few worldwide. The KREEC-R group concluded that there was no epidemiological evidence to support an increased cancer risk due to radiation from NPPs, and suggested that \"radiological study results or surveillance data of radiation doses around NPPs could be well documented for risk estimation of radio-inducible cancers, instead of long-term epidemiological study results.\" However, before reaching such conclusions, we suggest the following limitations of the study should be addressed first. First, the control groups of the study are not comparable to the exposed group in many ways, especially in socioeconomic status. According to the detailed technical report of this study ([@B2]), at least 10% of the male participants in the exposed and control groups did not graduate elementary school, while the national average figure for males older than 19 years is only 3.3% (derived from the 2,000 census). In addition, 28.7% of the exposed, 20.0% of the intermediate control (\'control-1\'), and 9.4% of the remote control (\'control-2\') group had a college degree or higher, while 28.1% of male adults in the nation did so. Overall, the cohort members were in lower socioeconomic positions than the national average, and this gap was especially large for the remote control group. It is well known that a lower socioeconomic position is associated with an increased cancer risk ([@B3], [@B4]). If the baseline cancer risk of the control group was higher than that of the general population as well as that of the exposed group, then the relative risk of the exposed group with reference to the control group could have been underestimated. Second, if the key independent variable of this study was the time living near NPPs as a proxy for cumulative radiation exposure, the exposure time (time at risk) and eligibility criteria should have been defined differently. Before the enrollment of cohort members, NPPs had already begun operation; for example, the first NPP in Korea (Gori \#1 plant) started commercial operation in 1978 ([@B2]). As the KREEC-R study had enrolled the members with a series of baseline surveys between 1992 and 2005, some participants could have been exposed for up to 27 years even before their enrollment in the cohort. Consequently, by excluding all cancer cases in the baseline survey, the study had effectively removed those who might have developed NPPs related cancer before the baseline survey. In fact, according to the technical report ([@B2]), the KREEC-R group identified 150 and 377 prevalent cases for the exposed and unexposed cohorts, respectively; these numbers are not negligible compared to the newly developed cases of 705 and 1,593 during the follow-up period. The valid way should have been to exclude only those who developed cancer before their exposure, that is, residence near NPPs, or before the midst of the minimum latency period ([@B5], [@B6]). Third, if one constructs multivariate models by selecting covariates based only on statistical association (or significance), variables of known risks could have been omitted ([@B7], [@B8]). For example, none of smoking or drinking variables was included in the multivariate Cox proportional hazard models for females because the authors relied exclusively on statistical significance for selecting covariates. In addition, it was not appropriate to use the same multivariate model with the same but limited covariates repeatedly for different types of cancer despite the known heterogeneity of the risk factors across various cancers. Fourth, the gender difference in cancer epidemiology is a well-known fact ([@B9], [@B10], [@B11]). Even if the exact mechanism is not clear, it cannot be disregarded as a \"self-contradictory\" ([@B1]) phenomenon. There are many ways to explain the difference, including differences in exposure, biological response, or access to health care, and the study finding of increased cancer risk in only one gender should be explored and explained more cautiously. Finally, before we reach any conclusion about health effects from NPPs, we have to examine the most vulnerable group. However, the KREEC-R study had targeted only adults older than 19 years. It is well known that children and adolescents are more sensitive to ionizing radiation. Children should have been the main subjects of studies of the environmental cancer risk ([@B12]), and even the U.S. National Research Council recommended a record-linkage based case-control study of cancers in children born near nuclear facilities ([@B6]). Considering these limitations, we believe that further studies are warranted, including re-analysis of the existing data, before drawing a hasty conclusion that epidemiologic studies are no longer necessary. This work was funded by a project grant (1301029-0113-SB110) from the Korea Radiation Safety Foundation. Ahn Yoon-Ok **The Author Response:** The correspondent depicted five limitations of the study should be addressed, and argued finally that \'further studies, including re-analysis of the existing data, are warranted before drawing a hasty conclusion that epidemiologic studies are no longer necessary. All the points of the 5 limitations commented, however, are not relevant to our study, its hypothesis (purpose), methods, and conclusion, and believe that there is a lack of understanding of our study. And furthermore, since no logical grounds for the final arguments were presented, the arguments are hollow. For instance, the correspondent argued that re-analysis of the existing data is necessary as a further study warranted. However, specifically what needs to be re-analyzed is not even addressed. And no logical grounds were presented for the \'drawing hasty conclusion\'. In short, the correspondence to our study was insufficient, and the arguments against our study were not even relevant points to our study. Point 1, the first limitation depicted is not pertinent to our study. Potential confounders need to be controlled for when studying the association between exposure variable and outcome. In our study, multivariate analysis was done ([@BC1]). So, the study results, i.e. hazard ratios or relative risks, are least likely biased estimates. Point 2 is definitely not relevant to our study, a cohort study. The correspondent may have misunderstood the cohort study. Since the first inclusion criterion for the cohort member or recruitment is the eligibility or potential for outcome occurrence ([@BC2]). The past or prevalent cases at baseline are to be excluded from the cohort recruitment. Point 3 is also not pertinent to our study, a study on the causal relation between a particular exposure factor and outcome (cancer) occurrence, not examining all the potential risk factors for the outcome. Other well-known risk factors for the outcome are to be included in the multivariate analysis model as co-variables, only when they were estimated as potential confounder. Point 4 is also not relevant to our study, and a conjecture. The correspondent does not seem to clearly understand the purpose of our study in addition to a solid knowledge of distinctive points between statistical association (or significance) and causal inference. Our study purpose was to examine the causal relation (i.e., inference) between radiations from NPPs and cancer risk, not cancer patterns between study populations. It is a conjecture to argue that the gender difference in cancer pattern does mean or suggest the gender-specific carcinogenicity. The \'self-contradictory\' denotes that evidences for the causal inference contradict themselves. Point 5 is also not relevant to our study. Looking at subjects under 19 years of age, although their risk for health effects from NPPs may be greater, was not our study objective, as accounted in the title of our paper.
{ "pile_set_name": "PubMed Central" }
Nick Cave details vinyl reissues Frontman sets out plans to re-release 14 albums Nick Cave & The Bad Seeds have announced a reissues series that will see 14 of their albums available on heavyweight 180g vinyl for the first time. They’ll launch seven albums this year, with the remainder arriving in early 2015 via BMG. Dates for next year’s releases will be announced soon. The reissues have been remastered by former Bad Seed and multi-instrumentalist Mick Harvey, while each album has been designed to reflect the original release – from cover artwork to printed inner sleeves. BMG Director of Masters and Product Management Didier Dehauteur says: “The Bad Seeds catalogue is a precious piece of rock history. We are determined to deliver a set of reissues which genuinely pay tribute to a seminal band.”
{ "pile_set_name": "Pile-CC" }
We are a booming new gaming technology business based in the Marston Green area, who are looking to add an experienced Games Mathematician who can help drive forward an expanding new team! Based in Marston Green, Easily commutable from anywhere in the West Midlands Salary of up to £50,000 To apply please call or email Sourced by: @ITJobs_W - your 24/7 twitter feed of latest IT vacancies across the West Midlands WHO ARE WE? We are a gaming software business who focus on building bespoke and custom game engine solutions. We use bespoke Game Engines to build and deploy our games, using cutting edge technologies to create the best products on the market! All of this helps us work towards our goal of becoming the #1 bespoke Game Development agency in the country. As our Games Design team is still relatively small, this role will give you the unique opportunity to make your mark on the team and have a massive impact on our on-going success! WHO ARE WE LOOKING FOR? We are looking for hire a talented Games Mathematician to create, calculate, analyse and process game ideas which will ultimately translate into online casino slot games. You must have an excellent maths and probability background and you will make sure that the mathematics created is accurate and follows various industry regulations. WHAT WILL YOU BE DOING? Responsible for advanced game design for the creation of multiple online casino slot games Experience performing complex mathematics for multiple games of various size & complexity Experience of customer and end user preferences such as likes and dislikes and maths probability theories WHAT YOU MUST HAVE EXPERIENCE IN… Degree in Mathematics or equivalent Strong probability / complex mathematics experience Games Mathematics and Games Design skills Return To Player (RTP) Experience with Winlines, Pay tables, Bonuses Experience running simulations in to the millions IT'S NICE TO HAVE… Experience with industry specific technology such as Slot Designer Advanced Excel skills Excellent Communication Skills Strong analytical focus TO BE CONSIDERED….. Please either apply by clicking online or emailing me directly to . For further information please call me on / . I can make myself available outside of normal working hours to suit from 7am until 10pm. If unavailable please leave a message and either myself or one of my colleagues will respond. By applying for this role you give express consent for us to process & submit (subject to required skills) your application to our client in conjunction with this vacancy only. Also feel free to follow me on Twitter @SearchableJim or connect with me on LinkedIn, just search James Roberts in Google! I look forward to hearing from you.
{ "pile_set_name": "Pile-CC" }
Human Flow Human Flow is a 2017 German documentary film co-produced and directed by Ai Weiwei about the current global refugee crisis. In the film the viewer is taken to over 20 countries to understand both the scale and the personal impact of this massive human migration. It was shot using various technologies, including drones, cameras and iPhones. Human Flow was screened in the main competition section of the 74th Venice International Film Festival Background Ai tells how the film began after he got his passport back from Chinese authorities and went on vacation to the Greek island of Lesbos. There he saw refugees coming on shore and began shooting footage on his iPhone. The shocking experience inspired him to make a film about refugees and their harrowing journeys. In the Director's statement of the screening program for Venice Biennale Ai says, "Human Flow is a personal journey, an attempt to understand the conditions of humanity in our days. The film is made with deep belief in the value of human rights. In this time of uncertainty, we need more tolerance, compassion and trust for each other since we all are one. Otherwise, humanity will face an even bigger crisis." He notes that his film is extremely personal to him, relating to his past experiences of inhumane treatment after being forced out of his home in Beijing during China's Cultural Revolution. He goes on to say that his experiences help him understand why he identifies with the refugees in the film and with the external forces they are often powerlessly facing. Ai also explains the significance of his title, Human Flow, and how it relates to flooding. With an analogy he makes the point of either building a dam to stop the flood, which would not solve the issue entirely and could intensify the outcomes, or finding a path to let the flow continue. Relating dams to physical borders and walls, he encourages the understanding of the causes behind why people become refugees and how we should work to solve those conditions so to stem the flow at its source. Key themes Human Flow brings to light the obvious gravity of the current global refugee crisis and uses interviews from experts and refugees alike. The film shows various refugees in times of crisis and how refugee flows can be classified into four causation categories: wars between states, ethnic conflicts, non-ethnic conflicts and flights from repression. Reflecting on the sheer volume of refugees currently living in our world today, the film deeply considers both individuals who are forced to migrate and those who are internally displaced i.e. forced to flee from their homes but remain within the territory of their own country. The film also reflects upon and questions the current global response to the refugee crisis. Shedding light unto 'shared responsibility', Human Flow shows how nations close to areas with many refugees require help for accommodation and how many wealthier nations are hesitant to provide the needed aid. It conveys global responses to border closings and the effects on refugees, such as the closure of the Republic of Macedonia border and the refugees becoming stuck in Greece's Idomeni border camp. Drawing on issues within refugee camps across the world, the film shows the vast numbers of individuals residing in camps such as the now defunct Calais Jungle outside Calais in France and Dadabb in north-eastern Kenya, with many having minimal basic human rights and resources. While telling the story Ai constantly focuses on the relation between refugees and individual human rights. He has multiple individuals seen crying on camera, sharing their grief and experiences from their dangerous voyages, their fears and the deaths of their loved ones. The film looks at various conventions set to protect refugees all the while, actual aid, policies and strategies do not correspond to obligations such as the 1951 Convention Relating to the Status of Refugees. Purpose The film is a direct call to action showing the gravity and scale of the refugee crisis. The EU requires responses to improve and enforce its charter on refugees and Ai's efforts to expand this message has intensified with the creation of screening parties. For instance in Canada, TIFF (Toronto International Film Festival) held a screening and panel discussion with representatives from Médecins Sans Frontières (Doctors Without Borders), bringing attention to the crisis by showing the film to academics and to the general public. The film also touches upon the response by the United Nations, whose official refugee definition is given in the film as someone being forced out of their homeland mainly due to violent conflict and persecution. This definition is often challenged because when it was created in 1951 the Geneva Convention was not specifically meant for global mass migration. The film raises the fact that refugees are increasing more now than ever before since the second World War. Ai's outspoken activism and artistic purpose constantly challenges issues relating to freedom and human rights. His social commentaries on the refugee crisis relate to his personal life and how he was forced out of Beijing with his family, as a young child during China's Cultural Revolution. He is open about his dehumanizing experience of living in a Chinese camp with terrible conditions. Also his art has often been at the forefront of bringing about awareness to the refugee crisis and he was quoted explaining that Human Flow attempts to show the viewer the similarities between individuals: "Understanding of humanity is above all. It's about, We're all the same. If someone being hurt, we are being hurt. So that kind of ideology has to be shared only by doing that have we had compassion for other people. We lost our home too. So that kind of ideology has to be shared only by doing so that have we have compassion for other people. We can tolerate something we'd normally think is so so foreign and so different. Someone lost their education, you feel, Oh, that could be my son. Some women have no place to deliver their children, you will say, That could be my mom or my wife. So those things we have to sounds very simple but we have to repeatedly talk about that. That makes us better as a society." Ai's efforts go on to explain that this crisis would be sooner solved if we all realize that it is "about all of us". Cast Throughout the film the viewer comes in contact with a multitude of refugees and their individual experiences. Various dignitaries are also included, such as Princess Dana Firas of Jordan who empathetically speaks about the current refugee crisis and conveys Jordan's response as “You must always hold on to humanity and the more immune you are to people’s suffering, I think, that’s very very dangerous.” Ai also interviews Maha Yahya, from the Carnegie Middle East Center, who goes on to speak about radicalization effects on vulnerable youth. The use of other experts in the film is extensive and also includes members of the United Nations, such as the UNHCR Communications Officer Boris Cheshirkov, the Italian UNHCR diplomat Filippo Grandi and the Deputy representative of UNHCR Kenya Wella Koyou as well as the Senior Operation Coordinator of UNHCR Pakistan Martin Din Kajdomcajc and Maya Ameratunga from UNHCR Afghanistan. Additionally, Ai introduces Dr. Cem Terzi from Turkey who works for the Association of Bridging Peoples as well as Druze leader, Walid Joumblatt and Greece's Migration minister Ioannis Mouzalas. Including various news sources juxtaposed with shots of the current crisis, the different chapters are intertwined throughout the film with Ai's artistic content quoting various poets from all around the world to make sense of the different situations. Reception Critical reception Human Flow received generally favorable reviews from critics. On review aggregator Rotten Tomatoes, the film received an approval rating of 91%, based on 104 reviews, with an average score of 7.7/10. The website's critical consensus reads, "Epic in scope yet clear-eyed and intimate, Human Flow offers a singularly expansive – and sobering – perspective on the global refugee crisis." On another review aggregator, Metacritic, the film received a score of 77 out of 100, based on 22 critics, indicating "generally favorable reviews". In Sight & Sound, Ben Nicholson provides a film review. He credits Ai’s loose structure of the film upon which the viewer is taken to more than 20 countries to see the current global refugee crisis. The use of aerial shots was listed to be a common element in the film, by which drones were used to display entire cityscapes of destruction and vast oceans to be crossed. The film received positive response as a piece with emotional and academic success. The New York Times calls it a "strangely beautiful movie" and credits the film for focusing on individuality amidst the large masses of people along with usage of drones to show the vastness and scale of our current global refugee crisis. GQ states that the film conveys a radical type of empathy to the viewer by focussing on human aspects, such as with the man walking to a makeshift graveyard where the bodies of his loved ones were buried – he started fleeing with 17 people and was now left with 12 – while the viewer is caught in a visceral moment of his grief. GQ notes the film's ability to have the camera constantly lingering in times of sadness to create a forceful humanization. The Washington Post calls Human Flow "pungent conceptually and aesthetically" and notes that perhaps the audience's uncertainty of what camp they are led to is perhaps Ai's point that this does not matter. Overall, it gave the film a rating of 3/4 stars. The film received such high praise that it was selected for a group of 170 documentaries shortlisted for the Oscars and placed within the top 15. References External links Category:2017 films Category:2010s documentary films Category:German films Category:German documentary films Category:English-language films Category:Documentary films about immigration
{ "pile_set_name": "Wikipedia (en)" }
Ebba Hentze Ebba Hentze (25 September 1930 – 20 May 2015) was a Faroese writer of children's books and a poet and translator. She received three Faroese literature and cultural prizes: Barnamentanarheiðursløn Tórshavnar býráðs (Tórshavn City Council's Children's Books Prize) in 1984, Faroese Literature Prize (Mentanarvirðisløn M. A. Jacobsens) in 2006 and Faroese Cultural Prize (Mentanarvirðisløn Landsins) in 2008, together with grants from Denmark and Sweden. Some of her books were written in Danish and some in Faroese. She was most active as a translator, having rendered around a hundred books into Danish from English, German, Faroese, Swedish and Norwegian. Biography Ebba Hentze was an adopted child and grew up in Tvøroyri. Her parents were Peter Christian Pauli Hentze (1891-1971) and Olivia Sophie Skaalum (1888-1976) from Hvalba. As a young girl she moved to Denmark to study. She graduated from High School at the Statens Kursus in Copenhagen in 1950 and then studied literature and linguistics at the University of Copenhagen. In the 1950s she obtained scholarships enabling her to study at the universities in Uppsala, Sweden, in Vienna, Rome and in the Sorbonne She worked as a publishing consultant for Politiken and Gyldendal and on a freelance basis for Danish, Swedish and Faroese radio. She moved back to the Faroe Islands in the late 1970s and played an important role among writers and other intellectuals in Tórshavn. She was a member of the Faroese committee, which nominates Fareose books to the Nordic Council's Literature Prize. She was an honorary member of the Faroese Writer's Association (Rithøvundafelag Føroya). Bibliography Ebba Hentze published a few poems in the Danish literature magazine Hvedkorn. These poems were her debut as a writer. She wrote several short stories in Danish which were published in Politikens Magasin. In 1985 she published an important contribute to Faroese women's literature with her prose poem Kata, ein seinkaður nekrologur (Kata, a delayed obituary). The poem tells about a woman who gives up her dreams to get an education, because she must take care of her younger siblings after their mother's death. Ebba Hentze made a great effort to make Faroese literature known outside the Faroe Islands, first of all by translating Faroese novels and poems by various writers and poets to Danish and by her efforts to find publishing houses who wished to publish the books. She translated several of Jóanes Nielsen's novels and poetry collections. She also translated Rói Patursson's poetry collection Líkasum (1985), which won The Nordic Council's Literature Prize. Children's books Antonia og Morgenstjernen, 1981 Antonia midt i det hele, 1982 - (Both books about Antonia are in Danish and were later translated into Faroese. They were also broadcast on radio stations in the Faroe Islands, Sweden, Norway, Finland and Iceland. The books were also published in the Netherlands and in Belgium.) Bjørns søn, 1983, written in Danish, later translated into Faroese with the title Mamman eigur meg. The story takes place in the village of Hvalba, where Ebba's mother came from. Mia, skúlagenta í Havn, 1987, children's book, written in Faroese Gulleygað, 1992, children's book, written in Faroese Short stories Juli, 1986, in Brá (Faroese literature magazine) Poems Kata, ein seinkaður nekrologur, 1984 in Brá number 5 Also published in a school book for 14- to 16-year-old pupils: Les 2. (Read 2) Faroese books translated to Danish by Ebba Hentze Bølgerne leger på stranden (Jens Pauli Heinesen), Gyldendal, 1980. Livets Sommer (roman efter Oddvør Johansen), Forlaget Vindrose, 1982. Med Edgar Allan Poe i Solhavn. Husets Forlag, 1984. 12 chosen short stories by Hanus Andreassen (who now is called Hanus Kamban) Ligesom, 1986, (collection of poems by Rói Patursson, who won The Nordic Council's Literature Prize). Original title: Líkasum Saltet i dampende middagsgryder, 1988 (poems by Jóanes Nielsen), Vindrose, Ebba Hentze has chosen the poems from his earliest collection of poetry, she translated them to Danish and put them together to this poetry collection. Færøhesten, 1990 (illustrated children's book by Ólavur Michelsen) Gummistøvler er de eneste tempelsøjler vi ejer på Færøerne, 1992 (novel by Jóanes Nielsen) Original title: Gummistivlarnir eru tær einastu tempulsúlurnar sum vit eiga í Føroyum Kirkerne på havets bund, 1994, (poems by Jóanes Nielsen). Original title: Kirkjurnar á havsins botni Grå oktober, 1995 (crime fiction by Jógvan Isaksen) Original title: Gráur oktober (Gray October) Sting, 1998, (poems by Jóanes Nielsen). Original title: Pentur I morgen er der atter en dag (novel by Oddvør Johansen) - it was nominated for The Nordic Council's Literature Prize, first in 2000, but was postponed to 2001. The book has not yet been published in Danish. Blodprøver, 2003 (poems by Tóroddur Poulsen) Hedder noget land weekend?, 2005 (play by Jóanes Nielsen) Honours Statens Kunstfond Barnamentanarheiðursløn Tórshavnar býráðs in 1984 Drassows Legat i 1992 Mentanarvirðisløn Landsins Extraordinary cultural prize in 2001 Lachmannska Priset i 2002 Faroese Literature Prize (Mentanarvirðisløn M. A. Jacobsens) in 2006 Faroese Cultural Prize in 2008 Sømdargáva landsins 2012 (Faroese grant, DKK 20.000 will be given annually for the rest of her life. The grant was handed on 15 January 2013) References Category:1930 births Category:2015 deaths Category:Faroese women writers Category:Faroese children's writers Category:20th-century Faroese poets Category:Faroese short story writers Category:Faroese Literature Prize recipients Category:Faroese Children's Literature Prize recipients Category:Translators to Danish Category:Danish children's writers Category:Faroese-language poets Category:Danish women short story writers Category:Women children's writers Category:Faroese women poets Category:20th-century women writers Category:20th-century translators Category:20th-century Danish short story writers
{ "pile_set_name": "Wikipedia (en)" }
3749? 5174 What is the next term in 14400, 57519, 129360, 229905, 359136, 517035, 703584? 918765 What is the next term in 5108, 8082, 11018, 13898, 16704, 19418, 22022? 24498 What comes next: 264323145, 528646291, 792969437, 1057292583, 1321615729, 1585938875? 1850262021 What comes next: 27568, 27059, 25684, 23011, 18608? 12043 What is next in -183, -683, -1731, -3591, -6527, -10803, -16683? -24431 What is next in -128226, -256539, -384924, -513381, -641910, -770511, -899184? -1027929 What is the next term in -396823, -793653, -1190481, -1587307? -1984131 What is the next term in 4325959, 8651938, 12977917? 17303896 What is the next term in 163758, 162865, 161972? 161079 What comes next: -6096, -6983, -9400, -14115, -21896, -33511, -49728? -71315 What comes next: 9331069, 18662137, 27993205, 37324273, 46655341? 55986409 What comes next: 25544672, 25544675, 25544678, 25544681, 25544684, 25544687? 25544690 What is the next term in -157575, -1260499, -4254153, -10083903, -19695115, -34033155, -54043389? -80671183 What is next in 923, 42, -1431, -3496, -6153? -9402 What comes next: -1102839, -1102825, -1102817, -1102821, -1102843, -1102889? -1102965 What comes next: 3270, 3294, 3342, 3414, 3510, 3630, 3774? 3942 What is the next term in -748677, -1496129, -2243581? -2991033 What comes next: 287198, 287204, 287212, 287222, 287234? 287248 What comes next: -2702641, -2702865, -2703075, -2703265, -2703429, -2703561, -2703655, -2703705? -2703705 What is the next term in 689018, 1377911, 2066804, 2755697, 3444590, 4133483? 4822376 What is next in -20590, -20221, -19850, -19477? -19102 What is next in 1578648, 3157295, 4735942, 6314589? 7893236 What is the next term in 6928, 7004, 7378, 8200, 9620, 11788, 14854? 18968 What comes next: -9505928, -19011866, -28517804? -38023742 What is next in 5240288, 10480575, 15720862? 20961149 What is next in -35915, -143670, -323265, -574700, -897975, -1293090, -1760045? -2298840 What is the next term in -176010358, -176010361, -176010366, -176010373, -176010382? -176010393 What is the next term in -7805, -4314, 1505, 9652, 20127? 32930 What is next in 107532617, 107532620, 107532623, 107532626, 107532629? 107532632 What comes next: 68337, 69274, 70207, 71136, 72061? 72982 What is next in 4723, 18922, 42615, 75802? 118483 What is next in 2371, 4740, 7141, 9592, 12111, 14716? 17425 What is next in -8168, -8190, -8196, -8180, -8136? -8058 What is the next term in 646042, 2584221, 5814558, 10337083, 16151826, 23258817, 31658086? 41349663 What is next in 9238861, 9238859, 9238857, 9238855, 9238853, 9238851? 9238849 What comes next: 865524, 1731015, 2596506, 3461997, 4327488, 5192979? 6058470 What comes next: 4089, 5150, 7087, 9900? 13589 What is next in 172879, 173219, 173557, 173893? 174227 What is next in 707890, 1415761, 2123610, 2831431, 3539218, 4246965? 4954666 What is next in 185572, 373874, 562176, 750478? 938780 What comes next: 1110852, 1110840, 1110830, 1110816, 1110792? 1110752 What is next in 25103974, 25103980, 25103988, 25103998? 25104010 What is the next term in 6301789, 6301792, 6301795, 6301798, 6301801, 6301804? 6301807 What is the next term in 2598, 2102, 1262, 66, -1498, -3442? -5778 What comes next: 4690, 37265, 125684, 297871, 581750, 1005245? 1596280 What is the next term in -6366, -6376, -6408, -6474, -6586, -6756? -6996 What comes next: -1508, -3083, -4730, -6449, -8240, -10103? -12038 What comes next: 2451, 19587, 66107, 156711, 306099, 528971, 840027, 1253967? 1785491 What is the next term in -382981915, -382981917, -382981921, -382981927, -382981935? -382981945 What is next in -2504, -5523, -8564, -11639, -14760? -17939 What is the next term in 113281, 226642, 340013, 453400, 566809, 680246, 793717, 907228? 1020785 What comes next: -15269, -24080, -32891, -41702, -50513, -59324? -68135 What comes next: -532, -832, -1122, -1408, -1696? -1992 What is next in 50530, 102060, 153616, 205204, 256830, 308500? 360220 What comes next: 489, 630, -1591, -8184, -21159, -42526, -74295? -118476 What is the next term in 8783, 9114, 9591, 10286, 11271? 12618 What is the next term in 12679640, 25359281, 38038920, 50718557, 63398192? 76077825 What comes next: 88574, 177049, 265526, 354005, 442486, 530969, 619454? 707941 What is the next term in -4006629, -8013250, -12019839, -16026378, -20032849? -24039234 What comes next: 84693, 168707, 252721, 336735, 420749? 504763 What is next in -26699, -53483, -80461, -107729, -135383, -163519? -192233 What is the next term in 252955, 1011919, 2276897, 4047889, 6324895? 9107915 What is next in -300, -379, -502, -669, -880, -1135, -1434? -1777 What is the next term in 13540, 13271, 13002, 12733, 12464? 12195 What is next in -1261065, -1261055, -1261045? -1261035 What is the next term in -4976, -4939, -4902, -4865, -4828? -4791 What is next in 3552, 7200, 10846, 14490? 18132 What is next in 40449, 40462, 40481, 40506, 40537, 40574? 40617 What is next in 1522, 3627, 7140, 12067, 18414, 26187, 35392, 46035? 58122 What comes next: 38657, 77044, 115181, 152942, 190201? 226832 What is next in -22964, -45485, -68004, -90521, -113036, -135549? -158060 What is next in 1458186, 1458184, 1458182, 1458180? 1458178 What comes next: -13915, -28222, -42529, -56836, -71143, -85450? -99757 What is next in 5110, 11842, 18574, 25306? 32038 What comes next: 1502, 1671, 1994, 2471? 3102 What is the next term in -400940, -801605, -1202270, -1602935? -2003600 What comes next: 50418, 50423, 50442, 50481, 50546, 50643? 50778 What is the next term in 219932, 219841, 219750, 219659, 219568, 219477? 219386 What is next in 1597202, 1597143, 1597086, 1597031, 1596978, 1596927, 1596878? 1596831 What comes next: -1876452, -1876450, -1876448, -1876446, -1876444? -1876442 What is the next term in -603, -1629, -3259, -5427, -8067, -11113? -14499 What is next in 4196, 8448, 12700, 16952, 21204, 25456? 29708 What comes next: 163598, 326926, 490254, 653582, 816910, 980238? 1143566 What is the next term in 296691, 593270, 889849, 1186428, 1483007? 1779586 What is next in -73835, -147750, -221743, -295808, -369939, -444130? -518375 What is the next term in -5812, -45761, -154018, -364735, -712064, -1230157, -1953166? -2915243 What is next in -13783, -13551, -13315, -13075, -12831, -12583, -12331? -12075 What comes next: 5220, 41906, 141464, 335328, 654932, 1131710? 1797096 What is the next term in -15616, -15551, -15478, -15397, -15308, -15211, -15106? -14993 What comes next: -9399, -34434, -75151, -131556, -203655? -291454 What comes next: 73497, 73469, 73433, 73383, 73313, 73217? 73089 What comes next: 1336, -1323, -7970, -18605? -33228 What is the next term in -606023, -1212047, -1818069, -2424089, -3030107, -3636123? -4242137 What comes next: 3649334, 14597316, 32843952, 58389242? 91233186 What is next in -1371585, -1371536, -1371457, -1371348, -1371209, -1371040? -1370841 What is next in -647018, -1293414, -1939810, -2586206? -3232602 What is next in 48767, 97513, 146259, 195005, 243751, 292497? 341243 What is the next term in -148111, -295683, -443255, -590827, -738399? -885971 What is the next term in -3765, -3630, -3373, -2970, -2397? -1630 What is next in -236333, -240031, -243729, -247427? -251125 What comes next: -137477, -274901, -412325, -549749? -687173 What is next in 25339367, 25339373, 25339383, 25339397, 25339415, 25339437, 25339463? 25339493 What comes next: 402029, 804038, 1206047? 1608056 What is the next term in -36471707, -36471705, -36471703, -36471701, -36471699, -36471697? -36471695 What comes next: -2513136, -2513135, -2513132, -2513127? -2513120 What comes next: -34205, -68408, -102599, -136778? -170945 What comes next: 62161, 84392, 121443, 173314, 240005, 321516, 417847? 528998 What is the next term in 2736, 5413, 8006, 10515, 12940, 15281? 17538 What comes next: -2813, -2950, -3127, -3344, -3601, -3898, -4235? -4612 What is next in 9197, 21774, 34351, 46928? 59505 What is the next term in 4939428, 9879015, 14818602, 19758189? 24697776 What comes next: 3504603, 3504599, 3504595, 3504591? 3504587 What is next in -11031, -44224, -99537, -176964, -276499? -398136 What is the next term in 86874569, 86874563, 86874557, 86874551, 86874545, 86874539? 86874533 What is next in 119666, 2
{ "pile_set_name": "DM Mathematics" }
Evaluation of the seventh American Joint Committee on Cancer/International Union Against Cancer Classification of gastric adenocarcinoma in comparison with the sixth classification. The seventh TNM staging system for gastric cancer of the American Joint Committee on Cancer/International Union Against Cancer (AJCC/UICC) had a more detailed classification than the sixth TNM staging system for both the tumor (T) and lymph nodes (N). The authors compared survival rates assessed by the seventh staging system with those by the sixth system. The authors analyzed the prospectively collected database on patients with gastric cancer who underwent surgery at Seoul National University Hospital between 1986 and 2006, and calculated the survival rates of 9998 cases with primary cancer, R0 resection, and >14 retrieved lymph nodes. The 5-year cumulative survival rates (5YSR) according to the seventh edition T or N classifications were significantly different. The 5YSR according to seventh edition of the TNM staging system were 95.1% (stage IA), 88.4% (stage IB), 84.0% (stage IIA), 71.7% (stage IIB), 58.4% (stage IIIA), 41.3% (stage IIIB), and 26.1% (stage IIIC), which were significantly different from each other. The 5YSR of the seventh edition T2 and T3 classifications had significant differences in patients with every N classification, and the 5YSR of seventh edition N1 and N2 classifications had significant differences in T2 patients, T3 patients, and T4 patients. Each stage in the sixth edition was divided into the seventh edition stage with different survival rates. In addition, the number of homogenous groupings in seventh edition TNM stages was increased from 1 to 2. The seventh system provided a more detailed classification of prognosis than the sixth system, especially between T2 and T3 tumors and N1 and N2 tumors, although further studies were found to be needed for the N3a and N3b classification.
{ "pile_set_name": "PubMed Abstracts" }
At 10:55am, the partially convertible rupee was at Rs 45.30/31 per dollar, 0.15% weaker than its Rs 45.24/25 close on Thursday MUMBAI, Jan 14: The rupee fell on Friday tracking losses in local shares, which raised worries of foreign investors continuing to pull out funds from Asia’s third-largest...
{ "pile_set_name": "Pile-CC" }
Posttraumatic tuberculous osteomyelitis of the foot--A rare case report. Skeletal tuberculosis developing after trauma is a rare occurrence.We report a rare case of posttraumatic tubercular osteomyelitis of mid-tarsal bone of the right foot. Patient was treated with regular dressing and anti-tubercular drugs. Posttraumatic skeletal tuberculosis should be considered in patient with non-healing ulcer.
{ "pile_set_name": "PubMed Abstracts" }
Introduction ============ Blepharoptosis (or simple ptosis) is the drooping or inferior displacement of the upper eyelid ([@R1]). It is diagnosed measuring palpebral fissure height, marginal reflex distance, upper eyelid crease and levator function ([@R2]). It must also be differentiated by pseudoptosis ([@R3]). The causes of ptosis can be classified into two categories: congenital and acquired. Congenital ptosis, which is an anomaly of the muscle elevator development, is unilateral in 69% of cases, but can also be symmetrical or asymmetrical bilateral ([@R4]). Other causes of congenital ptosis are the Marcus Gunn jaw-winking syndrome, the Duane's syndrome and the congenital Horner's syndrome ([@R5]). Acquired ptosis are classified into several subcategories: mechanical, myogenic, neuromuscular, neurogenic and cerebral ([@R5]). The most common cause of ptosis is mechanical, specifically aponeurotic (senile or young involution) in which there is bilateral ptosis due to a progressive relaxation or dehiscence of the levator aponeurosis; in young people, the causes are rubbing eyes and prolonged use of contact lenses. Other causes of mechanical ptosis are as follows: inflammation or infiltration of the eyelid (with malignancy or amyloid), dermatochalasis, tumours of the orbit or lid, post-surgical edema, chalazion, a lost contact lens in the superior fornix or a scar ([@R5]). Among non-mechanical acquired ptosis, we distinguish the following categories: myogenic (chronic progressive external ophthalmoplegia, myotonic dystrophy and oculopharyngeal muscular dystrophy), neuromuscular (myasthenia gravis and botulism), neurogenic (Horner's syndrome, oculomotor paresis, Miller--Fisher syndrome and ophthalmoplegic migraine) and cerebral (especially right hemisphere lesions) ([@R5]). Another cause of ptosis is tumour metastasis. Herein, we present a case of a 47-year-old man who presented with unilateral ptosis and blurred vision, due to a repetitive lesion that stemmed from metastatic renal cell carcinoma (RCC). Although rare, many studies report RCC metastasis to orbits ([@R6]). Case report =========== Written, informed consent was obtained from the patient for publication of the report and any accompanying images. A 47-year-old man was admitted to the Unit of Diagnostic Imaging Università Campus Bio-Medico di Roma for a brain magnetic resonance imaging examination. He was referred to our hospital because of narrowing of the left eyelid. The disorder was associated with occasional nuanced blurred vision. At the level of the left orbit roof in the frontal bone, in-depth thin-film sequences showed a solid lesion likely to be extraconal bone departure, with expansive growth characteristics (diameters of 23 × 15 × 25 mm). This was characterized by intermediate signal intensity on T1- and T2-weighted images, evidence of contrast enhancement and intra-orbital development at the upper-outer quadrant level. The deforming upper-side of the eyeball incorporated the lacrimal gland with no safe cleavage planes from the upper rectus, lateral rectus and the upper eyelid muscle. They were completely incorporated into the lesion (**[Figure 1](#F1){ref-type="fig"}**). Total body computed tomography (CT) showed numerous secondary mediastinal lymphadenopathy that were bilateral hilars (diameters right 13 × 23 mm and left 36 × 23 mm) or subcarinal (diameters 39 × 25 mm). ![Magnetic resonance imaging: Coronal T2 TSE sequence (**A**) and coronal SE T1 sequence with fat suppression (**B**), showing expansive lesion of probable bone origin with intraorbital development, which appears isointense in T2 and shows contrast enhancement on T1 fat-suppressed sequence (white arrows).](jkcvhl-3-11-g001){#F1} At the upper pole of the left kidney was a partially exophytic lesion (diameters 72 × 56 × 70 mm), which marked the upper caliceal group, with contextual necrotic phenomena (**[Figure 2](#F2){ref-type="fig"}**). Locoregional lumbar-aortic lymphadenopathy with a maximum diameter of 20 mm, two repetitive lesions at the body (diameter 21 mm) (**[Figure 2A](#F2){ref-type="fig"} and [B](#F2){ref-type="fig"}**) and medial arm (diameter 10 mm) of the left adrenal gland, and nodulation of 8 mm in diameter in the right adrenal gland were also seen. In addition, multiple bone lesions in skeletal segments were examined. After CT staging, the patient was subjected to endoscopic ultrasound, and multiple specimens at lymph-node stations 7 and 11L were collected for cytology. As a result of cytological sampling, the patient was diagnosed with RCC. The patient was subsequently followed up in another hospital for management. ![CT: axial scans during arterial (**A**) and venous (**B**) phases and coronal scan during venous phase (**C**) of the abdomen, show expansive lesion, partially exophytic, located in the upper pole of the left kidney (diameters 72 × 56 × 70 mm) with necrosis in the context (white arrows); it also observes repetitive lesion of the right adrenal gland body (diameter 20 mm) (**A** and **B**) (yellow arrows).](jkcvhl-3-11-g002){#F2} Discussion ========== About 25--33% of RCC patients have metastases at the first diagnosis ([@R9]). These are mainly detected in the lungs (75% of cases), regional lymph nodes (65%), bone (40%) and liver (40%). In 15% of cases, metastases to head and neck have been observed. Macroscopically, RCC metastases are highly vascular and soft, elastic and yellowish white in color. Histological features are as follows: encapsulating connective tissue, clear cell borders, copious clear cytoplasm and round or oval nuclei ([@R10]). RCC is often noted to invade the local vascularization through the interlobular, arcuate and interlobar veins and metastasize through the systemic circulation ([@R6]). Orbital involvement due to metastasis usually presents with orbital mass, exophthalmos, lid edema, ptosis, diplopia and/or cranial nerve paralysis ([@R11]). Orbital metastases (OM) are relatively rare with the incidence ranging from 1% to 13% reported series of orbital tumours ([@R12]). A US study, conducted on 100 patients, found a higher percentage of OM from the breast (53%), followed by lung (8%), melanoma (6%) and kidney (5%) ([@R13]). An Italian study, performed on 93 patients, found the greatest percentage of mammary origin (36%), followed by kidney (10%), lung (8%) and skin (6%) ([@R14]). Another study, carried out in Southern China on 46 patients, showed a higher percentage of nasopharyngeal origin (30%), followed by lung (8%), liver (6%), kidney (4%) and breast (4%) ([@R15]). Finally, a Japanese study, performed on 128 patients, found the greatest frequency of pulmonary origin (16%), followed by breast (15%), liver (14%), adrenal neuroblastoma (7%) and kidney (3%) ([@R16]). OM from RCC and clear cell are rare; they can also develop after the removal of the primary tumour ([@R17]). RCC promotes angiogenic factors that promote tumour and ocular neovascularization ([@R18]). Transitional cell carcinoma of the renal pelvis constitutes about 15--20% of renal tumours in adults and 90% of the renal pelvis tumours; squamous cell cancer and adenocarcinoma constitute the remaining 10% ([@R19]). Some cases of metastatic transitional cell tumour have been reported from the bladder to the choroid and orbit, whereas only one case of metastasis to the choroid from transitional cell carcinoma of the renal pelvis is reported ([@R20], [@R21]). Adult Wilms tumour is a rare tumour that tends to appear in advanced stage and has a poor prognosis ([@R22]). Only one case of metastasis to the eye (choroidal metastases) from adult Wilms cancer is reported ([@R23]). Conclusion ========== Symptoms such as exophthalmos, lid edema, diplopia, ptosis, cranial nerve paralysis or blurred vision could be the symptoms of a systemic malignancy. These must be investigated using available measures. Cytology and histology are invaluable tools in diagnostic pathology ([@R24]). In this case, cytology helped to identify metastatic RCC as the cause of unilateral blepharoptosis. [^1]: **Conflict of interest:** The authors declare no potential conflicts of interest with respect to research, authorship and/or publication of this article. [^2]: **How to cite:** Greco F, Sabatino L, Sabatino F, Casale M, Quattrocchi CC, Beomonte Zobel B. Unilateral blepharoptosis from renal cell carcinoma. J Kidney Cancer VHL 2016;3(3):11--15. Doi: <http://dx.doi.org/10.15586/jkcvhl.2016.61> [^3]: **Copyright:** The Authors.
{ "pile_set_name": "PubMed Central" }