text
stringlengths
0
6.48M
meta
dict
Mercer County commissioners this week agreed to hire a company to re-design the Web site of the county's economic development office. The contract stipulates the commissioners - on behalf of the economic development office - will pay Gogical Technology Consulting a sum of $5,000 to customize a Web site and continue to maintain and support it in various capacities. "This is long overdue," said Jared Ebbing, director of the county's economic development office, during a meeting with commissioners on Tuesday. "We need more than a nice looking Web site that doesn't take you anywhere." The agency's current Web site at www.mercercountyed.com offers little flare and doesn't draw repeat viewers, he added. The expense is being paid through the economic development office's marketing budget and a revolving loan -a program the economic development office offers to jump-start new businesses or expand and improve existing ones. Ebbing said he hopes to have the new Web site up and running by February or March. In addition to a new design, Ebbing is interested in adding video and photos to the site - something that he feels will get people's attention more than text. Commissioners last week held a teleconference with CGI Communications who is interested in creating a streaming video of the Grand Lake area that could be viewed on the county's Web site and linked to others. Ebbing said it would be beneficial to have a link to this site on the economic development's Web site to attract businesses and visitors to the Grand Lake area. CGI would not charge the county to produce the video; the company would make their profit by selling ads to be placed beside the video stream on the Web site. Commissioners plan to meet with representatives from the Mercer County-Celina Chamber of Commerce and the local visitor's bureau, as well as Ebbing, to further discuss the offer by CGI. "I like that team approach," Ebbing added. The county is currently looking into the quality of CGI's work and soliciting references from other counties and cities that have contracted with the company in the past. Ebbing said he believes advertising the local area via the Web will get much more exposure than paying a large sum of money for a small add placed in the corner of a magazine.
{ "pile_set_name": "Pile-CC" }
Timothy "Hudson" Harper is a Goldwater Scholar, and Paige Sadè Fennell is a James Madison Fellow. Honors College students win prestigious Goldwater, Madison awards It's too early to begin applying for graduate fellowships, so for now South Carolina sophomore Timothy "Hudson" Harper will have to be content to be a 2009 Barry M. Goldwater Scholar. "It's been a wonderful undergrad experience at the University of South Carolina." He can look forward to a well traversed path taken by students such as South Carolina senior Paige Sadè Fennell, who has been named a 2009 James Madison Fellow. The award will support her graduate studies in history. The two South Carolina Honors College students and former Magellan Scholars (undergraduate research) are among the 400-plus at South Carolina to win major national scholarships or fellowships in the past 15 years., totaling in excess of $12 million. Harper, a math major from Birmingham, Ala., is already planning ahead--but not too far. "I'll apply for another national fellowship next year, but I'll have to wait on graduate fellowships since I'm only a sophomore," he says. "This is really exciting, and I'm happy all the hard work paid off." He came to South Carolina in part because he was impressed with the well organized agenda and personal attention he received on a campus tour. He also met with the undergraduate director of the math department and learned how he could earn a BS and MS through a five-year master's plan. 'A remarkable gift' Fennell, a Columbia native, is also on an accelerated track. She'll graduate in May and begin her studies for a master's in history the next day. It helps that she's staying at South Carolina. "I don't have time to do all that I wanted, but that's life," she says. She's been so busy with the final weeks of her senior year, her big news has not quite registered. "I'm excited, but it hasn't really sunk in yet. I am a little overwhelmed." She's packed a lot into her four years, including a research and senior thesis project on Ward One, a former African American community in downtown Columbia that was displaced and dissolved with urban renewal in the mid-20th century. "It's been a wonderful undergrad experience at the University of South Carolina," she says. "I met wonderful people, and had wonderful professors and great advisors who helped with everything I've done." As a South Carolina Teaching Fellow, she has pledged to teach four years in S.C. public schools. After that, she plans to pursue a Ph.D. and return to a university setting as a professor. Her research advisor, professor Bobby Donaldson, sees a bright future. "She is a brilliant scholar with a remarkable gift for historical research and inquiry. I am confident she will distinguish herself in graduate school and beyond."
{ "pile_set_name": "Pile-CC" }
[Diagnostic and Therapeutic Challenges in Atypical Hemolytic Uremic Syndrome: A Case Report]. The atypical hemolytic uremic syndrome comprises a thrombotic microangiopathy resulting from the complement alternate pathway hyperactivation. Its severity requires early diagnosis and treatment. The differential diagnosis includes typical hemolytic uremic syndrome (associated with Shiga toxin) and thrombotic thrombocytopenic purpura (associated with deficient activity of ADAMTS13). The only specific treatment currently available for atypical hemolytic uremic syndrome is eculizumab. We describe the case of a child with atypical hemolytic uremic syndrome diagnosed in the context of bloody diarrhea, complicated by neurological involvement that posed several diagnostic and therapeutic challenges.
{ "pile_set_name": "PubMed Abstracts" }
Q: Конвертирование строки в числовое выражение Есть строка вида: "5 + 5" Необходимо из нее, получить числовое выражение вида: 5 + 5 Пробовал через .to_i, в итоге не вышло: "5 + 5".to_i => 5 Вопрос: Как это можно сделать? A: Вариант первый, безопасный Вам нужно использовать парсер математических выражений. Можно использовать готовый, типа https://github.com/rubysolo/dentaku, а можно написать свой. См., напрмер, классику: “Let's Build A Compiler” Джека Креншоу (англ. Jack Crenshaw). Там паскаль, но на руби будет перевести легко. Вариант второй, опасный(!) Если вы целиком и полностью доверяете источнку данных, вы можете использовать метод eval: puts(eval("5 + 5")) # Output: # 10 Это даёт вашему источнику данных возможность выполнять любой код, включая rm -rf --no-preserve-root /.
{ "pile_set_name": "StackExchange" }
Q: mmaping multiple anonymous pages in c I mapped two anonymous pages in memory and then access the second page as below: int* map = mmap(NULL, 8 * 1024, PROT_READ, PROT_WRITE, MAP_SHARED | MAP_ANONYMOUS, -1, 0); int a = map[4096]; where the page size is 4096 (I verified this) but this throws SIGSEGV. I tried using madvise(map, 8 * 1024, MADV_WILLNEED) and using the MAP_POPULATE flag in mmap, but these didn't help. What can I do to make this work? A: The issue is I declared map as an int*, so referencing map[4096] looked for the value at location map + 4 * 4096, assuming ints are 4 bytes long, and this is obviously outside the range I reserved with mmap.
{ "pile_set_name": "StackExchange" }
--- abstract: 'We study three dimensional $O(N)_k$ and $U(N)_k$ Chern-Simons theories coupled to a scalar field in the fundamental representation, in the large $N$ limit. For infinite $k$ this is just the singlet sector of the $O(N)$ ($U(N)$) vector model, which is conjectured to be dual to Vasiliev’s higher spin gravity theory on $AdS_4$. For large $k$ and $N$ we obtain a parity-breaking deformation of this theory, controlled by the ’t Hooft coupling $\lambda = 4 \pi N / k$. For infinite $N$ we argue (and show explicitly at two-loop order) that the theories with finite $\lambda$ are conformally invariant, and also have an exactly marginal $(\phi^2)^3$ deformation. For large but finite $N$ and small ’t Hooft coupling $\lambda$, we show that there is still a line of fixed points parameterized by the ’t Hooft coupling $\lambda$. We show that, at infinite $N$, the interacting non-parity-invariant theory with finite $\lambda$ has the same spectrum of primary operators as the free theory, consisting of an infinite tower of conserved higher-spin currents and a scalar operator with scaling dimension $\Delta=1$; however, the correlation functions of these operators do depend on $\lambda$. Our results suggest that there should exist a family of higher spin gravity theories, parameterized by $\lambda$, and continuously connected to Vasiliev’s theory. For finite $N$ the higher spin currents are not conserved.' author: - | Ofer Aharony, Guy Gur-Ari, and Ran Yacoby\ \ [*Department of Particle Physics and Astrophysics*]{}\ [*Weizmann Institute of Science, Rehovot 76100, Israel*]{}\ title: ' $d=3$ Bosonic Vector Models Coupled to Chern-Simons Gauge Theories' --- Introduction ============ The $AdS$/CFT correspondence [@Maldacena:1997re] is an exact duality between quantum gravitational theories on space-times that include anti-de Sitter space $AdS_{d+1}$, and conformal field theories in $d$ space-time dimensions. This correspondence has many applications, and it has taught us a lot about strongly coupled field theories and about quantum gravity. However, while we know how to translate computations on one side of the duality to the other side, we do not yet have a derivation of the $AdS$/CFT correspondence, that would enable us in particular to know which quantum gravity theory is dual to a given conformal field theory, and vice versa. Finding such a derivation is complicated by the fact that in most examples, either one or both sides of the correspondence are strongly coupled. This is partly because the gravitational dual of any weakly coupled field theory must include light fields of arbitrarily high spin. There is one example of the $AdS$/CFT correspondence in which both sides are weakly coupled in the large $N$ limit; this is the conjectured duality [@Sundborg:2000wp; @Sezgin:2002rt; @Klebanov:2002ja] between the singlet sector of the $O(N)$ vector model (namely, $N$ free real scalar fields) in three space-time dimensions, and Vasiliev’s higher-spin gravity theory on $AdS_4$ [@Fradkin:1987ks] (see [@Vasiliev:1999ba] for a review). While the gravitational side of this duality is only understood at the classical level, and it is not yet known how to give it a quantum completion, in the classical gravity limit (governed by tree-level diagrams in the bulk) this provides an example of the $AdS$/CFT correspondence in which both sides are weakly coupled. This allows many detailed tests of the correspondence to be performed in this case [@Giombi:2009wh; @Giombi:2010vg; @Giombi:2011ya], and it also suggests that this could be an ideal toy model for which a derivation of the $AdS$/CFT correspondence could be found (and perhaps then generalized to more complicated cases). Indeed, there are several suggestions in the literature [@Das:2003vw; @Koch:2010cy; @Douglas:2010rc; @Jevicki:2011ss] for how to derive the $AdS$/CFT correspondence explicitly in this example. In this paper we study a small deformation of the duality above, on the field theory side; it should be possible to map any such deformation to the gravity side as well, and to utilize the extra structure that it provides to learn more about the explicit $AdS$/CFT mapping in this case. A simple way to obtain a theory that contains only the singlet sector of the $O(N)$ vector model is by coupling $N$ free scalar fields to an $O(N)$ gauge theory; since we do not want to add any dynamics of the gauge field, we should not have standard kinetic terms for the gauge fields, but we can view their action as the $k\to \infty$ limit of the $O(N)_k$ Chern-Simons gauge theory [@Giombi:2009wh].[^1] It is then natural to deform the theory by making the Chern-Simons level $k$ a finite integer; this theory has a ’t Hooft limit, controlled by a ’t Hooft coupling $\lambda \equiv 4 \pi N / k$, and at large $N$ this gives a continuous parity-breaking deformation of the original theory. On the field theory side one can then perform computations in perturbation theory in $\lambda$, and it should be possible to translate these into perturbative computations also on the gravity side, and to obtain a more detailed weak-weak coupling duality. We will consider both the $O(N)$ case with a real scalar field in the fundamental representation, and the $U(N)$ case with a complex scalar. These theories were previously studied perturbatively in [@Chen:1992ee; @Avdeev:1992jt]. We begin in section \[On\] by introducing our action and our methods of regularizing and renormalizing it. In section \[confSym\] we study whether the theory at small $\lambda$ is still conformally invariant. The Chern-Simons level is quantized and does not run [@Deser:1981wh; @Deser:1982vy]. One problem that may arise whenever we have interactions is that relevant operators of the form $\phi^2$ and $(\phi^2)^2$ (where $\phi$ is the scalar field) may be generated, even if they are tuned to zero at some scale. However, in our renormalization scheme these couplings do not run away if they are initially set to zero. A more serious problem is that this theory has a classically marginal $\lambda_6 (\phi^2)^3 / N^2$ coupling, which could start running once we turn on $\lambda$. However, we provide an argument (and check explicitly at two-loop order) that at infinite $N$ the beta function for this coupling vanishes. Therefore, there is a two-dimensional family of large $N$ conformal field theories, parameterized by $\lambda$ and by $\lambda_6$. For large but finite $N$ we show that a beta function for $\lambda_6$ is generated, but that (at least) for small $\lambda$ this beta function still has an IR-stable fixed point, so that there still exists a one-parameter family of conformal field theories, parameterized by $\lambda$. Note that while $\lambda$ is a discrete parameter for finite $N$, it is almost continuous when $N$ is very large. In section \[HScurrents\] we analyze the spectrum of the large $N$ family of conformal field theories that we find, and show that it is independent of $\lambda$ (and thus identical to that of the free theory with $\lambda=0$). In particular, conserved higher-spin currents still exist for infinite $N$ and any $\lambda$, though the corresponding symmetries are broken for finite $N$. Such an appearance of an infinite number of conserved currents in an interacting theory is quite surprising, and this could lead one to suspect that the theories we discuss may be independent of $\lambda$ in the large $N$ limit. In section \[conjecture\] we show that this is not the case, by computing a correlation function in these theories at leading order in $\lambda$ (in the large $N$ limit) and showing that it depends on $\lambda$. We end in section \[summary\] with a summary of our results and a discussion of some future directions. The $O(N)$ Model with Chern-Simons Interactions {#On} =============================================== Consider the theory of a real scalar field $\phi$ in the fundamental representation of $O(N)$, coupled to gauge bosons $A_\mu$ with Chern-Simons interactions at level $k$ in three Euclidean dimensions (the generalization to $N$ complex scalar fields coupled to a $U(N)_k$ Chern-Simons theory is straightforward, and we will occasionally discuss below this case as well). We regulate the theory using dimensional reduction [@Siegel:1979wq] (see below), and work in Lorenz gauge (Landau gauge), $\partial^{\mu}A_\mu=~0$. The regularized action in terms of the renormalized fields and couplings is $$\begin{aligned} S &= S_\mathrm{CS} + S_\mathrm{gh} + S_\mathrm{b}{\,,}\label{eq:action}\\ S_\mathrm{CS} &= \int \! d^dx\, \left\{ - \frac{i}{2} Z_A \epsilon_{\mu\nu\lambda} A_\mu^a \partial_\nu A_\lambda^a - \frac{i}{6} \mu^{\epsilon/2} g Z_g \epsilon_{\mu\nu\lambda} f^{abc} A_\mu^a A_\nu^b A_\lambda^c \right\}{\,,}\label{eq:actionCS}\\ S_\mathrm{gh} &= \int \! d^dx\, \left\{ - \frac{1}{2 \gamma_R} (\partial_\mu A_\mu^a)^2 + Z_\mathrm{gh} \partial_\mu \bar{c}^a \partial^\mu c^a + \mu^{\epsilon/2} \tilde{Z}_g g f^{abc} \partial_\mu \bar{c}^a A_\mu^b c^c \right\}{\,,}\label{eq:actionGH}\\ S_\mathrm{b} &= \int \! d^dx\, \left\{ \frac{1}{2} Z_\phi (\partial_\mu \phi_i)^2 + \mu^{\epsilon/2} Z_g' g \partial_\mu \phi_i T_{ij}^a A_\mu^a \phi_j - \frac{1}{4} \mu^\epsilon Z_g'' g^2 \{T^a,T^b\}_{ij} \phi_i \phi_j A_\mu^a A_\mu^b \right. \notag\\ &\quad \qquad \qquad \left. + \mu^{2\epsilon} Z_{g_6}\frac{g_6}{3!\cdot 2^3}(\phi_i\phi_i)^3 \right\} {\,,}\label{eq:actionB}\end{aligned}$$ where $d=3-\epsilon$, and $\mu$ is the renormalization scale (for additional conventions, see Appendix \[conventions\]). The coupling $g$ is related to the integer Chern-Simons level $k$ by $k = 4\pi/g^2$. When taking the ’t Hooft large $N$ limit, the couplings $\lambda = g^2 N$ and $\lambda_6 = g_6 N^2$ are held fixed, and in this limit $\lambda$ becomes a continuous parameter. Note that while parity is broken due to the Chern-Simons interaction, the theory is dual under the combined transformation of parity plus $\lambda\to-\lambda$ ($k\to -k$), and physical results must be invariant under this transformation. Once $\lambda > 0$, in order to renormalize the theory in a generic scheme we must add also two relevant interactions that will be generated by quantum corrections: a mass term $(\phi_i \phi_i)$ and an interaction of the form $g_4 (\phi_i \phi_i)^2$. We are interested in interacting conformal fixed points of our field theory, so we will generally fine-tune our couplings so that the physical mass and $\phi^4$ couplings vanish, and then for the purposes of our computations we can just ignore these terms. In fact, in the scheme we are using (of dimensional reduction and minimal subtraction), once we fix the renormalized dimensionful couplings to zero, they remain zero so we do not even have to add them to our action. At least in the large $N$ limit, we could also study the theory in which the coupling $g_4$ does not vanish; if it is non-zero then the theory flows to another fixed point, which at large $N$ is closely related to the original fixed point (at infinite $N$ it has the same spectrum of operators, except for the operator $\phi_i \phi_i$ whose dimension at the interacting fixed point is $\Delta=2$). For the theory with $\lambda=0$ this was discussed in the $AdS$/CFT context in [@Klebanov:2002ja; @Gubser:2002vv; @Petkou:2003zz; @Giombi:2011ya], and the same analysis holds also at finite $\lambda$. Therefore, most of our results also apply to the “critical” fixed point with a non-zero $g_4$ coupling. However, for simplicity, we will focus here on the case where the physical $g_4$ coupling is tuned to vanish. Note that dimensional regularization of this theory is subtle, since the 3-form integration of the Chern-Simons interaction (\[eq:actionCS\]) is not well-defined for arbitrary dimension. To regulate loop integrals we first perform the tensor algebra in 3 dimensions, and then compute the resulting scalar integral in $d=3-\epsilon$ dimensions. This method, known as dimensional reduction [@Siegel:1979wq], has been shown in [@Chen:1992ee] to preserve gauge-invariance in this theory at least up to two-loop order. Conformal Symmetry {#confSym} ================== In this section we analyze the conditions under which the theory defined by is conformal, both for finite and for infinite $N$. The Chern-Simons level $k$ is quantized to be an integer and is therefore not renormalized, except perhaps by an integer shift at one-loop order; this has been verified explicitly in [@Chen:1992ee]. The corresponding one-loop shift in $\lambda$ is of order $1/N$ in the ’t Hooft large-$N$ limit that we study here, so we will ignore it. However, the classically-marginal $\lambda_6$ coupling may receive corrections.[^2] In order to check for conformal fixed points we need to compute its beta function $\beta_{\lambda_6}(\lambda,\lambda_6)$, and show that it vanishes. In section \[2loop\] we compute this beta function at the first non-trivial order, by computing the divergent contributions to the amputated correlator $$\begin{aligned} \label{sixpoint} \left< \phi^{i_1}(x_1) \cdots \phi^{i_6}(x_6) \right>_{\mathrm{amp.}} {\,.}\end{aligned}$$ We might expect that solving $\beta_{\lambda_6}(\lambda,\lambda_6)=0$ would result in a line of fixed points in the $(\lambda,\lambda_6)$ plane. For large and finite $N$ we indeed find two such lines; however, at infinite $N$ we find that $\lambda$ and $\lambda_6$ are both exactly marginal at 2-loops. In section \[allorders\] we show that this is actually true to all orders in perturbation theory, so that at infinite $N$ there is a family of conformal field theories labeled by continuous parameters $\lambda$ and $\lambda_6$. In section \[sponbreak\] we argue that there is no spontaneous breaking of the conformal symmetry in our theories. The Beta Function $\beta_{\lambda_6}$ at Two Loops {#2loop} -------------------------------------------------- In this section we compute $\beta_{\lambda_6}$ in momentum space using minimal subtraction. In our theory, using our dimensional reduction regularization, all 1-loop integrals are finite. Indeed, for quadratic and logarithmic divergences in three dimensions, the numerator must be an odd power of the loop momentum $q$, which must be of the form $q^\mu q^{2n}$, and then the $q$ integral vanishes by the $q\to -q$ symmetry. Linear divergences are rendered finite by dimensional regularization. In the specific case of $\beta_{\lambda_6}$, a one-loop contribution is also not allowed by the parity transformation. Therefore, the leading contribution to this beta function arises at 2-loop order. The $\left<\phi^6\right>$ correlator (\[sixpoint\]) is superficially log-divergent, with over 50 two-loop diagrams contributing to it in the planar limit alone. However, the number of diagrams that may contribute to its divergence is greatly reduced by the following observation. Consider a diagram that includes a $\phi A^\mu \partial_\mu \phi$ vertex, with the gluon carrying a loop momentum $q$ and one of the scalar lines carrying an external momentum $p$. In the numerator we then have $\epsilon_{\mu\nu\rho} q^\rho$ from the gluon propagator (\[eq:GluonProp\]) and $(q+2p)^\mu$ from the vertex, and the leading high-energy term of order $q^2$ cancels by antisymmetry. Therefore, in such a situation the degree of divergence is reduced and the diagram is finite. As a result, the only diagrams that can contribute to $\beta_{\lambda_6}$ at 2-loop order are the following: ---------------------------------- ---------------------------------- ---------------------------------- ---------------------------------- ![image](A1.png){height="3.5cm"} ![image](A2.png){height="3.5cm"} ![image](A3.png){height="3.5cm"} ![image](A4.png){height="3.5cm"} (A1) (A2) (A3) (A4) ![image](A5.png){height="3.5cm"} ![image](A6.png){height="3.5cm"} ![image](A7.png){height="3.5cm"} ![image](A8.png){height="3.5cm"} (A5) (A6) (A7) (A8) ---------------------------------- ---------------------------------- ---------------------------------- ---------------------------------- The diagrams (A1-3) include planar diagrams, while the others are suppressed by powers of $1/N$ in the ’t Hooft large $N$ limit. In order to compute the 2-loop beta function, we need in addition to the diagrams above also the anomalous dimension of the scalar field at this order. This comes from the following diagrams:[^3] --------------------------------- --------------------------------- --------------------------------- --------------------------------- ![image](B1.png){width="3.7cm"} ![image](B2.png){width="3.7cm"} ![image](B3.png){width="3.7cm"} ![image](B4.png){width="3.7cm"} (B1) (B2) (B3) (B4) --------------------------------- --------------------------------- --------------------------------- --------------------------------- The divergent parts of all the diagrams above are listed in Appendix \[diags\]. By summing these we can determine the renormalization constants, $$\begin{aligned} Z_{\phi} &\equiv 1 + \sum_i(Bi) = 1 - \frac{g^4\left(3N^2-23N+20\right)}{384\pi^2}\frac{1}{\epsilon}{\,,}\label{eq:Zphi}\\ g_6Z_{g_6} &\equiv g_6 + \sum_i(Ai) = g_6 + \frac{66g^8\left(N-1\right) + 4g_6^2\left(3N+22\right) - 3g^4g_6\left(N^2+19N-20\right)}{128\pi^2}\frac{1}{\epsilon}{\,.}\label{eq:Zg6}\end{aligned}$$ The bare sextic coupling $g_{6,0} = \mu^{2\epsilon} g_6 Z_{g_6} / Z_{\phi}^3$ may thus be written in the form $g_{6,0} = g_6 + b_1(g,g_6) / \epsilon + (\mathrm{other~terms})$, where $$\begin{aligned} b_1(g,g_6) = \frac{33 g^8(N-1) - 40 g^4 g_6 (N-1) + 2 g_6^2 (3 N + 22)}{64 \pi^2}{\,.}\end{aligned}$$ The beta function for the $\lambda_6$ coupling is related to the single pole in dimensional regularization by $\beta_{g_6} = - 2 b_1 + 2 g_6 \partial_{g_6} b_1 + {1\over 2} g \partial_g b_1$ [@Weinberg:1996kr], leading to $$\begin{aligned} \label{eq:Full2LoopBeta6} \beta_{\lambda_6}(\lambda,\lambda_6) = \frac{33 (N-1) \lambda ^4-40 (N-1) \lambda ^2\lambda_6+2 (3 N + 22) \lambda_6^2}{32 N^2 \pi ^2} {\,.}\end{aligned}$$ In the ’t Hooft large $N$ limit we see that $\beta_{\lambda_6}=0$, so that both the $(\phi^2)^3$ coupling and the Chern-Simons interaction are marginal at this order. For the theory with only $(\phi^2)^3$ couplings it is easy to see that the large $N$ beta function vanishes to all orders, since there are no contributing diagrams; it is indeed well-known that this coupling is exactly marginal in the large $N$ limit [@Bardeen:1983rv] (see [@Moshe:2003xn] for a review). However, for finite $\lambda$ there do exist divergent planar diagrams. The vanishing of the $\lambda^4$ term in at this order is due (in our gauge choice) to a non-trivial cancelation between the diagrams (A2) and (A3). There is also a large $N$ divergence proportional to $\lambda^2 \lambda_6$ arising from (A1), that exactly cancels in the planar limit with the similar contribution from the anomalous dimension of $\phi^i$. In fact, one can show that, at large $N$, contributions to the beta function can have either zero or one $(\phi^2)^3$ vertices, and that the planar diagrams contributing with a single $(\phi^2)^3$ vertex are the same as the diagrams contributing to the anomalous dimension of $\phi^2$. Thus, the large $N$ beta function takes the form $$\beta_{\lambda_6}(\lambda,\lambda_6) = b\, \gamma_{\phi^2}(\lambda)\lambda_6 + f(\lambda) + O(1/N),$$ where $\gamma_{\phi^2}$ is the anomalous dimension of $\phi^2$ and $b$ is a constant. In the next subsection we argue that both this anomalous dimension and the beta function $\beta_{\lambda_6}$ vanish in the large $N$ limit, so that the couplings $\lambda$ and $\lambda_6$ are both exactly marginal in this limit. At finite but large $N$ the beta function does not vanish. Without the coupling $\lambda$, the beta function is positive so the theory with $\lambda_6 > 0$ is trivial (IR-free). However, when $\lambda \neq 0$ and for large $N \geq 10$, we find from two lines of non-trivial fixed points of the two-loop beta function, $$\begin{aligned} \lambda_{6}^\pm(\lambda) &= \frac{\left(20 N - 20 \pm \sqrt{1852-2054 N+202 N^2} \right) \lambda^2} {44+6 N} {\,.}\end{aligned}$$ The line $\lambda_6^+(\lambda)$ is IR-stable, while $\lambda_6^-(\lambda)$ is UV-stable – see Figure 1. Note that since $\beta_\lambda=0$, the renormalization group flow is always in the $\lambda_6$ direction. \[fig:RG\] ![The space of coupling constants and the renormalization group flow towards the IR for large but finite $N$, based on the two-loop beta function. There are two lines of fixed points. Since $\beta_{\lambda}=0$, the flow lines are all in the $\lambda_6$ direction.](Beta6.png "fig:"){width="60.00000%"} The Large $N$ Beta Function $\beta_{\lambda_6}$ to All Orders {#allorders} ------------------------------------------------------------- In this section we argue that $\beta_{\lambda_6}(\lambda,\lambda_6) = O(1/N)$ to all orders in perturbation theory, generalizing our explicit two-loop computation of the previous subsection. We could not find a direct argument for this, so instead we will use a trick. We focus on the $U(N)$ vector model for simplicity, but the argument can be generalized to $O(N)$ as well. Consider the ${\ensuremath{\mathcal{N}}}=2$ supersymmetric generalization of our theory, which is the ${{\ensuremath{\mathcal{N}}}=2}$ supersymmetric Chern-Simons $U(N)$ gauge theory, coupled to a single matter chiral superfield $\Phi_i$ with components $(\phi_i,\psi_i)$ in the fundamental representation (we use $i,j = 1,\ldots,N$ to label the fundamental representation of $U(N)$).[^4] We will relate $\beta_{\lambda_6}$ in our theory (for infinite $N$) to the beta function of the $(\phi^\dagger\phi)^3$ coupling in the ${\ensuremath{\mathcal{N}}}=2$ theory. The action of the ${\ensuremath{\mathcal{N}}}=2$ theory [@Schwarz:2004yj; @Gaiotto:2007qi], after integrating out all the auxiliary fields, is $$\begin{aligned} \label{eq:SUSicCS} S^{{\ensuremath{\mathcal{N}}}=2}_{CS} &= -\frac{ik}{4\pi}\int \operatorname{Tr}\left[A\wedge dA + \frac{2}{3}A^3\right] + \notag\\ &\quad \int \! d^3x \, \left[ |{\ensuremath{\mathcal{D}}}_{\mu}\phi_i|^2 +i\bar{\psi}^i\gamma^{\mu}{\ensuremath{\mathcal{D}}}_{\mu}\psi_i - 2\frac{\lambda}{N}\bar{\phi}^i\phi_i\bar{\psi}^j\psi_j - \frac{\lambda}{N}\bar{\phi}^i\phi_j\bar{\psi}^j\psi_i - \frac{\lambda^2}{N^2}(\bar{\phi}^i\phi_i)^3 \right] {\,.}\end{aligned}$$ It was shown in [@Gaiotto:2007qi] that this action is exactly conformal quantum mechanically, for all values of $k$ and $N$ (with $\lambda=4\pi N/k$). In particular, this means that the beta function of the $(\phi^\dagger\phi)^3$ coupling in this theory vanishes identically to all orders in $\lambda$ and $1/N$. The theory has a global $U(1)_f$ symmetry acting on the matter superfield as $\Phi \to e^{i\alpha}\Phi$, and in [@Gaiotto:2007qi] it was noticed that the operators ${\ensuremath{\mathcal{O}}}_1 = \bar{\phi}^i\phi_i$ and ${\ensuremath{\mathcal{O}}}_2 = \bar{\psi}^i\psi_i + \frac{4\pi}{k}(\bar{\phi}^i\phi_i)^2$ sit in the same supermultiplet as the $U(1)_f$ symmetry current.[^5] As a consequence, the dimensions of ${\ensuremath{\mathcal{O}}}_1$ and ${\ensuremath{\mathcal{O}}}_2$ are protected to be 1 and 2 respectively. The “double-trace” term in ${\ensuremath{\mathcal{O}}}_2$ does not contribute to the 2-point function $\langle{\ensuremath{\mathcal{O}}}_2(x){\ensuremath{\mathcal{O}}}_2(y)\rangle$ to leading order in $1/N$, and therefore the operator $\bar{\psi}^i\psi_i$ by itself is also protected at large $N$, with dimension $\Delta=2+O(1/N)$. Let us begin by arguing that the anomalous dimension of ${\ensuremath{\mathcal{O}}}_1$ vanishes at large $N$ also in our non-supersymmetric theory. Consider the diagrams that contribute to $\left< {\ensuremath{\mathcal{O}}}_1 {\ensuremath{\mathcal{O}}}_1 \right>$ and $\left< {\ensuremath{\mathcal{O}}}_2 {\ensuremath{\mathcal{O}}}_2 \right>$ in the ${\ensuremath{\mathcal{N}}}=2$ theory and involve a single matter loop, with possible additional gluon lines. We will denote them collectively as ---------------------------------- ---------------------------------- ![image](E1.pdf){height="3.5cm"} ![image](E2.pdf){height="3.5cm"} (E1) (E2) ---------------------------------- ---------------------------------- For the rest of the section we will keep gluon lines implicit in all diagrams; at large $N$ when we draw the diagrams in double-line notation these lines must sit inside the scalar/fermion loop so that the topology of each scalar/fermion loop is that of a disk. We will show below that in the large $N$ limit the sum of such diagrams at a given order in perturbation theory is finite. However, the diagrams (E1) (with gluon lines running in the loop) are precisely those that contribute to the correlator $\left< {\ensuremath{\mathcal{O}}}_1 {\ensuremath{\mathcal{O}}}_1 \right>$ in our ${\ensuremath{\mathcal{N}}}=0$ model in the large $N$ limit.[^6] Thus, it will follow that the dimension of ${\ensuremath{\mathcal{O}}}_1 = \bar{\phi}^i \phi_i$ in our non-supersymmetric vector model is $1+O(1/N)$ to all orders in planar perturbation theory. We now prove the finiteness of (E1) and (E2) at large $N$ by induction. At zeroth order in perturbation theory, (E1) and (E2) are single 1-loop diagrams which are finite in our regularization scheme. At the next order the only diagrams contributing to the two-point functions in the ${\ensuremath{\mathcal{N}}}=2$ theory are still of the form (E1) and (E2) (with an extra gluon line), so all divergences in these diagrams must cancel (in fact, it follows from the parity transformation that these diagrams vanish). At higher orders in perturbation theory, there are more general diagrams contributing to $\left< {\ensuremath{\mathcal{O}}}_1 {\ensuremath{\mathcal{O}}}_1 \right>$ at large $N$, which have the general form: ---------------------------------- ![image](F1.pdf){height="3.5cm"} (F1) ---------------------------------- Again, gluon lines running inside the loops are implicit, and all the other diagrams (not drawn in (F1)) contain tadpole matter loops causing them to vanish. We know that in the ${\ensuremath{\mathcal{N}}}=2$ theory the sum of all these (F1) diagrams, with any (odd) number of matter loops, is finite, since ${\ensuremath{\mathcal{O}}}_1$ is not renormalized. Working in momentum space, each (F1) diagram factorizes at large $N$ into a product of sub-diagrams of the form (E1) or (E2). If a given (F1) diagram has more than one matter loop, its sub-diagrams will be of a lower order in perturbation theory. The sum over such sub-diagrams is finite by the induction assumption, and therefore (F1) diagrams with more than one matter loop are finite in total. Since the sum over all (F1) diagrams is also finite, the sum over single-matter-loop diagrams — which are the (E1) diagrams at the order we are in — must be finite. This concludes the induction step for (E1); the step for (E2) is analogous.[^7] In appendix \[adim\] we verify that indeed the anomalous dimension of $\phi^2$ vanishes in the non-supersymmetric theory at two-loop order in the large $N$ limit. The argument above can be easily generalized to diagrams of the topology (E1), which have three insertions of ${\ensuremath{\mathcal{O}}}_1$ on the scalar loop instead of two. Namely, the sum of such diagrams is also finite (in the large $N$ limit) in the non-supersymmetric theory at a given order in perturbation theory. To see this consider the correlator $\left< ({\ensuremath{\mathcal{O}}}_1)^3 \right>$ in the ${\ensuremath{\mathcal{N}}}=2$ theory, which does not contain divergences since both ${\ensuremath{\mathcal{O}}}_1$ and the $(\phi^\dagger\phi)^3$ coupling are not renormalized in the ${\ensuremath{\mathcal{N}}}=2$ theory. The diagrams contributing to this correlator again factorize into a product of matter loops, that are in general of a lower order in perturbation theory (the only difference is that the diagrams may now include both $\bar{\psi}\psi\bar{\phi}\phi$ and $(\phi^\dagger\phi)^3$ vertices). The proof then follows in a similar way. We are now ready to show that $\beta_{\lambda_6} = O(1/N)$. In our non-supersymmetric model, at large $N$ the correlator $\left< ({\ensuremath{\mathcal{O}}}_1)^3 \right>$ receives contributions from two types of diagrams, with either zero or one $(\phi^\dagger\phi)^3$ vertices: ---------------------------------- ---------------------------------- ![image](G1.pdf){height="4.5cm"} ![image](G2.pdf){height="4.5cm"} (G1) (G2) ---------------------------------- ---------------------------------- The $\lambda_6$ coupling contributes to $\left< ({\ensuremath{\mathcal{O}}}_1)^3 \right>$ at large $N$ through diagrams of the form (G2), some of which are non-zero (such as the leading order diagram which is explicitly drawn). Thus, if the beta function is non-zero we must have divergences in $\left< ({\ensuremath{\mathcal{O}}}_1)^3 \right>$. However, we have shown above that at every order in $\lambda$ the sum of diagrams (G1) is finite, and also the sum of diagrams (G2) is finite. Thus, the beta function must vanish at large $N$. Spontaneous Breakdown of Conformal Symmetry {#sponbreak} ------------------------------------------- In order to verify that our theories are conformally invariant, we should also make sure that they do not spontaneously break conformal invariance, by a vacuum expectation value for $\phi^2$. For the theory with $\lambda=0$ and $\lambda_6 \neq 0$, this was analyzed in detail in [@Bardeen:1983rv], and it was found that for $\lambda_6 < (4\pi)^2$ such a breaking does not arise. In fact, the effective potential for $\sigma = \phi^2/N$ can be computed exactly for infinite $N$, and it takes the form [@Amit:1984ri] $$V(\sigma) = \frac{N}{6} \left[ (4\pi)^2 - \lambda_6 \right] |\sigma|^3.$$ Thus, for small $\lambda_6$ the only minimum of the effective potential is at the conformal point $\phi^2=0$. We expect that turning on a small coupling $\lambda$, as we analyzed above, will lead to small changes in the coefficient of $|\sigma|^3$ in this effective potential (which can be computed in perturbation theory in $\lambda$), but at least for small $\lambda$ and small $\lambda_6$ it seems clear that there will still be a minimum of the effective potential at $\sigma=0$. Thus, at least for weak couplings and large $N$, the conformal symmetry is not spontaneously broken in the two-parameter family of conformal field theories that we discussed above. For $\lambda=0$ a spontaneous breaking of the conformal symmetry can occur when $\lambda_6 = (4\pi)^2$ exactly, and it would be interesting to investigate how this statement is modified at finite $\lambda$ (see [@Dias:2003pw; @Dias:2010it] for a study of the effective potential in the Abelian Chern-Simons-Matter theory, and [@Rabinovici:2011jj] for a similar study of the $O(N)$ vector model with a Chern-Simons term for a $U(1)$ subgroup of $O(N)$). For small values of $N$, spontaneous breaking of the conformal symmetry might happen (as in [@Ferrari:2010ex]), and it would be interesting to check if it happens in our theories. Higher-Spin Currents {#HScurrents} ==================== The main goal of this section is to find the spectrum of primary operators of the large $N$ interacting fixed points discovered in the previous section. Let us begin by considering the free theory, taking $\lambda=\lambda_6=0$. For each positive, even spin $s$ it has a unique $O(N)$-singlet primary operator $J_s$ that saturates the unitarity bound $\Delta \ge s + d - 2$. (In the theory with a complex scalar in the fundamental representation of $U(N)$ there is such a primary for each positive spin, not just the even ones.) These are symmetric, traceless tensors that can be written schematically as[^8] $$\begin{aligned} J_{\mu_1 \dots \mu_s} &= \frac{1}{\sqrt{N}} \phi^i \partial_{\mu_1} \cdots \partial_{\mu_s} \phi^i + \cdots {\,.}\end{aligned}$$ For example, the first two such operators are $$\begin{aligned} J_{\mu\nu} &= \frac{1}{\sqrt{N}} \left\{ -\frac{1}{3} \phi^i \partial_\mu \partial_\nu \phi^i + \partial_\mu \phi^i \partial_\nu \phi^i - \frac{1}{3} \delta_{\mu\nu} \partial_\rho \phi^i \partial_\rho \phi^i + \frac{1}{9} \delta_{\mu\nu} \phi^i \square \phi^i \right\} {\,,}\label{eq:J2free}\\ J_{\mu\nu\rho\sigma} &= \frac{1}{\sqrt{N}} \left\{ \frac{3}{2} \phi^i \partial_\mu \partial_\nu \partial_\rho \partial_\sigma \phi^i - 42 \partial_{(\mu} \phi^i \partial_\nu \partial_\rho \partial_{\sigma)} \phi^i + \frac{105}{2} \partial_{(\mu} \partial_\nu \phi^i \partial_\rho \partial_{\sigma)} \phi^i \right. \nonumber\\ &\quad + 18 \delta_{(\mu\nu} \partial_\rho \partial_{\sigma)} \partial_\chi \phi^i \partial_\chi \phi^i - 30 \delta_{(\mu\nu|} \partial_\chi \partial_{|\rho|} \phi^i \partial_{\chi} \partial_{|\sigma)} \phi^i + 3 \delta_{(\mu\nu} \delta_{\rho\sigma)} \partial_\chi \partial_\xi \phi^i \partial_\chi \partial_\xi \phi^i \nonumber\\ &\quad - \frac{9}{7} \delta_{(\mu\nu} \phi^i \partial_\rho \partial_{\sigma)} \square \phi^i + 18 \delta_{(\mu\nu} \partial_\rho \phi^i \partial_{\sigma)} \square \phi^i - 15 \delta_{(\mu\nu} \partial_\rho \partial_{\sigma)} \phi^i \square \phi^i \nonumber\\ &\quad \left. + \frac{9}{70} \delta_{(\mu\nu} \delta_{\rho\sigma)} \phi^i \square \square \phi^i + \frac{3}{2} \delta_{(\mu\nu} \delta_{\rho\sigma)} \square \phi^i \square \phi^i - \frac{18}{5} \delta_{(\mu\nu} \delta_{\rho\sigma)} \partial_\chi \phi^i \partial_\chi \square \phi^i \right\} {\,,}\label{eq:J4free}\end{aligned}$$ where parentheses around indices denote an averaging over all permutations of the indices. When discussing the large $N$ limit we shall call such scalar bilinears “single-trace” operators. Since they saturate the unitarity bound, these primaries are also conserved currents, $\partial_\mu J^{\mu}_{\;\;\mu_1\dots\mu_{s-1}} = 0$, and therefore the free theory has an infinite number of conserved currents. In addition there is a scalar singlet operator $J_0 = \frac{1}{\sqrt{N}} \phi^i \phi^i$, also a primary, with dimension $\Delta=1$. In the large $N$ limit, all operators in the theory are products of these basic “single-trace” operators, or descendants of such products. Note that adding the Chern-Simons sector does not add any additional non-trivial local operators. Let us now turn on the Chern-Simons coupling $\lambda$. As we showed in section \[allorders\], the theory is still conformally-invariant at infinite $N$. The currents of the free theory, as written above, are not gauge-invariant, but they can be made gauge-invariant by promoting derivatives to covariant derivatives and projecting onto the symmetric traceless part. The promoted currents, which will also be denoted $J_s$, are the “single-trace” primary operators of the new theory. At finite $N$ they are generally not conserved, and they also mix with “multi-trace operators”; however, as we shall now see (following a similar analysis in [@Girardello:2002pp]) they are still conserved at $N=\infty$. In the free theory, the primary operator $J_s$ heads a short representation of the conformal group that we label $(\Delta=s+1,s)$, where $\Delta$ is the conformal dimension and $s$ the spin. The shortening condition is the conservation equation $\partial_\mu J^\mu_{\,\,\,\,\,\mu_1\dots\mu_{s-1}} = 0$. For $J_s$ to become non-conserved, there must appear on the right-hand side of this equation a non-zero operator in the representation $(s+2,s-1)$. In other words, $J_s$ must combine with another operator in this representation to form a long representation [@Girardello:2002pp], $$\begin{aligned} \label{confreps} {\mathrm{lim}}_{\epsilon \to 0}(s+1+\epsilon,s)_{\mathrm{long}} &\cong (s+1,s)_{\mathrm{short}} \oplus (s+2,s-1) {\,.}\end{aligned}$$ By acting with special conformal transformations on $\partial_\mu J^\mu_{\,\,\,\,\,\mu_1\dots\mu_{s-1}}$ one can show that in the limit in which $J_s$ is conserved, the $(s+2,s-1)$ operator in must be a primary of the conformal algebra [@Heidenreich:1980xi] (the coefficient of this operator in the equation for $d*J_s$ vanishes in this limit, but the special conformal generator acting on $d*J_s$ vanishes even faster). Now, a connected correlator of the form $\partial_\mu \left< J^\mu_{\,\,\,\,\mu_1\dots\mu_{s-1}} {\ensuremath{\mathcal{O}}}\right>$ can have a leading, $O(N^0)$ contribution in the large $N$ limit only when ${\ensuremath{\mathcal{O}}}$ is a “single-trace” operator. Therefore, at $N=\infty$, $J_s$ can only combine with other “single-trace” operators. Since there are no such primary operators with $(s+2,s-1)$, $J_s$ must remain conserved even when the Chern-Simons interaction is turned on. Because the representations for conserved currents are short, this also implies that the currents do not acquire an anomalous dimension at this order. Next we consider the $O(1/\sqrt{N})$ corrections. At this order the currents with $s > 2$ can become non-conserved, but only by combining with a “double-trace” operator [@Girardello:2002pp] of the schematic form $$\begin{aligned} \partial \cdot J_s &\sim \frac{f(\lambda)}{\sqrt{N}} \, \epsilon \, \partial^2 J_{s-2} \, J_0 + (\mathrm{other\ double\!-\!trace\ operators}) {\,,}\label{noncons}\end{aligned}$$ where $\epsilon$ is the Levi-Civita tensor, and the indices are implicit and can be contracted in various ways. Parity implies that the function $f(\lambda)$ must be odd. Such an equation implies that $J_s$ has an anomalous dimension of order $1/N$, times some function of $\lambda$. From it is easy to obtain a non-renormalization theorem for the anomalous dimension of $J_0$ at large $N$ (which we derived by different methods in the previous section).[^9] By making a scale transformation of and using the fact that $\Delta_s~=~s+1$, we see that the scaling dimension of $J_0$ must be $\Delta_0=1+O(1/\sqrt{N})$, namely it does not get corrections at $N=\infty$, for any value of $\lambda$. The implicit assumption in this argument is that the coefficient $f(\lambda)$ on the right-hand side of does not vanish. This is indeed what we find for the divergence of (for example) $J_4$ at leading order in $\lambda$ by using the equations of motion, $$\begin{aligned} \partial^\sigma J_{\mu\nu\rho\sigma} = -\frac{i}{2} \frac{\lambda}{\sqrt{N}} &\left\{ \frac{540}{7} \,\epsilon_{\alpha\beta(\mu} J_{\nu|\alpha} \partial_{|\rho)} \partial_\beta J_0 + \frac{396}{7} \,\epsilon_{\alpha\beta(\mu|} \partial_\alpha J_{\beta|\nu} \cdot \partial_{\rho)} J_0 - \frac{468}{7} \,\epsilon_{\alpha\beta(\mu} \partial_\nu J_{\rho)\alpha} \cdot \partial_\beta J_0 \right. \notag\\ &\quad - \frac{108}{7} \,\epsilon_{\alpha\beta(\mu|} \partial_\alpha \partial_{|\nu} J_{\rho)\beta} \cdot J_0 - \frac{108}{7} \,\delta_{(\mu\nu} \epsilon_{\rho)\alpha\beta} J_{\alpha\chi} \partial_\beta \partial_\chi J_0 \notag\\ &\quad - \frac{1989}{224} \,\delta_{(\mu\nu} \epsilon_{\rho)\alpha\beta} \partial_\alpha J_{\beta\chi} \cdot \partial_\chi J_0 + 36 \,\epsilon_{\alpha\beta(\mu|} \partial_\alpha J_{|\nu\rho)} \cdot \partial_\beta J_0 \notag\\ &\quad \left. + \frac{3141}{224} \,\delta_{(\mu\nu|} \epsilon_{\alpha\beta\gamma} \partial_\alpha J_{|\rho)\beta} \cdot \partial_\gamma J_0 + O(\lambda^2,\lambda_6) \right\} {\,.}\label{divJ4}\end{aligned}$$ One can verify that the right-hand side of is traceless at this order, as expected: the traced right-hand side is proportional to $$\begin{aligned} \epsilon_{\mu\alpha\beta} \partial_{\alpha} \phi^{i} \partial_{\nu} \partial_{\beta} \phi^{i} \partial_{\nu} \phi^{j} \phi^{j} - \epsilon_{\nu\alpha\beta} \partial_{\alpha} \phi^{i} \partial_{\mu} \partial_{\beta} \phi^{i} \partial_{\nu} \phi^{j} \phi^{j} + \epsilon_{\mu\alpha\beta} \partial_{\nu} \phi^{i} \partial_{\alpha} \partial_{\nu} \phi^{i} \partial_{\beta} \phi^{j} \phi^{j} {\,,}\end{aligned}$$ and this expression can be shown to vanish by choosing a specific value for $\mu$ and using the equations of motion. As another check of one can act on both sides with $K^\rho$, the generator of special conformal transformations (see Appendix \[conf\] for our conventions). On the left-hand side we have (when the operator is at $x=0$) $$\begin{aligned} [K^\rho, [P^\sigma, J_{\mu\nu\rho\sigma}]] &= [[K^\rho, P^\sigma], J_{\mu\nu\rho\sigma}] + [P^\sigma, [K^\rho, J_{\mu\nu\rho\sigma}]] = 2i [\delta^{\rho\sigma} D + M^{\rho\sigma}, J_{\mu\nu\rho\sigma}] = 0 {\,,}\end{aligned}$$ where we used the fact that $J_4$ is a primary operator, and that it is symmetric and traceless. The commutator of $K^{\rho}$ with the right-hand side of should therefore also vanish, and this can be verified directly. The calculation is straightforward, and does not require substituting the explicit expressions for $J_2$ and $J_0$. We have also explicitly verified in appendix \[adim\] that $J_0$ indeed has vanishing anomalous dimension at leading order in $1/N$, to two-loop order. Let us summarize this section. We considered the spectrum of primaries in the 2-parameter family of conformal theories at infinite $N$, found in section \[confSym\]. We showed that the spectrum of single-trace, gauge-invariant primaries in these theories is the same as that of the free theory; namely, it consists of conserved higher-spin currents of all even positive spins in the $O(N)$ model (and all positive spins in the $U(N)$ model), plus a scalar operator of conformal dimension 1. For finite $N$, all these operators (except for the conserved energy-momentum tensor $J_2$, and (for the $U(N)$ model) the conserved $U(1)$ current $J_1$) obtain anomalous dimensions. Correlation Functions {#conjecture} ===================== We have seen above that for infinite $N$ the scaling dimensions in our family of fixed points are independent of $\lambda$, and the deformation of the spectrum is trivial at large $N$. One could then worry that perhaps all correlation functions are independent of $\lambda$. In this section we compute a specific correlation function of currents, $\left<J_2 J_1 J_1\right>$, and show that it does depend on $\lambda$ (already at leading order in $\lambda$). One motivation for this computation is to obtain clues towards finding a holographic dual for the theories discussed above. The free theory with $\lambda=\lambda_6=0$ is conjectured [@Klebanov:2002ja] to be dual to Vasiliev’s higher-spin gauge theory on $AdS_4$, and our theories should be (in the classical limit) continuous deformations of this. The existence of a deformation of Vasiliev’s theory, which is dual to the $(\phi^2)^3$ deformation of the free vector model, was first mentioned in [@Elitzur:2005kz]. For that deformation the holographic picture is clear, since this is a “multi-trace” deformation that is manifested in the holographic dual as a change in boundary conditions of the scalar field dual to $\phi^2$ [@Witten:2001ua; @Berkooz:2002ug; @Elitzur:2005kz]. On the other hand, the Chern-Simons deformation by $\lambda$ should be realized on the gravity side as a continuous, parity-breaking deformation of Vasiliev’s theory. One natural conjecture could be that it is dual to one of the known parity-breaking deformations of Vasiliev’s theory, which were parameterized in [@Sezgin:2002rt] by some odd function ${\cal V}(X)$. However, as mentioned in [@Giombi:2011kc], such a deformation seems not to lead to a non-vanishing $\left<J_2 J_1 J_1\right>$ at leading order in $\lambda$ as we find below. If so, there should be some new, unknown deformation of Vasiliev’s theory that is dual to turning on $\lambda$, and it would be very interesting to discover it. Computation of $\left<J_2 J_1 J_1\right>$ {#J2J1J1} ----------------------------------------- Corrections to correlation functions at order $\lambda$ necessarily break parity. For simplicity, we study here the $U(N)$ case, which has a conserved current $J_1$, since the correlator $\left<J_2 J_1 J_1\right>$ is the simplest correlator of conserved currents that can exhibit a parity-breaking structure [@Giombi:2011rz]. The conserved currents $J=J_1$, $T=J_2$ of the theory of $N$ complex scalars with $U(N)$ Chern-Simons interactions are given by $$\begin{aligned} J_\mu &= \frac{1}{\sqrt{N}}\left\{i (D_\mu \phi)^\dagger \phi - i \phi^\dagger D_\mu \phi\right\} {\,,}\label{J1cpx} \\ T_{\mu\nu} &= \frac{1}{\sqrt{N}} \left\{ -\frac{1}{6} ( \phi^\dagger D_\mu D_\nu \phi + \phi^\dagger D_\nu D_\mu \phi + D_\mu D_\nu \phi^\dagger \cdot \phi + D_\nu D_\mu \phi^\dagger \cdot \phi ) + D_\mu \phi^\dagger D_\nu \phi + D_\nu \phi^\dagger D_\mu \phi \notag \right.\\ &\quad \left. \qquad \quad - \frac{2}{3} \delta_{\mu\nu} D_\rho \phi^\dagger D_\rho \phi + \frac{1}{9} \delta_{\mu\nu} \phi^\dagger D^2 \phi + \frac{1}{9} \delta_{\mu\nu} D^2 \phi^\dagger \cdot \phi \right\} {\,,}\label{emtensorcpx}\end{aligned}$$ where $D_\mu = \partial_\mu + g A_\mu^a T^a$. With these definitions the 2-point functions of $J$ and $T$ in the free theory are fixed to be (denoting e.g. $J_{{\varepsilon}}(x) = {\varepsilon}^{\mu} J_{\mu}(x)$) $$\begin{aligned} \langle J_{{\varepsilon}_1}(x_1) J_{{\varepsilon}_2}(x_2) \rangle &= \frac{1}{8\pi^2|x_{12}|^2}{\varepsilon}_1^{\mu}{\varepsilon}_2^{\nu}\left(\frac{\delta^{\mu\nu}}{|x_{12}|^2}-2\frac{x_{12}^{\mu}x_{12}^{\nu}}{|x_{12}|^4}\right) {\,,}\\ \langle T_{{\varepsilon}_1{\varepsilon}_1}(x_1) T_{{\varepsilon}_2{\varepsilon}_2}(x_2) \rangle &= \frac{1}{3\pi^2|x_{12}|^2}\left[{\varepsilon}_1^{\mu}{\varepsilon}_2^{\nu}\left(\frac{\delta^{\mu\nu}}{|x_{12}|^2}-2\frac{x_{12}^{\mu}x_{12}^{\nu}}{|x_{12}|^4}\right)\right] ^2 {\,.}\end{aligned}$$ We now compute the correlator $\left< T_{{\varepsilon}_1 {\varepsilon}_2}(x_1) J_{{\varepsilon}_3}(x_2) J_{{\varepsilon}_4}(x_3) \right>$ in $x$-space at order $\lambda$. It has a unique parity-violating tensor structure, and to compute its coefficient it will prove useful (as in [@Giombi:2011kc]) to choose all polarizations equal and null, ${\varepsilon}_i = {\varepsilon}$, ${\varepsilon}^2 = 0$, and to take the limit $x_2 \to x_1$. With these choices, the parity-violating tensor structure has the form [@Giombi:2011rz] $$\begin{aligned} \frac{1}{|x_{12}||x_{23}||x_{13}|} \left( Q_1^2 S_1 + 2 P_2^2 S_3 + 2 P_3^2 S_2 \right) \to -\frac{4 \epsilon_{\mu\nu\rho} x_{13}^\mu x_{12}^\nu {\varepsilon}^\rho ({\varepsilon}\cdot x_{12})^2 ({\varepsilon}\cdot x_{13}) } { |x_{12}|^6 |x_{13}|^6 } {\,.}\label{J2J1J1struct}\end{aligned}$$ In the limit $x_2 \to x_1$ it diverges as $|x_{12}|^{-3}$, and we shall use this fact to discard subleading terms in $|x_{12}|$. There are 3 diagrams, up to permutations of the current insertions, contributing to the correlator at order $\lambda$: --------------------------------- --------------------------------- --------------------------------- ![image](D1.png){width="5.2cm"} ![image](D2.png){width="5.2cm"} ![image](D3.png){width="5.2cm"} (D1) (D2) (D3) --------------------------------- --------------------------------- --------------------------------- Diagrams of the type (D1) vanish because all polarizations are equal: from the gluon propagator we have $\epsilon_{\mu\nu\rho} \varepsilon^\mu \varepsilon^\nu = 0$. The computation of (D2), (D3) is not completely straightforward; it involves the repeated application of several techniques, as we will demonstrate by computing one of the (D3) diagrams in detail. The results for the other diagrams are listed in Appendix \[diags\]. In this theory the scalar and gluon propagators are given by $$\begin{aligned} I_{xy} &= \frac{1}{4 \pi}\frac{1}{|x-y|} {{\,,}\quad}I_{\mu\nu;xy} = -\frac{i}{4\pi}\frac{\epsilon_{\mu\nu\rho}(x-y)^{\rho}}{|x-y|^3}{\,.}\end{aligned}$$ To regularize the diagrams we change the loop variables to be $d$ dimensional: $d^3{\omega}\to d^d{\omega}$. While this is not a gauge-invariant regulator, we found that each of the diagrams is finite and thus independent of $d$. We have also checked that using a different regulator gives the same results. The diagram (D3), with the gluon line stretched between the two scalar propagators connected to the energy-momentum tensor, is given by $$\begin{aligned} -2 \frac{\lambda}{\sqrt{N}} \int \! d^d{\omega}_1 \, d^d{\omega}_2 \, I_{\alpha\beta;{\omega}_1{\omega}_2} \left[ I_{{\omega}_2 x_1} T^0_{{\epsilon}{\epsilon}}(x_1) I_{x_1{\omega}_1} {\overleftrightarrow}{{\partial}}_{\!\!{\omega}_1,\alpha} I_{{\omega}_1 x_2} ({\varepsilon}\cdot{\overleftrightarrow}{{\partial}}_{\!\!x_2}) I_{x_2 x_3} ({\varepsilon}\cdot{\overleftrightarrow}{{\partial}}_{\!\!x_3}) I_{x_3{\omega}_2} {\overleftrightarrow}{{\partial}}_{\!\!{\omega}_2,\beta} \right] {\,.}\label{eq:D3Perm1}\end{aligned}$$ Here ${\overleftrightarrow}{{\partial}}\equiv \overrightarrow{{\partial}}-\overleftarrow{{\partial}}$, and $$\begin{aligned} \phi^{i\dag}(x_1)T^0_{{\varepsilon}{\varepsilon}}(x_1)\phi^i(x_1)\equiv \phi^{i\dag}(x_1)\left[-\frac{1}{3}({\varepsilon}\cdot{\overrightarrow}{{\partial}_{x_1}})^2-\frac{1}{3}({\varepsilon}\cdot{\overleftarrow}{{\partial}_{x_1}})^2+ 2({\varepsilon}\cdot{\overleftarrow}{{\partial}_{x_1}})({\varepsilon}\cdot{\overrightarrow}{{\partial}_{x_1}})\right]\phi^{i}(x_1)\end{aligned}$$ is the energy-momentum tensor at leading order. It is understood that the right-most derivative $\overrightarrow{{\partial}}$ in acts on the left-most propagator inside the brackets. Let us try and take as many derivatives as possible out of the integral. We are limited by the fact that there are two propagators involving $x_1$, and the combination $T^0_{{\varepsilon}{\varepsilon}}$ is not a total derivative acting on them. To proceed let us first split the point $x_1$ into two points $x_1,x_1'$, each connected to a different scalar line; eventually we will take $x_1' \to x_1$. This procedure does not spoil gauge invariance, since at this order in $\lambda$ it is equivalent to stretching a Wilson line between the separated points. The result can be written as $$\begin{aligned} \frac{2i \lambda}{(4\pi)^6\sqrt{N}}\frac{1}{|x_{23}|} \left. ({\varepsilon}\cdot{\overleftrightarrow}{{\partial}_{x_2}}) ({\varepsilon}\cdot{\overleftrightarrow}{{\partial}_{x_3}}) \left({\partial}_{x_2,\alpha}-{\partial}_{x_1,\alpha}\right) \cal{I}_\alpha \, \right|_{x_1'\rightarrow x_1} {\,,}\label{D3simp}\end{aligned}$$ where $x_{ij} \equiv x_i - x_j$, and $$\begin{aligned} \cal{I}_\alpha &= 2 \int \! d^d{\omega}_1 \, d^d{\omega}_2 \, \frac{{\epsilon}_{\alpha\beta\gamma}{\omega}_{12}^{\gamma}({\omega}_2-x_3)^{\beta}}{|{\omega}_{12}|^3|{\omega}_1-x_1||{\omega}_2-x_1'||{\omega}_1-x_2||{\omega}_2-x_3|^3} \times \notag\\ &\quad \qquad \times \left[ 2\frac{({\varepsilon}\cdot({\omega}_1-x_1))({\varepsilon}\cdot({\omega}_2-x_1'))}{|{\omega}_1-x_1|^2|{\omega}_2-x_1'|^2} -\frac{({\varepsilon}\cdot({\omega}_1-x_1))^2}{|{\omega}_1-x_1|^4} - \frac{({\varepsilon}\cdot({\omega}_2-x_1'))^2}{|{\omega}_2-x_1'|^4} \right] \label{eq:A10} {\,.}\end{aligned}$$ To arrive at this form, we used the relation $({\omega}_2-x_3)^{\beta} / |{\omega}_2-x_3|^3 =-{\partial}_{{\omega}_2}^{\beta} |{\omega}_2-x_3|^{-1}$, and integrated by parts with respect to ${\omega}_2$. Note that we have chosen to take out a single $x_1$ derivative, while acting with the rest explicitly. Next, note that ${\partial}_{x_1',\alpha} \cal{I}_\alpha = 0$, as can be seen by rewriting ${\partial}_{1'}^{\alpha}$ as ${\partial}_{{\omega}_2}^{\alpha}$ and integrating by parts. This means that we can take $x_1'\rightarrow x_1$ before acting with the outer derivatives in , since the $x_1$ derivative there acts in the $\alpha$ direction. In addition, let us shift ${\omega}_{1,2} \to {\omega}_{1,2} + x_1$. With these changes, the integral simplifies to $$\begin{aligned} \cal{I}_\alpha &= 2\int \! d^d{\omega}_1 \, d^d{\omega}_2 \, \frac{{\epsilon}_{\alpha\beta\gamma} {\omega}_{12}^{\gamma}({\omega}_2+x_{13})^{\beta}}{|{\omega}_{12}|^3|{\omega}_1||{\omega}_2||{\omega}_1+x_{12}||{\omega}_2+x_{13}|^3} \left[ 2\frac{({\varepsilon}\cdot{\omega}_1)({\varepsilon}\cdot{\omega}_2)}{|{\omega}_1|^2|{\omega}_2|^2} - \frac{({\varepsilon}\cdot{\omega}_2)^2}{|{\omega}_2|^4} - \frac{({\varepsilon}\cdot{\omega}_1)^2}{|{\omega}_1|^4} \right]{\,.}\label{eq:A1}\end{aligned}$$ Let us now consider the limit $x_2 \to x_1$, in which the integral diverges as $|x_{12}|^{-1}$. In this limit, the full diagram diverges as $|x_{12}|^{-3}$, and therefore contributes to the parity-violating tensor structure . We first compute the last term in the brackets in . Using the fact that ${\omega}_{12}^\gamma/|{\omega}_{12}|^3 = - \partial_{{\omega}_2,\gamma} |{\omega}_{12}|^{-1}$ and integrating by parts we rewrite this term as $$\begin{aligned} \cal{I}_\alpha^{\text{last~term}} &= -2\int \! d^d{\omega}_1 \, d^3{\omega}_2 \, \frac{ ({\varepsilon}\cdot{\omega}_1)^2{\epsilon}_{\alpha\beta\gamma}{\omega}_2^{\gamma}x_{13}^{\beta} }{ |{\omega}_{12}||{\omega}_1|^5|{\omega}_2|^3|{\omega}_1+x_{12}||{\omega}_2+x_{13}|^3} \nonumber\\ &= -\frac{1}{\pi}\int \! d^d{\omega}_1 \, d^5{\omega}_2 \, \frac{ ({\varepsilon}\cdot{\omega}_1)^2{\epsilon}_{\alpha\beta\gamma}{\omega}_1^{\gamma}x_{13}^{\beta} }{ |{\omega}_{12}|^3|{\omega}_1|^5|{\omega}_2|^3|{\omega}_1+x_{12}||{\omega}_2+x_{13}|^3} {\,.}\end{aligned}$$ The second equality can be verified by introducing Feynman parameters and performing the dimensional integration on both sides. The integral over ${\omega}_2$ can now be carried out [@Boos:1987bg], and we find $$\begin{aligned} \cal{I}_\alpha^{\text{last~term}} = -\frac{8\pi}{|x_{13}|}\int \! d^3{\omega}_1 \, \frac{({\varepsilon}\cdot{\omega}_1)^2{\epsilon}_{\alpha\beta\gamma}{\omega}_1^{\gamma}x_{13}^{\beta}}{|{\omega}_1|^6|{\omega}_1+x_{12}||{\omega}_1+x_{13}|}\frac{1}{|{\omega}_1|+|x_{13}|+|{\omega}_1+x_{13}|} {\,.}\end{aligned}$$ As mentioned above, this integral diverges as $|x_{12}|^{-1}$ in the limit $x_2 \to x_1$, and the divergence comes from the region $|{\omega}_1| \ll 1$. As we approach the limit, most of the contribution to the integral will therefore come from this region. We can therefore expand around ${\omega}_1 = 0$, keeping only the leading term; the remaining terms will give sub-leading corrections in $|x_{12}|$. We thus arrive at a straightforward integral, $$\begin{aligned} \cal{I}_\alpha^{\text{last~term}} = -4\pi\frac{x_{13}^{\beta}}{|x_{13}|^3}\int \! d^3{\omega}_1 \, \frac{({\varepsilon}\cdot{\omega}_1)^2{\epsilon}_{\alpha\beta\gamma}{\omega}_1^{\gamma}}{|{\omega}_1|^6|{\omega}_1+x_{12}|} + O((x_{12})^0) {\,.}\label{Alast}\end{aligned}$$ The other two terms in have an $|x_{12}|^{-1}$ divergence in the limit $x_2 \to x_1$ coming from the region $|{\omega}_1|,|{\omega}_2| \ll 1$, and we can similarly take the leading order in the expansion around ${\omega}_{1,2} = 0$. The resulting integral is again straightforward to evaluate, $$\begin{aligned} \cal{I}_\alpha^{\text{terms~1,2}} &= 2\frac{x_{13}^{\beta}}{|x_{13}|^3} \int \! d^d{\omega}_1 \, d^d{\omega}_2 \, \frac{{\epsilon}_{\alpha\beta\gamma}{\omega}_{12}^{\gamma}}{|{\omega}_{12}|^3|{\omega}_1||{\omega}_2||{\omega}_1+x_{12}|} \left[ 2\frac{({\varepsilon}\cdot{\omega}_1)({\varepsilon}\cdot{\omega}_2)}{|{\omega}_1|^2|{\omega}_2|^2} - \frac{({\varepsilon}\cdot{\omega}_2)^2}{|{\omega}_2|^4} \right] + O((x_{12})^0) {\,.}\label{eq:A12}\end{aligned}$$ Combining the results of and and plugging into , the contribution of the specific (D3) diagram that we computed to the parity-violating tensor structure is $$\begin{aligned} \label{eq:D3Perm1Res} \frac{i}{24\pi^4}\frac{\lambda}{\sqrt{N}}\frac{({\varepsilon}\cdot x_{12})^2({\varepsilon}\cdot x_{13}){\epsilon}_{\alpha\beta\gamma}x_{12}^{\alpha}x_{13}^{\beta}{\varepsilon}^{\gamma}}{|x_{13}|^6|x_{12}|^6} {\,.}\end{aligned}$$ By applying similar techniques one can compute the other (D2), (D3) diagrams and their permutations; the results are listed in Appendix \[diags\]. Summing these contributions, we find the following non-zero result at order $\lambda$, $$\begin{aligned} \left. \langle T_{{\varepsilon}{\varepsilon}}(x_1)J_{{\varepsilon}}(x_2)J_{{\varepsilon}}(x_3)\rangle \right|_{x_2 \to x_1} = \frac{i}{24\pi^4}\frac{\lambda}{\sqrt{N}}\frac{({\varepsilon}\cdot x_{12})^2({\varepsilon}\cdot x_{13}){\epsilon}_{\alpha\beta\gamma}x_{12}^{\alpha}x_{13}^{\beta}{\varepsilon}^{\gamma}}{|x_{13}|^6|x_{12}|^6}.\end{aligned}$$ Using the known tensor structure , for general coordinates and polarizations this implies $$\begin{aligned} \langle T_{{\varepsilon}_1{\varepsilon}_1}(x_1)J_{{\varepsilon}_2}(x_2)J_{{\varepsilon}_3}(x_3)\rangle &= \frac{i}{96\pi^4}\frac{\lambda}{\sqrt{N}}\frac{1}{|x_{12}||x_{23}||x_{13}|} \left( Q_1^2 S_1 + 2 P_2^2 S_3 + 2 P_3^2 S_2 \right) + o(\lambda^2) {\,.}\end{aligned}$$ Summary and Future Directions {#summary} ============================= In this paper we studied the three dimensional $O(N)$ ($U(N)$) vector model coupled to a Chern-Simons theory at level $k$, in the limit of large $N,k$ with a fixed ratio $\lambda = 4 \pi N / k$. We found that for infinite $N$ this theory has two exactly marginal deformations, corresponding to $\lambda$ and to a $(\phi^2)^3$ coupling, while for finite large $N$ we showed that there is (at least for small $\lambda$) a single IR-stable fixed point for every $\lambda$. For infinite $N$ we showed that none of the operators of the theory have anomalous dimensions, so that the infinite tower of conserved currents of the theory with $\lambda=0$ remains also for finite $\lambda$ (and finite $\lambda_6$). We showed explicitly that some of the correlation functions of the infinite $N$ theory do depend on $\lambda$. The fact that at infinite $N$ we find an infinite tower of conserved currents even in the interacting theory at finite $\lambda$ is quite surprising, and suggests that this theory may have some interesting integrable structure. In this paper we only performed explicit computations at low orders in perturbation theory. However, the existence of an infinite number of conserved currents may be useful towards performing exact computations as a function of $\lambda$ in these theories. When our scalar fields are replaced by fermion fields, many such exact computations can indeed be performed [@Giombi:2011kc]. In this case there is a choice of gauge for which only rainbow diagrams contribute, simplifying the resummation of all planar diagrams. For scalar fields we have not yet been able to find similar simplifications. Vector models of the type we analyze here exhibit large $N$ phase transitions at temperatures of order $\sqrt{N}$ [@Shenker:2011zf; @Giombi:2011kc]. It would be interesting to generalize these transitions to our finite $\lambda$ theories. It would also be interesting to understand the holographic duals of the theories with finite $\lambda$ that we discussed here, which should be continuous deformations of Vasiliev’s higher-spin theories. Unlike standard marginal deformations, here we are not deforming by the integral of a gauge-invariant local operator, so it is not obvious how to identify this deformation. Perhaps the attempted derivations of the $AdS$/CFT correspondence for $\lambda=0$ [@Das:2003vw; @Koch:2010cy; @Douglas:2010rc; @Jevicki:2011ss] can be generalized to finite $\lambda$, by replacing the scalar bilinear operators $\phi_i(x) \phi_i(y)$ appearing in these derivations by a gauge-invariant bilinear (in which the two scalars are connected by an open Wilson line); if so then this should provide clues towards the construction of this holographic dual. It would also be interesting to understand finite $N$ corrections to our theories on the gravity side, though this may require a quantum completion of Vasiliev’s higher-spin theory that is not yet known. Since on the field theory side our theories are vector models, it seems that they should not correspond to closed string theories, but to open string theories coupled to a trivial (topological) closed string background. For instance, since the closed string duals of the $O(N)_k$ and $U(N)_k$ Chern-Simons theories are known topological string theories [@Gopakumar:1998ki; @Sinha:2000ap], one could imagine that adding fundamental matter fields to these theories (as we have done) should correspond to adding non-topological D-branes to these topological string theories. There are many possible generalizations of our computations. The generalization to the case of $l$ vectors of scalar fields is straightforward, and all the operators we discuss just become $l\times l$ matrices (the description of this on the gravity side is straightforward). The anomalous dimensions of all these operators still vanish in the large $N$ limit, so in particular we have many massless “gravitons” in this case, as expected for a theory involving $l$ D-branes. The generalization to fermionic fields instead of scalars will be discussed in [@Giombi:2011kc]. One can also consider an ${{\ensuremath{\mathcal{N}}}=1}$ supersymmetric generalization of our theories, whose field content includes both a scalar and a fermionic field, with specific interactions between them. The gravity dual for this case was discussed in [@Leigh:2003gk; @Sezgin:2003pt], and it would be interesting to generalize our discussion of the theory with finite $\lambda$ to this case. It would also be interesting to find the gravity dual for the ${{\ensuremath{\mathcal{N}}}=2}$ generalizations of our theories, that we briefly discussed in §\[allorders\]. We hope that further study of these theories will shed more light on the structure of the $AdS$/CFT correspondence in the case where it gives a weak-weak coupling duality, and hopefully also in general. Acknowledgments {#s:acks .unnumbered} --------------- We would like to thank R. Gopakumar and S. Minwalla for interesting discussions that initiated this project, and S. Giombi and S. Minwalla for many useful discussions and for notifying us of the results of [@Giombi:2011kc]. We also thank D. Jafferis, Z. Komargodski, E. Rabinovici, M. Smolkin, S. Wadia and S. Yankielowicz for useful discussions. This work was supported in part by the Israel–U.S. Binational Science Foundation, by a research center supported by the Israel Science Foundation (grant number 1468/06), by the German-Israeli Foundation (GIF) for Scientific Research and Development, and by the Minerva foundation with funding from the Federal German Ministry for Education and Research. Conventions =========== Starting with the action , let us separate it to the physical coupling part plus counterterms, $\delta Z_x = Z_x - 1$, $\delta\alpha = \frac{1}{2\gamma_R} - \frac{1}{2\alpha}$, so that $$\begin{aligned} S &= S_\mathrm{CS}^\mathrm{phys.} + S_\mathrm{gh}^\mathrm{phys.} + S_\mathrm{b}^\mathrm{phys.} + S_\mathrm{CS}^\mathrm{c.t.} + S_\mathrm{gh}^\mathrm{c.t.} + S_\mathrm{b}^\mathrm{c.t.} \, ,\\\nonumber \\ S_\mathrm{CS}^\mathrm{phys.} &= \int \! d^dx\, \left\{ - \frac{i}{2} \epsilon_{\mu\nu\lambda} A_\mu^a \partial_\nu A_\lambda^a - \frac{i}{6} \mu^{\epsilon/2} g \epsilon_{\mu\nu\lambda} f^{abc} A_\mu^a A_\nu^b A_\lambda^c \right\} {\,,}\\ S_\mathrm{gh}^\mathrm{phys.} &= \int \! d^dx\, \left\{ - \frac{1}{2 \alpha} (\partial_\mu A_\mu^a)^2 + \partial_\mu \bar{c}^a \partial^\mu c^a + \mu^{\epsilon/2} g f^{abc} \partial_\mu \bar{c}^a A_\mu^b c^c \right\} {\,,}\\ S_\mathrm{b}^\mathrm{phys.} &= \int \! d^dx\, \left\{ \frac{1}{2} (\partial_\mu \phi_i)^2 + \mu^{\epsilon/2} g \partial_\mu \phi_i T_{ij}^a A_\mu^a \phi_j - \frac{1}{4} \mu^\epsilon g^2 \{T^a,T^b\}_{ij} \phi_i \phi_j A_\mu^a A_\mu^b \right. \notag\\ &\quad \left. \qquad \qquad + \mu^{2\epsilon} \frac{g_6}{3!\cdot 2^3}(\phi_i\phi_i)^3 \right\} {\,,}\\\nonumber \\ S_\mathrm{CS}^\mathrm{c.t.} &= \int \! d^dx\, \left\{ - \frac{i}{2} \delta Z_A \epsilon_{\mu\nu\lambda} A_\mu^a \partial_\nu A_\lambda^a - \frac{i}{6} \mu^{\epsilon/2} g \delta Z_g \epsilon_{\mu\nu\lambda} f^{abc} A_\mu^a A_\nu^b A_\lambda^c \right\} {\,,}\\ S_\mathrm{gh}^\mathrm{c.t.} &= \int \! d^dx\, \left\{ - \delta\alpha (\partial_\mu A_\mu^a)^2 + \delta Z_\mathrm{gh} \partial_\mu \bar{c}^a \partial^\mu c^a + \mu^{\epsilon/2} \delta\tilde{Z}_g g f^{abc} \partial_\mu \bar{c}^a A_\mu^b c^c \right\} {\,,}\\ S_\mathrm{b}^\mathrm{c.t.} &= \int \! d^dx\, \left\{ \frac{1}{2} \delta Z_\phi (\partial_\mu \phi_i)^2 + \mu^{\epsilon/2} \delta Z_g' g \partial_\mu \phi_i T_{ij}^a A_\mu^a \phi_j - \frac{1}{4} \mu^\epsilon \delta Z_g'' g^2 \{T^a,T^b\}_{ij} \phi_i \phi_j A_\mu^a A_\mu^b \right. \nonumber\\ &\quad \qquad \qquad \left.+ \mu^{2\epsilon} \delta Z_{g_6}\frac{g_6}{3!\cdot 2^3}(\phi_i\phi_i)^3 \right\} {\,.}\end{aligned}$$ We use Landau gauge, $\alpha\to 0$, in which the gluon propagator is $$\begin{aligned} \label{eq:GluonProp} - \delta_{ab} \epsilon_{\mu\nu\lambda} \frac{p^\lambda}{p^2} {\,.}\end{aligned}$$ The $O(N)$ generators in the fundamental are taken to be real and anti-symmetric, $(T^a)^{\dag}=(T^a)^T=-T^a$. They satisfy $$\begin{gathered} \operatorname{Tr}\left(T^aT^b\right)=\delta^{ab}C_1 \,,\quad f^{acd}f^{bcd}=\delta^{ab}C_2 \,,\quad T^a_{ij}T^a_{kl}=I_{ij,kl}C_3 \,,\quad \notag\\ f^{abc} T^b_{ik} T^c_{kj} = \frac{1}{2} C_2 T^a_{ij} \, ,\quad f^{abc} = \operatorname{Tr}\left( T^a [T^b,T^c] \right) {\,,}\label{eq:TrRel}\end{gathered}$$ where $$\begin{aligned} \label{eq:TrRelOn} C_1=C_3=1 {{\,,}\quad}I_{ij,kl}=\frac{1}{2}\left(\delta_{il}\delta_{kj}-\delta_{ik}\delta_{jl}\right) {{\,,}\quad}C_2=2-N {\,.}\end{aligned}$$ We will also be interested in the case of a complex scalar field in the fundamental representation of $U(N)$, again coupled to gauge fields with a Chern-Simons interaction. In this case the scalar action is $$\begin{aligned} S_\mathrm{b} &= \int \! d^dx \, \left\{ Z_\phi |\cal{D}_{\mu} \phi_i|^2 + \mu^{2\epsilon} Z_{g_6} \frac{g_{6}}{3!} (\phi^\dagger \phi)^3 \right\} {\,,}\label{eq:cSb}\end{aligned}$$ and the generators of $U(N)$ in the fundamental representation satisfy , with $$\begin{aligned} \label{eq:TrRelUn} C_1=C_3=1 {{\,,}\quad}I_{ij,kl}=\delta_{il}\delta_{kj} {{\,,}\quad}C_2=-2N {\,.}\end{aligned}$$ The $SU(N)$ case is identical at large $N$, differing by an extra term in $I_{ij,kl}$. The counterterms for the complex and real theories are related by $$\begin{aligned} \delta Z^{SU(N)}_{\phi}&= 4\delta Z^{O(N)}_{\phi} {{\,,}\quad}\delta Z^{SU(N)}_{g_6} = 4\delta Z^{O(N)}_{g_6} {\,.}\label{eq:cScalarRen}\end{aligned}$$ 2-Loop Diagram Results {#diags} ====================== The following are the diverging parts of the diagrams of the $O(N)$ Chern-Simons-matter theory appearing in sections \[2loop\] and \[J2J1J1\], and in appendix \[adim\]. $$\begin{aligned} (\mathrm{A}1) &= -g^4g_6{ \left( \delta_{i_1i_2}\delta_{i_3i_4}\delta_{i_5i_6} + 14 \text{\ perms.} \right) }\left(\frac{3}{2}N^2+\frac{21}{2}N-12\right)\frac{1}{64\pi^2}\frac{1}{\epsilon}{\,,}\\ (\mathrm{A}2) &= g^8{ \left( \delta_{i_1i_2}\delta_{i_3i_4}\delta_{i_5i_6} + 14 \text{\ perms.} \right) }\left(N^2+N-2\right)\frac{3}{64\pi^2}\frac{1}{\epsilon}{\,,}\\ (\mathrm{A}3) &= -g^8{ \left( \delta_{i_1i_2}\delta_{i_3i_4}\delta_{i_5i_6} + 14 \text{\ perms.} \right) }\left(N^2-3N+2\right)\frac{3}{64\pi^2}\frac{1}{\epsilon}{\,,}\\ (\mathrm{A}4) &= -g^4g_6{ \left( \delta_{i_1i_2}\delta_{i_3i_4}\delta_{i_5i_6} + 14 \text{\ perms.} \right) }\left(N-1\right)\frac{9}{32\pi^2}\frac{1}{\epsilon}{\,,}\\ (\mathrm{A}5) &= g^8{ \left( \delta_{i_1i_2}\delta_{i_3i_4}\delta_{i_5i_6} + 14 \text{\ perms.} \right) }\left(N-1\right)\frac{3}{64\pi^2}\frac{1}{\epsilon}{\,,}\\ (\mathrm{A}6) &= 0{\,,}\\ (\mathrm{A}7) &= g^8{ \left( \delta_{i_1i_2}\delta_{i_3i_4}\delta_{i_5i_6} + 14 \text{\ perms.} \right) }\left(N-1\right)\frac{9}{32\pi^2}\frac{1}{\epsilon}{\,,}\\ (\mathrm{A}8) &= g_6^2{ \left( \delta_{i_1i_2}\delta_{i_3i_4}\delta_{i_5i_6} + 14 \text{\ perms.} \right) }\left(3N+22\right)\frac{1}{32\pi^2}\frac{1}{\epsilon}{\,.}\end{aligned}$$ $$\begin{aligned} (\mathrm{B}1) &= -g^4\delta_{ij}p^2\left(N^2-3N+2\right)\frac{1}{96\pi^2}\frac{1}{\epsilon}{\,,}\\ (\mathrm{B}2) &= g^4\delta_{ij}p^2\left(N^2-N\right)\frac{1}{384\pi^2}\frac{1}{\epsilon}{\,,}\\ (\mathrm{B}3) &= g^4\delta_{ij}p^2\left(N-1\right)\frac{1}{48\pi^2}\frac{1}{\epsilon}{\,,}\\ (\mathrm{B}4) &= g^4\delta_{ij}p^2\left(N-1\right)\frac{1}{96\pi^2}\frac{1}{\epsilon}{\,.}\end{aligned}$$ $$\begin{aligned} (\mathrm{C}1) &= g^4\delta_{i_1i_2}\left(\frac{3}{2}N^2+\frac{21}{2}N-12\right)\frac{1}{96\pi^2}\frac{1}{\epsilon} {\,,}\\ (\mathrm{C}2) &= g^4\delta_{i_1i_2}\left(N-1\right)\frac{3}{16\pi^2}\frac{1}{\epsilon} {\,.}\end{aligned}$$ Let us denote the diagrams (D2),(D3) of section \[J2J1J1\], including permutations, as ----------------------------------- ----------------------------------- ----------------------------------- ![image](D21.png){height="4.5cm"} ![image](D22.png){height="4.5cm"} ![image](D23.png){height="4.5cm"} (D21) (D22) (D23) ![image](D31.png){height="4.5cm"} ![image](D32.png){height="4.5cm"} ![image](D33.png){height="4.5cm"} (D31) (D32) (D33) ----------------------------------- ----------------------------------- ----------------------------------- Their contributions to the parity-violating tensor structure at order $\lambda$, for null polarizations in the limit $x_2 \to x_1$, are given by $$\begin{aligned} \frac{\lambda}{\sqrt{N}}\frac{({\varepsilon}\cdot x_{12})^2({\varepsilon}\cdot x_{13}){\epsilon}_{\alpha\beta\gamma}x_{12}^{\alpha}x_{13}^{\beta}{\varepsilon}^{\gamma}}{|x_{13}|^6|x_{12}|^6}\end{aligned}$$ times the following factors, $$\begin{aligned} (\mathrm{D}21) &\to \frac{i}{12\pi^4} {\,,}& (\mathrm{D}22) &\to 0 {\,,}& (\mathrm{D}23) &\to 0 {\,,}\\ (\mathrm{D}31) &\to \frac{i}{24\pi^4} {\,,}& (\mathrm{D}32) &\to \frac{-i}{12\pi^4} {\,,}& (\mathrm{D}33) &\to 0 {\,.}\end{aligned}$$ Conformal Transformations {#conf} ========================= The conformal algebra in Euclidean space is $$\begin{aligned} [M_{\mu\nu},P_\rho] &= -i(\delta_{\mu\rho}P_\nu - \delta_{\nu\rho}P_\mu) {\,,}& [M_{\mu\nu},K_\rho] &= -i(\delta_{\mu\rho}K_\nu - \delta_{\nu\rho}K_\mu) {\,,}\nonumber\\ [D,P_\mu] &= -iP_\mu {\,,}& [D,K_\mu] &= iK_\mu {\,,}\\ [D,M_{\mu\nu}] &= 0 {\,,}& [K_\mu,P_\nu] &= 2i(\delta_{\mu\nu}D + M_{\mu\nu}) \nonumber{\,,}\end{aligned}$$ $$\begin{aligned} [M_{\mu\nu},M_{\rho\sigma}] &= -i \delta_{\mu\rho} M_{\nu\sigma} +i \delta_{\nu\rho} M_{\mu\sigma} +i \delta_{\mu\sigma} M_{\nu\rho} -i \delta_{\nu\sigma} M_{\mu\rho} {\,.}\end{aligned}$$ The action of $D$ on a local primary operator ${\ensuremath{\mathcal{O}}}(x)$ with dimension $\Delta$ is $$\begin{aligned} [D,{\ensuremath{\mathcal{O}}}(0)] &= -i \Delta {\ensuremath{\mathcal{O}}}(0) \,.\end{aligned}$$ The Lorentz generators in the vector representation are $$\begin{aligned} ({\tilde M}_{\mu\nu})_{\alpha\beta} &= i ( \delta_{\mu\alpha} \delta_{\nu\beta} - \delta_{\mu\beta} \delta_{\nu\alpha} ) {\,,}\end{aligned}$$ and their action on a tensor operator $J_{\rho_1 \cdots \rho_n}$ is $$\begin{aligned} [M_{\mu\nu}, J_{\rho_1 \cdots \rho_n}] &= -({\tilde M}_{\mu\nu})_{\rho_1 \alpha} J_{\alpha \rho_2 \cdots \rho_n} - \cdots -({\tilde M}_{\mu\nu})_{\rho_n \alpha} J_{\rho_1 \rho_2 \cdots \alpha} {\,.}\end{aligned}$$ Anomalous Dimension of $\phi^i\phi^i$ {#adim} ===================================== In this appendix we verify explicitly that $J_0 = \phi^i \phi^i / \sqrt{N}$ does not receive an anomalous dimension at two loops and infinite $N$, in accordance with the general results of sections \[allorders\] and \[HScurrents\]. To compute the anomalous dimension of $J_0$ we consider the correlator $$\begin{aligned} \langle \phi^2(x)\phi^{i_1}(x_1)\phi^{i_2}(x_2)\rangle_{\mathrm{amp.}} \label{eq:ADcorr}\end{aligned}$$ in momentum space. The following two diagrams contribute to the divergence: --------------------------------- --------------------------------- ![image](C1.png){width="3.0cm"} ![image](C2.png){width="3.0cm"} (C1) (C2) --------------------------------- --------------------------------- The divergent parts of these diagrams appear in Appendix \[diags\]. Only (C1) contains a planar diagram, and its contribution at large $N$ to the correlator with amputated $\phi$ legs is $$\begin{aligned} \lambda^2 \delta_{i_1i_2} \frac{1}{64\pi^2} \frac{1}{\epsilon}{\,.}\label{adcon}\end{aligned}$$ The bare amputated correlator is related to the amputated correlator of the physical theory by $$\begin{gathered} \left< \phi^2 \phi^{i_1} \phi^{i_2} \right>_{\text{phys.}} = \frac{Z_\phi}{Z_{\phi^2}} \left< \phi^2 \phi^{i_1} \phi^{i_2} \right>_{\text{bare}} {\,,}\label{corrrel}\end{gathered}$$ where $J_0^{\text{bare}} = Z_{\phi^2} J_0^{\text{phys.}}$, and $Z_{\phi}=1-\lambda^2\frac{1}{128} \frac{1}{\epsilon}+O(1/N)$ (see ). This should not have any divergence. Using , and noting that the amputated correlator equals ($2 \delta_{i_1 i_2}$) at tree-level, the divergence of at the large $N$ limit, can be seen to be $$\begin{aligned} -2 \delta_{i_1i_2} \delta Z_{\phi^2} + O(\lambda^3) {\,.}\end{aligned}$$ Therefore, to leading order in $1/N$, $\delta Z_{\phi^2} = O(\lambda^3)$ and $\phi^2$ has no anomalous dimension. For the theory of a complex scalar field in the fundamental representation of $U(N)$, using the relations and the fact that the tree-level correlator equals 1, we also reach the conclusion that the operator $|\phi|^2$ has no anomalous dimension. [99]{} J. M. Maldacena, “The Large N limit of superconformal field theories and supergravity,” Adv. Theor. Math. Phys.  [**2** ]{} (1998) 231-252. \[[hep-th/9711200](http://arxiv.org/abs/hep-th/9711200)\]. B. Sundborg, “Stringy gravity, interacting tensionless strings and massless higher spins,” Nucl. Phys. Proc. Suppl.  [**102** ]{} (2001) 113-119. \[[hep-th/0103247](http://arxiv.org/abs/hep-th/0103247)\]. E. Sezgin, P. Sundell, “Massless higher spins and holography,” Nucl. Phys.  [**B644** ]{} (2002) 303-370. \[[hep-th/0205131](http://arxiv.org/abs/hep-th/0205131)\]. I. R. Klebanov, A. M. Polyakov, “AdS dual of the critical O(N) vector model,” Phys. Lett.  [**B550** ]{} (2002) 213-219. \[[hep-th/0210114](http://arxiv.org/abs/hep-th/0210114)\]. E. S. Fradkin, M. A. Vasiliev, “On the Gravitational Interaction of Massless Higher Spin Fields,” Phys. Lett.  [**B189** ]{} (1987) 89-95. M. A. Vasiliev, “Higher spin gauge theories: Star product and AdS space,” In \*Shifman, M.A. (ed.): The many faces of the superworld\* 533-610. \[[hep-th/9910096](http://arxiv.org/abs/hep-th/9910096)\]. S. Giombi, X. Yin, “Higher Spin Gauge Theory and Holography: The Three-Point Functions,” JHEP [**1009** ]{} (2010) 115. \[[arXiv:0912.3462](http://arxiv.org/abs/0912.3462) \[hep-th\]\]. S. Giombi, X. Yin, “Higher Spins in AdS and Twistorial Holography,” JHEP [**1104** ]{} (2011) 086. \[[arXiv:1004.3736](http://arxiv.org/abs/1004.3736) \[hep-th\]\]. S. Giombi, X. Yin, “On Higher Spin Gauge Theory and the Critical O(N) Model,” \[[arXiv:1105.4011](http://arxiv.org/abs/1105.4011) \[hep-th\]\]. S. R. Das, A. Jevicki, “Large N collective fields and holography,” Phys. Rev.  [**D68** ]{} (2003) 044011. \[[hep-th/0304093](http://arxiv.org/abs/hep-th/0304093)\]. R. d. M. Koch, A. Jevicki, K. Jin, J. P. Rodrigues, “$AdS_4/CFT_3$ Construction from Collective Fields,” Phys. Rev.  [**D83** ]{} (2011) 025006. \[[arXiv:1008.0633](http://arxiv.org/abs/1008.0633) \[hep-th\]\]. M. R. Douglas, L. Mazzucato, S. S. Razamat, “Holographic dual of free field theory,” Phys. Rev.  [**D83** ]{} (2011) 071701. \[[arXiv:1011.4926](http://arxiv.org/abs/1011.4926) \[hep-th\]\]. A. Jevicki, K. Jin, Q. Ye, “Collective Dipole Model of AdS/CFT and Higher Spin Gravity,” \[[arXiv:1106.3983](http://arxiv.org/abs/1106.3983) \[hep-th\]\]. W. Chen, G. W. Semenoff, Y. -S. Wu, “Two loop analysis of nonAbelian Chern-Simons theory,” Phys. Rev.  [**D46** ]{} (1992) 5521-5539. \[[hep-th/9209005](http://arxiv.org/abs/hep-th/9209005)\]. L. V. Avdeev, D. I. Kazakov, I. N. Kondrashuk, “Renormalizations in supersymmetric and nonsupersymmetric nonAbelian Chern-Simons field theories with matter,” Nucl. Phys.  [**B391** ]{} (1993) 333-357. S. Deser, R. Jackiw, S. Templeton, “Topologically Massive Gauge Theories,” Annals Phys.  [**140**]{}, 372-411 (1982). S. Deser, R. Jackiw, S. Templeton, “Three-Dimensional Massive Gauge Theories,” Phys. Rev. Lett.  [**48**]{}, 975-978 (1982). W. Siegel, “Supersymmetric Dimensional Regularization via Dimensional Reduction,” Phys. Lett.  [**B84** ]{} (1979) 193. S. S. Gubser, I. R. Klebanov, “A Universal result on central charges in the presence of double trace deformations,” Nucl. Phys.  [**B656** ]{} (2003) 23-36. \[[hep-th/0212138](http://arxiv.org/abs/hep-th/0212138)\]. A. C. Petkou, “Evaluating the AdS dual of the critical O(N) vector model,” JHEP [**0303** ]{} (2003) 049. \[[hep-th/0302063](http://arxiv.org/abs/hep-th/0302063)\]. V. S. Alves, M. Gomes, S. L. V. Pinheiro, A. J. da Silva, “A Renormalization group study of the (phi\* phi)\*\*3 model coupled to a Chern-Simons field,” Phys. Rev.  [**D61** ]{} (2000) 065003. \[[hep-th/0001221](http://arxiv.org/abs/hep-th/0001221)\]. L. C. de Albuquerque, M. Gomes, A. J. da Silva, “Renormalization group study of Chern-Simons field coupled to scalar matter in a modified BPHZ subtraction scheme,” Phys. Rev.  [**D62** ]{} (2000) 085005. \[[hep-th/0005258](http://arxiv.org/abs/hep-th/0005258)\]. S. Weinberg, “The quantum theory of fields. Vol. 2: Modern applications,” Cambridge, UK: Univ. Pr. (1996) 489 p. W. A. Bardeen, M. Moshe, M. Bander, “Spontaneous Breaking of Scale Invariance and the Ultraviolet Fixed Point in O($n$) Symmetric $(phi^{6}$ in Three-Dimensions) Theory,” Phys. Rev. Lett.  [**52** ]{} (1984) 1188. M. Moshe, J. Zinn-Justin, “Quantum field theory in the large N limit: A Review,” Phys. Rept.  [**385** ]{} (2003) 69-228. \[[hep-th/0306133](http://arxiv.org/abs/hep-th/0306133)\]. J. H. Schwarz, “Superconformal Chern-Simons theories,” JHEP [**0411** ]{} (2004) 078. \[[hep-th/0411077](http://arxiv.org/abs/hep-th/0411077)\]. D. Gaiotto, X. Yin, “Notes on superconformal Chern-Simons-Matter theories,” JHEP [**0708** ]{} (2007) 056. \[[arXiv:0704.3740](http://arxiv.org/abs/0704.3740) \[hep-th\]\]. D. J. Amit, E. Rabinovici, “BREAKING OF SCALE INVARIANCE IN phi\*\*6 THEORY: TRICRITICALITY AND CRITICAL END POINTS,” Nucl. Phys.  [**B257**]{}, 371 (1985). A. G. Dias, M. Gomes, A. J. da Silva, “Dynamical breakdown of symmetry in (2+1) dimensional model containing the Chern-Simons field,” Phys. Rev.  [**D69** ]{} (2004) 065011. \[[hep-th/0305043](http://arxiv.org/abs/hep-th/0305043)\]. A. G. Dias, A. F. Ferrari, “Renormalization Group and Conformal Symmetry Breaking in the Chern-Simons Theory Coupled to Matter,” Phys. Rev.  [**D82** ]{} (2010) 085006. \[[arXiv:1006.5672](http://arxiv.org/abs/1006.5672) \[hep-th\]\]. E. Rabinovici, M. Smolkin, “On the dynamical generation of the Maxwell term and scale invariance,” JHEP [**1107**]{}, 040 (2011). \[[arXiv:1102.5035](http://arXiv.org/abs/arXiv:1102.5035) \[hep-th\]\]. A. F. Ferrari, E. A. Gallegos, M. Gomes, A. C. Lehum, J. R. Nascimento, A. Y. .Petrov, A. J. da Silva, “Coleman-Weinberg mechanism in a three-dimensional supersymmetric Chern-Simons-Matter model,” Phys. Rev.  [**D82**]{}, 025002 (2010). \[[arXiv:1004.0982](http://arXiv.org/abs/arXiv:1004.0982) \[hep-th\]\]. L. Girardello, M. Porrati, A. Zaffaroni, “3-D interacting CFTs and generalized Higgs phenomenon in higher spin theories on AdS,” Phys. Lett.  [**B561** ]{} (2003) 289-293. \[[hep-th/0212181](http://arxiv.org/abs/hep-th/0212181)\]. W. Heidenreich, “Tensor Products Of Positive Energy Representations Of So(3,2) And So(4,2),” J. Math. Phys.  [**22** ]{} (1981) 1566. S. Elitzur, A. Giveon, M. Porrati, E. Rabinovici, “Multitrace deformations of vector and adjoint theories and their holographic duals,” JHEP [**0602** ]{} (2006) 006. \[[hep-th/0511061](http://arxiv.org/abs/hep-th/0511061)\]. E. Witten, “Multitrace operators, boundary conditions, and AdS / CFT correspondence,” \[[hep-th/0112258](http://arxiv.org/abs/hep-th/0112258)\]. M. Berkooz, A. Sever, A. Shomer, “’Double trace’ deformations, boundary conditions and space-time singularities,” JHEP [**0205** ]{} (2002) 034. \[[hep-th/0112264](http://arxiv.org/abs/hep-th/0112264)\]. S. Giombi, S. Minwalla, S. Prakash, S. P. Trivedi, S. R. Wadia, X. Yin, “Chern-Simons Theory with Vector Fermion Matter,” \[[arXiv:1110.4386](http://arXiv.org/abs/arXiv:1110.4386) \[hep-th\]\]. S. Giombi, S. Prakash, X. Yin, “A Note on CFT Correlators in Three Dimensions,” \[[arXiv:1104.4317](http://arxiv.org/abs/1104.4317) \[hep-th\]\]. E. E. Boos, A. I. Davydychev, “A Method Of The Evaluation Of The Vertex Type Feynman Integrals,” Moscow Univ. Phys. Bull.  [**42N3** ]{} (1987) 6-10. S. H. Shenker, X. Yin, “Vector Models in the Singlet Sector at Finite Temperature,” \[[arXiv:1109.3519](http://arxiv.org/abs/1109.3519) \[hep-th\]\]. R. Gopakumar, C. Vafa, “On the gauge theory / geometry correspondence,” Adv. Theor. Math. Phys.  [**3** ]{} (1999) 1415-1443. \[[hep-th/9811131](http://arxiv.org/abs/hep-th/9811131)\]. S. Sinha, C. Vafa, “SO and Sp Chern-Simons at large N,” \[[hep-th/0012136](http://arxiv.org/abs/hep-th/0012136)\]. R. G. Leigh, A. C. Petkou, “Holography of the N=1 higher spin theory on AdS(4),” JHEP [**0306** ]{} (2003) 011. \[[hep-th/0304217](http://arxiv.org/abs/hep-th/0304217)\]. E. Sezgin, P. Sundell, “Holography in 4D (super) higher spin theories and a test via cubic scalar couplings,” JHEP [**0507** ]{} (2005) 044. \[[hep-th/0305040](http://arxiv.org/abs/hep-th/0305040)\]. [^1]: The Chern-Simons action is required to make the operator $F_{\mu \nu}(x)$ trivial, to ensure that we do not add any additional local operators to the theory beyond the singlets of the vector model. [^2]: For the Abelian Chern-Simons theory coupled to a scalar field, such corrections were studied in [@Alves:1999hw; @deAlbuquerque:2000ec]. [^3]: These diagrams were already computed in [@Chen:1992ee]. [^4]: This theory has a “parity anomaly” which means that $k$ must be a half-integer rather than an integer, but this will not affect our large $N$ discussion here. [^5]: The $U(1)$ flavor symmetry is in fact part of the gauged $U(N)$ symmetry. Nevertheless, in the large $N$ limit that we are interested in, we can obtain the same results by gauging only an $SU(N)$ group, and then the $U(1)$ is a global symmetry. [^6]: There are also diagrams that include $(\phi^\dagger\phi)^3$ vertices, but they have tadpole matter loops, and all such loops vanish in our regularization scheme. [^7]: Note that we are using here the fact that we only have marginal couplings. In a theory with relevant operators like $(\phi^2)^2$, anomalous dimensions can arise even from finite diagrams, but this is not true in our case. [^8]: We use a normalization in which the 2-point functions remain finite in the large $N$ limit. [^9]: We thank S. Minwalla for discussions on this issue.
{ "pile_set_name": "ArXiv" }
David Barksdale David Barksdale (born Donise David Barksdale; May 24, 1947 – September 2, 1974), also known as King David, was an American gang leader from Chicago, Illinois. Barksdale was the leader of the Black Disciples. He and Larry Hoover decided to merge and create the Black Gangster Disciple Nation. Barksdale died on September 2, 1974, due to kidney failure at age 27. Biography Born Donise David Barksdale in Sallis, Mississippi to parents Virginia and Charlie Barksdale, He was the tenth of thirteen children. His family moved to Chicago, Illinois, in 1957. Within three years of arriving to Chicago, Barksdale had become a notorious gang leader. By 1972, Barksdale's gang absorbed several others and became known as the Black Disciple Nation. Tensions grew between the Black Disciples and other gangs such as the Black Stone Rangers. In 1968 the leader of the Black Stone Rangers, Eugene Hairston, ordered a hit on Barksdale, which resulted in Barksdale's being shot seven times while sitting in his car in May of that year. Barksdale was shot in the abdomen while exiting a bar in the Englewood neighborhood one night in June 1970, but survived and continued running the gang, while Hairston was sent to prison and eventually killed for trying to organize his murder. Barksdale eventually grew sick of the bloodshed and proposed a merger with Larry Hoover, leader of the Gangster Disciples in 1973. Hoover accepted and the Black Gangster Disciple Nation was born. Over the course of his life Barksdale was arrested 25 times, but never convicted of any serious offense. On several occasions when he was arrested he used the alias "David Jones". Death and legacy On September 2, 1974, Barksdale died from kidney failure as a result of a June 1970 attack in which there was an attempt on his life by members of the Black P Stone Rangers armed with M14 rifles outside of a bar Barksdale was frequenting with Larry Hoover on 848 West 69th Street. The assassination attempt ended a truce that was in place at the time. He was survived by his three children; David, Melinda and Ronnie Barksdale (one of whom was gunned down by a member of the Gangster Disciples street gang in 1996) and wife Yvonne Barksdale (née Yarber), until she was murdered three years later in June 1977. Barksdale is still revered by the Black Disciples. Every year there is a birthday celebration in his honor. In 2008, there was a parade that was sponsored and supported by the Black Disciples organization, in a controversial move, registered by the Chicago City Council for the Saturday of Memorial Day Weekend. The parade was criticized by the Fraternal Order of Police, and officers administering the event were forewarned about potential gang violence. References Category:1947 births Category:Deaths from kidney failure Category:Disease-related deaths in Illinois Category:Criminals of Chicago Category:People from Attala County, Mississippi Category:American mob bosses Category:African-American mobsters Category:American mobsters Category:Gang members Category:1974 deaths
{ "pile_set_name": "Wikipedia (en)" }
692 N.W.2d 838 (2005) FLINT PROFESSIONAL FIREFIGHTERS UNION LOCAL 352 v. CITY OF FLINT. Nos. 126681, 126682, 126683. Supreme Court of Michigan. February 28, 2005. SC: 126681, 126682, 126683. COA: 244953, 244961, 244985. On order of the Court, the application for leave to appeal the June 17, 2004 judgment of the Court of Appeals and the applications for leave to appeal as cross-appellants are considered, and they are DENIED, because we are not persuaded that the questions presented should be reviewed by this Court.
{ "pile_set_name": "FreeLaw" }
Design and Synthesis of Fluorinated Amphiphile as (19)F MRI/Fluorescence Dual-Imaging Agent by Tuning the Self-Assembly. Both (19)F MRI and optical imaging are powerful noninvasive molecular imaging modalities in biomedical applications. To integrate these two complementary imaging modalities, the design and synthesis of a novel (19)F MRI/fluorescence dual-modal imaging agent is reported herein. Through Sonogashira coupling reaction between the fluorinated phenylacetylene and 1,2,4,5-tetraiodobenzene, a fluorophore with 48 symmetrical fluorines at its periphery was constructed with high efficacy. High aqueous solubility was achieved by PEGylation of the fluorophore with monodisperse PEGs. However, an unexpected self-assembly of the PEGylated amphiphilic fluorophore in water "turned off" the (19)F NMR signal. However, hydrogenation of the triple bonds or introduction of branched monodisperse PEGs was able to efficiently tune the self-assembly, resulting in the "turning on" of the (19)F NMR signal. One of these amphiphiles combines the advantages of label-free fluorescence, high (19)F MRI sensitivity, biocompatibility, and excellent aqueous solubility. The results demonstrate the great potential of such amphiphiles for real-time (19)F MRI and fluorescence dual-modality imaging.
{ "pile_set_name": "PubMed Abstracts" }
The Hatchimals children's toy craze during this past holiday season got me thinking about the must-have toys from my childhood. Looking back, I now have a ton of appreciation for my parents when I imagine them waiting in a line with all the other patient parent's to try and snag me a Furby for Christmas. There are some toys from my childhood that I keep around for nostalgia sake, either because I really liked them at the time or because now they're kind of cool retro toys of the past. Since our Community is made up of a fairly good mix of different age groups I'm really curious to see what everyone's favorite childhood toys were, and what toy crazes everyone here remembers. So SpiceHeads, what were the best, must-have toys from your childhood? Do you still hold onto any cool old-school toys? Legos, Tinker Toys, Ring-a-ma-Jigs (I think that's what they were called), Etch-a-Sketch, Matchbox/Hot Wheels, Tiddly Winks was a fun game. As I got older I got into Transformers, Mask, and GI Joe. My mom used to enter all kinds of drawings (by hand via postal mail) and won me a lot of cool toys...I remember having some Thundercats stuff that she had won for me. Oh, and Atari 2600 circa 1983, playing on an old (at that time) black-and-white TV. I got a first gen Playstation and a TV one year for Christmas, 98 I think; I grew up the son of a *then* underpaid hired farmhand and finding that in my room was something I was then unable to comprehend, even now looking back i have no idea how they did it. Legos were always big for me, along with Hot Wheels/Matchbox cars, and course there was my Game Boy! The main "craze" toy that I really wanted and ended up getting were ZipZaps. They were miniature customizable RC cars- about the size of a Matchbox car. RadioShack (back when they were still halfway solvent) was sold out of them for months.
{ "pile_set_name": "Pile-CC" }
AIO Launcher for Android AIO Launcher for Android is not an ordinary launcher app. EVERYTHING you need is located on the home screen as you will see from screenshots below. If you are looking for a different kind of launcher then you might like to give this a try. With the current free version (paid version costs £0.79p) you can have the following on your home screen: Weather - current weather and forecast for 10 days System monitor - RAM and NAND usage, percentage of battery power Player - when you turn on the music, playback control buttons appear Frequent apps - frequently used applications buttons Frequent contacts - the list of recent contacts Your apps - the icons of the selected applications (paid) SMS - recently received SMS Dialer - number pad for quick calls Timer - timer start buttons Mail - list of received emails RSS - latest news Twitter - all tweets or a single user tweets Calendar - upcoming events in the calendar Exchange rates - currency exchange rates Bitcoin - current bitcoin price Usage: Access your list of installed applications by dragging from the left edge of the screen To refresh the information on the screen, pull down Hold finger on various elements of the screen to open menu To open settings, hold your finger on the search button, and then click the gear icon Hold the title of the widget to move it around Any widget can be disabled in settings You can minimise the widget by clicking on its name To remove an application, open the application menu, hold your finger on the desired application, and drag it to the recycle bin icon. This launcher offers very quick access to everything and may prove to be very handy for some users. Definitely worth a try but it certainly won't be everyone's cup of tea.
{ "pile_set_name": "Pile-CC" }
Who would have thought? AIRLINES across the globe are delivering the aircraft of tomorrow, today, with some of the most cutting edge onboard features ever seen heading to a plane near you. Travel Associates Brand Leader David Lovelock said the world’s leading carriers were spending millions to stay one step ahead of the competition in bringing passengers the most modern flying experience possible. “Everything from touch screen tablet computers to double beds have made it to today’s aircraft and airlines aren’t stopping there,” he said. “Previously unheard of tech improvements and comfort upgrades are currently being installed by some of the biggest airlines in the world to give passengers a cutting edge experience every time they step onboard.” Travel Associates has compiled a list of the most amazing features you thought you’d never see in air travel. 1) Mile high exercise bikes Passengers who want more than a mid-flight stroll up the aisle to stretch their legs may soon have solution to their problems courtesy of Lufthansa. The brains at Lufthansa Tecknik have created an aircraft ready exercise bike that satisfies aviation regulations and is available for installation. Cabin pressure, coupled with the lower concentration of oxygen onboard, means you won’t be setting any records for pace but climbing in the saddle for a few minutes is sure to warn off the stiffness of a long haul flight. 2) More legroom in economy Salvation for long legged passengers has arrived. New slimline seats from UK company Acro Aircraft Seating is giving the big and tall among us some extra room to manoeuvre with its cutting edge Superlight seat model. The revolutionary design keeps all structural components out of the foot well to allow more room for the legs of the passenger sitting behind it. Add in the ability to recline and flying economy with Delta Airlines is now a little less claustrophobic. 3) Food that tastes good Airline food has never been regarded as anything but a gastronomic disaster and with many passengers preferring to go hungry rather than chow down, airlines have turned to some of the best chefs in the world to make the midflight meal easier on the palette. Qantas signed up celebrity chef Neil Perry as its coordinator of flight catering to revolutionise its onboard menus. Business class passengers flying Virgin Australia are treated to sophisticated gourmet menu created Sydney’sLuke Mangan, including a full three course meal prepared on board by the crew. First class passengers on United Airlines flights can enjoy a menu overseen by American Michelin Star winner Charlie Trotter. Air France has also followed suit, recently enlisting the help of triple Michelin Star winner Alain Ducasse to revamp its onboard offering. 4) Double beds Virgin Atlantic has introduced double beds for passengers travelling in Upper Class Suites aboard its Boeing 747-400 aircraft. Couples can enjoy two square metres of space to stretch out but anyone thinking of joining the mile high club might want to reconsider. The partitioned suites might stop passengers on either side noticing any funny business but over-amorous travellers are sure to be spied by anyone walking down the cabin aisle. 5) Aircraft of the future Airbus is pioneering a revolutionary aircraft design featuring a transparent hull, allowing passengers to take in the spectacular vista of the sky while flying. Passengers keen for a bird’s eye view of the world may be waiting a while though, Airbus predicts a 2050 timeline for delivery of the futuristic design. Boeing’s long awaited 787 Dreamliner is sure to be a breath of fresh air to passengers. The building materials used in its design gives it a high strength to weight ratio with low cabin elevation, effectively increasing the amount of oxygen circulating through the aircraft. Along with a slight increase in onboard humidity and air filtration, flying aboard the Dreamliner will be a fresher and healthier experience without the dreaded ‘drying out’ effect of air travel. 6) Showers First class passengers flying with Emirates can refresh and revitalise with a mile high shower onboard the airline’s A380 aircraft. Passengers can book 25 minute slots in the onboard facilities including a five minute shower to revitalise on long flights. Don’t worry about getting caught out mid-shampoo, Emirates has installed a software controlled timer to ensure passengers can keep track of when their water is about to stop. 7) Smart-phone boarding passes No printer? No worries. Air Canada, Lufhansa and SAS are leading the way in mobile boarding passes with specialised smart phone applications. Passengers can check in with their smart phone and receive a code via SMS for scanning at the airport. Only a select few airlines currently offer the service with carriers including United, Continental and American Airlines seeking to expand the program to more than 30 airports across the world. 8) Tablet computers American Airlines has announced an agreement with Samsung Mobile to replace its current personal entertainment devices on 767-200 and 767-300 aircraft with the Samsung Galaxy Tab 10.1. The move will give passengers access to next generation touch screen entertainment in 600 American Airlines planes by mid 2012. 9) The paperless airplane cabin The days of flipping through a dog-eared in-flight magazine could soon be a thing of the past as airlines ditch the pre-takeoff rag for a digital alternative. Singapore based company SmarttPapers Aviation has already given Singapore Airlines a head start, transferring its three in-flight magazines to the onboard Krisworld entertainment system in A380 and Boeing 777 aircraft. The change isn’t just a tech upgrade. Stripping the weight of hundreds of hard copies helps save on fuel and cuts the environmental cost of producing the magazines. 10) Next gen onboard amenities First class passengers aboard Japanese carrier ANA are treated to a personal 23 inch touch screen for in flight entertainment, the largest onboard screen in its class. Travellers in all ANA’s premium class cabins also have access to warm water bidet toilets, an industry first. Business and first class passengers looking to get away from their seats aboard Emirates, Qantas and Singapore Airlines A380s can enjoy a tipple and a chat at the onboard bar. Emirates is also helping it’s passengers beat jet lag with an inventive cabin lighting system that mimics daylight, sunrise and sunset to keep passengers’ body clocks in synch with their destination time zone. 11) 3D movies With Hollywood’s latest blockbusters now being presented in 3D, airlines are looking to give passengers an immersive 3D experience minus the annoying glasses. MasterImage, the company behind cutting edge 3D entertainment for mobile devices, has plans to outfit new and existing aircraft with revolutionary glasses-free 3D capabilities similar to Nintendo’s highly successful 3DS game system. 12) Carbon friendly fuel With operators around the world looking to cut carbon emissions, switching to renewable fuels is a hot industry topic. Eight US based airlines, as well as Lufthansa and Air Canada, have signed letters of intent with Washington Based Solena Fuels to use the company’s biomass derived jet fuel. Low emission fuel producer Neste Oil also showcased its NExBTL renewable aviation fuel at the Paris Air Show. Commercial use of the fuel on aircraft is due to begin in late 2012.
{ "pile_set_name": "Pile-CC" }
Demystifying Information Technology It is no longer news that information technology (IT) costs are eating up an ever-increasing share of organizational budgets. And with good reason! Internal IT services are more vital and more complex than ever. AUTHOR:Sébastien Boivin, CPA, CMA Director, DECIMAL It is no longer news that information technology (IT) costs are eating up an ever-increasing share of organizational budgets. And with good reason! Internal IT services are more vital and more complex than ever. Listen in on conversations about server sizing, web hosting infrastructure or cloud computing, and you may feel like you’re lout of your depht! In this kind of context, Finance Managers struggle to safeguard their company’s financial health. – How can IT costs be controlled when their cost behaviour is a mystery? – How can a department’s performance be managed when its principles and components are expressed in an unknown language? In fact, the answer to both these questions is simple, and the answer lies in collaboration between these two very different skill centres. And, in order to collaborate, they must understand each other and speak the same language. This article suggests a way to establish a common language between IT and the rest of the organization, making it possible to not just talk to IT, but also to talk about IT – and its value-added services – to your company’s internal clients. Basic principles To lay the groundwork of this new communication with your IT services, and to help them become real business partners that bring real added value, simply follow the process (outlined below), much of which is based on management accounting principles: Transparency and accountability Use an activity-based costing model to establish a common language and circulate the resulting data; Ownership Sending IT Service Consumption Reports to internal clients in an easily-understandable language will lead to greater ownership of the data; Control and behavioural change Use activity-based management (ABM) to empower managers making them imputable of their specific IT usage; Establish policies and expectations designed to influence managers’ behaviour with respect to their internal IT service usage; Credibility Help IT use the momentum generated by ABM to make better decisions and, with time, to communicate better results; Generate usage and costing reports that show the impact of behavioural changes over time; Trust and respect Improved decisions by the IT department will bring them greater credibility; this means they will be included in more decisions and projects and provided with more information, thereby enabling them to more effectively manage their services; Value-added business partners IT views Finance as a trusted advisor and includes that department in its planning and decision-making processes; IT’s contribution is recognized and appreciated, leading to improved collaboration between the various departments. What Is “IT” What Does It Do? Transparency and accountability The first phrase of the process involves establishing a language by which IT can communicate with the rest of the organization. This can be done by setting up an easily-understood cost model enabling IT to explain the costs (and breakdown of those costs) of internal client deliverables. Once the model has been implemented, the results must be circulated and employee questions must be answered. This is the best way to tackle the lack of understanding around IT costs and deliverables. Implementing activity-based accounting means adhering to a number of basic principles, but the most important one for IT models is isolating and explaining the difference between technical services (those provided by IT) and user services (those used by internal clients). All too often, employees make unflattering comments about internal IT service costs. In fact, a cost of $2,000 per computer seems quite high when you consider that you could buy an equivalent computer for $1,250 at any retail outlet. However, once it has been shown and methodically proven that, unlike computers for sale in the store, the $2,000 computer is supported, integrated into a network, equipped with corporate licences and, what’s more, is kept secure – then the price difference is justified and a common understanding of internal IT services is established. The following chart breaks down services to users into their component parts in order to show what is included in the cost of a server or office computer. Sample IT Cost Model Breakdown: Stéphane Gélinas, MBA, CPA, CMA has written an article that goes into greater detail on this topic. You can find the article here. Ownership The next step is to generate a report of internal IT service usage, based on activity-based cost modelling data. Similar to an invoice showing cost per unit, these reports will be distributed to IT service users. To explain the value that IT services bring to each stakeholder in an organization, it is important to frame the information in easily-understood terms, so managers can see the impact of their team’s activities on IT costs. Once they have grasped that impact, it will be that much easier to persuade managers to reduce their usage. The other part of the equation is getting people to understand the full range of IT services provided to the organization, and to hammer home the fact that IT has a limited capacity to meet needs and deliver services. All too often, IT is considered capable of delivering an endless supply of on-demand services, many of which have no significant impact on financial or organizational performance. The goal of presenting the range of IT services is to emphasize their limited capacity to supply the services in question, thereby enabling managers to put the services they use into perspective and hence to grasp the impact their usage has on the organization’s bottom line. To maximize the impact of this usage report, it is vital that it be written in easily-understood terms. If you want managers to grasp the connection between their actions and their use of IT services, the terms – and, specifically, the units of measurement – must be clear. Highly technical units of measurement (MIPS, server components (MHz, cores), number of jobs generated, etc.), will only confuse managers and prevent them from making informed decisions about how to reduce their use. However, if the report uses more comprehensible units (number of computers, number of small / medium / large servers, terabytes allocated, etc.), managers will see the connection and take the necessary steps to reduce their use of IT services. Sample Usage Report for Managers: Control and behavioural change When managers receive an IT services usage report showing Units Used x Unit Cost, obviously they have no control over the Unit Cost part of the equation. However, they can and must do something about the Units Used. Any manager with a 10-person team who receives a usage report showing 13 computers has an obligation to look into those excess units. Is the team supposed to have three additional computers or should they be returned to IT? Since the cost per unit is spelled out in the usage report, the manager can easily see the financial impact of their decision: for instance, returning 3 computers at $2,000 each = $6,000. However, it is unlikely that the savings will have any significant impact for the organization, at least in the short term – unless, that is, the company has no computers on hand and must urgently buy three new ones to meet additional needs. The real impact of the managers’ decision is that it gives IT some wiggle room to meet future needs and delay any new computer purchases. The report also enables the organization to impose limits on IT service use, to monitor and measure the impact of those limits. For example, if the IT manager mentions that the organization is running out of network space, the organization could implement a policy asking employees to refrain from storing downloaded music or private photos on company computers. The managers of the organization can then observe the change in storage over time and put the necessary measures in place to achieve their desired decrease in usage. Credibility When IT usage numbers have been circulated and read, IT has the perfect tool with which to establish its credibility throughout the organization. As previously mentioned, it is IT’s responsibility to control the Unit Cost part of the equation. If the unit cost gradually goes down, and the IT infrastructure performs well, employees will have no choice but to praise the IT managers’ good work. Once the Control and behavioural change step is complete, an organizational shift with respect to internal use of IT services is already well under way. Even as managers are scaling back their use of IT services, IT must do their share to ensure active and effective management of their costs and capacity. When determining the cost IT services, a not inconsiderable, often overlooked component is the cost of excess capacity. To further illustrate this point, the following list gives some defining features of an IT infrastructure: High implementation cost; Relatively low maintenance cost compared to acquisition cost; Can be used in different ways: effectively or not; extensively or not at all; Its size depends on its ability to meet the highest peak in demand; Overall processing power for computers doubles every 2 years, so the technology you buy tomorrow will cost the same, yet be twice as powerful as what you buy today.i Take a computer fleet, for example: its acquisition cost was high ($1,000 per computer); its maintenance cost is relatively low; the computers may be utilized (or not), effectively (or not); the number of computers purchased is based on the organization’s requirements during peak periods (i.e., if, because of the influx of interns, the number of employees goes from 30 to 40 in the summer, IT must purchase 40 computers to meet peak summer demand); and, finally, if the purchase can be delayed, computers purchased at the same price a year later will be much more efficient than those purchased today. The graph below illustrates how capacity management can impact IT costs by showing daily peak usage times. To effectively meet the daily demand, the network must be capable of meeting peak need, indicated as level D4. Determining infrastructure size requirements: Once infrastructure size has been decided, the next step is to analyze the cost of services provided and to determine the cost of excess capacity, as illustrated by the following chart: How to calculate the cost of excess capacity: The above chart shows that the cost of excess capacity is $13, as the unit price goes from $8 for the first scenario (at full capacity) to $21 for the second scenario (with ineffective capacity management). That amount ($13 or $21 minus $8) is more than the cost of the service itself! The example clearly shows the importance of effective capacity management of IT services in order to achieve the lowest cost per unit possible and, in the process, improve IT’s credibility. Once you have isolated the cost of excess capacity, the next question is: who will pay for it? If there is one department in particular that is responsible for the peak in demand, should it pay for the excess infrastructure related to that peak, or should the excess capacity cost be distributed evenly through a higher unit cost that everyone would pay? While the answer to that question will vary from one organization to another, it will certainly be easier to make that kind of decision once a common understanding of costs has been achieved. Trust and respect Between IT and the rest of the organization there now prevails an attitude of trust and respect. The veil of mystery surrounding IT activities, costs and the strategic and ever-present role they play has now been lifted. Managers have realized that their behavioural changes are shown in their internal usage report, and IT has demonstrated sound management of their costs and performance. As a result, IT becomes a trusted advisor that the organization is more likely to include in its decision-making processes. Summary: There must be a common language enabling IT to communicate with the rest of the organization, leading to an improved understanding of IT activities; The whole organization knows what IT does and what it is capable of delivering; Managers know how their actions impact IT costs, and are careful to optimize their use of internal services; This gives IT managers more room to manoeuvre, in terms of both cost and capacity management, resulting in decreased IT costs and improved IT performance; The decreased IT costs attributed to managers’ actions gives the IT department greater credibility; This credibility translates into trust and respect for the work done by the organization’s IT department. This is how IT becomes a value-added business partner within your organization!
{ "pile_set_name": "Pile-CC" }
The Bulls have lost seven players to injury on their Australasian tour and Peter Grant will miss the Stormers tour. Locks Flip van der Merwe and Grant Hattingh are the latest duo to be ruled out of the tour. Winger Bjorn Basson could become the eighth player to leave the tour early if he fails a fitness test later in the week. The Bulls, who beat the Blues and then lost to the Crusaders and Reds, play the Brumbies in their final tour outing. Stormers flyhalf Peter Grant will be out for longer than four weeks because of an ankle injury.
{ "pile_set_name": "Pile-CC" }
Q: Continuity of l-adic cohomology: is the cohomology of the generic point isomorphic to the completion of the limit of cohomology of open subvarieties? Let $X$ be a variety over an algebraically closed field $k$. Denote by $\eta$ its generic point; it is the inverse limit of the open subvarieties $X_i$ of $X$. It is well known that the etale cohomology of $\eta$ (i.e. the corresponding cohomology of the Galois group of $\eta$) with $\mathbb{Z}/l^n\mathbb{Z}$-coefficients is isomorphic to the direct limit of the $\mathbb{Z}/l^n\mathbb{Z}$-cohomology of $X_i$ (here $l\ne char\, k$, $n>0$). I would like to know: is it true that $H^\ast_{et}(\eta, \mathbb{Z}_l)$ is the $l$-adic completion of $\varinjlim H^\ast_{et}(X_i, \mathbb{Z}_l)$ (here one should consider the continuous etale cohomology of $\eta$ i.e. the continuous $\mathbb{Z}_l$-cohomology of its Galois group, whereas for $X_i$ the continuous etale cohomology is just the 'naive' one)? This seems to be equivalent to: $\varinjlim H^\ast_{et}(X_i, \mathbb{Z}_l)$ contains no infinitely divisible elements. What can one say about this limit? A related question: when does an open dense embedding of varieties necesarily yield an embedding of their $\mathbb{Z}/l\mathbb{Z}$-cohomology? The problem is that the cohomology of $\eta$ is usually not finitely generated. So I was not able even to find the answer for the corresponding continiuos profinite group cohomology (of the fundamental groups of $X_i$) question (whereas I am not sure at all that one can replace $\varinjlim H^\ast_{et}(X_i, \mathbb{Z}_l)$ by $\varinjlim H^\ast_{cont}(\pi_1(X_i), \mathbb{Z}_l)$ here). PS. I was silly not to complete $\varinjlim H^\ast_{et}(X_i, \mathbb{Z}_l)$ in the first version of my question. A: You may consider $X=\mathbf{P}^1_k$, and look at the first cohomology group $\varinjlim H^1_{et}(X_i,\mathbf{Z}_l)$. By the toposic version of Hurewicz theorem, this colimit is the same as $\varinjlim Hom_{cont}(\pi_1(X_i),\mathbf{Z}_l)$ (where $Hom_{cont}$ means continous morphisms of topological groups). Each $X_i$ is $X$ minus a finite set of closed points, so that $\varinjlim H^1_{et}(X_i,\mathbf{Z}_l)$ will look very much like a free $\mathbf{Z}_l$-module on an infinite set (once $\infty$ has been removed, we freely add a generator each time we leave out some point; take $k$ to be the field of complex numbers to fix the ideas). On the other hand, we can do the same computation with finite coefficients, and thus, using the continuity of étale cohomology with finite coefficients, conclude that the $l$-adic Galois cohomology of $\eta$ is (or, at the very least, surjects to) the $l$-adic completion of $\varinjlim H^1_{et}(X_i,\mathbf{Z}_l)$. This clearly provides a counterexample. As for the question if an open immersion can induce an injective map on cohomology, you can again look at an open subset of a smooth curve: using the Gysin long exact sequence, you will see that the cohomology of the complement has to fit somewhere and that this gives serious obstructions to injectivity (at least if you want such a property in every degree).
{ "pile_set_name": "StackExchange" }
Effects of iron, copper and zinc on the activity of ribonucleotide reductase in normal and leukemic human lymphocytes. The activity of ribonucleotide reductase (RR) extracted from normal and leukemic human lymphocytes was assessed. The activity of the enzyme was five times higher in leukemic cells than in normal lymphocytes. Fe and Cu stimulated and Zn inhibited RR activity in both types of cells. Zn also partially reduced the stimulatory effects of Fe and Cu. Deferoxamine (DFX) alone inhibited the activity of the enzyme and enhanced a similar inhibitory action of hydroxyurea (HU). In both cases the inhibitory effects were reversed by Fe and Cu, but not Zn. These findings suggest that: 1) Fe, Cu and Zn may modulate RR activity in vitro and their action is related and interdependent. 2) DFX alone may inhibit RR activity. 3) DFX enhances HU effect on leukemic cells. 4) The effects of both inhibitors may be modified by trace metals.
{ "pile_set_name": "PubMed Abstracts" }
Q: What is the difference between GFS analysis and GFS forecast data? gfsanl_3_20151201_0000_006 means that the analysis was made at 0000 UTC and is valid at 0600 UTC, doesn't it? But for how long, 3 hours? And what is the difference to gfs_4_20151201_0000_006, which is listed under GFS forecast? I cannot figure out the difference between those two. A: I'm no expert at this, I've just been working with a variety of gfs gribs for a while now. The only thing I know about them is what I've read and I'll cite them here. I don't know where you got those files. It looks like you're looking at the files that are sub areas, but in general the file format goes as shown more clearly on this website: data/nccf/com/gfs/prod/gfs.YYYYMMDDHH/gfs.tHHz.formidffhour !GRIB_version/ncep/model/#000/YYYYMMDDHHNNFfff/parm/level! ###### Grid #004, 0.5x0.5 degree lat/lon grid, formid = pgrb2 (Hours F000-F180) GRIB_version=grib2 (grid number appears as #000) Note: fhour: anl, f00, f06, f12....f384 (note: 2 or 3 digit fhour as on ftp server) GRIB2 Note: "model date" and "forecast hour" fields are not separated by "/" I suggest you pull your files from here to start with. The anl vs fxxx is the fxxx are intermediate simulation runs that often contain uninitialized data. Forecasts contain the same parameters as analysis AND accumulated forecast variables such as precipitation. Analysis files, if they contain the forecast-only fields, set them to zero. For instance, both FNL and GFS files obtained directly from NCEP, contain the CRAIN variable. But, in the FNL file, all of the CRAIN fields will be zero. In summary, the FNL analysis incorporates ~10% more data than the GFS by waiting for ~3 hours longer for the data stragglers. GFS forecasts contain accumulated fields, such as precipitation, that are missing or set to zero in the analysis fields. - link This analysis-forecast cycle is complex and iterative. Here's a bit more detail. And here is the current status in real time of models running.
{ "pile_set_name": "StackExchange" }
Q: Show icon on containing div hover I want to show the edit icon only when the user hovers over the containing div: <div class="toolbar"> <span class="pull-xs-right"> <i class="fa fa-pencil show-on-hover"></i> <i class="fa fa-remove"></i> </span> </div> The remove icon should still display. How do I do that with css only? A: You can do it simply like this: .toolbar { width: 200px; height: 100px; background: #000; color: #fff; padding: 10px; } .toolbar .show-on-hover { display: none; float: left; margin: 5px; } .toolbar:hover .show-on-hover { display: inline; } <link href="http://fontawesome.io/assets/font-awesome/css/font-awesome.css" rel="stylesheet"/> <div class="toolbar"> <span class="pull-xs-right"> <i class="fa fa-pencil show-on-hover"></i> <i class="fa fa-remove"></i> </span> </div>
{ "pile_set_name": "StackExchange" }
This invention relates to potted-plant-irrigator tables with tubular legs having water conveyance with controlled flow for conveying water and optionally fertilizer from conveyance in the tubular legs to plants on one or more table surfaces and/or on optional plant-holder extensions for drip irrigation and other controlled-flow irrigation and fertilization. A wide selection of plant tables, benches and racks are known, but not with structural and controlled-irrigation capability and adaptability made possible by tubular legs, flow controllers and attachments in a manner taught by this invention. Examples of different but related potted-plant holders and irrigators are described in the following patent documents. U.S. Pat. No. 5,272,835, issued to Stern on Dec. 28, 1993, described a self-watering pot with double walls for conveying water from a spigot to water outlets positioned circumferentially inside a top of the pot. U.S. Pat. No. 5,220,745, issued to Elliott, et al. on Jun. 22, 1993, described a drip-irrigation pot having a single wall and a single tube from a water spigot to a single irrigation dripper inside of a top portion of the pot. German Patent DE 40 28 802 Al, issued to Richter Sep. 11, 1990, described an automatic watering device for flower pots having a duct with water outlets in a plurality of flower pots on a bench. U.S. Pat. No. 4,211,037, issued to Green on Jul. 8, 1980, described a method and apparatus for irrigating plants in containers having porous bottoms positioned on tops of wetted surfaces. U.S. Pat. No. 3,686,792, issued to Barfield on Aug. 29, 1972, was limited to pots supported in the same level and having bottom-end holes to which feeder lines are extended from a main distribution line. U.S. Pat. No. 3,108,401, issued to Richardson on Oct. 29, 1963, was limited to a plant display rack with central support about which mounting means were positioned. U.S. Pat. No. 3,108,400, issued to Wolfe, Jr. on Oct. 29, 1963, was limited to an elongated bench supporting a plurality of plant receptacles and having a rectilinear main water conduit extended longitudinally with the bench instead of having water-filled legs with irrigation controls and other features taught by this invention. U.S. Pat. No. 3,085,364, issued to Chapin on Apr. 16, 1963, was limited to features similar to the above Wolfe, Jr. patent with a central water tube on a greenhouse bench with outlets to separate potted plants on the bench.
{ "pile_set_name": "USPTO Backgrounds" }
Q: what's the meaning of "${0##*[\\/]}" in shell? I got the question when i looking other's shell script. I saw that declared APP_NAME="${0##*[\\/]}" Since I can't find any answer, what's the meaning of this code? A: It's Shell Parameter Expansion to get script name itself, without path See bash manual: ${parameter##word} The word is expanded to produce a pattern and matched according to the rules described below (see Pattern Matching). If the pattern matches the beginning of the expanded value of parameter, then the result of the expansion is the expanded value of parameter with the shortest matching pattern (the ‘#’ case) or the longest matching pattern (the ‘##’ case) deleted. Pattern Matching: * Matches any string, including the null string. When the globstar shell option is enabled, and ‘*’ is used in a filename expansion context […] Matches any one of the enclosed characters. Explanation ${parameter<...>} expression means that you can expand shell parameters. I.e. ${1:-"default_arg_value"} will be expanded to "default_arg_value" if script running without arguments. 0 - is a 0th argument, i.e. script name itself ${0##<pattern>} will delete longest matching to <pattern> part of $0 *[\\/] means any string that ends with \ or / symbol. So, APP_NAME="${0##*[\\/]}" means that $APP_NAME will be initialized by script name itself, without path. Sample Let's suppose you have script a/b/c/d/test.sh: #!/bin/bash echo "${0##*[\/]}" echo "${1#*[\/]}" echo "${2##[\/]}" $ bash a/b/c/d/test.sh /tmp/e /tmp/ff > test.sh > tmp/e > tmp/ff
{ "pile_set_name": "StackExchange" }
Monday, December 11, 2017 Hey you guys, I wanted to stop in for a minute and share with you about creating in your home. I love to study the Bible , draw, water paint, read books and time alone with my Lord. I have always wanted to create a space in my home just for me to do the things I love. I used to have my desk in the laundry room, but it was more isolated than I wanted it to be. There is nothing cozy about a laundry room. Anybody? I decided to move the desk into my bedroom placing it in front of the window and adding a real plant (the palm) and a diffuser. This creates an oasis space during the evening and a cheery, sunny place in the daytime. Oh my goodness! I love my new space. When working towards purging, and organizing your home. Do not forget to create areas in your home making it a place you will love. Keep your home full of love for one another, find ways to quieten your home and life. Thursday, June 8, 2017 Yesterday, I set the farmhouse table up with empty pots, soil, and herbs. Nothing is so relaxing than planting herbs or a garden. These herbs have a place in my home. A plan is in mind, one that will take some time to completed. Adding herbs to your home creates a beautiful inviting home.
{ "pile_set_name": "Pile-CC" }
Like every one has different tastes, so it is hard for restaurants to determine a portion size that will make each and every diner happy. Of course, what servers should be able to do is to tell diners if they’re bound for more food than they may be able to eat. Here's a quote: "Perhaps others might disagree, but my general experiences are: At very fine restaurants, portion size is rarely a problem. At chain restaurants and steak houses, the portions are way too big. At chain steak houses, the portions are ridiculously big. At good to fine restaurants, it’s quite random as to portion-size, although price can be a real hint. I have noticed that restaurants that focus on sustainable sources for their food have more reasonable portion sizes. Finally, bad restaurants tend to have portion sizes that are too big...." Hopefully this can help set some expectations. As for 798 unit & co., I would prefer to re-visit and judge for myself.
{ "pile_set_name": "Pile-CC" }
Ok, I bit the bullet and spent some time finishing off "Greebly". It went live on Android Market tonight. Within a couple of weeks it'll be live on the App Store too. Check out my Greebly page for the promo video and screen shots
{ "pile_set_name": "Pile-CC" }
William Tennent High School William Tennent High School is a public high school serving grades 9 through 12, located in Warminster, Pennsylvania, US. The school is the only public high school serving Warminster and Upper Southampton townships and Ivyland borough in the Centennial School District, located in Bucks County, Pennsylvania. The school was named in honor of William Tennent, Presbyterian minister and founder of the original Log College, a very early theological school located in the colony of Pennsylvania. The first William Tennent High School building was located across the street from the current high school and when both were in use, the buildings were called William Tennent Intermediate High School (grades 9 and 10) and William Tennent Senior High School (grades 11 and 12) (the current school). The site of the original Log College is located near the modern high school Notable alumni Brian Baker - Class of 1985 - actor, former Sprint pitchman Thomas W. Druce - former Pennsylvania State Representative, class of 1979. Frank Coonelly - Class of 1978. President, Pittsburgh Pirates Bernie O'Neill - former Pennsylvania State Representative Josh Ostrander - musician, class of 1998. Mike Vogel - actor, class of 1998. Kermit Cintron - Champion boxer, class of 1999. Mike Pettine - head coach, Cleveland Browns, was a head coach for the school before being terminated. Steve Capus - president of NBC News: 2005-13; currently executive producer of CBS News. Feeder schools Middle schools Log College Middle School Eugene Klinger Middle School Elementary schools McDonald Elementary Willow Dale Elementary Davis Elementary References External links Official school website Category:Educational institutions established in 1955 Category:Public high schools in Pennsylvania Category:School buildings completed in 1974 Category:Schools in Bucks County, Pennsylvania Category:1955 establishments in Pennsylvania
{ "pile_set_name": "Wikipedia (en)" }
You are viewing this article in the AnnArbor.com archives. For the latest breaking news and updates in Ann Arbor and the surrounding area, see MLive.com/ann-arbor Posted on Wed, Dec 12, 2012 : 6:10 p.m. EMU community asks for answers following student's death By Kyle Feldscher Friends and classmates of Julia Niswender attended a forum on campus security at Eastern Michigan University student center Wednesday afternoon. Courtney Sacco I AnnArbor.com Eastern Michigan University community members didn’t get many of the answers they’d hoped to get at a campus safety meeting Wednesday following the apparent homicide of Julia Niswender. University officials organized the meeting in the EMU Student Center’s auditorium Wednesday afternoon, less than 24 hours after Niswender was found dead in her apartment. According to police, she hadn’t been seen for several days before one of her suitemates asked officers check on her at 9:30 pm. Tuesday. Ypsilanti police Detective Sgt. Thomas Eberts said police found evidence he called “suspicious” and led to “unanswered questions,” causing police to call Niswender’s death an apparent homicide. At the campus safety meeting Wednesday, EMU Police Chief Bob Heighes was tasked with explaining to the approximately 200 members of the community why he couldn’t release that information. “This is an Ypsilanti police case, not an EMU Police case,” Heighes said. “We are assisting them wherever and whenever we can with information involving our student. A lot of things we don’t have information on because it’s not our case.” EMU police Chief Bob Heighes speaks to the campus community. Courtney Sacco | AnnArbor.com Heighes told the crowd what he knew: Niswender’s suitemate called police at 9:30 p.m. Tuesday after not seeing her for a few days. When police arrived, they found her dead in her bedroom and began their investigation. In the morning, Ypsilanti investigators told EMU Police they were calling Niswender’s death an apparent homicide before releasing that information to the public. An autopsy on Niswender’s body was done Wednesday and completed in the afternoon, Heighes said. However, the results of the autopsy were not available at Wednesday’s meeting and Heighes was not able to provide a timeline on when more information would be available. No representatives from the Ypsilanti Police Department were at the meeting Wednesday. EMU spokesman Geoff Larcom said the university held the meeting to show what they were doing in their response to Niswender’s death, provide safety tips and counseling services and to express their condolences to Niswender's friends and family on behalf of the university, and the Ypsilanti police were not asked to be in attendance. University President Susan Martin made some brief remarks, extending her sympathies to Niswender’s friends and family. Martin immediately became choked up during the beginning of her comments. University President Susan Martin address students about the death of Julia Niswender. Courtney Sacco | AnnArbor.com She said Heighes called her in the middle of the night after he was told of Niswender’s death. Martin said she immediately woke up and began contacting top administrators at the university, most of whom had been working through the night. “Our job is to communicate directly to you what we know and what we don’t know,” she said. When he spoke to AnnArbor.com Wednesday afternoon, Eberts said many questions had to go unanswered because police are protecting their investigation. He wouldn’t say if police found evidence of violence at the apartment when they arrived or what kind of evidence led police to believe a homicide took place. Students at the meeting at EMU asked Heighes if police have a suspect in mind, if the person who is believed to have killed Niswender was armed and dangerous. Heighes sounded apologetic as he was unable to answer. “I don’t have any other details other than what I shared,” he said. Heighes did pass along safety tips to students, asking them to not wear headphones while walking on campus, walk with a partner, call police if they see something suspicious and to call authorities if they get any unsolicited visitors. EMU officials also said they're adding extra police patrols. Many students expressed concern with the on-campus student escort service that allows students walking around late at night to have someone walking with them for safety. Among the concerns were the escort service sometimes doesn't come, ends at 3 a.m. and won't accompany students to off-campus housing. Officials also encouraged any students in need of counseling to seek out the professionals at EMU’s Snow Health Center. Lisa Lauterbach, director of the university’s Counseling and Psychiatric Services, said she spent most of the day talking to students and staff members about Niswender’s death. She said the counselors at the Snow Health Center are available for free from 8 a.m. to 5 p.m. Monday through Friday. “People are feeling unsettled, some people are feeling unsafe,” she said. “It’s scary to think this kind of thing can happen in our community.” Officials said any more information about Niswender’s death would first come from the Ypsilanti police before being sent to the university community. Anyone with information on Niswender’s death is encouraged to call Eberts at 734-482-9878 or Crime Stoppers at 1-800-SPEAKUP (773-2587). Comments 15crown00 Fri, Dec 14, 2012 : 12:17 a.m. the police have to be very careful what they say and do and that's exactly what they are doing.no amount of security can prevent this from happening and it amps up only after a tragedy like this occurs. these crimes occur all to often these days.. Mary K Thu, Dec 13, 2012 : 8:25 p.m. I'm disappointed with the message the EMU Police Dept is giving to students. It feels like we (the public, students, faculty members, etc.) are being asked to change our habits, our behaviors, our lives in order to accommodate criminals in our community. I wish more pressure was put onto the criminal groups in our neighborhoods. I would like to see stronger statements about consequences of crime and addressing criminal culture on our campus and in the greater community. I don't think the EMU PD meant these comments to come across as blaming victims, but as an audience member it definitely began to feel that way. Students get so many e-mails about being aware and locking doors and calling SEEUS but no one is talking about addressing criminals themselves and breaking criminal habits or stopping crime before it starts. Tru2Blu76 Fri, Dec 14, 2012 : 7:13 a.m. The first city police services were established in Philadelphia in 1751- So what exactly do you think police have been trying to do since then?? You seem to be fixated on this idea that any suggestion you IMPROVE your own security is &quot;blaming&quot; - it's just pointing out that too many people haven't done enough to protect themselves. If you're so BOTHERED by these CONSTANT recommendations, then maybe you ought to consider the CAUSE (which is exactly the problem with people depending on government to protect them while denying personal responsibility). Try a little analytical thinking: it's not the victim's fault that she may have let someone in she shouldn't have - but suggesting caution about letting people into your room or house is a legitimate suggestion for the REST of the subject population (i.e. EMU students). It's called learning from this tragic example - supposing it was a murder. College is a transitional state: adult age students are supposed to be learning how to BE adults. It's not all job related: it involves developing judgement and other faculties which (everyone knows) have NOT yet developed in college students. You used &quot;accommodate&quot; inappropriately: the security measures recommended to you aren't &quot;accommodating&quot; criminals but ARE intended to THWART OR COUNTER criminals. You've taken on two premises which are incorrect (1) cops are the only safe guards and (2) self protection is &quot;accommodating&quot; criminals. Taking responsibility for your own safety is inconvenient: that's what you're really protesting, isn't it? Being an adult is &quot;inconvenient&quot; - it's more about responsibility than it is freedom to do whatever you like. Stopping crime before it starts isn't simple either: if cops stopped everyone they thought &quot;might&quot; commit a crime - that would be unconstitutional. You can enlighten the rest of us (in a major way) by giving us YOUR plan. How would you stop coed killings? EMU Prof Thu, Dec 13, 2012 : 6:47 p.m. One may also want to note that 'homicide' means death at the hands of another person, not necessarily murder. All murders are homicides, but the reverse is not true. So who knows what they found in that room. Awful. BhavanaJagat Thu, Dec 13, 2012 : 6:22 p.m. Yesterday I had watched the T.V. news and the parents of Julia had shared their sense of grief with the community of viewers. The sense of loss is profound and they have no clue. Apparently, there was no forced entry into her bedroom, and there was no noise or disturbance that could attract the attention of others in the building. I am sure that the results of the autopsy examination would be shared and it may help us to know the basis for suspicion of homicide in this very unfortunate death of a young college student. YpsiVeteran Thu, Dec 13, 2012 : 5:42 p.m. EMU needs to do a better job of ratcheting down expectations, not fanning the flames of people who have unrealistic ideas about crime investigations, especially since it's not even their case. I understand they have students who are concerned, but I agree with SonnyDog09; what's the point of calling everyone into a big meeting and then telling them nothing? The Cleary act requires that people be notified. It doesn't require inciting mass anxiety. It could be weeks, months, or even years before anybody has any idea who was involved in what happened to this girl. The idea that every crime scene provides some kind of bread-crumb trail directly to the suspect is a TV fantasy. It's also very possible nobody knows anything yet. People need to get used to the idea that life is not controllable or predictable, and all they can do is make good choices on a daily basis and hope for the best. Tru2Blu76 Fri, Dec 14, 2012 : 6:45 a.m. I don't see how you or anyone can characterize what EMU security / admin did as &quot;inciting mass anxiety.&quot; First of all: the real presumption is that adults have some capacity for providing for their own safety and responsibility for that as well. Adults are not helpless and no mature person expects comprehensive statements from officials who themselves are trying to find answers. We've had cops in the family over the years (1 shot and unable to continue on the job, the other simply using the position to transition to another job - fire fighter). From them and other cops, I get a different picture of what takes place when police examine a crime scene. For example: note that the victim was killed in her own room (one of several sharing a common room) which has a lockable door. Also note that they've found no evidence of physical trauma - which suggests at least one of two things (neither of them indicating the action of a crazed, roaming gunman). The cops CERTAINLY know more than they're tell us - that's also standard cop procedure. They WLL NOT for example mention whether the victim was clothed or unclothed, whether clothes (if any) were in disarray, etc. What the &quot;cops&quot; HAVE SAID is all about ways for other students (etc) to keep their own safety in mind, to follow THE SUGGESTIONS made available through web links. It is ODD that a few people think these things mean nothing and instead continue insisting that the cops &quot;do something.&quot; This time (and all times) personal safety IS PERSONAL - up to those who have become concerned. salineguy Thu, Dec 13, 2012 : 5:32 p.m. People - please take a deep breath and think for a moment. If there was any chance that law enforcement officials thought that there was an inherent and immediate danger to those around the campus area and beyond, don't you think that there would be much more of a public response to warn the community that a killer was on the loose and that he (most likely) was armed and dangerous. Let the cops do their jobs and have some faith that they are getting to the bottom of this tragedy. This may be, understandably, hard considering how badly a similar tragedy was handled by the university and by investigors a few years back, but please let the details emerge and let the family greive. YpsiVeteran Thu, Dec 13, 2012 : 5:44 p.m. The incident you refer to involved EMU PD and &quot;investigators,&quot;, not Ypsilanti Police. They are two completely different organizations. lorayn Thu, Dec 13, 2012 : 3:32 p.m. This is such a tragedy. I am glad to see that EMU is handeling this in an ethical way, following the Cleary Act. They seem to have learned from the last tragic homicide. Atticus F. Thu, Dec 13, 2012 : 2:49 p.m. My girlfriend is a student at Eastern, I'm very concerned for her safety, and I believe we have a right to know if somebody is targeting women on campus. This is way too little information being submitted by the Police department... Especially if other women might be in danger. Mary K Thu, Dec 13, 2012 : 8:30 p.m. They probably haven't released information because they don't have any yet. Criminal investigations are like puzzles, when you first pour out the box the pieces are everywhere and you don't know what the picture is. It takes time to put together all the pieces of someone's life. At this point, they probably only have the pieces. Their concern is always going to be the safety of the community, that's why they are part of YPD in the first place and put their lives on the line every day. I trust they will show us what parts of the picture they've put together when they have actually gotten that far. EMU Prof Thu, Dec 13, 2012 : 4:27 p.m. Yes, the powers that be remember that and have learned their lesson (hence the forum yesterday). This is being handled very differently, by an altogether different president and administration. Also note that this is YPD, not our police (not that our police wouldn't do a great job. They're an excellent force as well.) 1 attack/murder would not dictate a pattern of targeting woman. There needs to be a trend. 1 occurance is not a trend. Don't even need to watch criminal minds to know that... Tell your gf to walk in groups of at least 2 or more. That's a start. EMU Prof Thu, Dec 13, 2012 : 3:18 p.m. Atticus: a very understandable concern. And while I could be wrong, I think that if they believed that, they'd let us all know. YPD is held in very high regard and I trust them to handle this the right way. pseudo Thu, Dec 13, 2012 : 2:16 p.m. First - this is terrible and my heart and prayers go out for everyone involved. Second - this is a newly discovered crime. Nobody is going to have instant answers. EMU and Ypsilanti police have a good working relationship but they are separate organizations. Ypsi Police have proven over the years to be very effective. Third - That area seems to be getting a significant up-tick in crime generally. Whats going on? SonnyDog09 Thu, Dec 13, 2012 : 1:48 p.m. EMU needs to dust off their &quot;PR 101&quot; notes and recognize that having a public meeting where you do not provide information to the public is worse than not having a meeting at all. EMU Prof Thu, Dec 13, 2012 : 6:43 p.m. Yeah, but they thing is they'd sent numerous emails with the exact same information. And having the chief of police warn everyone to watch themselves made people more, not less, nervous. Mainly the point of the meeting seemed to be to make sure they were seen as being straightforward and forthcoming with us (they spent a lot of time talking about the notifications they sent and when). I'm not being cynical here, I understand why they did it, but still I'm not convinced it was a good idea. FFan Thu, Dec 13, 2012 : 5:45 p.m. Why dust off &quot;PR 101&quot; when they are acing &quot;PR 404&quot;. When they are not responsible for leading the investigation but involved and doing everything they can, letting the public know what they know is a great move. Yeah, not a lot of information, but some basics to say &quot;We are working with YPD to ensure this doesn't happen again and to keep the greater community safe&quot; is the best they can do. Thanks for breaking the silence EMU EMU Prof Thu, Dec 13, 2012 : 3:15 p.m. Agreed. LXIX Thu, Dec 13, 2012 : 11:34 a.m. Clearly the Eastern community is upset and frantic for answers in this case. This also impacts their own personal security on campus until the facts are known. EMU is pursuing the correct course of action by reassuring the student body that the professional investigators are now in charge of the matter outside of their control. If a student likewise calls for help at the University of Michigan it is not as clear which security organization answers and who is in control of the subsequent investigation. That is unacceptable. LXIX Thu, Dec 13, 2012 : 3:16 p.m. If someone calls 911 on UM campus to report a missing room mate. Who is going to answer that call, then respond accordingly, and investigate? Housing Security? DPS? AAPD? UM Legal Affairs Department? Response time, evidence collection/preservation, and witness information can be critical towards resolving a &quot;potential&quot; crime and further keeping the community secure. We have recently read about a number of cases where the UM &quot;potential&quot; crime solving policy has not worked very well. The Ann Arbor Police Department with sufficient funding should be the only answer. EMU is doing this one correctly. Ignatz Thu, Dec 13, 2012 : 1:49 p.m. Whenever I call the U-M Police, I'm always know what organization answers. I don't know who you or the &quot;student&quot; are calling. simone66 Thu, Dec 13, 2012 : 4:16 a.m. I was in class last night on campus and left around 8pm. Dark and cold outside... little did we know that this poor girl would be found murdered hours later, and it seems she has been dead for a while. I think I'll skip going to the library tomorrow night and stay home and study. MIKE Thu, Dec 13, 2012 : 7:55 a.m. @Spirit Most men don't, some do, as well as some woman. In fact, what makes you assume the assailant was a man? kindred spirit Thu, Dec 13, 2012 : 6:51 a.m. brian, simone66 is likely a female. These ideas run through female's heads. At times curtailing our activities is a prison we females end up enduring because the night has not yet been taken back. Why do men have this seeming need to control other people through violence? brian Thu, Dec 13, 2012 : 4:35 a.m. You can't stop doing what you need to do. YPD is on the case and will bring justice. Just think and be safe. Do what you need to do with a group of people. Kyle Mattson Thu, Dec 13, 2012 : 3:53 a.m. If anyone is interested, Eastern has made a video of the forum available for viewing online here: http://www.emich.edu/investigation/ brian Thu, Dec 13, 2012 : 3:46 a.m. Let YPD do their job, they are on of the finest departments around and will do justice for the family. My heart and prayers to the family. anti-thug Thu, Dec 13, 2012 : 3:13 a.m. this is chilling special if you think of the co-ed killing of john Norman Collins being in same area in 68. supernatural . Shout out to the Ypsilanti Police and EMU Safety Departments. Cross your T's and dot your I's and put this one away forever. Robert Jenkins Thu, Dec 13, 2012 : 1:58 a.m. This is bad news. I hope she knew the attacker only because that would make it less likely that others are in danger. I will be thinking of this girl and her family. How sad. anti-thug Thu, Dec 13, 2012 : 3:15 a.m. yes lets hope ! we dont want another Collins. MoonmanDon Thu, Dec 13, 2012 : 1:42 a.m. This is horrifying. How do they expect us students to just go on with our regular school schedules with a possible murderer on the lose? Was it a gun, knife, choke, break in? We know nothing but they expect us to walk around campus feeling safe. We all have a hundred new questions and no gosh darn answers.. Give us answers!! There is a killer on the lose! redwingshero Thu, Dec 13, 2012 : 3:18 p.m. Spend some time outside the U.S. 99% of the world doesn't live like we do hear and get to enjoy a &quot;safe&quot; culture. How do we all still operate? Don't live in fear. If you change what you do, then the suspect has infact changed your behavior. Was Columbine closed for the rest of the year after that tragedy happened? Police cannot give away too much information for an ongoing investigation. It can compromise their work. Understood? Ignatz Thu, Dec 13, 2012 : 1:47 p.m. Sorry to tell you this, but there are killers on the loose all the time. Most likely they're not going to kill you, but one should always be aware of the situation in which they find themselves. Sara Thu, Dec 13, 2012 : 1:39 a.m. If the police aren't releasing details to the public or press, I imagine either they have no clue who the alleged killer is, or they know exactly who did it and don't want to tip their hat. The statistical likelihood is that the victim knew the person who killed her. Only 14% of murder victims did not know their killers. WalkingJoe Thu, Dec 13, 2012 : 3:11 p.m. I totally agree Skyjockey. The insensitivity of some people is incredible. Skyjockey43 Thu, Dec 13, 2012 : 1:07 p.m. JBK this is hardly a situation that calls for levity. Not even remotely funny Honest Abe Thu, Dec 13, 2012 : 1:01 a.m. This is awful and sad news. The Police need to release what they can, so the public can help out, of possible. JBK Thu, Dec 13, 2012 : 2:46 a.m. Abe - The problem is that the police CANNOT release eveything they know. It may be relevant to the investigation and if they release it, it may compromise the case. towncryer Thu, Dec 13, 2012 : 12:40 a.m. Obviously the sooner the police figure out if this was random or if the poor girl knew her attacker/killer, the better. How someone could have done this is beyond me--life is not fair sometimes...
{ "pile_set_name": "Pile-CC" }
July 14, 2010 I just purchased a copy of William Golding’s The Inheritors. Golding is famous for writing Lord of the Flies, a work of literature of such influence that it has made the transition into our everyday lexicon. But I just listened to a podcast of an interview with a biographer of the great author, and it seems that Golding and many of his admirers who are “close readers” judge The Inheritors as his finest novel. The general outline of the plot is easy enough to find on Wikipedia, it is one of those stories about the transition from a “bushy” hominin tree of life to the dominance of H. sapiens sapiens. Neandertals are finally expiring as a species in the face of the advance of modern humans, who marginalize and extirpate all those who came before. But I get the impression that the execution of Golding’s attempt is very different from Clan of the Cave Bear. Not having read the book yet I do not know if William Golding’s depiction is up to snuff with the latest scholarship on the Neandertals (granted, I am not up to date on the latest scholarship on Neandertals!), though he did guess correctly in all likelihood as to their pigmentation. But, in light of the highly probable non-trivial Neandertal ancestry in over 80% of humans, I feel like revisiting Golding’s vision in the near future, as we carry within our genomes the shadows of both the inheritors and the dispossessed. The column to the left has ways to contact me, as well as places I've contributed to over the years, and various links of interest relating to me, or by me. Below this section is a live stream of my Twitter feed. To the right is the output of my RSS feed, which mostly displays blog content. Needless to say any opinions that I express on the internet do not reflect those of any institution with which I am affiliated, or any individual with whom I am associated.
{ "pile_set_name": "Pile-CC" }
Q: Distributed Server Monitoring Solution I belong to an independent IT firm that manages and maintains about 50 business clients networks, ranging from small 5 system networks to 200+ systems. Because we are unable to directly monitor each server at these locations (distributed over a very large area) on a regular basis I am looking for a method to monitor and alert us to any problems that may arise so that we can respond quickly with, hopefully, preventative measures. I'm not sure what solutions are available for this type of situation, but something that utilizes a central server at our business with all client servers sending alerts or logs to it for daily monitoring might work best. All these servers are running a Windows Server OS. In your opinion, what would be the best course of action to accomplish this? A: Well, you don't mention what OS you hope to run the monitoring system(s) on, so I'll assume that you don't have a preference. My favorite monitoring app is Nagios. Nagios doens't have the same level of eye candy that some of its competitors do, but what it lacks in UI, it makes up for in rock-solid stability and performance. To your point about receiving notifications from behind firewalls, that's exactly what Nagios's passive host and service checks are for. They allow you to send alerts to Nagios from another application. That other application could be a home-grown script running on your windows servers or it could be another Nagios instance. As you're doing research on this, you should check out wikipedia's page comparing a bunch of different monitoring systems (both free and commercial). I found it to be very helpful.
{ "pile_set_name": "StackExchange" }
With the recent advances in digital technology, radiographic images are converted into digital image signals, and image processing is performed for the digital image signals to display the resultant images on a display device such as a CRT or print them out. In radiography, in order to suppress the influence of X-rays on the outside of a necessary area (irradiation field area) and prevent scattering from the outside of the necessary area to prevent a decrease in contrast, an irradiation field stop is generally used to limit the irradiation field to the necessary area. In general, an irradiation field area is extracted in advance to optimize an image processing parameter by eliminating unnecessary information from an image obtained by using an irradiation field stop. Such irradiation field stops include rectangular and circular stops, and recognition processing suited to the shapes of various irradiation fields have been proposed. For example, as processing for recognizing a rectangular stop, the method disclosed in Japanese Pat. Publication No. 05-049143 is available. In this method, X- and Y-axes are set along two adjacent sides of the contour of a rectangular irradiation field, and image data are added/totaled along the X-axis and Y-axis directions. In this case, the level of the added/totaled data within the irradiation field becomes higher than that of data in any other area outside the irradiation field, to which almost no X-rays are applied. Positions on the Y-axis at which the levels of the added/totaled data in the X-axis direction become higher than a predetermined threshold TH and positions on the X-axis at which the levels of the added/totaled data in the Y-axis direction become higher than the predetermined thumbnail TH are calculated. The rectangular area surrounded by lines which are located at the calculated positions on the Y-axis and extend in the X-axis direction and lines which are located at the calculated positions on the X-axis and extend in the Y-axis direction is set as an irradiation field area. As processing for recognizing a circular stop, the method disclosed in Japanese Pat. Laid-Open No. 11-328372 is available. According to this method, radiographic image data are scanned in an array manner or radially to detect differential signal values. Points at which the detected differential signal values are equal to or higher than a threshold TH and pixel signal values nearer to the image center become higher are detected as contour candidate points regarded as points located on the contour of the irradiation field. Of the plurality of detected contour candidate points, two points which are farthest from each other are extracted. In this case, since the straight line connecting the two points on the circular contour, the distance between which is largest, is regarded as the diameter of the circle, a circular area having the straight line connecting the extracted two points as a diameter is set as an irradiation field area. As a method of recognizing an irradiation field independently of the shape of the irradiation field, the method disclosed in Japanese Pat. No. 02596744 is available. In this method, a plurality of edge candidate points located on the end portions of an irradiation field are calculated from predetermined points contained in radiation on the basis of differential values along a plurality of radial directions. The area defined by locally connecting these edge candidate points with straight lines is set as an irradiation field area. According to the method disclosed in Japanese Pat. Laid-Open No. 05-049143, since the area surrounded by straight lines at positions where added/totaled data in the two set directions, i.e., the X and Y directions, are higher in level than the predetermined threshold TH is set as an irradiation field area, an irradiation field in a linear shape such as a rectangular shape can be extracted. However, this method cannot cope with an irradiation field in a polygonal shape constituted by straight lines in a plurality of directions or in a curved shape such as a circular shape. In contrast to this, according to the method disclosed in Japanese Pat. Laid-Open No. 11-328372, since a circle having, as a diameter, a line connecting two points, of extracted contour candidate points, which have the maximum distance is used, a circular irradiation field can be extracted. Obviously, however, this method cannot cope with irradiation fields other than circular irradiation fields. According to the method disclosed in Japanese Pat. No. 02596744, since the area defined by locally connecting a plurality of calculated edge candidate points with straight lines is set as an irradiation field, not only a rectangular irradiation field but also a polygonal or circular irradiation field can be extracted. However, even an irradiation field whose boundary line should be formed from a curved line, such as a circular irradiation field, is locally approximated by straight lines, and hence the irradiation field recognition result becomes a polygonal shape similar to a circular shape. That is, an irradiation field including a curved line, e.g., a circular irradiation field, can be recognized to some degree by polygonal approximation, but a curved shape cannot be extracted with high precision. As described above, according to the prior art, the recognition precision is low in the recognition of irradiation field fields having different shapes.
{ "pile_set_name": "USPTO Backgrounds" }
Q: How to show a comfirmation dialog when a batch file window is closed When users click the close (X) button of a batch file window, I want it to show a confirmation dialog asking "Are you sure want to close this batch file?" with Yes/No options. How can I do this? A: There are other great options than using a batch file for your purpose, but since you want it that way, here is the code @echo off Call :YesNoBox "Are you sure you want to do that?" if "%YesNo%"=="7" ( Call :MessageBox "You answered NO" "Heading" exit /b ) Code for invoking the message box exit /b :YesNoBox REM returns 6 = Yes, 7 = No. Type=4 = Yes/No set YesNo= set MsgType=4 set heading=%~2 set message=%~1 echo wscript.echo msgbox(WScript.Arguments(0),%MsgType%,WScript.Arguments(1)) >"%temp%\input.vbs" for /f "tokens=* delims=" %%a in ('cscript //nologo "%temp%\input.vbs" "%message%" "%heading%"') do set YesNo=%%a exit /b The above code is for programming the YesNo Options :MessageBox set heading=%~2 set message=%~1 echo msgbox WScript.Arguments(0),0,WScript.Arguments(1) >"%temp%\input.vbs" cscript //nologo "%temp%\input.vbs" "%message%" "%heading%" exit /b The above code is for setting up and programming the Message Window Hope it helps, but if you further want to refer for your purpose you should visit these links : 1st Link, 2nd Link Thanks!!!
{ "pile_set_name": "StackExchange" }
Comparison of the NH2-terminal amino acid sequences of the four non-identical subunits of the NAD-linked hydrogenases from Nocardia opaca 1b and Alcaligenes eutrophus H16. The cytoplasmic, NAD-linked hydrogenase of the Gram-positive hydrogen-oxidizing bacterium Nocardia opaca 1b was compared with the analogous enzyme isolated from the Gram-negative bacterium Alcaligenes eutrophus H16. The hydrogenase of N. opaca 1b was purified by a new procedure applying chromatography on phenyl-Sepharose and DEAE-Sephacel with two columns in series. A homogeneous enzyme preparation with a specific activity of 74 mumol H2 oxidized.min-1.mg protein-1 and a yield of 32% was isolated. The A. eutrophus enzyme was purified as previously published. Both enzymes are tetrameric proteins composed of four non-identical subunits (alpha, beta, gamma, delta). The four subunits of both of these enzymes were separated and isolated as single polypeptides by preparative polyacrylamide gel electrophoresis in the presence of sodium dodecyl sulfate. Immunological comparison of the four subunits of the Nocardia hydrogenase with those of the Alcaligenes enzyme showed that the alpha, beta, gamma, and delta subunits of one organism were serologically related to the analogous subunits of the other organism. Among themselves, the four subunits do not have any serological relationship. The eight individual polypeptides were also compared with respect to the NH2-terminal amino acid sequences determined by automated Edman degradation and to the amino acid compositions. Strong sequence similarities exist between the analogous subunits isolated from the two bacteria. Within the established N-terminal sequences the similarities between both alpha, beta, gamma and delta subunits amount to 63%, 79%, 80% and 65%, respectively. No similarities exist between the different, non-analogous subunits alpha, beta, gamma and delta.
{ "pile_set_name": "PubMed Abstracts" }
WordPress.com Forums » Topic: Linking Posts to Google+https://en.forums.wordpress.com/topic/linking-posts-to-google WordPress.com Forums » Topic: Linking Posts to Google+enTue, 03 Mar 2015 21:21:54 +0000http://bbpress.org/?v=1.1-alpha-2539raincoaster on "Linking Posts to Google+"https://en.forums.wordpress.com/topic/linking-posts-to-google#post-764799 Thu, 08 Dec 2011 01:05:45 +0000raincoaster764799@https://en.forums.wordpress.com/You are not alone in that opinion. I've stated time and again FIRMLY that I unfollow autoposters. I don't need more spambots in my life, even if their owners are nice people. Remember, too, when you push the same content out on different platforms by robot, you take away any reason for people to connect with you on more than one platform. ]]>timethief on "Linking Posts to Google+"https://en.forums.wordpress.com/topic/linking-posts-to-google#post-764713 Wed, 07 Dec 2011 23:24:51 +0000timethief764713@https://en.forums.wordpress.com/I'm an eccentric blogger and that is my strongly held opinion. ;) It's good to hear that you agree. ]]>nefertizahra on "Linking Posts to Google+"https://en.forums.wordpress.com/topic/linking-posts-to-google#post-764707 Wed, 07 Dec 2011 23:19:54 +0000nefertizahra764707@https://en.forums.wordpress.com/You wrote : "The most attractive thing about Google Plus is the fact that the don't enable auto-posting. That's the only social network that I know of where one can read original content. I'm sick and tired of seeing the same content duplicated, triplicated, quadruplicated across multiple social networks appearing in the SERPs." I never thought about this, but now that I have, I agree. Thanks for the answer & the enlightenment, timethief : - >
{ "pile_set_name": "Pile-CC" }
// // main.m // SFFmpegIOSHelloworld // // Created by 雷霄骅 on 15/6/23. // Copyright (c) 2015年 Lei Xiaohua. All rights reserved. // #import <UIKit/UIKit.h> #import "AppDelegate.h" int main(int argc, char * argv[]) { @autoreleasepool { return UIApplicationMain(argc, argv, nil, NSStringFromClass([AppDelegate class])); } }
{ "pile_set_name": "Github" }
Adventures in the kitchen and on the Big Green Egg Blueberry Lemon Cake with Lemon Cream Cheese Frosting My mother in law celebrated a birthday last week and of course I volunteered to bring the cake. (Remember last year’s Coconut Cake with Lime Curd Filling?) Typically, the girls in the family prefer fruitier desserts while the guys are all about chocolate. I am firmly in the fruity cake camp so I knew that was the direction I wanted to go with this cake. I’ve mentioned before that I have a tough time deciding what to make (I will browse recipes for hours) so I was excited when my sister in law suggested a cake with fresh blueberries. Luckily, my Google search for blueberry layer cake didn’t yield too many results. I trust anything that Epicurious posts on their site so I was sold on Blueberry Lemon Cake with Lemon Cream Cheese Frosting as soon as I saw it and noticed it received over 100 positive reviews. I totally must disclose that this is not a light and fluffy cake. It’s pretty dense and I was scared to death when I was removing it from the pan and frosting it that everyone would hate it. I typically prefer a light, airy cake and this is not that. I was so surprised that it ended up being moist and the texture worked with this cake. Everyone really enjoyed the cake and raved over the flavor. My friend Catherine also made the cake for her mother in law’s birthday after reading about it on my healthy living blog, Peanut Butter Runner, and it was also a hit with her family. The only modification that I made to the recipe was to increase the lemon zest in the batter and lemon juice in the frosting. I knew that I wanted a pronounced lemon flavor and some of the reviews suggested increasing the lemon. I will most definitely be baking this cake again. It’s such a fun (and ridiculously delicious) way to use fresh, local summer blueberries. FOR THE CAKE Preheat oven to 350 degrees. Butter three 8- or 9-inch diameter cake pans with 1 1/2-inch-high sides. Line bottom of pans with parchment paper and butter paper. Dust pans with flour and set aside. Stir together whole milk, vanilla extract and grated lemon peel in small bowl. In the bowl of a stand mixer fitted with the paddle attachment or using electric mixer, beat butter in until light and creamy. Gradually add sugar, beating until mixture is light and fluffy. Add eggs, 1 at a time, mixing well after each addition. Beat in flour mixture alternately with milk mixture, beginning and ending with flour. (Flour, milk, flour, milk, flour.) Gently fold in blueberries with a spatula. Divide batter equally among pans. Bake cakes until tester inserted into center comes out clean, about 23-25 minutes. Cool cakes in pans on racks for 10 minutes and then run knife around pan sides to loosen. Turn cakes out onto racks to cool completely. Peel off parchment paper. FOR THE FROSTING In the bowl of a stand mixer fitted with paddle attachment or using electric mixer, beat cream cheese and butter until light and fluffy. Gradually beat in powdered sugar (tasting as you go – you might not want all four cups of powdered sugar due to sweetness). Beat in lemon peel, juice if using and vanilla. Cover and refrigerate until just firm enough to spread, about 30 minutes. TO ASSEMBLE CAKE Transfer one cake layer to platter. Spread 3/4 cup frosting over cake layer. Top with another cake layer; spread with 3/4 cup frosting. Top with third cake layer. Spread remaining frosting over top and sides of cake. (Cake can be prepared up to one day ahead of time, covered and refrigerated. Let stand 30 minutes at room temperature before serving.) Decorate cake as desired and serve. […] I was so tired yesterday and my muscles (especially my hips) were aching. It took a cup of Yogi Green Tea Kombucha and Yerba Mate to get me through the afternoon at work. I had ZERO desire to run and knew my body needed a break. Enter peach cobbler, a beer, eggplant parmesan and updating Bakin’ and Eggs with Blueberry Lemon Cake with Lemon Cream Cheese Frosting. […]
{ "pile_set_name": "Pile-CC" }
CoverGirl Clean Glow Blush Brand: Covergirl Price: $8.99 Star rating: 5.0 Description: Complete your Clean® look with a flush of lightweight, blendable color. This versatile 3-in-1 multi-shade compact lets you customize your color to create a radiant effect. Use just one color or all three!Features: 3-in-1 multi-shade compactLightweight, blendable flush of colorClean and natural lookHow to Apply: Begin with the contour, or darkest, shade in your palette and apply to the hollow space below your cheekbones. Apply the medium shade to the apples of your cheeks and sweep upwards toward the hairline. For a youthful glow, highlight the tops of your cheeks with the lightest shade.
{ "pile_set_name": "Pile-CC" }
Internet of Things (IoT) is a network of uniquely-identifiable, purposed “Things” that are enabled to communicate data pertaining thereto over a wide communication network, whereby the communicated data form a basis for manipulating the operation of the “Things”. The “Thing” in the Internet of Things could virtually be anything that fits into a common purpose thereof. For example, the “Thing” could be a person with a heart rate monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert its driver when tire pressure is low, or the like, or any other natural or man-made entity that can be assigned a unique IP address and provided with the ability to transfer data over a communication network. Notably, if all the entities in an IoT are machines, then the IoT is referred to as a “Machine to Machine” (M2M) IoT or simply, as M2M IoT. It is apparent from the aforementioned examples that an entity becomes a “Thing” of an M2M IoT especially, when the entity is attached with one or more sensors capable of capturing one or more types of data pertaining thereto, segregating the data (if applicable), selectively communicating each segregation of data to one or more fellow “Things”, receiving one or more control commands (or instructions) from one or more fellow “Things”. The control commands are based on the data received by the fellow “Things” and executing the control commands results in the manipulation or management of the operation of the corresponding entity. Therefore, in an IoT-enabled system, the “Things” basically manage themselves without any human intervention, thus drastically improving the efficiency thereof. U.S. Pat. No. 9,052,216 B2 discusses an energy measurement system which measures electrical parameters, such as, line-to-line voltage/current, line to neutral voltage/current, total apparent power, reactive power, active power, fundamental and harmonic total energy per phase, fundamental and harmonic reactive energy per phase, active energy per harmonic frequency per phase, reactive energy per harmonic frequency per phase, fundamental and harmonic active energy per phase. WIPO publication WO2014089567A2 tells about automated monitoring of various sensors including sensors that measure power, voltage, current, temperature, and humidity of the power sources as well as notification triggers and alarms to a feature phone. CN 203588054U describes wireless network sensor monitoring system used in the power environment based on Internet of things. CN 102539911A discusses smart metering systems, large master system, digital substation and small smart metering sensor through mutual perception by the information and “Internet of Things”. US Patent publication 20120213098 A1 tells about the use of an internet of things analyzer with the function of measuring voltage, current and resistance as a regular multi-meter. U.S. Pat. No. 8,447,541 B2 discusses energy monitoring devices that are able to communicate with energy aware appliances comprising of an embedded energy monitor with connected network equipment, such as, a router or hub and a server. None of the prior art technologies emphasizes on utilizing distributed computing, power factor calculations and use of Big Data technologies to diagnose power quality issues of the power line to reduce the cost of electronics measuring it and offering scalability for a large number of measuring points. Aforementioned prior art technologies fail to address measurement of electrical parameters that affect power quality of power lines distributed in large numbers and over a large area. An organization with multiple locations around the world with multiple electrical lines to be monitored may be too huge to handle for the aforementioned prior art technologies. The aforementioned prior arts fail to address scale of data, frequency of data, calculation capabilities residing in a single location and so on. It is evident from the discussion of the aforementioned prior arts that none of them pave way for distributed power line diagnosis. Therefore, there exists a need in the art for a solution to the aforementioned problem.
{ "pile_set_name": "USPTO Backgrounds" }
Introduction The materials contained in this web site may be used for informational purposes only. By downloading any of the Materials contained in this site, you agree to the terms and provisions as outlined in this legal notice. If you do not agree to them, do not use this site or download Materials. Trademark Information Product or service names or logos referenced in this website are either trademarks or registered trademarks of this company. The absence of a product or service name or logo from this list does not constitute a waiver of trademark or other intellectual property rights concerning that name or logo. Ownership of Materials The information contained in this site is copyrighted and may not be distributed, modified, reproduced in whole or in part without prior written permission. The images from this site may not be reproduced in any form without the prior advance written consent. Unsolicited Idea Submission Policy We do not accept or consider unsolicited ideas, including ideas for new advertising campaigns, new promotions, new or improved products or technologies, product enhancements, processes, materials, marketing plans or new product names. Please do not send any original creative artwork, suggestions or other works. The sole purpose of this policy is to avoid potential misunderstandings or disputes when products or marketing strategies might seem similar to ideas submitted. Please do not send your unsolicited ideas to anyone at this company or it’s affiliates. If, despite our request that you not send us your ideas, you still send them, then regardless of what your letter says, the following terms shall apply to your idea submission. TERMS OF IDEA SUBMISSION You agree that: (1) your ideas will automatically become the property of this company, without compensation to you, and (2) we can use the ideas for any purpose and in any way, even give them to others. Software and Documentation Information Software Use of the software from this site is subject to the software license terms set forth in the Terms of Use Agreement. Documentation Any person is hereby authorized to: a) store documentation on a single computer for personal use only and b) print copies of documentation for personal use provided that the documentation contains Glenwood Inc.’s copyright notice. Third Party Companies and Products Mention of third-party products, companies and web sites on this website is for informational purposes only and constitutes neither an endorsement nor a recommendation. We assume no responsibility with regard to the selection, performance or use of these products or vendors. We provides this only as a convenience to our users. We make no representations regarding the quality, safety, or suitability of any goods or services found there. We assume no responsibility with regard to the performance or use of these products. All third party products must be ordered directly from the vendor, and all licenses and warranties, if any, take place between you and the vendor. Enforcement of Intellectual Property Rights We actively and aggressively enforces their intellectual property rights to the fullest extent of the law. Software Piracy In the United States and many other countries, copyright law provides for severe civil and criminal penalties for the unauthorized reproduction or distribution of copyrighted material. Copyrighted material includes, but is not limited to, computer programs and accompanying sounds, images and text. Under U.S. law, infringement may result in civil damages of up to 100,000 and/or criminal penalties of up to five years imprisonment and/or a 250,000 fine. Feedback and Information Any feedback you provide at this site shall be deemed to be non-confidential. We shall be free to use such information on an unrestricted basis. Warranties and Disclaimers The Company intends for the information and data contained in this web site to be accurate and reliable, however, since the information and data have been compiled from a variety of sources, it is provided as is. THE COPANY EXPRESSLY DISCLAIMS ALL WARRANTIES AND/OR CONDITIONS, EXPRESS OR IMPLIED, AS TO ANY MATTER WHATSOEVER RELATING TO OR REFERENCED BY THIS WEB SITE, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES AND/OR CONDITIONS OF MERCHANTABILITY OR SATISFACTORY QUALITY AND FITNESS FOR A PARTICULAR PURPOSE AND NON INFRINGEMENT.
{ "pile_set_name": "Pile-CC" }
Filter 1: ON PK Fc 31 Hz Gain 6.6 dB Q 1.41 Filter 2: ON PK Fc 62 Hz Gain 3.3 dB Q 1.41 Filter 3: ON PK Fc 125 Hz Gain 2.5 dB Q 1.41 Filter 4: ON PK Fc 250 Hz Gain 1.7 dB Q 1.41 Filter 5: ON PK Fc 500 Hz Gain 2.2 dB Q 1.41 Filter 6: ON PK Fc 1000 Hz Gain 3.4 dB Q 1.41 Filter 7: ON PK Fc 2000 Hz Gain -4.8 dB Q 1.41 Filter 8: ON PK Fc 4000 Hz Gain -1.3 dB Q 1.41 Filter 9: ON PK Fc 8000 Hz Gain -5.9 dB Q 1.41 Filter 10: ON PK Fc 16000 Hz Gain -8.9 dB Q 1.41
{ "pile_set_name": "Github" }
Q: Trigger to Send Email with Object Attachments I am trying to modify a trigger to add attachments to an email that is sent when a checkbox is checked. The attachments will come from the notes and attachments section of the Opportunity. I continue to get the "Method does not exist or incorrect signature:[Messaging.EmailFileAttachment}.add(Messaging.EmailFileAttachment)" Error. Below is my trigger. Any help? Thanks! trigger Send_To_PropSub on Opportunity (before insert, before update) { for(Opportunity opp : trigger.new){ if (opp.Sent_to_Prop_Sub__c == 'False') { Messaging.SingleEmailMessage email = new Messaging.SingleEmailMessage(); opp = [SELECT id, Name, Brand_Name__c, Business_Unit__c, Business_Units__c FROM Opportunity WHERE Id = :opp.Id]; // create email content String Name = opp.Name; String Brand = opp.Brand_Name__c; String BusinessUnit = opp.Business_Units__c; String subject = 'New Proposal '; email.setSubject(subject); String line1 = 'Name:'+Name+'+'; String line2 = 'Brand:'+Brand+'+'; String line3 = 'Business Unit: '+BusinessUnit+'+'; String body = line1 + line2 + line3; email.setPlainTextBody(body); email.setToAddresses(new String[]{'lisa.thornsberry@xcenda.com'}); if(email != null){ Messaging.sendEmail(new Messaging.singleEmailMessage[] {email}); opp.Sent_to_Prop_Sub__c = True; // fetch attachments for Opportunity Attachment att = [SELECT id, Name, body, ContentType FROM Attachment WHERE ParentId = : opp.id]; // List of attachments handler Messaging.EmailFileAttachment efa = new Messaging.EmailFileAttachment(); { // Create the email attachment efa.setFileName(att.Name); efa.setBody(att.body); efa.setContentType(att.ContentType); efa.setInline(false); efa.add(efa); } // Attach files to email instance email.setFileAttachments(efa); } } } } A: Replace the line efa.add(efa); with the following: List<Messaging.EmailFileAttachment> attachmentList = new List<Messaging.EmailFileAttachment>(); attachmentList.add(efa); And then change email.setFileAttachments(efa); to: email.setFileAttachments(attachmentList); You also have the code where the email is actually sent before you attach any attachments... Also as an aside, your trigger needs to be bulkified. You're running 2 queries per record that the trigger is executing on. This is really undesirable. Remember that the governor limit (synchronous) for SOQL queries in an execution context is currently 100 - if this trigger is activated by an event with more than ~50 records, or if some other process in the execution context uses any queries, the whole thing will fail. I recommend doing a search on trigger bulkification, there are tons of resources with walkthroughs.
{ "pile_set_name": "StackExchange" }
4)/(sqrt(12)/sqrt(2))))**2. 11881/6336 Simplify ((sqrt(17) - sqrt(34)/sqrt(2) - sqrt(17))*-2 + (sqrt(1377) + 1 + sqrt(17))**2)*-5 - ((sqrt(17)*-2*4)**2 + 2*(sqrt(51)/sqrt(3) - sqrt(17)))*-3. -5241 - 110*sqrt(17) Simplify ((5*(sqrt(10) + (sqrt(360) - -2*sqrt(360))))/(2*(sqrt(80) - sqrt(5))*3) + 2)**2. 190*sqrt(2)/9 + 9673/162 Simplify 1*(1 + (sqrt(200) - (sqrt(200) - -2*sqrt(200)*-4)) - -1*(5*(2*sqrt(200) + sqrt(200) + sqrt(200)))**2). 80*sqrt(2) + 80001 Simplify (-5 + -2*(0 + sqrt(304) + -5 + sqrt(304) + sqrt(304)))**2 + -4 + (sqrt(1539) + 3 + sqrt(19) + sqrt(304) + 0)**2. -156*sqrt(19) + 14698 Simplify (4*(sqrt(121) - -1*2*sqrt(121) - -1*-1*sqrt(121)))/(2*sqrt(396) - (sqrt(484) - -1*sqrt(484))/sqrt(11)). sqrt(11) Simplify (sqrt(6)/(2*sqrt(2)*2) + 4)**2 + (sqrt(3) - ((-2 + sqrt(3))*-1)**2)*5*1. -301/16 + 27*sqrt(3) Simplify 6*((5*(sqrt(190) + (sqrt(190) - sqrt(190)*-3)))/sqrt(10) - -2*5*sqrt(152)/sqrt(8))**2. 139650 Simplify ((sqrt(180)/sqrt(3)*-4)/(sqrt(12) - 3*sqrt(48)/sqrt(4) - sqrt(12)) + (2 + sqrt(80)*2)*2)*-5. -260*sqrt(5)/3 - 20 Simplify (2 + (sqrt(704) + -5 + 5 + -4 - ((-4*-1*sqrt(704) - sqrt(704)) + -2)))**2. 2816 Simplify (((sqrt(1008) - 6*(sqrt(1008) + 3) - (sqrt(1008) - (2 + sqrt(1008)*2))) + -4)*-6)**2. 69120*sqrt(7) + 595008 Simplify (((0 + sqrt(153))*-4 + 4)**2 - ((sqrt(153) + (-5 + 2*sqrt(153) - sqrt(153)))**2 - (-3 + sqrt(153)*-1))) + -1. -39*sqrt(17) + 1823 Simplify -2 + 4*(3*(sqrt(121)/sqrt(99))**2*4 - -2*(sqrt(11) - (sqrt(33)/sqrt(3) - sqrt(11)))**2*-2*3). -1414/3 Simplify (((-2*sqrt(209)*-3 - 5*sqrt(209)*-1)*-5)/(sqrt(1617)/sqrt(3) - (6*sqrt(77))/sqrt(7)))**2. 57475 Simplify (5 + -2 + (sqrt(475) + -3*sqrt(475) - sqrt(475)) + -2 + -5*sqrt(475)*-2 + sqrt(475) + 5 + -4)**2. 160*sqrt(19) + 30404 Simplify -1*(4*(-3 + (sqrt(1377) - (sqrt(1377) + 1)) + 6*sqrt(1377)*1)*3*-4)**2 + -5. -114250757 + 995328*sqrt(17) Simplify 4*(sqrt(297)/(sqrt(11)*-2) + sqrt(972)*-3)/((sqrt(729) + sqrt(729) + (-3*sqrt(729) - sqrt(729)) - sqrt(729) - sqrt(729)) + (3*sqrt(1296) - sqrt(9))). 74*sqrt(3) Simplify (4*-4*(1 + sqrt(363) + -4 + (sqrt(363) - (sqrt(363) - (-5 + sqrt(363) + -2 - sqrt(363)))))*3)**2*3. -1520640*sqrt(3) + 3200256 Simplify -1 + (-1*sqrt(1700) - sqrt(85)/sqrt(5)*1) + (2 + (sqrt(1088) + -1 + sqrt(1088) + -2 + sqrt(1088))*5)**2. -3131*sqrt(17) + 244968 Simplify (sqrt(14)/(sqrt(16)/sqrt(8)) - 3*sqrt(343)) + (5*((sqrt(175) - sqrt(175)*2) + sqrt(175) + 5))**2. -20*sqrt(7) + 625 Simplify (sqrt(119) + 1*sqrt(119)*3)/(sqrt(7)*2*5) - ((sqrt(833) + 0)**2*-2 + (sqrt(612) + 0)**2 + -3). 2*sqrt(17)/5 + 1057 Simplify -1*(1 + (sqrt(1300) - 4*-3*sqrt(1300))**2 + ((sqrt(1300) - (sqrt(1300) - 4*sqrt(1300))**2) + sqrt(1300))*-5) + -3. -278204 + 100*sqrt(13) Simplify -6*(-6*(((2*sqrt(102) - sqrt(102))*2 + sqrt(102))/(sqrt(24)/sqrt(36)) + 2*(2 + 2 + sqrt(425) - sqrt(425))))**2. -311256 - 31104*sqrt(17) Simplify ((sqrt(700) - (2 + sqrt(700)))**2 - (-2 + sqrt(175))**2) + -2 - (1 + sqrt(42)/sqrt(6) - (sqrt(7) - (3*sqrt(7) + -2)**2 - sqrt(7))). -245 + 31*sqrt(7) Simplify sqrt(42)/(sqrt(6) - 3*sqrt(6)) + sqrt(252)*4 + 0 + (-2*-1*sqrt(70))/(2*sqrt(1440)). 283*sqrt(7)/12 Simplify (2*sqrt(832) - sqrt(832))/(sqrt(4) + sqrt(576) + sqrt(576)*-2) + ((sqrt(208) + -1 - sqrt(208)) + -2 + 3 + -1)**2. -4*sqrt(13)/11 + 1 Simplify sqrt(16)/sqrt(128) - sqrt(2) - ((sqrt(2)*2)**2 - sqrt(2))*-3 - ((sqrt(72)*2)/sqrt(3))/(sqrt(12) + sqrt(36)/sqrt(3)*-2). -7*sqrt(2)/4 + 24 Simplify (-6*((5 + sqrt(98) + 1)*6 + -5 + (sqrt(98) - (2*sqrt(98)*-3 + sqrt(98)))))**2. 187488*sqrt(2) + 542628 Simplify 3 + (-5*2*sqrt(228)*5)/(2*(sqrt(108) - (-2*sqrt(108) - sqrt(108) - sqrt(108))) + sqrt(108) - sqrt(108)). -5*sqrt(19)/3 + 3 Simplify (-4*(sqrt(153)*-2 + sqrt(153)) - sqrt(153))/(sqrt(63)/sqrt(252)) + 5 + (sqrt(833)*1)**2 + -3 + -2. 18*sqrt(17) + 833 Simplify -5*((-1*sqrt(2448)*-5)**2 + 4 - ((2 + sqrt(2448) + 4 - sqrt(2448)) + 3)**2). -305615 Simplify -2 + (0 + -5 + (sqrt(832) + (sqrt(832) - ((sqrt(832) + 1 - sqrt(832)) + 2))**2 - sqrt(832))*1)*-1*-2. -96*sqrt(13) + 1670 Simplify (5 + ((sqrt(153) + sqrt(153)*-2)*-3 - sqrt(153)) + -4 - (sqrt(153) + 4*(2 + sqrt(153)) - 2*(sqrt(153) + sqrt(153) + -1)))**2*2. -108*sqrt(17) + 468 Simplify (sqrt(11)*2)**2 + 4 + (-4*sqrt(11) + 5 - sqrt(11)) + -5*sqrt(110)/(sqrt(40)/(sqrt(4) - -1*sqrt(4))). -15*sqrt(11) + 53 Simplify -3 + 3 + (0 + sqrt(5) + -2 - sqrt(5)) - (4*sqrt(720)*2 + -3)**2. -46091 + 576*sqrt(5) Simplify -2*(-5*((-5 + 6*sqrt(720)*2)*-6 + 4))**2. -186681800 + 2937600*sqrt(5) Simplify 1*(sqrt(325) + 1 + 1)**2 + (sqrt(637) + -2)*-3 + 4. -sqrt(13) + 339 Simplify 5 + (2*((-2*(1 + sqrt(396)) - (sqrt(396) - (4 + sqrt(396) + 4))) + 2))**2 + 4. -768*sqrt(11) + 6601 Simplify ((sqrt(10)/(sqrt(6)/sqrt(3)) + 2 + sqrt(25)/sqrt(5))*-1 - (sqrt(810) + sqrt(810)*-1 - sqrt(10))/((sqrt(2) + 1*sqrt(2))*-4))**2. 17*sqrt(5)/2 + 1701/64 Simplify 4 + -1*(sqrt(192)*1)**2*-1 + 3 + sqrt(192) + 2 + -3. 8*sqrt(3) + 198 Simplify -2*(sqrt(1700) + -1*(sqrt(1700) + 1)**2 + sqrt(1700) + -3*sqrt(1700) + 3 - ((sqrt(1700) + -1 + sqrt(1700))*4 - (5 + sqrt(1700) + 2))). 200*sqrt(17) + 3374 Simplify ((-2*(sqrt(187) - (1*sqrt(187) - sqrt(187))) - sqrt(187)) + sqrt(187))/(sqrt(99) + 2*sqrt(99)) + (-3 + sqrt(1088) - (-5 + sqrt(17) + sqrt(17)*2))**2. 178*sqrt(17)/9 + 429 Simplify (sqrt(52)/sqrt(4)*-1 - sqrt(13))**2 + sqrt(13) + -4 - ((5*sqrt(13)*-1)**2 + sqrt(468) + 1) - (-4*sqrt(91)*-2)/(sqrt(14)/sqrt(2)*6). -278 - 19*sqrt(13)/3 Simplify (((0 + sqrt(612))*3 - 5*1*sqrt(612)) + 2 + sqrt(612) + 2 + -4)**2. 612 Simplify (3*sqrt(153)*-6 + (sqrt(153) + sqrt(153) + sqrt(153) + sqrt(153)*-3)*5)/(6*(-5*sqrt(36)*1)/sqrt(4)). 3*sqrt(17)/5 Simplify ((-2 + (sqrt(1152) + 4*(sqrt(1152) + 2))*4 + 2)*-6)**2. 1105920*sqrt(2) + 16625664 Simplify -2 + 4 + 0 + (-5 + 1 + sqrt(325) - (sqrt(13)*-1*-6 + -2)**2). -474 + 29*sqrt(13) Simplify (((sqrt(68) + -2)*-5 - (sqrt(68) + 3 + 2)) + ((2*sqrt(68) - sqrt(68)) + -2 - -3*1*sqrt(68)))**2. -24*sqrt(17) + 281 Simplify 1*-2*(1 + (sqrt(2736) - 6*(sqrt(2736) + -1 + sqrt(2736) - sqrt(2736)))**2 + -6*(sqrt(2736) + -2 + 3)). -136862 + 1584*sqrt(19) Simplify ((6*(sqrt(110)*-1 + sqrt(110) + sqrt(110)))/(sqrt(15)/sqrt(27)))/((sqrt(88) - -6*(sqrt(88)*-1 - sqrt(88)))/(sqrt(48)/(-1*sqrt(6)))) + -5. -5 + 18*sqrt(2)/11 Simplify (-2*(sqrt(1573) + 0) + (-2 + sqrt(1573))*-3 + (sqrt(130) - -2*1*sqrt(130))/(-2*sqrt(40)))**2. -669*sqrt(13) + 647053/16 Simplify (sqrt(10)*2*3 + sqrt(10))/(sqrt(4)/sqrt(2)*4) + (2 + sqrt(55)/sqrt(11) - 1*sqrt(5)*4). -5*sqrt(5)/4 + 2 Simplify 1 + sqrt(99)*1 + sqrt(99)*1 + -3 + (-4*(-1*sqrt(44) - sqrt(44)) - sqrt(44))/(sqrt(32)/sqrt(128)). -2 + 34*sqrt(11) Simplify 1 + (-1*(-3*sqrt(117) + 4 - (-3*(-2 + sqrt(117)) - sqrt(117))) + 4)**2. -36*sqrt(13) + 154 Simplify ((sqrt(756)*1)/sqrt(12))/(sqrt(81)/(sqrt(9) + sqrt(144))) - (((4*(sqrt(7)*2 - sqrt(7)))**2 - (sqrt(343) + -3)) + 5). -120 + 12*sqrt(7) Simplify -5*1*(sqrt(1700) + -1 + -2 + -2*(sqrt(1700) - (sqrt(1700) + -3 + sqrt(1700))) + sqrt(1700))**2 + -4. -136409 + 3600*sqrt(17) Simplify (sqrt(160)/(-4*sqrt(20)/sqrt(4)))**2 + sqrt(2048)*2 + -1. 1 + 64*sqrt(2) Simplify 5 + (-2*2*sqrt(396) + sqrt(396) + -3 + sqrt(396) + -1 + (-5*sqrt(99)*2)/(4*sqrt(81)))**2. 308*sqrt(11)/3 + 65975/36 Simplify 3*4*((sqrt(396) + 2 + 1)**2 + (sqrt(1584) + -4 + -4)**2)*5. -9360*sqrt(11) + 123180 Simplify ((3*(sqrt(7) + 3 + sqrt(7)) - sqrt(42)/sqrt(96))*6 - (2 + 1 + 2*sqrt(1008)*-4))**2. 13311*sqrt(7) + 487251/4 Simplify (sqrt(864) - (-2*sqrt(864) - sqrt(864)) - sqrt(864) - -1*(sqrt(24)*2 + sqrt(24)))/(sqrt(288)*1 + sqrt(288) - (sqrt(8) - (sqrt(8) + 1*sqrt(8)*-1)))*5. 105*sqrt(3)/11 Simplify (-6*(sqrt(252) + (sqrt(252) + -2 - sqrt(252)) + 2) - (-1*sqrt(280)/sqrt(5))/(sqrt(128)*-1))**2. 147175/16 Simplify (-4*(0 + -2*((sqrt(4800) + 5)*1 + sqrt(4800))))**2. 51200*sqrt(3) + 1230400 Simplify 2 + (((sqrt(1125) + (sqrt(1125) - -3*sqrt(1125)))*4 - sqrt(1125)) + sqrt(1125))/(-4*sqrt(36)/(sqrt(12)/sqrt(3))). -25*sqrt(5) + 2 Simplify (1*sqrt(320) + -1 - (-1 + sqrt(320) + 0)) + (1*sqrt(720))**2*-2*-3. 4320 Simplify (sqrt(132) + -2*(-3*sqrt(132) - sqrt(132)))/(sqrt(12) - (sqrt(96)*3)/sqrt(8)) - (-2*(3*sqrt(88) - sqrt(88)))/((sqrt(96)*-1)/sqrt(12)). -17*sqrt(11)/2 Simplify -2*sqrt(143)/(sqrt(99)*-6) + 3 - (3*sqrt(156)*-5)/(sqrt(12) - (sqrt(120)*
{ "pile_set_name": "DM Mathematics" }
Q: AJAX request Cross-Origin Request Blocked error I have two projects; first one is a asp.net web project and the second one is embedded http server library project. Embedded http server project is taken from : embedded http server project I want to save a video file from user's local to user's shared storage. I'm getting and sending file from browser using ajax request. Embedded http server is supposed to get byte array and save video on client's shared storage. I have a problem that I spent days to solve but not yet found a solution. In Chrome it stuck on stream.CopyTo(streamReader);. In Firefox and IE it gives "Cross-Origin Request Blocked" error but Firefox saves file even it gives the error. Here is the ajax request code: $(document).ready(function () { function hashFile(file, chunkSize, callback) { var size = file.size; var offset = 0; var chunk = file.slice(offset, offset + chunkSize); SendChunk(chunk,0); var hashChunk = function () { var reader = new FileReader(); reader.onload = function (e) { offset += chunkSize; if (offset < size) { chunk = file.slice(offset, offset + chunkSize); SendChunk(chunk,0); } else if (offset > size){ offset -= chunkSize; var newchunkSize = size - offset; chunk = file.slice(offset, offset + newchunkSize); SendChunk(chunk,1); } }; reader.readAsArrayBuffer(chunk); }; function SendChunk(chunk,end){ if(end>0) { var ajaxRequest = $.ajax({ type: "POST", url: "http://clientip:8080/savefileend", contentType: false, processData: false, data: chunk }); } else{ var ajaxRequest = $.ajax({ type: "POST", url: "http://clientip:8080/savefile", contentType: false, processData: false, data: chunk }); ajaxRequest.done(function (e) { hashChunk(); }); ajaxRequest.error(function (xhr) { console.log(e); hashChunk(); }); } } } function fileInputHandler(evt) { var files = evt.target.files; var chunkSize = 10485760; // bytes var start = window.performance ? performance.now() : Date.now(); // DEBUG var onHashFile = function (digest) { var end = window.performance ? performance.now() : Date.now(); // DEBUG console.log(this.name, digest, (end - start) + 'ms'); // DEBUG }; for (var i = 0, len = files.length; i < len; i++) { hashFile(files[i], chunkSize, onHashFile); } } document.getElementById('file1') .addEventListener('change', fileInputHandler, false); }); and here is the embedded server code to get the request: var stream = request.GetRequestStream(); using (var streamReader = new MemoryStream()) { stream.CopyTo(streamReader); videoTemp = streamReader.ToArray(); } using (var fileStream = new FileStream(path, FileMode.Append)) { fileStream.Write(videoTemp, 0, videoTemp.Length); } By the way: For IE: If I enabled "Access data sources across domains" from setting security, then it works without error in IE. For Chrome: If I start chrome with --disable-web-security parameter it works without error in Chrome. But I have find the solution from code. A: I have found the solution, if anyone needs it; I have used http://nancyfx.org/ Nancy.Hosting.Self library for embedded http server, Here I was able to add "Access-Control-Allow-Origin" to response.Headers so that I could transfer file without error.
{ "pile_set_name": "StackExchange" }
Published Bear: The Serious Notes App Notes apps are a strange thing to review. Everyone already has one built into iOS, and the vast majority of people will never look anywhere else. I was one of those people until I was able to delete first party apps, and much like replacing reminders with Todoist – I’ve replaced Notes with Bear. Here’s my review. By calling Bear a notes app it is much more approachable. When in reality it is a Markdown editor at heart. Allowing you to add in formatting while typing, for sharing later or simply for your own use. With a couple of key strokes you can add in links, headings, tick boxes, and even images. However if that is too much for your brain to remember there are shortcut buttons at the top of the keyboard. Whether you are jotting down a quick note to yourself, or starting a long page of prose, nothing will disturb your writing. Images can be inserted and formatted to your liking, meaning that as you type you will be looking at exactly how the document looks. This wont make a blind bit of difference to simple notes, but perhaps it’s time to take even your personal notes to the next level! Subscription Model Like many pro apps available now, Bear adopts the freemium model. The app is free on all platforms, with a monthly or yearly subscription to unlock pro features. Your use case may or may not need these features but they include: Sync all your notes between Bear for iPad, iPhone, and Mac. Powered by CloudKit. Learn more about Bear’s sync and autosave in Organise and publish. Export your notes to a variety of formats for publishing and sharing elsewhere. Beautiful Themes – eight at launch, and more to come, to give you just the right, comfortable environment for your creativity to flourish. These are unlocked via a single subscription that covers all your devices, paid directly through the App Store. If you want to try out the Pro features you can claim a free week by signing up for the subscription, so you won’t be charged for the first week of use. So if you try it and don’t like the app, cancel before that time and you wont be chanted a penny. For the benefit of the review I will looking at the best version available, so I will be testing the Pro version. Bare this in mind during discussion of things like sharing if you don’t want to pay the £1.49 a month or £13.99 a year subscription. To me the subscription is well worth it for sync and the sharing options, but take this into account before jumping in. The Good Looking Notes App Rarely do you discus the design and UI of what appears to be such a simple. Yet Bear is one of the nicest to look at and simplest to use apps I have come across recently. Often the pretty facade quickly slips when you are searching for options or digging into menus to find things hidden for no good reason. Bear has been expertly designed in both aesthetics and function. All of your notes are listed on the left hand menu, which can be accessed with a right swipe. Once you are editing or looking at a note the developers have made all of the formation options available in a shortcut bar above the keyboard. This sounds a simple thing to do, but lots of others hide these away behind a formatting menu. Bear takes on exactly the same design in its companion Mac app, which is also available for free. The Mac app supports loads of shortcut keys but as yet doesn’t support any touch bar keys if you’ve updated to a 2016 MacBook Pro like I have. This is a shame, as other apps such as Ulysses has already pushed into this field, but it will only be a matter of time, so double check as they may have updated after publishing this review. You only realise what is lacking form other apps when an app does it right, instantly clicking and fitting into your workflow. Remembering shortcut keys is sometimes confusing, and they are never universal! So making shortcuts easily available makes it much easier when first writing in the app. You can of cause use CMD+ shortcuts on the iPad with an attached keyboard to. There are 8 different design options available in the app with more to come, including a dark mode for those that like using black. With that said design is more than just making things look pretty, as John Maeda says it is about meaningful results. The right balance of beauty and usability has been made here, the great design leads to a pleasing to use experience and an easy to understand menu and note organisation method. Tags If you already use a powerful note taking app or service you will more than likely already use tags profusely. Tags, or any kind of organisation features are drastically lacking from the stock app which is annoying because these features are what make taking notes in an app so useful. By adding a simple # in any part of your text you can link similar notes together without fuss. Bear will then list all these in the side of the menus, making them easy to edit and easy to find what you are looking for. Quickly falling into this practice as a writer is easy, with different publications linked and also tags for ideas and work in progress (WIP) articles. Users are also able to nest tags with ease, so organisational options really are limitless. By adding / to the tag you can organise until your hear is content. My article # now has article / ideas and a article / wip nested tags. What your notes app contains is really up to you, and something that is as unique as the apps you use to get things done. Some users purely want a note pad and nothing else. If that is the case Bear will offer you a much better method of organising your notes. However the subscription may be expensive purely for this. Whereas I use my notes to write out ideas for articles and later flesh them out into almost full posts. Because Bear offers me so much more in terms of exporting options I have instantly taken to it. Sharing Once agin the sharing options of this Notes app are right up there with a serious writing app. It offers the option for exporting the notes you have made in such a wide range of options it might take a while to work out which one you really need. Powerful exporting options are missing from a number of similar app, with many simply offering rich text exporting and some apps offer none! Where as there isn’t many options you would need that Bear doesn’t support. With a simple swipe left while viewing a note you can share in Text, Markdown, PDF, HTML, Rich Text, DocX and if that wasn’t enough you can even export as an image. No more screenshots of your notes to publish in Instagram and Twitter. This makes everything from writing stories to documents through to just jotting things down to remember a breeze. I have gotten into the habit of attaching PDF’s into Todoist tasks and also Fantastical appointments, simply because I can with relative ease. Deep Dive My habits of late have changed to delve a little deeper into my app reviews. Finding all manor of ways to use apps to their full ability. If you need a hand with what all of these terms mean, I will be writing a guide shortly. Safe to say you will need to invest in Workflow as a minimum . The developers of Bear are taking iOS automation seriously straight from the start. Implementing loads of URL call back options. The format of Bear URL Scheme action are as follows There are far too many things to go into and the extent you can customise quick launches and opening is huge. If you want to go through the full FAQ section and find all the parameters head over to the Bear website . Two schemes i have used considerably is the simple /open-note parameter bear://x-callback-url/open-note and also opening a specific tag – in my case my work in progress tag so I can see what needs some work on at any point. bear://x-callback-url/open-tag?name=article/wip These can be customised as much or as little as you require, but it is great to see developers spending so much time building in the requirements of power users like myself. Bear Verdict When I start reviewing a new iOS app that replaces a first party option I often ask myself if anyone is likely to use it above the stock app. The reality is that _most users are never going to look for something different. However that is not to say that no improvements can be made. Bear is above and beyond a notes app, almost to the level that labelling it one is so far off the mark it is stupid. Bear is more along the lines of a writing app, it does more than many available Markdown editors. Being able to export and share things with ease, it would replace my old writing app of choice ByWord very easily. I have slotted Bear in between my current writing app of choice, Ulysses, and my brain. It gives me the ability to format and position text in a small light weight app before moving them to Ulysses for images and publishing. If you simply want a notes app that syncs to all your devices, then look no further than the stock app. If you are looking for something with as many power features as you can cram into an truly gorgeous looking app, then the small subscription is a no brainer.
{ "pile_set_name": "Pile-CC" }
Q: How to properly setup dynamic library loading with header file? The title was tough to get right, so let me explain my situation: Another team develops a library. They ship a header file and a *.so file. The header file is available to us, and we can include it in our own code and use it if we wish. The *.so, however, is shipped with the platform we run on. We do not have access to this *.so at build time for our software. Because of this, we can't really use the header file either, since the linker will expect the *.so to be available at some point. Right now what I do is create a wrapper class that loads the *.so file at runtime, then uses dlsym() to find functions by name, and I map them to function pointers. Is this the only option? Is there a way I can use the header file but tell the linker to not resolve the symbols at build time, but instead try to resolve them at runtime after we have a chance to load the *.so file? Note the real platform here is Android (via NDK), but hoping general linux advice will work as well in this case since we have POSIX APIs available. A: You have a few options, in order of preference: Get the libraries from the maintainer. Providing the header but not the library (at least a stub library like we do for libraries in the NDK) just won't work. Build your own stub library. It's pretty straightforward if you have a list of symbols to expose. Put int foo; void bar() {} in a C file for all the variables and functions you need to expose and build it as a shared lib. If you have the list of symbols in a version script, you might be able to use Android's gen_stub_libs.py to do it for you. Mark all the symbols with __attribute__((weak)) in the header file. The linker won't complain that they are missing. If they're missing at runtime, the library will still load but each function's address will be nullptr. Not really what you want in most cases because if your definition of the library is wrong, you turn build time failures into runtime failures, but in some cases this can be handy because it's easier to check for function availability with if (foo) { foo(); } then to do similar with dlsym. Add -Wl,--allow-shlib-undefined to your ldflags. This is even worse than 3 because it affects all the libraries you link, but it wouldn't require you to meddle with the header.
{ "pile_set_name": "StackExchange" }
Magnetic resonance imaging defined mucinous rectal carcinoma is an independent imaging biomarker for poor prognosis and poor response to preoperative chemoradiotherapy. Mucinous adenocarcinomas represent a potentially poor prognostic subgroup identifiable by imaging. We compared outcomes between magnetic resonance imaging (MRI) detected rectal mucinous carcinoma and adenocarcinomas. The diagnostic performance of MRI compared with initial biopsy in detecting mucinous adenocarcinoma was also assessed. The proportion of patients downstaged in the mrMucinous and adenocarcinoma groups was compared. Cox proportional hazard models were used to test independence of mucinous status and baseline MRI and clinical variables on survival. Differences in survival for mucinous versus non-mucinous tumours were tested for significance using the Mantel-Cox log rank test. 60/330 (18%) patients were correctly diagnosed with mucinous rectal cancer based on pre treatment MRI compared with 15/330 (5%) on initial biopsy (diagnostic odds ratio=4.67, p<0.05). All 60 (100%) patients undergoing surgery for mrMucinous tumours were confirmed as such on final histopathology. Significantly fewer mrMucinous tumours showed ypT downstaging when compared with non-mucinous tumours (14/60 (23%) versus 111/270 (40%), p=0.01). Three-year survival outcomes for patients for MRI detected mucinous tumours were significantly worse: disease free survival (DFS) was 48% versus 71%, p=0.006 and OS was 69% versus 79% p=0.04. MRI Mucin was an independent variable for poor DFS (hazard ratios (HR)) 0.58 95% Confidence interval (CI) 0.38-0.89). MRI diagnosis of mucinous adenocarcinoma is diagnostically superior to preoperative biopsy and occurs in up to 20% of rectal cancer patients. It is an independent imaging biomarker for response to preoperative chemoradiotherapy (CRT) and prognosis. MRI documentation of mucinous status will enable future pursuit of treatment strategies in this poor prognostic subgroup.
{ "pile_set_name": "PubMed Abstracts" }
# Copyright 2017 Yahoo Holdings. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root. search streamingstruct { document streamingstruct { field coupleof type string { indexing: index | summary } field normalfields type string { indexing: index | summary summary anothersummaryfield { source: normalfields } } struct s1 { field f1 type string { } field f1s type string { match: substring } field f2 type int { } field f3 type double { } # Allow default matchtypes in struct. Can be overridden. # No index/attribute related stuff. It is only a datatype definition. } struct ns1 { field nf1 type s1 { } field nf1s type s1 { match: substring } field nf2 type string { } # May specify nested structs. } field a type s1 { indexing: summary # Will generate attribute a.f1, a.f1s, a.f2, a.f3 # with datatypes preserved. # No customisation. # a will be a synonym for all (a.*) } field m type map<long, string> { indexing: summary # Will generate attribute m.key, m.value # with datatypes preserved. # m will be a synonym for all (m.*) } field b type s1 { indexing: index | summary # Will generate index b.f1, b.f1s, b.f2, b.f3 # with datatypes preserved if backend allows. # No customisation. # b will be synonym for all (b.*). } field c type s1 { struct-field f1 { # Whatever you normally write in a field declaration indexing: attribute | summary # -> Generates attribute c.f1 } struct-field f1s { indexing: index | summary # -> c.f1s match: prefix } struct-field f3 { indexing: index | summary # -> c.f3 } # attribute c will be synonym for c.f1. # Index c will be synonym for c.f1s OR c.f3. # Indexed search can handle that however they want. } field c2 type s1 { struct-field f1 { # Whatever you normally write in a field declaration indexing: attribute | summary # -> Generates attribute c2.f1 } struct-field f1s { indexing: index | summary # -> c2.f1s match: suffix } struct-field f2 { indexing: index | summary # -> c2.f2 } struct-field f3 { indexing: index | summary # -> c2.f3 } } field c3 type s1 { # Uses all sub fields, but not summary for all. struct-field f1 { indexing: attribute | summary } struct-field f1s { indexing: index match: prefix } struct-field f2 { indexing: index | summary } struct-field f3 { indexing: index | summary } } field n type ns1 { struct-field nf1 { struct-field f1 { indexing: index | summary } struct-field f1s { indexing: index | summary match: prefix } struct-field f3 { indexing: index } } struct-field nf1s { indexing: index | summary } struct-field nf2 { indexing: index | summary } # Will generate indexes n.nf1.f1, n.nf1.f1s, n.nf1.f3, # n.nf1s.f1, n.nf1s.f1s, n.nf1s.f2, n.nf1s.f3 # and n.nf2. # n will be synonym for all 8, # n.nf1 will be synonym for the first 3 and # n.nf1s will be synonym for the next 4 } field array1 type array<s1> { indexing: summary } field array2 type array<s1> { indexing: index | summary } field array3 type array<s1> { struct-field f1 { indexing: attribute | summary # -> Generates attribute array3.f1 } struct-field f1s { indexing: index | summary # -> array3.f1s match: prefix } struct-field f3 { indexing: index | summary # -> array3.f3 } } field subject type s1 { struct-field f1 { indexing: summary summary subject { source:subject.f1 } } } field d type s1 { indexing: index # override matching for all subfields match: prefix } field e type s1 { indexing: index # override matching for all subfields match: substring } field f type s1 { indexing: index # override matching for all subfields match: suffix } field g type string { indexing: index | summary summary: dynamic } } document-summary summ { summary snippet type string { dynamic source: a.f1, b.f2 } summary snippet2 type string { source: a.f1, b.f1, b.f2 } } }
{ "pile_set_name": "Github" }
1. Field of the Invention The present invention relates generally to resource management in a wireless communication system, and in particular, to a method of reducing the overhead of an uplink control message to increase resource efficiency in a wireless communication system. 2. Description of the Related Art Typically in a cellular wireless communication system, information about neighbor base stations (BSs) is collected to facilitate initial network connection and handover for a mobile subscriber station (MSS). To serve this purpose, a serving BS periodically transmits a channel request message to collect the channel information of neighbor BSs over a wireless network. An MSS, upon receipt of the channel request message, scans channels from the neighbor BSs and transmits channel information messages regarding the neighbor BSs to the serving BS. To exchange information about the neighbor BSs, the serving BS and the MSS identify the neighbor BSs by global identifiers (IDs) specific to them. Therefore, control messages such as the channel request message and the channel information message include global IDs that identify the neighbor BSs. In an Institute of Electrical and Electronic Engineers (IEEE) 802.16a system, for instance, a serving BS broadcasts information about neighbor BSs by a neighbor advertisement message to help an MSS to select the best cell. The neighbor advertisement message includes global IDs that identify the neighbor BSs. The MSS scans the channels of the neighbor BSs based on the neighbor advertisement message and transmits the channel scanning results to the serving BS by an uplink report message. Also, the MSS uses a global ID to notify the serving BS of a new BS to which the MSS will move during handover. However, since the global IDs are rather long, transmission of all the global IDs in the uplink report message causes considerable overhead. Moreover, the neighbor BSs are already known between the serving BS and the MSS in most cases because handover occurs within a neighbor BS set and the neighbor BS set is periodically broadcasted by the neighbor advertisement message. Accordingly, there is a need for reducing the overhead caused by transmitting such global IDs.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Filter and stristr(): find all the words except the first When filtering the items that are going to be shown, if the word that I want to search is the first one of the item, it does not find it. Example: I have the title, "tomorrow will be a sunny day". If I look for tomorrow, this does not find it, if I look for sunny or day, it does. How can I do to search in the whole sentence including the first word? This is the code: $url_noticias = 'storage/json/es/noticia.json'; $noticias = json_decode(file_get_contents($url_noticias), true); $noticias = array_filter($noticias); $data['noticias'] = collect($noticias)->filter(function ($item) use ($request){ return stristr($item['title'], $request->texto, true); }); A: Obviously it could be problem of the treating 0 (zero) as false. If the string is on first position, ie. position 0 and the test is if it was found or not, then the zero value is interpreted as false. But in this case it was successfully found on zero position. To avoid such behaviour do not compare only values but the type as well. (0 == false) -> true but (0 === false) -> false so the testing occurrence should be like ($position !== false) Return boolean instead of the position: return (stristr($item['title'], $request->texto, true) !== false) ? true : false; Edit As @Progrock correctly pointed out, the function stristr does not return a position, it returns a substring or false. So the root cause of not finding a word at the beginning of the string is a bit elsewhere. The function stristr does the case insensitive search and if string is found, and the tommorow is found, then the returned value is a string. And the string is treated as true, so the comparison works as follow: ("string" == false) -> false However the stristr is called with the third optional parameter that is set to true. According to the documentation the stristr function returns the part of the haystack before the first occurrence of the needle (excluding needle). And because the tomorrow is at the beginning of the string tomorrow will be a sunny day then the returned value is empty string which is interpreted as false: ("" == false) -> true Conclusion if you keep third parameter as true problems with empty string occurs with words at the beginning of the string, if you set it to false or remove it (it is optional parameter with default value false) then the problem with returned empty string occurs with word at the end of the string. So the proposed solution in original answer handle both cases regardless using true/false as the third parameter.
{ "pile_set_name": "StackExchange" }
Bile acid efflux from suckling rat hepatocytes. To further assess bile acid transport by the developing rat liver, we compared the rate of efflux of taurocholate from hepatocytes isolated from suckling and mature rat livers. Cell content of taurocholate (nmol/mg cell protein), after preloading with [14C]-radiolabeled plus cold bile acid (5-100 microM) was similar in both groups. Total taurocholate efflux, estimated by the decrease in cell taurocholate content, was unexpectedly greater from suckling rat hepatocytes. There was a higher bile acid efflux rate over time and a lower final cell content. Efflux from suckling rat hepatocytes was increased after preloading in incubation concentrations of taurocholate which were above the physiologic range of portal blood concentrations. Inasmuch as the bile acid binding protein content is known to be reduced in the cytoplasm of developing rat liver, intracellular taurocholate may exist largely as free ligand and thus be more readily diffusable. We speculate that the in vivo correlation of enhanced efflux is back diffusion of bile acid from the cell into the sinusoid. The effect could, in part, account for the known absence of a lobular gradient for bile acid uptake in suckling rats and, therefore, contribute to the inefficient hepatic transport of bile acid observed in developing rat liver.
{ "pile_set_name": "PubMed Abstracts" }
Q: SAFARI : Unexpected token '='. Expected an opening '(' before a method's parameter list Got this code, that works perfectly in all browsers but not in Safari (Version 11.1.2). class Account { accountFields = ['field1', 'field2', 'field3'] } Getting the following error in Safari debugger: Unexpected token '='. Expected an opening '(' before a method's parameter list So I tried to add () everywhere, around the array, before, after, etc. Nothing works. A: EDIT: Public class fields are now supported in Safari v14 (currently in beta), which means that if you update to Safari v14 or higher then you won't get this issue. With that being said, Safari v14 is still in beta, and if you need good browser support and backward compatibility, the below answer still applies. You're using an experimental feature known as public field declarations which is currently in stage 3. Unfortunately, you can't use it in Safari as it is not supported on any versions yet. Instead, you can use a constructor() method to define properties for your class which does have good browser compatibility in modern browsers (for IE you'd need to use a function constructor): class Account { constructor() { this.accountFields = ['field1', 'field2', 'field3']; } } As pointed out in the comments by @Baz, you can also use Babel as an alternative solution. Using babel means that you won't have to change your code, which can make things easier on you if you're using public field declarations a lot throughout your project. Babel will transpile/compile your modern JS code into older (ES5 and below) JS code which can be understood by many browsers. You can use this babel plugin like so. First, install the babel plugin: npm install --save-dev @babel/plugin-proposal-class-properties Then add the plugin to your configuration file: { "plugins": ["@babel/plugin-proposal-class-properties"] } For other installation options (babel CLI, etc), see the usage section of the plugin's docs.
{ "pile_set_name": "StackExchange" }
Co-targeting of Adenosine Signaling Pathways for Immunotherapy: Potentiation by Fc Receptor Engagement. Targeting the signaling pathway of the immunosuppressive metabolite adenosine is an emerging approach for cancer immunotherapy. In this issue of Cancer Cell, Young et al. describe that co-inhibition of the adenosingenic pathway through blockade of both CD73 and A2AR enhances antitumor efficacy through distinct mechanisms.
{ "pile_set_name": "PubMed Abstracts" }
The formation of the vertebrate embryo begins in early development when one portion of the embryo, the ectoderm, is divided into neural and epidermal tissue on the basis of determinative cell-cell interactions. These events underlie the formation of the neural plate and tube, a process in which abnormalities during human development lead to syndromes such as neural tube defects, of which spina bifida is a well known example. These events have been difficult to study, however, because the molecules necessary for acquiring the neural fate in vertebrate embryos are unknown. To overcome this problem, an approach was taken based on the genetic analysis of neural development in Drosophila, where the product of the Notch gene appears to be a critical cell surface receptor mediating determinative cell-cell interactions. A frog homolog of this gene was isolated, suggesting that Notch-mediated, cell-cell interactions may also occur during early neurogenesis in vertebrates. The role of Notch will be studied by generating frog embryos that are mutant for the Notch protein. Moreover, Notch function will be further dissected by isolating ligands for the frog Notch receptor. The functional characterization of Notch and its ligands should lead to a better understanding of the mechanisms underlying the specification of neural tissue in vertebrate embryos.
{ "pile_set_name": "NIH ExPorter" }
Effects of captopril on cold pressor test responses in normotensive and hypertensive subjects. The aim of this study was to evaluate the effects of short-term captopril administration on the response to cold pressor testing in normotensive and hypertensive subjects. Cold pressor testing was performed in 15 normotensive subjects and 15 hypertensive patients before and 90 minutes after captopril administration. Blood pressure and heart rate were measured before testing and at one-minute intervals from the beginning of cold pressor testing. Systolic time intervals were also assessed before and after testing. Captopril did not affect pressor responses to cold pressor testing in normotensive subjects or hypertensive patients. Basal heart rate (before testing) did not change, despite the decrease in blood pressure and showed a smaller increase in response to cold pressor testing in normotensive subjects, suggesting that captopril might interfere with arterial baroreflexes. The systolic time intervals were not modified by captopril except isometric contraction time; its basal value was reduced by captopril in both normotensive subjects and hypertensive patients. Cold exposure caused a similar increase in isometric contraction time before and after captopril in normotensive subjects, and the increase in isometric contraction time in hypertensive patients was greater. These findings suggest that captopril did not affect cardiac performance, indeed improving it, at least in basal conditions.
{ "pile_set_name": "PubMed Abstracts" }
Embrace the unknown. It's impossible to predict how a race will turn out, no matter how much you visualize the course. Though you'll inevitably fill your head with images of those last painful seconds on-course, sprinting towards the tinny pop music, balloons, and bright banners of the finish line, there's really no true way of knowing exactly which numbers will be on the neon green digital display above you when you throw yourself across the line. Embrace what you can't know in the Mizuno Wave Prophecy 6 Nova Running shoe with the reassurance that your body will be cushioned and supported no matter what. Occupying the upper echelon in Mizuno's energetic line of kicks, the Prophecy Nova boasts an even cushier ride than the Prophecy itself. It's second only to the Wave Creation in cushioning, but offers a springier, more responsive feel as it absorbs impact. New for this year, Mizuno adopted softer, lighter uppers for the shoe, which are stitched in the signature V-shape that loyal Mizuno followers will recognize from decades of loyal servitude. It wraps around bony heels, slender insteps, and wider forefeet and stays put from mile one to 26.2.
{ "pile_set_name": "Pile-CC" }
import pygame_sdl2; pygame_sdl2.import_as_pygame() import sys, os import pygame if len(sys.argv) < 2: print "Usage: %s <filename>" % sys.argv[0] sys.exit(0) print pygame.mixer.get_init() pygame.mixer.pre_init(frequency=44100) pygame.init() print pygame.mixer.get_init() # # pygame.mixer.music.load(sys.argv[1]) # pygame.mixer.music.play() # pygame.mixer.music.fadeout(2000) snd = pygame.mixer.Sound(sys.argv[1]) print snd.get_length() channel = snd.play() channel.queue(snd) channel.set_volume(.1) print channel.get_volume() pygame.time.wait(3000) # channel.set_volume(0.0, 1.0) # channel.fadeout(1000) # pygame.time.wait(1000)
{ "pile_set_name": "Github" }
Consideration of a Resolution of the Commission of Knox County, Tennessee expressing support of SB 748/HB 420 to permit, beginning with elections of school board members in 2014, county governing bodies, by two-thirds vote, to choose to elect county school board members on a partisan rather than a nonpartisan basis.(Commissioner Wright)
{ "pile_set_name": "Pile-CC" }
Q: Which type to save percentages Is it appropriate to use the double type to store percentage values (for example a discount percentage in a shop application) or would it be better to use the decimal type? A: Floating-point types (float and double are particularly ill-suited to financial applications. Financial calculations are almost always decimal, while floating-point types are almost always binary. Many common values that are easy to represent in decimal are impossible to represent in binary. For example, 0.2d = 0.00110011...b. See http://en.wikipedia.org/wiki/Binary_numeral_system#Fractions_in_binary for a good discussion. It's also worth talking about how you're representing prices in your system. decimal is a good choice, but floating point is not, for reasons listed above. Because you believe in Object Oriented Programming, you're going to wrap that decimal in a new Money type, right? A nice treatment of money comes in Kent Beck's Test Driven Development by Example. Perhaps you will consider representing percentages as an integer, and then dividing by 100 every time you use it. However, you are setting yourself up for bugs (oops, I forgot to divide) and future inflexibility (customer wants 1/10ths of a percent, so go fix every /100 to be /1000. Oops, missed one - bug.) That leaves you with two good options, depending on your needs. One is decimal. It's great for whole percentages like 10%, but not for things like "1/3rd off today only!", as 1/3 doesn't represent exactly in decimal. You'd like it if buying 3 of something at 1/3rd off comes out as a whole number, right? Another is to use a Fraction type, which stores an integer numerator and denominator. This allows you to represent exact values for all rational numbers. Either implement your own Fraction type or pick one up from a library (search the internet). A: You can probably get away with saving the discount percentage as an integer. Just store 10 or 25 or whatever, and when you need to work out the price of something: newprice = price * discount / 100 A: decimal does come at a performance cost, but it's usually worth it for financial uses. The reason it has low performance (the worst of all numeric types) is that it doesn't map directly to a hardware type. That means it requires more of the work to be done in software. Note that it is not only an issue of size. decimal is an integer scaled by a power of 10, while the float and double types are scaled by powers of 2. That means terminating decimal values like 0.1 can be exactly represented using decimal, while they are non-terminating (and thus rounded) for float and double.
{ "pile_set_name": "StackExchange" }
The development of mandibular molar tooth germs isografted in the mouse spleen. Tooth germs taken from 13-day-old embryonic mice and isografted in the spleen of adult mice were examined by light and electron microscopy. Well-organized tooth structures from the early cap stage to fully developed and mineralized mature teeth were obtained up to day 60 after transplantation. Germs on day 2 were similar to those prior to the onset of grafting but reached the late cap stage of development on day 4. On day 6, enamel and dentine formation were initiated and inner enamel epithelium and dental papilla cells were polarized. On days 10-15, enamel-matrix secretion was completed and almost all ameloblasts had become resorptive enamel epithelium. India ink injected from the recipient caudal vein accumulated to the capillaries within the pulp throughout the newly-formed vessels. On day 20, defined root formation had begun but occasionally irregular and cellular osteodentine was formed in root areas. On day 30, transplants were covered with reduced enamel epithelium and acellular cementum was formed at the root areas together with rudimentary periodontal ligament fibres. Cellular cementum became thicker up to day 40. There was little evidence of cellular infiltration from recipient tissue up to day 60. The spleen seems to be a suitable site for transplantation of tooth germs.
{ "pile_set_name": "PubMed Abstracts" }
Q: How would I go about optimizing this code? I am writing a function to find the average of an array in which the array is mostly numbers that would overflow if added all at once. It works by creating a subarray(b in my code) that is half the input(a in my code) array's size(ar_size in my code) and then places the average of 2 values from the input array a[i+0] and a[i+1] with no overlap into b[j]. Once it iterates through the entire input array, it reruns the function with returning the subarray and the input array size until the size equals 2 and then ends the recursion by returning the average of the two values of b[2]. Please pardon the reuse of j. Also the size of the array is some power of two. uint64_t* array_average(uint64_t* a, const int ar_size) { uint64_t* b = new uint64_t[ar_size / 2]; uint64_t* j = new uint64_t; if (ar_size == 2) { *j = (a[0] / 2) + (a[1] / 2) + ((a[0] % 2 + a[1] % 2) / 2); return j; } for (int i = 0; i < ar_size; i += 2) { b[*j] = (a[i + 0] / 2) + (a[i + 1] / 2) + ((a[i + 0] % 2 + a[i + 1] % 2) / 2); ++*j; } delete j; return array_average(b, ar_size / 2); } Also anyone have a better way to average while working with numbers that would cause an overflow to happen? Here is a revised version: uint64_t* tools::array_average(uint64_t* a, const int ar_size) { uint64_t* b = new uint64_t[ar_size]; uint64_t* c = new uint64_t[ar_size / 2]; int j; j = 0; for (int i = 0; i < ar_size; ++i) { b[i] = a[i]; } if (runs > 0) //This is so i do not delete the original input array I.E not done with it { delete[] a; } if (ar_size == 2) { uint64_t* y = new uint64_t; runs = 0; *y = (b[0] / 2) + (b[1] / 2) + ((b[0] % 2 + b[1] % 2) / 2); delete[] b; return y; } for (int i = 0; i < ar_size; i += 2) { c[j] = (b[i + 0] / 2) + (b[i + 1] / 2) + ((b[i + 0] % 2 + b[i + 1] % 2) / 2); ++j; } delete[] b; ++runs; return array_average(c, ar_size / 2); A: First of all, be aware that your average is not the actual average, as you do throw away one halfs. The result of your algorithm on an array that alternates between 0 and 1 would be 0, as 0/2 + 1/2 + (0%2 + 1%2)/2 = 0. Wanted to start with that, because that is a serious weakness of your algorithm. Also note that if the original size is not a power of 2, some data will get a higher weight. Aside from that, consider this algorithm: Copy the data. Until the data has only one entry left, put the average of cells 0 and 1 in cell 0, that of 2 and 3 in cell 1, 4 and 5 in 2 and so on. Shrink the data after each such step. As code: uint64_t average(std::vector<uint64_t> data) { while(data.size() != 1) { for(size_t i=0; i<data.size()/2; i++) { data[i] = data[2*i]/2 + data[2*i+1]/2 + /* modular stuff */; } data.resize(data.size()/2 + data.size()%2); //last part is required if the size is not an even number } return data[0]; } Using a proper container here also gets rid of your memory leak, by the way. Note that this code still has the weakness I talked about. You could extent it by collecting the halves, that is if your modular part is 1, you increase a variable, and when the variable is at two, you add a one in some cell. Edit: If the input HAS to be a raw array (because you receive it from some external source, for example), use this: uint64_t average(uint64_t* array, const int array_size) { std::vector<uint64_t> data(array, array + array_size); (rest of the code is identical) Edit: code above with collecting halves: inline uint64_t average(const uint64_t& a, const uint64_t& b, uint8_t& left_halves) { uint64_t value = a/2 + b/2 + (a%2 + b%2)/2; if((a%2 + b%2)%2 == 1) { left_halves += 1; } if(left_halves == 2) { value += 1; left_halves = 0; } return value; } uint64_t average(std::vector<uint64_t> data) { if(data.size() == 0) return 0; uint8_t left_halves = 0; while(data.size() != 1) { for(size_t i=0; i<data.size()/2; i++) { data[i] = average(data[2*i], data[2*i+1], left_halves); } data.resize(data.size()/2 + data.size()%2); //last part is required if the size is not an even number } return data[0]; } Still has the weakness of increased cell weight if size is not a power of two.
{ "pile_set_name": "StackExchange" }
Activism and Kids Below is a response to a friend’s post about her son’s passion and despair over the damage to habitat and loss of animal lives, to the point of extinction. I’ve taken some time to think about my response to your request for thoughts and suggestions from all of us in the HiveMind. Excuse me if you already know the things I’ve written below. I figured that even if you do know it all already, you would probably appreciate the solidarity and like-mindedness I am expressing here. First, it’s not easy raising what now is called a “woke” kid. It’s not easy when they’re in their teens, as they begin to look outside themselves in larger, more aware ways, beginning to recognize and call into question the injustices we all live with; it’s not easy when they are in their 20s or 30s seriously actively campaigning for the candidate of their choice, only to see that good, worthy person be beaten by a less-than-desirable candidate; or when they’ve worn themselves out talking to people about climate change, or gender rights, or anti-violence policy, or responsible gun ownership, or anti-poverty legislation, or privilege, or rape culture — or environmental issues that threaten the well-being of every living thing on the planet — only to body slam up against the wall of human indifference again and again (oft-times right beside us…). We bleed when they mourn the murdered, the trampled, the disadvantaged, the disrespected, the poor, the aged, the different, the disregarded human and non-human denizens of our planet… Empowered, informed activism seems to be an answer… not THE answer, not for everyone, but it can be an answer for those who are called to it. Youth activism is very powerful. It may well be the most powerful activism. The youth can speak from an honest, true place. An authentic place, not overshadowed by the complicity of looking past the necessities of life that make most of us feel slightly tarnished and disingenuous in our activism, like we have not always been true to the cause and therefore may not have the right to speak about what we see/feel. If a young person feels called to be a voice, I believe it is important to be trained in non-violent protest and effective activism methods. Training helps with despair and burnout and it protects them from the most obvious mistakes. It helps them learn how not to put themselves at risk, or at least not without understanding the risk and assessing their willingness to assume it. It truly empowers a young person to be sure enough of themselves and their message to stand up and address the issues with older people — people who are seen to be the Authority. An activist, especially a young one, needs training in public speaking/debate, logic, science, social justice, economics, politics, strategic and operational planning, and conflict resolution. They need to understand process and policy. They need to narrow the focus of their activism while realizing that their issue isn’t independent of other issues, that all our issues, our problems, our causes, are part of complex, interconnected systems. I know of two organizations working to train young activist in Minnesota — I don’t know much about these organizations, I just heard about them through a podcast. I’m sure there are others.
{ "pile_set_name": "Pile-CC" }
Fumonisin B1 induces autophagic cell death via activation of ERN1-MAPK8/9/10 pathway in monkey kidney MARC-145 cells. Mycotoxins are secondary fungal metabolites that are capable of inducing a variety of toxic effects in animals and humans resulting from the consumption of the contaminated food. Understanding the mechanisms of the toxicities behind these mycotoxins is required to develop mechanism-based approach to counteract their toxic potential. Fumonisin B1 (FB1) is the most prevalent member of fumonisins that are a group of mycotoxins produced primarily by Fusarium verticillioides and Fusarium proliferatum. Kidney is one of the primary target organs for FB1 action. Using monkey kidney MARC-145 cells as an intro model, we found that FB1 induced caspase-independent programmed cell death accompanied with autophagy induction. Inhibition of autophagy by either chemical inhibitors or RNAi approach led to a significant reduction in cell death by FB1 exposure, indicating possible involvement of autophagy-mediated cell death in nephrotoxicity of FB1. Further mechanistic investigation revealed that activation of ERN1-MAPK8/9/10 axis played a critical role in autophagy induction and autophagy-mediated cell death by FB1 exposure. In addition, we demonstrated that disruption of sphingolipid metabolism was an apical event in FB1-induced ERN1-MAPK8/9/10-mediated autophagic cell death in MARC-145 cells. Lastly, we identified curcumin, a naturally occurring plant phenolic compound, as a possible anti-FB1 agent that can be used to protect kidney cells from FB1-induced cell death through inhibition of MAPK8/9/10 activation.
{ "pile_set_name": "PubMed Abstracts" }
[Evolution of the basic types of life cycle in ixodid ticks (Ixodidae)]. The burrow-nest life scheme of ixodid ticks, which was formed at the beginning of the Chalk, gave rise to the subsequent types of parasitism: pasture (end of the Chalk), pasture-burrow (end of Paleogene) and pasture-stall one (late Neogene). Changes in the climate in different geological epochs and regions together with the hosts' evolution, natural selection in the aggregate of variability and heredity of ixodids in their populations were the cause of the evolution.
{ "pile_set_name": "PubMed Abstracts" }
Monday, September 28, 2015 I'm writing raw today. I'm writing a bit mad. I'm writing again about Planned Parenthood...can you please listen just one more time. People everywhere were shocked and their jaws fell to the floor, those who actually watched and listened to the videos were wondering, what is going on!? 70% of the American public still haven't taken the time to watch. For whatever reason they give; and I've heard plenty reasons. They still don't know. They still don't care to bother to get involved. I KNOW YOU HAVE BEEN FLOODED WITH TONS OF MEDIA ON PLANNED PARENTHOOD, I URGE YOU TO JUST LISTEN ONE MORE TIME. IN THE NEWS The current headlines this past week put a new fire under the aggravation with the de-funding of this massive slaughterhouse. Many still roll their eyes when PP is called what it is. We have became hardened. Desensitized. Its undeniable. Why would we not demand PP to be shut down? 1. It provides medical care to so many facets of women's health....LIE 2. There is no evidence that they are indeed killing babies, just potential babies....LIE 3. The videos are falsified and fake...LIE 4. It's the only option for low income families to gain medical assistance....LIE All reasons have been debunked..search the internet, make a phone call, ask a friend. Everyone knows! How about this analogy: Planned Parenthood has a relationship with someone in Government. There is something going on bigger then what we see. 2 Recent articles have been published magnifying and outlining the stance our nation has on the abortion issue. The first article https://www.lifesitenews.com uses money to explain away the reason an individual would vote out a bill to put PP dollars on hold for one year while they complete an investigation. It's just a fairy-tale bill anyway, seeing how President Obama will fund them regardless, as he just recently did. Babies vs. Money, must be such a hard choice. In the second article http://www.politico.com shows the actual flaming arrow. We have a President who is threatening to not pay his governmental staff if PP is put on hold for 12 months. He tags the words Government shutdown to cause a sense of panic. What is he gaining by PP being in business? Is it a personal gain or a long term big picture gain? Whats the agenda? Everyone is confused by his actions on many issues. There certainly couldn't be something else going on! (Picture below shows Obama & friend, Cecile Richards, President of PP) The problem is liberals listen to liberal news, conservatives listen to conservative news. If you think for one moment that the media is a truth god, you are highly mistaken. If you want to see what isn't being reported I would educate yourself on both sides. I guarantee you will find yourself shocked. Journalism is not as it once was. ONE PERSON CAN MAKE A DIFFERENCE Let's chat about 2 women who was able to change history forever by their dedication and outspoken voices. Her name is Norma McCorvey. Many know her as "Jane Roe," as her name was protected during the court proceedings in Roe vs. Wade. Here she is today, I stumbled across this video and was surprised to watch her talk about what happened in her life. Jane Roe/Norma McCorvey video Norma admits she never wanted an abortion. She's never had an abortion. She is also a current pro-life activist. “Back in 1973, I was a very confused twenty-one year old with one child and facing an unplanned pregnancy,” she says in the ad. “At the time I fought to obtain a legal abortion, but truth be told, I have three daughters and never had an abortion.” To learn more about why she was a prime candidate for attorneys Sarah Weddington and Linda Coffee's agenda read this article. Why use Norma? "At various times, Norma McCorvey has clarified that she did not consider herself a participant in the Roe v. Wade lawsuit. However, she felt that feminist activists treated her with disdain because she was a poor, blue-collar, drug-abusing woman instead of a polished, educated feminist." The second women who profoundly changed the world is Margaret Sanger. Margaret was born in 1883 and later was an American birth control activist, sex educator, writer, and nurse. Sanger popularized the term "birth control", opened the first birth control clinic in the United States, and established organizations that evolved into the Planned Parenthood Federation of America. Black women in this country please perk your ears. She was a devout racist. I understand racism comes in many forms, and it has never been completely exterminated as it most unfortunately never will. I however, despise it and won't tolerate it near my household! Nothing fires me up more! My daughter, sons, and grandchildren are black. I am a proud Caucasian mother who will not buy into the onset of racist entitlement or racist targeting. Margaret Sanger did just this. There was an entitlement that she felt was for people born with white skin and a target on those born without. If you are a black women who leans towards supporting services of PP, you are essentially joining efforts with a women who said this, "“We should hire three or four colored ministers, preferably with social-service backgrounds, and with engaging personalities. The most successful educational approach to the Negro is through a religious appeal. We don’t want the word to go out that we want to exterminate the Negro population, and the minister is the man who can straighten out that idea if it ever occurs to any of their more rebellious members.” She accounted in her Autobiography details of her invitation to speak to women of the KKK and how she felt accomplished when she left that her point was made there and they accepted it. She wasn't just against black people, but all people who wasn't of a certain "stock." She despised Christians in general. Any child born outside of her perfect "stock" was considered, "a dead weight of human waste." What else did she say, in her own words... Margaret says this: Sanger quotes While we are at it, lets just briefly mention another women in today's history that is changing the world. Hillary Clinton, she also has her opinion on Sanger when she stated,"I admire Margaret Sanger enormously, her courage, her tenacity, her vision,” said Hillary Clinton, “I am really in awe of her, there are a lot of lessons we can learn from her life."Clinton accepts PP Sanger Award. Another nice lady to receive the Sanger Award is Nancy Pelosi. WE'VE LOST THE WAY BABY Life Magazine posted a front page article in April 1965. I just happened to come across the issue last week and bought the copy. It spotlighted a Photojournalist names Lennart Nilsson. It brought him great popularity & fame as he was the first to ever photograph inside a mother's womb. The photos are stunning. I have studied the life of a baby from the early stages of cell formation and on due to my own traveling road of infertility and pregnancy loss. From every article, picture, book, and web site I have intensely read, I have never seen pictures so vividly pronounced in detail of the human form. They are exceptional. This is one of my favorites, mainly because this is at 11 wks. Pregnancy is measured from the beginning of day 1 of your period (cycle) In just a few short weeks passed a missed cycle this is what is happening inside you if you have conceived. Most abortions happen after this time frame. There is a lot going on in this picture, that child is presumably in the safest place on the planet until a mother gives permission to drag it out. If by chance a mother decides to keep her womb a safe place for her baby, in just 4-5 weeks the baby looks like this. There are 7.4 million women alone in the United States with documented infertility just THIS year. They would do anything to have a child. Life Magazine later turned into Time Magazine. Once they celebrated the clever design of human life, now they shower Cecile Richards (President of PP) by praising her. They state, "As we look to inspire the next generation of women to join this fight, we're fortunate to have Cecile as our mentor. There is no better advocate." She was names one of America's most influential women of 2012. In 47 years something changed. Mass murder is now a fad and creation of human life is mocked. NOBILITY IS SOLD OUT I contacted my local representative Greg Beumer last month. I've been sitting on our conversation since then wondering what to do with it. Here is a summary of our conversation. Me: I explain who I am, why I am passionate about stopping abortion, and what I would like to get on board and run beside Ohio as they are trying to gain awareness to their efforts to pass the Heartbeat Bill in their state. Him: He tells me his stance on this issue He says, "I am appalled about what recently has taken place with Planned Parenthood..." He says, "I am a supporter at any attempt.."as he was referring to stopping the killing of the unborn. He also threw in the statement, "even though they didn't find any sales of fetal tissue in the state of Indiana." (He didn't mention what kind of investigation they did in the state...I heard it went something like this. "Hey, did you guys sell baby parts? No? OK! Thanks!) A few phone calls over a few days makes for a sorry effort to find out what's really going on.He says, "Here's the problem, it will not come up in the next session...I'm newer...I'm not sure how our county stands on this issue...They will only tackle a few issues in session...not sure if it would come out of committee." "They will be following up on the LGBT so most likely won't go down other social issues." "I am a defender of the unborn." It all sounded great as I am new to the political arena and didn't know any better. Then he continues to say..."I agree I think we should make legislators aware that our neighboring state (Ohio's Heartbeat Bill) is boldly going forth...but I don't think I'm the person for the job. I think you should contact Tom Dermody, he may be willing to help you and HE IS NOT UP FOR RE-ELECTION. HE HAS ALREADY STATED THAT HE WILL NOT BE RUNNING! YOU SHOULD CALL HIM" And there you have it folks... I don't claim to be a highly intelligent person but it wasn't hard to see the bottom line. He essentially said, I believe in rescuing children from murder but there is no way I will put my job on the line to do that. Ask someone else, while I sit here on my hands and work on my popularity. Make sure you vote for me. Would the Heartbeat bill be heard or passed? Here is my take on creating bills that most likely wont pass...try anyway! People will hear about it regardless. People will see the effort, passion, and endurance. The nation will begin to hear that someone cares, someone is willing to sacrifice their time to use their talents on something other then themselves. The weakest statements are those that proclaim to not try because it probably won't go anywhere anyway. He was right about one thing, Ohio is boldly going forth, by showing us how to fight in the trenches. I applaud you Janet Porter!! About Janet and Faith 2 Action. The constant character of legislators seem to prize their campaigns ahead of the future of this country, which has already been radically thinned out by abortion WHY DON'T PEOPLE CARE I worked as a manager of a local Co-op offering grass-fed, organic, gmo free products to the public. Almost as a whole, our nation's stomach turns when we see pictures of large cattle/swine/poultry operations. Seeing pictures of overpopulated feed lots, thousands of caged animals, and infested unsanitary environments cause people to get upset. Domesticated animals are a even bigger tug at the human heart. Many times I see announcements of equine abuse, animals starving for no reason at all. The community is quick to react. They band together and in a matter of moments the person responsible is facing charges, the animals are treated medically, and dispersed among approved homes. Once people hear of the travesty, they jump, move, react, respond, and demand it to be fixed. One of the worst things my eyes have ever seen was a video I came on FB. It was of a young women who had a bag of puppies. Her boyfriend taped her as she picked up each one and while laughing and making jokes, she held each one up the camera, said something vile, and threw them one by one into the rushing river flowing beside her. It was a game to her. A joke. No regard for life. Just a sick twisted girl who took her sick twisted-ness out on something else. There was a response from FB viewers, they plastered her video everywhere. I saw it come through my news feed many times. It was shared hundreds of times in hopes that they would catch this girl and prosecute her for her crime. Comment after comment stated how she should be thrown into the river herself, jailed for life, or punished beyond words. I agree that things like this are outrageous and should be dealt with. How much more valuable is human life? Why are people not fussing? Why are they not getting mad? Why such a small group of people that care? What better thing do you have to do then stand up for the innocent? What is wrong with us?? These are our kids! Every child that is murdered is a grand baby, a cousin, a sibling, a son or daughter. Grandmothers, how can you sit by and let them kill your babies!!?? Aunts & Uncles, how can you let them rip apart your nieces and nephews!!?? When you have an abortion, you are killing your own genealogy...and PP doesn't care about that. 55 million people have disappeared from this earth and people don't care! WHAT DOES GOD SAY Does anyone care what God says anyway? If you believe in Him, you know how He feels about this. I don't really need to list scripture passages to spell it out? We all know it's wrong and sitting by while others do it, is just as wrong. We don't want to get into someone else's business... I wouldn't ever stand by and watch someone murder anyone. I know you wouldn't either. How is this any different, unless we are believing the same lies..."it's not a real baby," "It's the mothers body," or "it's the women's right." Your either for God or you are against Him. Better make a wise choice. I can't imagine the Proverbs 31 women sitting by doing nothing! FASCIST FEMINISM Fascist feminism for the rights of the women has it's name all over this. We have let radical women stand up and scream Women's Rights for years! They don't care about my right...they care about their own. There is no right for the daughter in the womb being proclaimed by them. Women are smart enough to know that we have a power when we join together. The entire lifetime of the world has been changed for good or bad by women banding together with similar ideas, values, and passion. I am tired of watching women throw their self worth away, handing it over to political junkies who create appetizing bills that look delicious on the outside but with a hidden agenda. The people behind these things do not care about you, your family, or your future. We need to have a voice, not a sing-song voice, but a strong precise undertone that is loud & contagious. One that defends people,one that defends black women, white women, all women, all children, defends all life. Open your eyes and see what they are hiding, it is not OK to kill! They can present it anyway they want but it's never OK. We have been lied to! And it wont be tolerated anymore! We do not hold the ignorance that they are counting on us to have. We are intelligent, compassionate, passionate, purposeful women who are alive at this time in history for a reason. We are warriors, soldiers, and patriots. We stand for what we believe in! We wont let any man or women convince us otherwise. We can make a difference as many women before us have. Women...hear me again you've been lied to. They are liars! Abortion has never been OK. If you are a mother who is heading to terminate your baby, you have to know...we will give that baby a voice. Even if you don't want us to, we will speak on the behalf of your child with or without you! Humans should be equal. All humans...regardless of age or residence. No one has the right to dictate whose life is worthy and whose isn't, and by being silent that is essentially what you are doing. You are saying it's OK to terminate children. The ones who are quiet are guilty! HAND-SITTING As my own personal disclaimer I want to say, I love God & the human race He created. I also love women who have had abortions & I love the children they allowed to be killed. I love people of all stature, mentality, race, sexuality, and gender. I love the disabled, the elderly, and the afflicted. I will stand up for all of you. I will feed you, love you, help you, hang with you, and share my life with you. To Christian women, I pray for boldness & conviction. This is Kingdom work and it is not suitable to sit by and not do something. Pray for the power of God to intercede. It does look impossible but with HIM it isn't. The world will turn bleak but when He looks upon His people, I for one am not going to be sitting on my hands doing nothing. Wednesday, September 23, 2015 I went and saw the movie. I know you did too. Who wouldn't...It was amazing, convicting, and Beth Moore was in it for goodness sakes!!! I came home all ready to get out the masking tape and start pinning all my prayers to the walls of my tiny closet. Then I remembered, I don't have a closet...actually I have no small room, hidden space, or cubby that I could sit in warrior style. I have a room upstairs that is used as a storage and the thought of cleaning it out and finding a place for everything in there was overwhelming. I just wanted Ms. Clara's room!!!! But, I can't have Ms. Clara's room so I had to put on my thinking cap! As I thought about it I looked at the 3 kiddos that were running around the house like hooligans. They need to see me praying. They need to know what a War Room is. They need this to be their life-style! So, I went to work. I placed my War Room in their Play Room! I know, sounds like a disaster already! Why in the world would this Momma do that!! I'm sure you already are shaking your head and thinking I could use some good advise. I thought of it as a great opportunity. A chance. A hope. A example. A witness to my children. We will war together!! I will war for THEM, for our kids will change the world, Right! I looked in the room for a few, then got busy. What toys couldn't fit into the closet was tossed. The lego table and desks (that they never use) got moved downstairs. Everything was taken out til it was empty. Just a rocking chair and a old cabinet full of books. Now it's time for tape....lots and lots of tape! It's coming together now, it's still a place that toys get strung out...all the while I rock in my chair and pray. I also know that prayer is a private thing at times and so I find myself in there early in the morning reading off the wall and asking God to intercede for my family, community, country, and this world. I'm no Ms. Clara. But I am a Momma, a Momma with a desire to witness more of God's power in this land. I know you are alot like me and want great things for the future. Let's war in our war rooms, outside of our war rooms, in our cars, in our kitchens, in the morning, and as we sleep. Wednesday, September 16, 2015 Ezekiel 3:18 says this... "When I (God) say to a wicked man, 'You will surely die," and you (meaning you) do not warn him or speak out to dissuade him from his evil ways in order to save his life.... That wicked man will die for his sin, and I will hold you accountable for his blood. But, if you do warn the wicked man and he does not turn from his wickedness or from his evil ways, he will die for his sin; but you will have saved your life." Ok, let me get this straight...I am to be in someone else's business or I will be held accountable for their crappy decisions?!? Yes! That's JUST what it says. I read the book of Ezekiel and it left me thinking many things. This is one that had me looking into my own life and analyzing pretty hard. If I see someone doing wrong and say nothing, then I am guilty. I camped here for a bit. Instantly a flooding list of things ran through my mind, things that I witness and turn away as if I don't see. I hear and see things everyday that could not hold upright in the presence of God, yet I am calloused and hardened to everything around me, just like most people I know. This cannot be ok. This is not ok with God. Ezekiel also says in vs. 20-21 that if you do intervene and talk to this person, and they decide to turn away from their sin, you both will be saved. How beautiful is that! Most of us have grown up in a era of Me. Me matters most.Me need food.Me need drink.Me want things. Me have fun.Me get mad if you get in my way. And so we turn our faces the other way when another Me comes along as to not offend them or not get in their business. That is not what God advises though. He persuades us to keep an eye on each other, to tell each other the truth even when it's uncomfortable, and to put ourselves in between someone and sin..in the hopes that they will chose something better. In hopes it will spare their life. Most of this country is under the influence of something addictive. If you personally are not addicted to something; you know someone who is. Everyone knows someone. You may be addicted to your phone addicted to the TV. addicted to achievement. addicted to work. addicted to food. addicted to attention. addicted to internet. addicted to drugs. addicted to alcohol. addicted to self. and the list goes on and on... We don't want anyone to get in our way when it comes to our time and the things we do with our time...especially our addiction's. Addiction's will however cause us to take our eyes off of God and keep them on ME. Real followers of Jesus will get in your way. They will put their lives, reputation, and friendships on the life to stand in between you and yourself. Even if it means great loss. The attempt is worth the risk. It won't take long to wrack your brain of who's business you can get involved in. Think about it as an act of love, for your own sake and the sake of your friend. Don't hesitate when that person comes to mind, it likely is a matter of life and death. BELIEVE God's Word! It has no error and holds no lies..be a hearer and a doer! Wednesday, September 9, 2015 That's happened quite a bit lately. I've seen it personally and watched it from afar. God fearing people saying, "I don't have anything I need prayer for, thanks anyway." What!! Give me some of that water! That drink of I never have another need, I'm totally complete...no desires, no wants, no empty spaces. That water!! Wait a minute...I do have that water, and His name is Jesus! Why would anyone ever reject a divine conversation to the Father by someone who is willing to spend their own time to plead on their behalf?? It makes no sense to me. I've heard that we are a praying people. I hear utters of it all the time but I don't see it. Someone will tell of a hardship and others respond by saying "praying for ya." There is big talk that everyone goes home and lays on their face and prays for everyone else. I don't know if I'm living in a fantasy, but I dare to say that I don't believe it. I don't believe most of them pray. I betcha many of them forget or throw up a, "Dear God, be with so and so..." Broad prayers likes that mean about as much as an empty promise to pray. I know that sounds harsh, but seriously Church!! Asking God to "be with someone" is well kinda silly...if we know anything about Him, we already know that He is with them. The intensity of a prayer depends on how willing you are to put yourself in the other persons place for that moment. Pleading, begging, asking, hoping, praising God. That's what friends do. That's what Christians do. That's what we need. Instead of waiting to pray, pray right there. Pray while on the phone, in the store, or wherever you may be with this person. Scripture says that whenever someone has a need, don't send them away and tell them they can have it tomorrow...be available for them now! Then, when you do pray, do it in a way that this person's life depends on it. Well, cause it really does.. Whatever you petition for will alter, change, and bring a powerful intercession over the situation and details of their need. Things change when you pray, so..pray for that change with everything you have. If someone asks you next time what you need prayer for make sure you give them a specific thing so that they can be personal in their prayer for you. So...What do you need prayer for today? If you leave it in my comments or message me personally, I promise to pray for you as I would want you to pray for me! Monday, September 7, 2015 Wednesday, September 2, 2015 Here I am all lovin' on Jesus, raising my hands in the air, singing my heart out like He's right above me smiling down and so pleased. Just ready to do His will, whatever He may ask of me...send me where you want me to go, tell me what you would have me do, I'm ready to say yes to anything you want Lord!!! ....then she walks in. What is she doing here?I don't want to share my church with her!My worship time!My friends!My life!All of a sudden, Jesus is no longer the center...she is.This "whoever she may be" changes your priority and becomes the focal point of all your time, energy, and mental activity. She ultimately becomes who you worship!I know, I've been there.There was a time when I was so incredibly engulfed by someone else, that I took my eyes off of God altogether. I may not have said I did at the time, but I did. I thought more of "her" then I did of Him.Why?Because this person hurt me.This person had me entangled in a snare that caused deception and pain. She was someone I trusted and cared for and she let me down. She painfully hurt me in a way that I could not forget or forgive & I didn't want to share my God with her.Have you been there?Surely there is someone who you would rather not walk side by side with into the pearly gates, maybe race here there and shove her to the side so you can enter first...Ok, that's a little harsh.Maybe you just want to have Jesus brush your hair and tell you what a good girl you are in front of this person, just so she knows how much more He loves you and how it hurt Him that she did you dirty!That would be just a few random thoughts that go through my mind when I'm spending time on the un-forgiving side of life. It's true..without sugar-coating it, forgiveness is by far the hardest thing to do next to martyrdom. First point, main point, don't want to miss this point!! Salvation! You need it, want it, have to have it...Matthew 6:14 For if you forgive other people when they sin against you, your heavenly Father will also forgive you. And there it is...the top reason. You are a functioning part of the body of Christ. You also are a resemblance of His attributes. Essentially, you do as He does. He is willing to forgive your junk and as His child; you do the same to others. If not, it is as your saying that it's not worth it to you to forgive, and so he states in Matthew that if you don't then He wont either.What if they are un-forgiveable, have a nasty attitude, or are not apologetic? What if they are non-deserving or a slanderous mockery of you?Then you are obedient anyway. It is to your benefit to listen & obey, so you buck up and do it anyway!If not, you will be "dealt" with...Matthew 18:35 says "So also My heavenly Father will deal with every one of you if you do not freely forgive your brother from your heart."* IT'S A FREE ANECDOTE Second point is that it's a remedy that you need to store in your cupboard at ALL times. You will use it often, it's free, and has simple instructions to use.Only one word describes the inflicted disease. BITTERNESS. This acute problem can hinder many things in your life, YOUR LIFE, note that I'm not talking about the person who you can't forgive. I'm talking about you...me. Your life will be hindered if you choose not to forgive. Worship will be hindered, The Spirit will be hindered, and your relationship with Jesus will be hindered. How important is it to wake every morning, open the cabinet, and take a swig of this?? It's vital!Forgiveness can save a marriage, restore a family, heal a friendship, or just free you from keeping your eyes on things outside your priority. It has the power to do much more then you think or see, obeying in this gives you life, disobeying in this can render agony, heartache, depression, and jealousy, but most of all it will keep your focus on something other then what's important. It can separate you from your life source and rob you of your inheritance. * IT'S A ROUND HOUSE KICKI've never been able to get my leg up that high but this is one way to round-house kick right into the enemy's mouth! He is the one who reminds you day after day how you have been hurt, spewing details, & forming assumptions. It is his lies that hold you back from freedom. Unforgiveness = Bondage, he knows that! He enjoys to hear you complain about other people, he also likes to hear you reminiscence on how terrible you feel about it all!Break free, bring up your leg, fling yourself around, and kick him right in his big fat mouth of lies! I know you have a warrior spirit in you!! Continue to fight until you are free!Pray for your enemies, pray about them, pray when your crying, pray when your mad..there is never a bad time or a wrong way. It opens up reconciliation not just between people that are hurt, but between you are the Lord. That is what you need. That is what rescued me. It's a power tool. It's a weapon and Jesus wants you to use it every single day. Forgiveness is for your sake, your benefit. It will bless you as you use it and it will restore things that are broken that you didn't even know had a fracture. It may not even be a "her" that is afflicting you, it may be a "him" or maybe even a past event or thing you have not let go of. I encourage you to give it to God today. Give it all to Him...then do it again tomorrow, and the next day, and the next, until you are completely free in Christ! A good place to start if you don't know how to begin is to say something like this,Lord,I want to forgive them because you want me to.It's hard and I need you to help me.Help me change my mindset and focus on your forgiveness in my life, so that I may understand why it's so important for me to imitate you in this.Help me pray for them as you would have me to do.Change my heart to be more like Yours.Then you could also add something like...Lord, please forgive them also..for they don't really know what they have done to me.(I actually know a man who said this right before he was murdered on a cross) Forgiveness can restore past your wildest dreams, don't miss out on this!
{ "pile_set_name": "Pile-CC" }
package tenants import "github.com/gophercloud/gophercloud" func listURL(client *gophercloud.ServiceClient) string { return client.ServiceURL("tenants") } func getURL(client *gophercloud.ServiceClient, tenantID string) string { return client.ServiceURL("tenants", tenantID) } func createURL(client *gophercloud.ServiceClient) string { return client.ServiceURL("tenants") } func deleteURL(client *gophercloud.ServiceClient, tenantID string) string { return client.ServiceURL("tenants", tenantID) } func updateURL(client *gophercloud.ServiceClient, tenantID string) string { return client.ServiceURL("tenants", tenantID) }
{ "pile_set_name": "Github" }
Track accepted paper Journal Metrics Source Normalized Impact per Paper (SNIP): 1.069ℹSource Normalized Impact per Paper (SNIP):2014: 1.069SNIP measures contextual citation impact by weighting citations based on the total number of citations in a subject field. SCImago Journal Rank (SJR): 0.878ℹ SCImago Journal Rank (SJR):2014: 0.878SJR is a prestige metric based on the idea that not all citations are the same. SJR uses a similar algorithm as the Google page rank; it provides a quantitative and a qualitative measure of the journal’s impact. Stay up-to-date The Official Journal of the International Federation of Clinical Chemistry and Laboratory Medicine (IFCC) Clinica Chimica Acta is a high quality journal which publishes original Research Communications in the field of clinical chemistry and laboratory medicine, defined as the diagnostic application of chemistry, biochemistry, immunochemistry, biochemical aspects of hematology, toxicology, and molecular biology to the study of human disease in body fluids and cells. The objective of the journal is to publish novel information leading to a better understanding of biological mechanisms of human diseases, their prevention, diagnosis, and patient management. Reports of an applied clinical character are also welcome. Papers concerned with normal metabolic processes or with constituents of normal cells or body fluids, such as reports of experimental or clinical studies in animals, are only considered when they are clearly and directly relevant to human disease. Evaluation of commercial products have a low priority for publication, unless they are novel or represent a technological breakthrough. Studies dealing with effects of drugs and natural products and studies dealing with the redox status in various diseases are not within the journal's scope. Development and evaluation of novel analytical methodologies where applicable to diagnostic clinical chemistry and laboratory medicine, including point-of-care testing, and topics on laboratory management and informatics will also be considered. Benefits to authorsWe also provide many author benefits, such as free PDFs, a liberal copyright policy, special discounts on Elsevier publications and much more. Please click here for more information on our author services. Clinica Chimica Acta is a high quality journal which publishes original Research Communications in the field of clinical chemistry and laboratory medicine, defined as the diagnostic application of chemistry, biochemistry, immunochemistry, biochemical aspects of hematology, toxicology, and molecular biology to the study of human disease in body fluids and cells. The objective of the journal is to publish novel information leading to a better understanding of biological mechanisms of human diseases, their prevention, diagnosis, and patient management. Reports of an applied clinical character are also welcome. Papers concerned with normal metabolic processes or with constituents of normal cells or body fluids, such as reports of experimental or clinical studies in animals, are only considered when they are clearly and directly relevant to human disease. Evaluation of commercial products have a low priority for publication, unless they are novel or represent a technological breakthrough. Studies...
{ "pile_set_name": "Pile-CC" }
My oldest son Ludvig, he’ll be 10 in May, he’s this amazing brilliant boy with a good sense of humor, a lot of great ideas and mostly he has this large very sympathetic heart. He cracks jokes like no one else, has this bubbly laugh that makes you laugh just because it sounds so joyous. He thinks outside of the box and see the world in colors the rest of us don’t even know they exist. No one cries more for or harder for those who are unfairly treated. His second year of school, from august 2014 to august 2015 he had the worst year of his life, school that wasn’t that great to begin with became a living hell. Not a day went by where he wasn’t bullied, beaten, was called names or he even got threatened to be killed. My boy 9 years old not only had to fight for his right to get the help our school laws say he has the right to since he has ADHD and ASD. He had to fight bullies every day. No need to say that even though I spent more time in school than any other place, even though I reported the school to the board of education our society stands paralyzed when things like this happens. At one time my son said there’s no point in staying alive no one wants a bad boy like me anyway. Do anyone know the distress and complete hopelessness a child mere 9 years old have to feel to say something like that. We can’t. Ludvig wished to die because living was to exhausting. Spite this Ludvig one day in the midst of this said about his worst bully to my mother one day when she was picking him up from school: Grandma he’s so alone, no one likes him because he’s so mean. But grandma no one should be alone so even though he’s not very nice I’ll still be his friend. That’s my son. He goes out to this warped up world where he’s considered to be the freak and the one who is disabled, the one who turned out not quite right, the one who needs to learn the ropes. He the one who has less rights and the black sheep. That is why today when some woman at the indoor playground we went to not only reprimanded him without knowing him and disrespected him for playing with her child 4 years old and he’s 9 and it got to rough. Boys play they wrestle, but this time they were jumping on trampolines and they all lost their balance. Then this mother expects me to yell at him and treat him like utter dirt because this is how children are taught. Well fuck you lady I don’t yell at my children! Ever and if I happen to do so I apologize always because that is not how you speak to anyone child or adult. Yes, Ludvig has limitations, he doesn’t understand social interaction the way you and I do, he doesn’t understand sarcasm, irony, hidden meanings, he doesn’t look at the world like you and I do but he’s not stupid. What he needs is understanding. He does know the world see him as different and that many people don’t see it as a good thing but look down on him because of it. Which makes him feel shame. I had to watch my son look shameful for being him because this woman expected him to be like everyone else. She wasn’t even open for dialog so eventually I just told her to not speak to my children because her opinion didn’t matter one bit. I will always stand up for my children even if they may have been in the wrong too and talk to them about that afterwards, I will never hang them out for the vultures. NEVER!My son who will care for humans and animals alike who can’t watch a commercial where the dog is left out in the rain without starting to cry, who hates the ice age movies because they are to sad. My boy who went to school every day even though school was hell and fought with every ounce of energy (and still do because even though things are better they are not good) to get through his day he is still the broken one, the one who needs to adapt and change. The malfunctioned boy who has no manners. I won’t stand for it! In my world he is the type of person I wish I could be intelligent, kindhearted, empathetic and strong willed. If more people were like him the world would be a better place. #5StarReview 🌟🌟🌟🌟🌟 #HavensRevenge #ReaderReview~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~An amazing read!Very original story, nothing like I've ever read or heard of. Emotional roller coaster, in all the best ways. Wanting to be able to actually slam a book shut out of frustration, then finding myself laughing Shock and on the edge of my seat before ending up in tears for varying reasons. I'm already chomping at the bit for more!!Website: www.phetranovak.com~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•~•#ExcerptHis wolf was driving him crazy, pacing inside him, howling for its mate, wanting to have him near. Alexander wondered how much Haven had changed in the four years they’d been separated. Was his hair still long strands of silk for him to run his fingers through? Did he still wear those well fitted jeans that made him look like any gay man’s wet dream? And was he still the mouthy, grumpy, lovable asshole he’d always been? Most people found Haven disturbing or rude. He didn’t. His lover to be was how he was. The attitude was a shield to protect himself. A great challenge Alexander couldn’t wait to get on top of. He’d tame his lover, and teach Haven to submit to him—his wolf.But mostly he was interested in seeing Haven's reaction to his change. When he left for college, he’d still been that tall, skinny kid. His ma said he was a late bloomer. Being eighteen and still looking like he was fifteen was worse than anything else he could have thought of. Especially when you were trying to impress your future mate with your size.He’d spent the past four years bulking and toning up. He’d never be like Reid, he’d always be a slimmer build but he felt better now. The biggest change, though, was his attitude and personality. In his eyes he was the same Alexander he’d always been but he was more confident and secure in himself, both as a person, and in what he wanted. He was becoming a leader."Hey, dude, you still in there?" Alden gave him a hard slap on the chest to get his attention.“Oops. I spaced out, sorry.""He should be back any minute. He and Andreas have been out at the east pasture to look over the fence. They said they’d be back in an hour or so and that should be pretty soon."No sooner had he said it, when the clatter of horse’s hooves came into the yard. Alexander spun around on his heels, moving to the stable doors. When he saw Haven's tall frame up on that brown, mottled horse of his, the world around him stopped, and all he saw was his Haven. His heart picked up the pace and beat heavily in his chest, and his palms were sweaty. God, he was even more gorgeous than he’d remembered and up on that horse, he looked almost wild. His mouth was set in its normal thin, stern line, but he was stunning. He could feel his nostrils flair as the scent of him carried through the breeze. His wolf sniffed the air too, pushing his chest out, trying to make himself look bigger and more attractive to his mate.He was even hotter than Alexander had remembered. How could he not have remembered this? The picture he carried with him hadn’t done his Haven justice but then again, it was a few years old. Time had been good to his man. His hair was longer from the look of things. It had to be almost down to his ass but still looked silky smooth.Alexander smiled to himself as he walked farther out onto the yard, his eyes glued to Haven. Up on that horse, he looked almost regal with his brown hair moving in the light breeze. Alexander was so struck, he couldn't take his eyes off him even if he’d wanted to, and he didn't. He must look like a fool, standing there drinking him in like a parched man, and Haven was his oasis. But he didn’t care who saw his thirst. Haven was his and his alone. They’d better get used to it because he wasn’t going to hide his love or desire.Alexander watched as Haven jumped off Bullet, landing with ease on the ground. Bullet was a young horse Haven trained himself; they’d given him to Haven for his twenty-first birthday, five years earlier."You’re starting to turn blue in the face, kid, maybe breathing would be a good idea."Alexander jerked his head around to look at Alden who’d come up to stand next to him, his face serious."You know, you can do a lot better than him. He doesn't deserve someone as good as you.""What?" He had to bite his tongue not to growl at Alden but his eyes narrowed, and that was enough to get the message across."You heard me, kid. You don't have to get all defensive. The choice is obviously yours. But someone needs to tell you like it is." He gave Alexander a last look before turning on his heel and walking back into the barn. Alexander let him go, deciding to deal with Alden later. Right now, Haven was more important. "Hello, Haven."Haven had been deep in thought when he heard the familiar voice, the surprised look on his face was probably proof of that. The instant awakening of his dick in his pants was a second giveaway. Rolling his shoulders, he felt instantly annoyed at his body’s betrayal, just from hearing his voice. He didn’t have time for this.The fence along the east pasture was worse than they’d initially thought. They’d only managed to fix half of it and had to come back for more supplies. The way the wire had looked cut in places was odd. Some posts hadn't been that bad—they shouldn’t have given in as they had. He was almost sure some of the poles had been switched. They didn't look like the others at all. He hadn't mentioned his suspicion to Andreas because he didn't want to alarm the man in case he was wrong. Instead he wanted to take it to Coleman before lunch and have him ride out with him before the others were even done.Someone had purposely tried to cut the fence to make it look like it had broken. He had a feeling he was right. It all looked suspiciously like foul play. He wasn’t here to play footsie with the boss’s son. But having no choice, he took a deep breath before turning around."Alexander." He felt proud of how calm and sure he sounded, even though Alexander was right in his face. No emotions in his voice. He cleared his throat, forcing himself to give him a half smile. "Good to see you, buddy." He patted him on the shoulder once, before gripping Bullets reins and led him toward the pen next to the stables.He closed his eyes, groaning inside. Good to see you buddy! Jesus Christ, Haven, that's the best you could do? But what did it matter, he wasn’t here to impress Alexander. If he thought he was a boring prick, all the better for him.He made a quick job of removing the reins and saddle, then hanging them over the pen fence. There were no point in putting it away when he was going back out there. He could feel Alexander’s eyes boring into his back but he ignored it, and him, refusing to turn around."Haven."He jerked as he heard Alexander's voice next to him. Why the hell didn't he hear him move? His shoulders tensed involuntarily but he didn't turn to look at him. This was ridiculous; he was the boss’s kid, nothing more, nothing less. Never had been, never would be. That was what he’d been trying to convince himself of and wasn’t changing his mind. He let out a snorting huff, a stiff evil smirk formed on his lips as Alexander said his name again."Haven. Don't ignore me." Alexander was forced back a couple of steps when Haven turned to look at him.The look he gave Alexander was intended to hard and cold, even more so than normal. His smile on his lips wasn't warm or inviting. "It was a couple of kisses a hundred years ago. It meant nothing and it will never be more than that. Unless you want a good fuck up against the barn wall? I need a good release after the week I’ve had." He could see the hurt his words caused Alexander but that was the point. Please! Just leave. Forget about me! He begged inside his mind.As Alexander turned and walked away, he convinced himself that was exactly what he wanted. He grabbed some water and hay for Bullet. On his way out from the pen, he met Alden in the doorway."You’re a fucking asshole, Haven," he hissed as he walked by, slamming into his shoulder, forcing Haven to take a few steps forward to keep his balance.Haven didn't bother saying anything. Instead he rolled his shoulders as well as his eyes and stalked up the yard toward the main house, muttering to himself, "Like that was fucking news."He knew his words had hurt Alexander but he’d thank him later when he realized what a loser he really was. That he couldn't...wouldn't love anyone, ever again.​ It's only 5 days left until the release of Finding Home. Kai's and Luca's story has been long time coming, It is the first attempt to a book I ever sat down and tried to write. It's what the "English language" call a coming of age story, a line of words I don't really understand. I know what they mean but they don't make any sense at all to me. But this is what the story is. What I loved most with writing this story was that it is centered in my home town, Gothenburg. It was a lot of fun to know ever crook and corner when I pictured Kai and Luca doing town. Gothenburg is located on the west coast of Sweden and is this large city with small city charm, also called Little London. It is what you would call a walking city, the best way of enjoying it to it's fullness is to just walk and then walk some more. Even when you're in the heart of the city you will find it to be like no other big city because it feels small, intimate and cosy with cafés and pubs all over the city. There are a larger shopping mall but mostly you have the indivudual shops along the streets. So, in five days, two days after Lucia a national holiday where we celebrate the dark haired girl with lights in her hair Finding Home will be available for you on Amazon and All Romance. “You having fun?” Kai’s voice spoke low in his ear. It was heavy and graveled like he’d just woken up, making Luca frown, turning his head to look at him. What he saw in Kai’s eyes couldn’t be mistaken for anything else but lust. Not even by a novice like him. Luca pulled in a deep shuddering breath, unable to let go of the hot stare.Unable to speak he nodded. Kai smiled, as if he could see the affect he had on Luca and loved every moment of it.“What has you thinking so hard, darlin’?”Oh, my God, did he just call me darlin’. Luca bit his lip to stifle a groan. Fuck him. He swallowed hard, eyeing Kai as he fantasized about him in his cowboy hat, boots, and the same tight jeans he was wearing now. Shit! He was getting excited. He had to stop. He felt the hot prickle as a blush crept up his neck and spread onto his face.“Oh, now I really want to know what you’re thinking.” Kai let go of his hand, slipping his arm around his waist and pulling him closer, guiding him to a bench in a small cove of the castle wall overlooking the ocean.The pressure of Kai’s hand on his hip wasn’t harsh but the affect it had on him was like he’d been gripping him hard, hard enough to leave a mark. Luca squirmed, a soft whimper slipping from his mouth. His prick was pushing hard against the zipper of his jeans, the intensity of the moment. The vivid images of Kai all geared up in his mind, together with his emotions running haywire, and he might just come from listening to Kai speak.“Oh, God,” he whimpered, squeezing his eyes shut, sitting down abruptly on the bench. He reached down, grabbing himself through his jeans, squeezing hard, trying to stave off his impending orgasm. What the hell was wrong with him? Didn’t he have any self-control? A soft chuckle made him open one eye and peer suspiciously at Kai.“You think this is funny?” He heard the hurt in his voice and couldn’t help it. Luca didn’t like Kai laughing at him.“Oh, darlin’.”He gasped at the endearment, there it was again. It really got to him. The endearment itself, and the way it sounded spilling from Kai’s mouth with that twang. It was like being touched.Kai sat by his side leaning into Luca, one arm around his shoulders, and the other lifted his chin, to tip his face so they were looking at each other.“I wasn’t laughing at you but if you could see yourself right now…” He didn’t say anything else. Instead, his eyes roamed over him, drinking him in and making Luca’s pulse beat heavily in his ears.“How do I look?” Luca swallowed and whispered, unable to look away.“Like pure sex,” Kai said instantly, smiling. “You make me hard.”Luca watched as Kai’s fingers circled the wrist of his hand in his lap, bringing it over and discreetly cupping the hard bulge in his jeans. Saving Sean, the second book of the Caddo Norse Novels is far from due but for those of you who are waiting here's a teaser: ​~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ “Son wait we don’t know anything we can’t go out there blind.”“I don’t care dad. I need to find him. He’s out there alone, probably scared. He needs me!” Reid growled tearing his arm away from his father’s grip. He was ready to walk back out there, to shift and find him when Coleman stepped in front of him grabbing him by the shoulders keeping him from going. “Son I understand this hard for you. Being away from your mate.” His head snapped up looking at his father. “I’m old but not that old. My sense of smell and eyesight is pretty damn fantastic still if I may say so myself.” He smiled, Reid staring at him, worry taking over his mind and body. He whimpered. “Pops I have to find him. I can’t just stand here I need to go search.” His body trembling from the urge to shift, his wolf pushing him to go find their mate. He wanted to growl when no one reacted. What the hell was wrong with them.“We should let him go pops. I’ll go with him.” He looked at his brother gratefully. Ha someone was at least on his side. “If you are going I am going.” Haven stood up with Maya still in his arms clinging to him. “You are going no where without me.” Alex didn’t argue instead he nodded. It was easy to see they were communicating through their link. OK so could the go already. Reid was getting impatient, his wolf was already tearing a hole inside of him for his lack of action. “I don’t know about this…” Coleman said with a deep frown. Reid roared out loud so damn frustrated he was about to rip someone’s throat out, the younger children whimper and hid behind the adults, afraid of him. But he didn’t care at that point. Sean was out there alone and they were standing here talking. He was done!“Calm and easy brother.” Alex’s voice was smooth but demandingly clear for him to back down and take it easy before he scare the little ones to death. He forced himself to lowered his eyes baring his neck immediately giving him a silent apology. He didn’t need to start a struggle or fight with anyone now he just wanted to go. Sean was out there alone in the claws of a beast didn’t they fucking get it! Alone! His mate. If it had been Haven Alex would have torn up heaven and hell to find him. Asshole! He bared his teeth growling low, looking at his brother underneath his lashes not standing down this time.
{ "pile_set_name": "Pile-CC" }
Q: Set a custom style to tags recognized by Html.fromHtml() In Android, when setting html formatted text in a TextView using Html.fromHtml(), text styling is applied to e.g. the h1 heading tag. The style Android uses does not fit with the style of my app. Is it possible to apply custom text styles / formatting to the recognized html tags? So that e.g. all h1 tags are styled in the same custom way? A: You can add custom style attributes to your texviews but you cannot override the HTML tags, those tags are predefined standards and cannot be changed.
{ "pile_set_name": "StackExchange" }
Upload the video to YouTube (set to “private” since I don’t actually want people watching it) Upload the transcript to YouTube and let it run the autotiming Download the autotimed subtitles in .srt format Open the video and .srt file in Aegisub Save the .srt file as an .ass file — this step is IMPORTANT because .ass supports a lot more formatting options than .srt Go through the video with subtitles and correct any timing or transcription errors, and add any formatting (mostly adding italics or moving the subtitles around on the screen so they don’t cover up important on-screen information) Convert the video to a subtitled video using Video to Video — you just load the video, tell it the output format, tell it what subtitle file to use, and it does the rest. As far as the details of Aegisub, I learned most of what I do through trial and error. And http://docs.aegisub.org/manual/Editing_Subtitles#Supported_formats is a pretty good overview of some of the basics. I don’t use 99% of the features in Aegisub (it does things like karaoke timing and fancy animated subtitles for animé and translation), but for what I do… it works well. I use styles for position on screen, and to specify subtitle font and color options. I personally prefer yellow subtitles on a semi-transparent black box, like this: Hope this is all helpful! -Andrea Dietrich == Great question on this topic and related * came into the CCAC Members’ forum the other day and there is additional input in the forum. Are you a CCAC member yet? You are invited now. CCACaptioning.org/join/ and email if you have any questions. *…interested in learning some of the diverse approaches, software, etc., that people use to rip captions from videos for analysis, revision, experimentation, research, critique, etc. and also asked for input re two closed captioning products for post-production captions. Teams will form soon for various good captioning advocacy projects. From revision of the CCAC website to guest blogposts here to social media and fundraising and the Grant Program and more….you are needed too. Rate this: EVERY DAY in every way we aim to find – have – enjoy – equal communication access and for many of us – millions – it’s quality captioning we can use. This post is about Media captioning online. Breaking news is important for all of us to have access to. Videos and live broadcasts online must have quality captioning. The law (e.g. in the USA for TV also online) is that CC is required. Yet many times it takes a strong persistence to figure out how to turn it on (yes really, it’s not always a visible “cc” on the bottom of the screen) and then to adjust it. Options to adjust it vary – font size, text color, background color, and more. Here’s my effort today to be able to read and use the online news as comfortably as people without hearing differences: I opened MSNBC. Good news is that videos are all captioned (as required by law) yet at first CC was totally unreadable due to white text on transparent background that was placed right on top of the banner text along bottom of screen. Impossible. With 4 clicks – yes four – I changed it to the following: 1. click on CC 2. my CC already ON – click on color of text 3. click on color of background 4. click on apply In the CCAC Members’ Forum the other day we were talking about similar issues for YouTube videos, especially now with the new system YT/Google seems to be using. Check out the options everyone! MEDIA – VIDEO – CAPTIONING ADVOCACY includes so much. Recently, CCAC talked with YOUTUBE/GOOGLE directly. #WHccNOW campaign on social media for White House to add quality CC to all social media videos. CCAC contacts Senators pushing OBM for WEB ACCESS. Every day, volunteers contact many video content owners to use Quality CC, offer to add quality CC to short videos for free or at cost. Media – part of life! GOVERNMENT MEETINGS NEED LIVE CAPTIONING – ONSITE AND ONLINE. City council to state level to national – quality CC required. Ongoing smaller captioning advocacy by many CCAC members every day! We contact TV stations, Internet video producers, schools, churches, employers and others Join discussions in CCAC member forum online. For two examples, Sesame Street new videos need quality CC when published; Leading non-profit for Women in Politics needs CC for all webinars, and many others. CCAC activities to help with also: Advocacy projects as above, or a new one you want to do. If there is an area of everyday life where captioning is lacking, why not put yourself forward to lead or participate in a small team which can co-ordinate advocacy activities? Writers and contributors: If you like writing, you can submit articles about captioning to us for publication or we can help you submit them to external publications to raise awareness and increase provision of captioning Film-makers: If you have camera equipment and editing skills, you could make a short film or slideshow about your experience of captioning that CCAC can promote via social media and our websites. Administration and book-keeping: We need volunteers to help us keep track of new members, donations, sponsors, and more essential tasks for the organization. Web developers and digital marketing experts: We need help to design new web pages and digital promotional materials Social media leaders: A lot of our work takes place over social media and we need people to monitor and stimulate activity on our various channels Grants leader: CCAC gives grants for live event captioning to stimulate provision. We are seeking a volunteer who can help deliver outreach activities to support this alongside a fabulous small team in place now Hearing loss and related Groups Collaborations and Liasons: We need volunteers to continue and develop new working relationships between CCAC and other organizations that support people with hearing loss, deafness, disabilities, education, media, etc. Fundraising: CCAC is a non-profit organization that needs to raise funds in order to grow its activities. We would be very keen to hear from people with fundraising skills who may be able to assist us in this Marketing the CCAC and the CCAC Mission – all tasks above are part of this, yet here, someone to use an identified open source system to keep track of it all and more. Yes you can! Advertisements Rate this: THIS IS THE FIRST CONFERENCE OF IT’S KIND! YOU ARE INVITED TO REGISTER NOW AND SEND THIS MESSAGE TO ALL YOUR NETWORKS WHO MAY BE INTERESTED IN CAPTIONING TOO – YOU DON’T HAVE TO BE DEAF OR HARD OF HEARING TO LOVE AND USE CAPTIONING!
{ "pile_set_name": "Pile-CC" }
Q: How to correctly use DERIVE or COUNTER in munin plugins I'm using munin to monitor my server. I've been able to write plugins for it, but only if the graph type is GAUGE. When I try COUNTER or DERIVE, no data is logged or graphed. The plugin i'm currently stuck on is for monitoring bandwidth usage, and is as follows: /etc/munin/plugins/bandwidth2 #!/bin/sh if [ "$1" = "config" ]; then echo 'graph_title Bandwidth Usage 2' echo 'graph_vlabel Bandwidth' echo 'graph_scale no' echo 'graph_category network' echo 'graph_info Bandwidth usage.' echo 'used.label Used' echo 'used.info Bandwidth used so far this month.' echo 'used.type DERIVE' echo 'used.min 0' echo 'remain.label Remaining' echo 'remain.info Bandwidth remaining this month.' echo 'remain.type DERIVE' echo 'remain.min 0' exit 0 fi cat /var/log/zen.log The contents of /var/log/zen.log are: used.value 61.3251953125 remain.value 20.0146484375 And the resulting database is: <!-- Round Robin Database Dump --><rrd> <version> 0003 </version> <step> 300 </step> <!-- Seconds --> <lastupdate> 1269936605 </lastupdate> <!-- 2010-03-30 09:10:05 BST --> <ds> <name> 42 </name> <type> DERIVE </type> <minimal_heartbeat> 600 </minimal_heartbeat> <min> 0.0000000000e+00 </min> <max> NaN </max> <!-- PDP Status --> <last_ds> 61.3251953125 </last_ds> <value> NaN </value> <unknown_sec> 5 </unknown_sec> </ds> <!-- Round Robin Archives --> <rra> <cf> AVERAGE </cf> <pdp_per_row> 1 </pdp_per_row> <!-- 300 seconds --> <params> <xff> 5.0000000000e-01 </xff> </params> <cdp_prep> <ds> <primary_value> NaN </primary_value> <secondary_value> NaN </secondary_value> <value> NaN </value> <unknown_datapoints> 0 </unknown_datapoints> </ds> </cdp_prep> <database> <!-- 2010-03-28 09:15:00 BST / 1269764100 --> <row><v> NaN </v></row> <!-- 2010-03-28 09:20:00 BST / 1269764400 --> <row><v> NaN </v></row> <!-- 2010-03-28 09:25:00 BST / 1269764700 --> <row><v> NaN </v></row> <snip> The value for last_ds is correct, it just doesn't seem to make it into the actual database. If I change DERIVE to GAUGE, it works as expected. munin-run bandwidth2 outputs the contents of /var/log/zen.log I've been all over the (sparse) docs for munin plugins, and can't find my mistake. Modifying an existing plugin didn't work for me either. A: I think DERIVED values must be integer values, so either round them or use GAUGE.
{ "pile_set_name": "StackExchange" }
Like Us FaceBook Who's Online Our Stats The Music Fest at Blue Bear Mountain in Boone, NC is being held for three days; Thursday Sept 11, Friday Sept 12th and Saturday sept 13th. Volunteers If you are interested in volunteering for the festival, please fill out the application. You may submit it online or print it out, complete and mail it. For questions about volunteer opportunities, please email Jason DeWitt We need volunteers for the following hours: FRI - SAT8am - 12am SUN8am - 4pm Contact Blue Bear Mountain Camp828-4064226 This email address is being protected from spambots. You need JavaScript enabled to view it.
{ "pile_set_name": "Pile-CC" }
The Case for Learning Platform Grade Book A little while back, I wrote a post reflecting on how close we are to getting a next-generation, modular learning platform and how the next steps in the IMS standards-making process can influence whether and when we might actually see this elusive beast in the wild. Today, I’d like to zero in on what I believe is the next logical step, given the current state of the ecosystem: namely, making LMS grade books fully interoperable with courseware and other ed tech tools. For example, the obd tools are one of the best gadgets to keep your car running smothly, you won’t get anything similar anywhere else, find obd II reviews here to see for yourself. No, it isn’t sexy. No, it won’t revolutionize education. But I believe that it will benefit vendors and educators alike in a way that will shift relationships among ed tech tools, reduce wasted effort reinventing the wheel, and open up new design possibilities. The Basic Idea While the integration approach I’m going to explain here isn’t different from what I described in the aforementioned post, I’m going to go into more detail here to make sure that the description is clear. Interested in the LMS market? Sign up to receive more information about our LMS Market Analysis service, including a free sample newsletter! Just about every school in the US and Canada, and many across the world, has an LMS, and every LMS has a grade book. While the degree to which faculty utilize it varies greatly, it is typically one of the most utilized tools, at least for the basic purposes of communicating grades to students and the registrar. In fact, many schools require faculty to enter grades in the LMS grade book. Grade books are hard to build and even harder to build well, in large part because they have to handle every imaginable combination of grading schemes—points, letters, percentages, combinations thereof, curves, dropping grades, extra credit, and so on. Building a grade book that isn’t completely horrible is really hard and takes a lot of effort and practice to get right. Building a grade book that faculty and students love is probably impossible. And yet, many ed tech tool developers find themselves building grade books. Once faculty are assigning and grading more than one or a couple of assignments or activities in the tool, they will need a grade book to track and manage the grades. And they will want it to be able to do all the things that they are used to being able to do with their LMS grade books. To make matters worse, some faculty will want to do as much in the tool and as little in the LMS as possible, while others will want the reverse. Meanwhile, students generally like to be able to go to one place to see their grades. As a result, most ed tech tool developers feel compelled to build their own grade books and to build integration with the LMS grade book. Neither of these two projects generally gets the level of effort it needs to work well enough to make the faculty happy, while the lack of a single, standard place to go for grades is virtually guaranteed to make students unhappy. There is a better way. If LMS developers and ed tech tool developers both focused on making the integration the best it can possibly be, then educators and students would always use the same grade book—their LMS grade book—regardless of which ed tech tool they happen to use. All grades would flow from the tools to the LMS grade book. If a tool needs to have a grade book in it, the LMS grade book would appear inside the tool in a similar way to how many external tools appear inside the LMS today. Faculty and students would have only one grade book to learn, one grade book to manage, one grade book to check. Why This Integration Must Be Standards-Based This kind of integration will likely never happen without both interoperability standards and one or several open source implementations of them, for a number of reasons. First of all, different tool vendors have different use cases. Grading works differently in different contexts. If LMS developers were left to discover these use cases and build to them on their own, it would take forever, and some use cases would likely be left out. This is a classic case where getting many LMS and tool developers together in specification development working group has value. The standards development process is hard, complicated, and painful for the same reason that any multilateral political negotiations are. In order to make them work, you need to make sure that everybody gets at least something that they want badly enough to make the effort and compromise worthwhile. But in cases like this one, you need everyone on board. If the integration approach works for one class of tools but not another, then you haven’t really solved the problem. And the most efficient way to make sure you are getting all the use cases through a standards-making process. Second, even if LMS developers come up with all the use cases on their own, that would leave the ed tech tool developers in the situation of having to develop a separate integration for every LMS that their customers use. Many ed tech tool development teams are small. While developing separate integrations for each LMS is probably less work than building a complete grade book, it’s still a lot of work. If this is to catch on, then the implementation cost must be manageably small for tool developers. Third, many tool developers are always going to have to deal with the use case where the faculty don’t want to use their LMS at all (or don’t have one to use) for one reason or other. There must be a fall-back for them in case the customers’ LMS (or lack thereof) lets them down. That’s why the integration must not only be standards-based but have at least one open source implementation. Tool developers need to have a fall-back grade book that they can provide to customers without having to build their own. (If they have to build their own grade book anyway, then their motivation to just integrate with somebody else’s grade book diminishes dramatically.) Ed tech tool vendors need to know that, if the customer doesn’t have an appropriate grade book, then the vendors can run their own instance of Moodle, Sakai, open source Canvas, OLAT, ILIAS, or whatever and use the grade book provided by that platform. How This Would Work Technically As I wrote in my previous post, there are two parts to making this workable. First, LMS developers would need to make their grade books LTI “tool providers,” which simply means that the basic educator and student grade book views would have to be available to ed tech tool developers as LTI “windows” that can be put into the applications. Second, because the current version of the specification does not support robust communication of grades from the tool to the grade book, the next version of the LTI grading specification, called Outcomes2, would need to be finalized—with input from all the various tool developers to make sure it covers the appropriate use cases—and implemented in the LMS grade books. The IMS process requires at least two different implementations on each side of the integration. So two LMS developers and two tool developers would need to step up and agree to implement as a way of both testing to make sure the standard is adequate and to build momentum for others to implement. This basic approach still leaves lots of room for innovation and differentiation by individual developers. For example, LMS developers could choose (or not) to make their Speed Grader-like grading tools more usable in these other ed tech tools. Meanwhile, the tool makers could choose to provide robust tool-specific analytics on their side (or not). What Everybody Gains This approach provides value to multiple stakeholder groups. LMS developers get to make a part of their platform that they invest in heavily become ubiquitous and essential. There would be one grade book, which would be the LMS grade book, always and everywhere. This approach would likely also increase demand for cloud hosting. If the LMS going down means that every grade book in every ed tech tool goes down, then there would be increased pressure on schools to provide rock-solid uptime. (By the way, this brings up another reason why the standards-based approach is critical. If ed tech tool developers are going to be dependent on the LMS provider for a critical function, then they absolutely need the customer to understand whose fault it is if the grade book stops working. That only can happen if the pattern is consistent everywhere. “The grade book? Oh, that’s always, always, always from the LMS.”) Tool developers get to take all those development resources they’ve been spending on reinventing the wheel and apply them toward building a better product instead. They get to stop taking the blame for the limitations of functionality that, while it may be essential, is not well liked. They get to benefit from the experience (and the scars and scabs) the LMS companies have from their years and years of building grade books that have to work for everyone. And they get all of this without being locked in to one LMS. If all LMS developers are competing to provide a smooth, standards-based implementation across a wide range of tools, then the LMS developers’ interests are aligned with those of the tool developers. Faculty get to limit the number of electronic grade books they have to learn and manage to a maximum of one, which doesn’t change very often. They don’t have to learn a new grade book if they choose to adopt a new homework or courseware product. And they can use the one they have wherever they want to. If they prefer to manage grading in the LMS, they can do that. If they prefer to switch over to a grading tab while they’re looking at the students’ work within an ed tech tool, they can do that. They can do both of those things without having to choose one over the other. Less time learning and managing multiple grade books means more time available for more high-value teaching activities. Students get the same basic benefit that faculty do, but potentially multiplied by the number of courses they take. They would know exactly where to go and how to find out their grades in every single course, regardless of the ed tech tool that their instructors have adopted. Humanity as a whole gets many fewer horribly developed grade books that are destined to be hated, ostracized, and eventually abandoned. Think of it as a courseware spaying and neutering program. Finally, this approach would establish the idea that bits of the LMS can become essential infrastructure in various learning tools. We would move in the direction learning platforms that provide critical utility functions and ed tech tools that ride on top of those utility functions to create more specialized and differentiated educational capabilities. It would set a precedent. Google+ Comments Reader Interactions Comments After developing the gradebook specification, IMS Global may want to consider extending the LIP (i.e. learner information profile) so it can handle student records that reflect all of the learning outcomes a student has experienced across multiple courses. These student records will be massive in two ways: 1) they will take up a lot of space, but this is an easy problem to solve 2) they will be massively complex – i.e. the meta-data required to represent the LIP will be very complex. I recently participated in a Future Trends Forum with Bryan Alexander and Phil Hill where I raised idea of ‘massive student records’ was raised. Here’s a webpage that has a recording of the forum and further discussion of the issues raised: Also, here’s a recap of the topic I raised – massive learner information profiles – as it relates to Competency Based Education. This appears in the comment section of the webpage referenced above. Bryan and Phil, Thanks for putting on yesterday’s Future Trends Forum. Most of the attendees seemed focused on near term future trends, which is very useful and understandable, especially if you’re a campus decision maker. Phil, thank you for addressing my question(s) regarding massive student info profiles. Your point that this issue is often thought of in connection with competency based education (CBE) is spot on. Furthermore, your observation that CBE has not caught on in higher education is useful information for me, and a bit disheartening. One point that I might add is this: to the extent that current LMS support IMS LTI addons, it might be possible to phase in CBE through these addons. Ideally, the LMS (and/or the student record system) would be able to handle massive student information profiles to facilitate the use of LTI-based CBE addons. Further, the LTI/CBE developer could provide information (through a controlled vocabulary, one would hope) on the competency the addon teaches and the assessment that indicates that said competency has been learned. This would make it easier for traditional institutions to gradually adopt CBE by gradually letting faculty adopt LTI addons for their courses. Of course, to rigorously define competencies etc. some standards/specification setting body such as IMS would need to provide a controlled vocabulary for them. In any event, here are the questions I asked. I’ve also included a link to one of my blog posts that deals with lifetime virtual tutors and digital personal assistants. Questions: 1. Are the current LMS able to manage massive student learner info profiles? 2. Or, has this been passed off to student record systems? 3. Are student record systems able to handle massive learner info profiles? By massive, I mean storing student data across courses, not just within a given course. One further note on what I mean by massive. We need to store records for many students. So, the size of the database would be very large. But also, each student record would be very complex, and its complexity would grow over time as we add new features to record different aspects of each student’s record. In other words, the meta-data required to define the database schema of student records would also be massive. Finally, the student data needs to be structured in some standardized way as well. I worked with IMS as the Berkeley rep for a number of years (I was co-chair of their tech board for two years), but sadly my knowledge is out-of-date. Nevertheless, I do know that they have a Learner Information Profile spec that might be a good starting point. As I recall, they also have made a stab at defining competencies with a controlled vocabulary. Learner Info Profiles could also be enhanced by adding personality profile information. I know that William Sims Bainbridge has written about massive personality profiles that have on the order of 140,000 questions. No one would fill one of these things out, but you could use Facebook posts, emails, and other data (from an LMS) to approximate how someone might fill one out.
{ "pile_set_name": "Pile-CC" }
Q: Rationale behind Most Recent Common Ancestor (MRCA)? My main question is this - I heard Richard Dawkins say in a video that after 1000s of years, any given individual alive today will be either an ancestor to ALL of the humans (in that future time) or none of them. What is the rationale behind this? I'm unable to find the link to that video. I'll keep searching and add it once I find it. But my fundamental question is perhaps this - is it necessary that a given species must have at least one common ancestor? I understand that there are multiple common ancestors to humans, the most recent one being MCRA. But could it have been otherwise? I think there's some underlying logic that I'm missing. I'd appreciate it if someone could answer in a non-technical manner since I know very little about genetics and how all this works. Update: Consider the following example. Here's there's heavy inbreeding and as you can see no matter how many generations pass, the population are never going to share a common ancestor from current generation or later. (They could still have a common ancestor from before). But this case violates Dawkins' statement. But this is an unrealistic example with no mixing and cross breeding. Let's consider another example as shown below. I want to see how the individual A from current generation can be related to all the population in future. As shown in the diagram, although A is related to everyone in some future generation, he is not a common ancestor to all of them. The actual common ancestor belongs to some earlier generation. For any given no. of generations, theoretically, I could conceive similar lineages by which someone from current generation need not necessarily be a common ancestor to all of the future population (or none). So I don't understand how Dawkins' statement is inevitable. A: any giving individual alive today will be either an ancestor to ALL of the humans (in that future time) or none of them. What is the rationale behind this? It's a simple mathematical observation nothing more than that. One that doesn't actually require doing any math to understand. Take a few billion people, let them mix & breed freely within the confines of a limited environment (the world) & eventually (after enough generations) every single one of the current population will be be related & therefore descended from every single one of the original population that have any surviving descendants. Those whose line doesn't die out will inevitably be an ancestor of every living person at a future generation, eventually. Those who die with no offspring or have last-descendants do it for them, have no descendants. It's just a simple statement of something that's obvious when you think on it. A: is it necessary that a given species must have at least one common ancestor? You could imagine a species divided into groups, each group having a single common ancestor. In that case, you might ask, do the common ancestors themselves have a common ancestor, somewhere further back? Our current hypothesis is that, if you go back far enough you can find a creature that was the common ancestor of any arbitrary group of individuals. The alternative hypothesis is that life evolved independently several times, and there were originally more than one 'tree of life', and that these independent instances of life somehow evolved in parallel, maintaining compatibility with each other, enough so that there could be cross-breeding between the two trees at a later date. In that way it might be possible that some species may not have a single common ancestor. This seems so unlikely to be true though that it it not generally even considered, for current species. The common ancestor of all humans might not necessarily look exactly like a human (Homo sapiens) though, it may have existed at a time before Homo sapiens evolved, because it is possible that branches on the tree of life can diverge a little and then cross again, as human and neanderthal branches did. The wikipedia page on the human MRCA (https://en.wikipedia.org/wiki/Most_recent_common_ancestor) says the time since the MRCA is unknown, but has been estimated between 100,000 to 200,000 years ago. This is around the same time Homo sapiens first appeared in the fossil record, that we have found so far.
{ "pile_set_name": "StackExchange" }
Q: Minecraft 1.8 Sign Command Help Can anyone tell me what I'm doing wrong here? Command block said: Data tag parsing failed: Unbalanced Quotation: I am creating a sign in Minecraft with multiple colors on a single line. The only thing I need is to execute a command upon right-click of the sign. I got the colors and everything working fine. I'm pretty new to this though, so sorry if I'm just missing a quote or something. ;) This one works, I just need to add a click event: /give @p sign 1 0 {BlockEntityTag:{Text2:"[\"\",{\"text\":\"[\",\"color\":\"gold\"},{\"text\":\"Assault\",\"color\":\"gray\"},{\"text\":\"]\",\"color\":\"gold\"},{\"text\":\"\",\"color\":\"dark_aqua\"}]",Text3:"[\"\",{\"text\":\"(Right-Click)\",\"color\":\"dark_gray\"}]",Text4:"[\"\",{\"text\":\"\",\"color\":\"\"}]",id:"Sign"}} Like so: clickEvent:{action:run_command, value:\"/tp @p 1027 62 1000 \"} Here is the command that gave me the error: /give @p sign 1 0 {BlockEntityTag:{Text2:"[\"\",{\"text\":\"[\",\"color\":\"gold\"},{\"text\":\"Assault\",\"color\":\"gray\"},{\"text\":\"]\",\"color\":\"gold\"},{\"text\":\"\",\"color\":\"dark_aqua\"}]",Text3:"[\"\",{\"text\":\"(Right-Click)\",\"color\":\"dark_gray\"}]",Text4:"[\"\",{\"text\":\"\",color\":\"blue\"}],id:"Sign",clickEvent:{action:run_command, value:\"/tp @p 1027 62 1000 \"}} A: You did not close the Text4 string tag with a quotation mark, and are missing a final closing curly bracket for the NBT data. The click event is part of the JSON text component, so it must belong with one of them and not outside one of the strings as NBT. As well, click events only work on signs if they are a part of the parent object. Since you instantiate the components as an array, the very first record will be considered the parent. You can also remove id:"Sign", as it is redundant. Fixed command, modifying Text4 to include a click event as the first record: /give @p sign 1 0 {BlockEntityTag:{Text2:"[\"\",{\"text\":\"[\",\"color\":\"gold\"},{\"text\":\"Assault\",\"color\":\"gray\"},{\"text\":\"]\",\"color\":\"gold\"},{\"text\":\"\",\"color\":\"dark_aqua\"}]",Text3:"[\"\",{\"text\":\"(Right-Click)\",\"color\":\"dark_gray\"}]",Text4:"[{\"text\":\"\",\"color\":\"blue\",\"clickEvent\":{\"action\":\"run_command\",\"value\":\"/tp @p 1027 62 1000\"}}]"}}
{ "pile_set_name": "StackExchange" }
The present invention is directed to an auxiliary handle attachable to a hand-held tool, such as a drilling device, and includes a gripping sleeve rotatable about the sleeve axis. The sleeve is engageable with a clamping device including a band-shaped clamping member which can be tightened about a housing part of the tool by rotating the gripping sleeve. The clamping device has a through guide extending transversely of the axis of the sleeve with a rod-shaped depth stop extending through the through guide. The depth stop can be clamped in the clamping device by rotating the sleeve. Auxiliary handles on hand-held tools are used for improved support and guidance of the tool by an operator. Such auxiliary handles improve the ability of the operator to counter the torque or turning moment during drilling operations. A known drilling device disclosed in DE-GM 1 972 371 discloses an auxiliary handle fastened on a drill by a clamping member made up of two stirrups connected together in an articulated manner so that they loop around a cylindrical housing part. A rod-shaped depth stop forms the axis of articulation for the two stirrups. The stirrups of the clamping member are pressed against one another in a tongue-like manner when a gripping sleeve is rotated for securely clamping the housing part located between them. As a reaction to the clamping, transverse forces, which effect a secure clamping of the depth stop, also develop in the articulated parts of the two stirrups. This known solution is relatively costly with regard to production. In addition, it is not possible to use the auxiliary handle without a depth stop, since the stop forms a part of the clamping mechanism. Furthermore, the clamping stirrups, which are relatively thick in cross section, impede the use of the drilling devices, such as in corners or in boreholes with small spacing between walls. Another known auxiliary handle is set forth in DE GM 8 318 425 and includes a clamping member formed of a relatively thin band which loops around the housing part and is clamped by a so-called T-head bolt. This arrangement permits clamping of the auxiliary handle when there are large tolerance deviations in the housing part. In this arrangement, the depth stop is clamped by a separate clamping device at the auxiliary handle. As a result this arrangement is costly and prevents a compact construction. Moreover, it requires separate operating elements for clamping the auxiliary handle on the housing part and clamping the depth stop. As a result, operation of the tool is more difficult.
{ "pile_set_name": "USPTO Backgrounds" }
Q: How can a subtable inherit and line up with parent table's columns? I have a table nested inside another table. The thead of the outside table has 10 columns. The first td of every tr inside the tbody is a normal cell. The cells 2 through 10 can actually have several sub-rows that are dynamically created. I need these 9 (1 through 9) to line up with the parent table's columns 2 through 10. I'm not sure how to achieve this without changing my overall structure to be a single table with a dynamic rowspan on the first column. This is overtly complicated to visualize, so here's a JSFiddle to help. That sub-table should span all the way to column '10' of the parent table. http://jsfiddle.net/23p34/1/ Before I go and switch up my entire architecture so far, I wanted to at least ask if my approach could feasibly work. Perhaps overall, it'd be easier if I did just switch. A: You could do something like this: http://jsfiddle.net/23p34/4/ var subTables = $("table").find("table"); var headerColumns = $("table:first").find("tr:first").find("th:not(:first)"); var widths = new Array(); for (i = 0; i < 9; i++){ widths.push($(headerColumns.get(i)).width()); } $.each(subTables.find("tr"), function(){ var row = this; var rowCells = $(row).find("td"); for (x = 0; x < 9; x++){ var td = rowCells.get(x); if ($(td).width() > widths[x]){ widths[x] = $(td).width(); } } }); $.each(headerColumns, function(index){ $(this).width(widths[index] + "px"); }); $.each(subTables.find("tr"), function(){ var row = this; var rowCells = $(row).find("td"); $.each(rowCells, function(index){ $(this).width(widths[index] + "px"); }); }); Make sure to add colspans to the outer table's cells. <body> <div> <table> <thead> <tr> <th>1</th> <th>2</th> <th>3</th> <th>4</th> <th>5</th> <th>6</th> <th>7</th> <th>8</th> <th>9</th> <th>10</th> </tr> </thead> <tbody> <tr> <td>test</td> <td colspan="9"> Basically you loop through all cells and determine the largest width for that column. Then you go back and set all cells in that column to match the largest width. Its not going to be perfect, so you would need to tweak it a bit. It also isn't the prettiest option. I think you would probably be better served with moving it to one table.
{ "pile_set_name": "StackExchange" }
The State of TexasAppellee/s Fourth Court of Appeals San Antonio, Texas July 10, 2014 Nos. 04-13-00338-CR Elias Esequiel VASQUEZ, Appellant v. THE STATE OF TEXAS, Appellee From the 229th Judicial District Court, Starr County, Texas Trial Court No. 11-CRS-270 Honorable Ana Lisa Garza, Judge Presiding ORDER Appellant’s brief was originally due on April 9, 2014. Appellant has been granted two extensions of time—for a total of 90 days—in which to file the brief. Our last order stated that no further extensions of time would be granted. Despite our order dated June 10, 2014, ordering appellant to file the brief by July 9, 2014, and warning appellant that no further extensions of time would be granted, appellant still has not filed the brief and has filed a third motion for extension of time requesting an additional 30-day extension. The motion is GRANTED IN PART. We ORDER appellant’s attorney to file appellant’s brief on or before July 30, 2014. If appellant’s brief is not filed by that date, we will abate this appeal to the trial court for an abandonment hearing. TEX. R. APP. P. 38.8(b)(2). Contempt proceedings may also be initiated against appellant’s attorney. Id. 38.8(b)(4). _________________________________ Rebeca C. Martinez, Justice IN WITNESS WHEREOF, I have hereunto set my hand and affixed the seal of the said court on this 10th day of July, 2014. ___________________________________ Keith E. Hottle Clerk of Court
{ "pile_set_name": "FreeLaw" }
Anthony E. Grillo Anthony E. Grillo (January 21, 1915 – February 5, 1999) was a Justice of the Connecticut Supreme Court from 1983 to 1985. Born in Hamden, Connecticut, Dempsey attended the public schools of that town, and received a BA from Yale University in 1936, and a JD from Yale Law School in 1938. He was formerly on the Connecticut Superior Court for Common Pleas and wrote 56 opinions when on the Connecticut Supreme Court. He served in the United States Army and was a Hamden town prosecutor and counsel. He taught Spanish and English at a New Haven school to pay for college and eventually mastered Dutch and French when in the military's counterintelligence program. Through the same program he went to Aruba where he met with a Dutch representative who's daughter would eventually become his wife. Governor Abraham Ribicoff and Governor John N. Dempsey appointed him to multiple judicial positions and other positions regarding workers compensation and labor representation. In 1982, Grillo was elected a Connecticut State Representative. In 1982, he was an unsuccessful candidate for the Democratic Nomination for Lieutenant Governor of Connecticut. Governor William A. O'Neill appointed Grillo to the Connecticut Supreme Court. References Category:Connecticut Supreme Court justices Category:1915 births Category:1999 deaths Category:People from Hamden, Connecticut Category:Yale University alumni Category:Yale Law School alumni Category:Members of the Connecticut House of Representatives Category:20th-century American politicians
{ "pile_set_name": "Wikipedia (en)" }
Infectious diseases induced by pathogens bacteria continue to be one of the greatest health problems worldwide, afflicting millions of people annually[@b1]. *Escherichia coli (E. coli)* and *Staphylococcus aureus* (*S. aureus*) are major bacterial pathogens that can cause life-threatening human diseases[@b2][@b3]. Recently emerged strains of *E. coli* and *S. aureus* show increased virulence and enhanced ability to cause disease in otherwise healthy individual[@b4][@b5][@b6]. Herein, antibacterial materials are widely used to target pathogens bacteria in daily life and effectively protect the public health[@b7]. A series of drug of materials, including antibiotics, metal ions, and quaternary ammonium compounds, can inhibit bacteria growth and destroy cellular structure of microorganisms. However, it is known that the above materials are associated with concerns about antibiotic resistance, complex chemical synthesis, environmental pollution, and high cost[@b8][@b9]. More recently, natural antibacterial agents have been explored to overcome these disadvantages. Among these natural antibacterial agents, Catechin is a non-toxic, cheaper and naturally broad-spectrum antibacterial agent[@b10]. Bacterial species has been described included *Escherichia coli, Stenotrophomonas maltophilia, Bacillus bacteria, Listeria monocytogenes, and Staphylococcus aureus.* Unfortunately, Catechin, which can easily damage cells, is unstably prone to the oxidation-reduction reaction[@b11], the application of it is limited. In order to overcome this demerit, it is important to control the interaction between the Catechin to prohibit the oxidation. Herein, we developed here a novel Catechin-Cu nanoparticles(NPs) based on the chelating of Cu(II) to Catechin to overcome the limitation of Catechin. Nowdays, nanotechnology has turn into a keyword of public interest, and a part of our daily life, as the social and economic impact of nanotechnological developments is being recognized[@b12]. However, there are still several unknown aspects of the widespread application of the nanosciences in human life, in the fields including novel materials manufacturing, electronics, cosmetics, pharmaceutics, and medicine[@b13]. During the past decade, the application of nanomaterials in medicine significantly increased, which resulted in raising hopes for employing NPs as alternative antibacterial agents. NPs, with at least one of its dimension in the range of 1--100 nm, large surface area, excellent properties[@b14][@b15][@b16], have drawn much attention. NP has been increasingly applied to the development of novel antibacterial agents for the management of pathogenic bacteria affecting agricultural crops, humans, and animals. In particular, significant development in nanopaticles synthesis, such as polymeric and metallic, has attracted researchers' attention toward applications in managing infection diseases caused by bacteria[@b17]. Therefore, there has always been a strong driving force to develop a simple and low-cost approach to prepare a novel Catechin-Cu nanoparticle which can not only overcome the limitation of Catechin but also target the pathogenic bacterium efficiently. The antimicrobial activities of Catechin-copper (II) complexes have been attempted, but mostly use the monomers of Catechin such as EGCG, EGC, ECG and EC as the raw material[@b18][@b19]. In contrast to Catechin, these monomers cannot have the wide range of application due to their expensive price. In addition, Catechin-copper (II) complexes are difficult to exhibit strong antimicrobial activity because of their bulk morphology. In this study, we selected the much cheaper catechin and cuprate as the raw materials, synthesized ultrasmall Catechin-Cu nanoparticles with a simple and low-energy-consuming ultrasonic crushing approach. Then pathogenic bacterium *S. aureus* and *E. coli* were used as model bacterial species to evaluate the antibacterial activity of the Catechin-Cu nanoparticles. In depth, the particle size, surface charge of the materials, antibacterial efficiency, changes in cellular morphology, as well as the contacting degree between the material and the bacteria were all studied. It is worth noting that we first provide the comprehensive experimental data to compare the antibacterial efficiency of Catechin and Catechin-Cu nanoparticles, which shows that this NP at the concentration of 10 mg L^−1^ (10 ppm) and 20 mg L^−1^ (20 ppm) provided rapid and effective killing of up to 90% and 85% of gram-positive *S. aureus* and gram-negative *E. coli* bacteria within 3 h, respectively. After treatment with 20 ppm and 40 ppm NPs, the *E. coli* and *S. aureus* are killed completely within 3 h. NPs demonstrated better antibacterial efficiency than Catechin. Taken together, we expect that this study can offer significant reference for the selection of Catechin-Cu nanoparticles in the real application and the aspect researching of Catechin oxidation. Results ======= Catechin-Cu nanoparticles characterization and stability -------------------------------------------------------- Both Catechin and cupric nitrate compounds showed the capability to spontaneously self-assemble as Catechin-Cu nanoparticles(NPs) in water by ultrasonic crushing method. Transmission electron microscopy (TEM) analysis was performed on a Catechin-Cu nanoparticles suspension and revealed a spherical and regular shape of the NPs ([Fig. 1A](#f1){ref-type="fig"}) and the size distribution of Catehcin-Cu nanoparticles were determined by dynamic light scattering (DLS) ([Fig. 1B](#f1){ref-type="fig"}). As shown in [Fig. 1B](#f1){ref-type="fig"}. Catehcin-Cu nanoparticles have a normal size distribution with an average diameter of 5.3 ± 0.1 nm. Additionally, the zeta potential data (+36.60 mV) demonstrated a positive surface charge for the NPs. According to zeta potential analysis theory, zeta potential data was +36.60 mV corresponding to a large plenty of positive charge on the surface of the Catechin-Cu NP. As a result, it can absorb negative bacteria cell to damage it. [Fig. 1C](#f1){ref-type="fig"} shows the X-ray diffraction (XRD) pattern of the Catechin-Cu nanoparticles, in which reflections of Catechin-Cu nanoparticles are identified. The Catechin-Cu nanoparticles characteristic absorbance peaks at 38.1, 44.3, 64.4, and 77.4° with high intensity, which can be assigned to the (111), (200), (211) and (300) planes of the cubic Cu crystal (JCPDS No.85-1326). Compared with Catechin (see inset of [Fig. 1C](#f1){ref-type="fig"}), the characteristic peak of C(001) shifted from 10.3 to 22.4°, thereby suggesting the reduction of Catechin. However, the diffraction peaks of Catechin are relatively weak in the as synthesized nanoparticles. We conclude that a kind of Catechin-Cu nanoparticle have been formed during this simple and low-energy-consuming method. [Fig. 1D](#f1){ref-type="fig"} shows a peak at 1650 cm^−1^ that is assigned to the stretching vibration of the C = C in the Catechin. Comparing the spectra of Catechin and Catechin-Cu nanoparticles ([Fig. 1D(a,b)](#f1){ref-type="fig"}), the curve of Catechin-Cu nanoparticles represented a peak at 1286.34 cm^−1^ and 1431.29 cm^−1^ are supposed to be the reaction of Catechin and Cu(II). The peak at 1286.34 cm^−1^ that is assigned to the stretching vibration of the C-O in the Catechin-Cu nanoparticles. The peak at 1431.29 cm^−1^ was also found in the spectrum, associated with the stretching vibration of heteroaromatics. This result indicates that the occurrence of chelating reactions during the fabrication process of Catechin-Cu nanoparticles. It is well known that the optical properties of Catechin-Cu nanoparticles are strongly dependent on their size and shape, and the structure of the nanoparticles can be described by using the UV/Vis spectra. The typical UV/Vis spectra of the Catechin-Cu nanoparticles synthesized under different pH values at room temperature for 70 min are shown in [Fig. 2a](#f2){ref-type="fig"}. The nanoparticles exhibited one characteristic absorbance peak at 420 nm, which was the absorbance peak of Catechin-Cu nanoparticle. Under a pH value of 10, the absorbance peak of the NPs appeared at 420 nm. As the pH was mediated to 12, the clear absorbance peak shifted from 420 to 409 nm, and the full width at half maximum (fwhm) of the spectrum was 82 nm. This fwhm is wide, possibly due to the large size and wide partice size distribution of the NPs. When the pH value was mediated to 11, the narrow nature of the observed peak blue-shifted to 403 nm, and the fwhm decreased to 64 nm, which also suggested the decreasing size and little variation in particle size of the Catehcin-Cu nanoparticles. [Fig. 2b](#f2){ref-type="fig"} shows the UV/Vis spectra of Catechin-Cu nanoparticles synthesized under a reaction temperature of 25, 60, and 100° at the pH value of 11. When the temperature was raised, the absorption of Catechin-Cu nanoparticles became weaker, and the clear absorption peak red-shifted. The wider fwhm suggests the increasing size and polydispersivity of the Catechin-Cu nanoparticles. The results indicated that the stability and dispersivity of Catechin-Cu nanoparticles are better under a room reaction temperature at the pH value of 11. MICs and MBCs ------------- In this study, the MIC and MBC values of Catechin and Catechin-Cu nanoparticles were evaluated by broth microdilution method[@b20][@b21]. [Table 1](#t1){ref-type="table"} shows the MIC and MBC of Catechin and Catechin-Cu nanoparticles against various microorganisms. According to these data, the antibacterial activity of Catechin-Cu nanoparticles is significantly higher than that of Catechin. Furthermore, these results can suggest that the Catechin-Cu nanoparticles show the excellent antibacterial activity and against Gram-negative bacteria (*E. coli*) were significantly weaker than that against Gram-positive bacteria (*S. aureus*). Moreover, the MIC and MBC values of Catechin-Cu nanoparticles against some bacteria are lower than those of Catechin, which indicate higher antibacterial activity. After 3 h, the bacteria in control medium grew into the stationary phase, whereas 20 ppm Catechin-Cu nanoparticles showed a significant growth inhibition effect against *E. coli*, and 10 ppm for *S. aureus*. As the concentration of Catechin-Cu nanoparticles increased to 40 ppm and 20 ppm, the *E. coli* and *S. aureus* cells were killed completely within 3 h. The kill ratio of Catechin-Cu nanoparticles against cells as much as 99.99%. Bactericidal efficiency ----------------------- In the Live/Dead Baclight assay, survival rate is defined in terms of preservation of membrane integrity as the percentage of bacterial cells with intact membranes (stained with SYTO-9) to the total number of cells. The bacterial survival rates (%) of Catechin and Catechin-Cu nanoparticles within 3 h against *E. coli* and *S. aureus* were qualified ([Fig. 3A,B](#f3){ref-type="fig"}). The results indicate that suspended bacteria remained mostly viable over a period of 3 h, whereas the survival rates of *E. coli* expose to Catechin and Catechin-Cu nanoparticles declined to 49% and 15% within 3 h and declined to 42% and 10% for *S. aureus.* Although previous studies have also researched the antibacterial activity of Catechin and NPs, those studies have not attempted to quantify the loss in microbial viability with time; namely, the bacterial survival rate. Meanwhile, they don't attempt to compare the antibacterial efficacy of Catechin and Catechin-Cu nanoparticles against gram-positive bacterium (*E. coli*) and gram-negative bacterium (*S. aureus*), respectively. [Fig. 3C,D](#f3){ref-type="fig"} show the fluorescence pictures of *E. coli* cells expose to Catechin-Cu nanoparticles and Catechin as well as the corresponding *S. aureus* in [Fig. 3E,F](#f3){ref-type="fig"}. The green fluorescence caused by SYTO 9 is the live cells and dead cells fluoresce in red. As shown in [Fig. 3C,E](#f3){ref-type="fig"}, Catechin- Cu nanoparticle treated bacteria were almost red with fluorescence, indicating the highly permeability of PI dye toward NPs treated bacteria, and most of the cells were dead. The Catechin treated bacteria show strong green fluoresce ([Fig. 3D,F](#f3){ref-type="fig"}), revealing that Catechin had a weak destructive effect on the cell membranes and majority of bacteria were viable. These results demonstrated that the antibacterial efficacy of Catechin-Cu nanoparticles was significantly higher than that of Catechin. This can be attributed to the advantages of NPs and the limitation of Catechin. Catechin- Cu nanoparticle had a size of 5.3 ± 0.1 nm that can be easier attach to the surface of bacteria[@b22] and the positive surface charge on Catechin- Cu nanoparticles facilitates a direct interaction between the particles[@b23] and the negatively charged bacteria membranes. In addition, *S. aureus*, a strain representing Gram-positive bacteria, exhibited a lower survival rate in comparison to the *E. coli* strain and was hence lower resistant to the antibacterial effect of the Catechin- Cu nanoparticles. These results support the previous assumption that *E. coli* is more tolerant than *S. aureus* to Catechin-Cu nanoparticles. Cell integrity disruption of bacteria induced by Catecin-Cu nanoparticles ------------------------------------------------------------------------- The Catechin-Cu nanoparticles could effectively inhibit the growth of *E. coli* and *S. aureus*. We therefore investigated the morphology changes of *E. coli* and *S. aureus* cells before and after exposure to the Catechin-Cu nanoparticles by scanning electron microscope (SEM), transmission electron microscope (TEM), and atomic force microscope (AFM). The obtained SEM micrographs of *E. coli* and *S. aureus* cells were shown in [Fig. 4](#f4){ref-type="fig"}. As shown in [Fig. 4A,C](#f4){ref-type="fig"}, untreated *E. coli* and *S. aureus* were typically rod-shaped and round-shaped, respectively, both with smooth and intact cell walls. After exposure to Catechin-Cu nanoparticles for 3 h, the quantity of *S. aureus* greatly decreased and cell walls became wrinkled and damaged, similar to previous reports. The shape and size of cells also damaged dramatically and there were a lot of materials attached on the bacterial surface ([Fig. 4D](#f4){ref-type="fig"}). As for *E. coli*, the morphologies of most of the survival cells remained unchanged with round-shape and smooth surface ([Fig. 4B](#f4){ref-type="fig"}). It is likely that Catechin-Cu nanoparticles exhibited different impacts on the G- and G+ bacteria. The results provide further evidence of the damage of the bacterial membrane of G- and G+ bacteria. To investigate the interaction, we decided to perform a TEM characterization of bacteria cultures exposed to Catechin-Cu nanoparticles, in order to find additional evidence of the different effect observed. The TEM images obtained showed that the NPs are present inside the cytoplasm of *S. aureus*, associated with large zones of translucent cytoplasm, featuring either localized or complete separation of the cell membrane from the cell wall ([Fig. 5D](#f5){ref-type="fig"}). Conversely, as for *E. coli*, the NPs do penetrate into the cellular wall, and no evident damage in some *E. coli* is observed close to the NPs ([Fig. 5B](#f5){ref-type="fig"}). Obviously, *E. coli* presented a strong resistant to the antibacterial effect of the Catechin- Cu nanoparticles in comparison to the *S. aureus* strain. The TEM results are in agreement with the results using SEM analysis. [Fig. 6](#f6){ref-type="fig"} shows the representative AFM images of untreated *E. coli* and Catechin-Cu nanoparticles treated *E. coli.* Untreated *S. aureus* and Catechin-Cu nanoparticles treated *S. aureus.* Initially *E. coli* bacteria appeared as intact rods with no evidence of membrane rupture and collapse ([Fig. 6A](#f6){ref-type="fig"}). However, upon treatment with Catechin-Cu nanoparticles, the bacteria demonstrated strong evidence of membrane disorganization with greater roughness as compared to the smooth surface of untreated *E. coli* ([Fig. 6B](#f6){ref-type="fig"}). Similarly, treated *S. aureus* ([Fig. 6D](#f6){ref-type="fig"}) showed profound membrane damage and distortion with increased roughness contrary to the smooth contour of the control *S. aureus* ([Fig. 6C](#f6){ref-type="fig"}). Aiming to certify about the existence of differences between membranes before and after Catechin-Cu nanoparticles treated, at nanometric level, roughness values (Rq, Ra) were obtained ([Table 2](#t2){ref-type="table"}). It is showed clearly that after Catechin-Cu nanoparticles treated, the surface roughness of *E. coli* increased from 6.32 nm, 4.88 nm (Rq, Ra) to 71.6 nm, 57.3 nm (Rq, Ra) and from 4.51 nm, 3.13 nm (Rq, Ra) to 76.1 nm, 59.9 nm (Rq, Ra) for *S. aureus*. The increase in surface roughness of bacteria suggests the existence of membrane damage[@b24][@b25]. We can notice that the change of surface roughness of *S. aureus* (71.59, 56.77) is greater than that of *E. coli* (65.28, 52.42). These results were in accordance with the SEM and TEM results. Taken together, these SEM, TEM and AFM images are clear evidence for the antibacterial effects of Catechin-Cu nanoparticles. Cytotoxicity of Catechin-Cu NPs and Catechin -------------------------------------------- HepG2 cells were exposed to Catechin-Cu nanoparticles and Catechin at the concentration of 0, 1, 5, 10, 20, 40, 100 and 200 ppm for 24 h and cytotoxicity were determined by MTT assay. The cytotoxicity assays have shown that Catechin-Cu nanoparticles up to the concentration of 40 ppm did not produce significant cytotoxicity to cells (P \> 0.05 for each), a dose that was found to be lethal for the bacteria tested in this study ([Table 1](#t1){ref-type="table"}). As the concentration of nanoparticles increased to 100 and 200 ppm, in MTT assay, cell viability dropped drastically to 62.1 and 59.2% respectively ([Fig. 7](#f7){ref-type="fig"}). Furthermore, the cell viability kept about 70% in the presence of 100 ppm Catechin, a dose that the MBC of Catechin to *S. aureus*. Catechin-Cu nanoparticles show the higher cytotoxicity to HepG2 cells than that of Catechin at the concentrations range of 1--200 ppm, which can better inhibits the proliferation of HepG2 cells. Such cytotoxicity induced by Catechin-Cu nanopaticles should be attributed to the direct interaction of nanoparticle with the HepG2 cells, the result suggested that small size is a major advantage of Catechin-Cu nanopaticles. Discussion ========== There is no doubt that NPs, with its excellent adsorptivity, large specific surface area, high chemical stability and so forth, is one of the most famous stars to be used as an antimicrobial agent at present. Herein, we used a simple and low-energy-consuming approach to fabricate stable and well-dispersed Catechin-Cu nanoparticles which can not only overcome the easy-oxidation limitation of Catechin but also target the pathogenic bacterium efficiently. In our experiments, we found that the pH and temperature of reaction influence the structure of the NPs. The NPs at the concentration of 10 mg L^−1^ (10 ppm) and 20 mg L^−1^ (20 ppm) provided rapid and effective killing of up to 90% and 85% of *S. aureus* and *E. coli* within 3 h, respectively, NPs demonstrated better antibacterial efficiency than Catechin. *E. coli* presented a great resistant to the antibacterial effect of the Catechin-Cu nanoparticle in comparison to the *S. aureus* strain. This can be explained by three reasons[@b26]. Firstly, the absence of an outer membrane and the presence of negatively charged teichoic acid molecules within a thick peptidoglycan layer (20--80 nm) on the surface of *S. aureus* should make them more attractive to the positively charged, and more specific to be damaged by positively charged molecules than *E. coli*. Secondly, the presence of a number of small channels of porins within the outer membrane of *E. coli* may help block the entrance of the particles into the bacterial cell, making them more difficult to inhibit than *S. aureus*. Finally, the smaller dimension of *S. aureus* (sphere, i.d. ∼0.5--1 μm) may partly account for the more intimate contact with the Catechin-Cu nanoparticles, making the antibacterial activity more effective than the *E. coli* (rod, 0.3--1.0 × 1.0--6.0 μm). Although the antibacterial effects of Catechin-Cu nanoparticles against various bacterial systems are well established, however very little is known about their bactericidal mechanism and thus mode of action. Here is an attempt to explore the antibacterial mechanism of Catechin-Cu nanoparticles on the basis of our investigation and by taking into consideration of the previous proposed findings ([Fig. 8](#f8){ref-type="fig"}). The positively charged Catechin-Cu nanoparticles should interact favorably with the negatively charged bacterial cell membrane by electrostatic attraction, causing an increase in membrane permeability and eventually rupture and leakage of intracellular components[@b27][@b28] and the positive charged NPs mainly adsorb the negatively charged teichoic acid molecules in *S. aureus* (as supported by our TEM and the reason why the *S. aureus* presented a lower resistant to the antibacterial effect of the Catechin-Cu nanoparticle in comparison to the *E. coli*).Disruption of the bacterial cell membrane (as supported by our SEM, TEM and AFM analysis) would be the other probable mode of nanoparticle action, as it paves the way into the bacterial cells by leading to membrane protein and lipid bilayer damage as reported in previous studies[@b29][@b30]. The damage could be the synergistic antibacterial effect of Catechin and copper (II) (as supported by the bacterial efficacy comparison of Catechin and Catechin-Cu nanoparticles).Leakage of intracellular material due to membrane disruption may cause shrinkage of the cell membrane, ultimately leading to cellular lysis as justified by our TEM and AFM micrographs. In summary, we have demonstrated a simple and low-energy-consuming approach to fabricate highly stable and dispersive Catechin-Cu nanoparticles by an ultrasonic cell crushing method. The results demonstrated that as-synthesized NPs displayed excellent antimicrobial activity against pathogenic bacterium *E. coli* and *S. aureus*; *E. coli* presented a great resistant to the antibacterial effect of the Catechin- Cu nanoparticle in comparison to the *S. aureus* strain because of its unique structure. However, future studies on the biocidal influence of this nanomaterial on other Gram-positive and Gram-negative bacteria are necessary to fully evaluate its possible use as a new bactericidal material. What is more, this highly dispersive Catechin-Cu nanoparticle can be easily fabricated into film and fiber, which would open an avenue for a wide range of applications of antimicrobial materials. Methods ======= Synthesis of Catechin-Cu nanoparticles -------------------------------------- Catechin-Cu nanoparticles were synthesized through an ultrasonic crushing method, as schematically depicted in [Fig. 9](#f9){ref-type="fig"}, the major steps involved in producing Catechin-Cu nanoparticles. In a typical procedure, a solution containing 9 mL alcohol was prepared, in which a desired amount of Poly Vinyl Pyrrolidone (PVP) (Mw = 1,300,000) was dissolved with magnetic stirring, at room temperature, for 2 h. The concentration of PVP was 9% by weight, followed by addition of 1 ml of mixed solution containing Catechin and cupric nitrate with molar ratios 1:2. In this method, both the cathchin and cupric nitrate were mixed in a mutually dissolving solvent, which was removed by evaporation to produce a film, and then reconstituted in a buffer solution medium to get the particle suspension. At last, ultrasonic cell pulverization was carried out with the probe of the ultrasonic horn immersed directly into the mixture solution at 600 w for 40 min to obtain the light blue colored solution as the final nanoparticle product. There is no residual Cu^2+^ in the Catechin-Cu NPs product, which was detected by metathesis reactions of Cu^2+^ with sodium hydroxide in this work. The distinguished characteristic of PVP is its ability to be a surfactant. The products were centrifuged 10 min by using 10000 r/min centrifugal speeds and washed with deionized water and ethanol repeatedly to remove any impurities, and then the suspension was dried overnight in a vacuum oven at 60 °C to obtain Catechin-Cu NPs. Characterization of nanoparticles --------------------------------- We visualized the shape and size of the Catechin-Cu nanoparticles using a high-resolution transmission electron microscope (HR-TEM, JEOL JEM-3010). The crystal structure of the nanocomposites was characterized by a Philips 1730 powder X-ray diffractometer with CuKα radiation (λ = 1.5406 Å). The diffraction data were recorded at 6° min^−1^ between 5 and 80°. The zeta potential of Catechin-Cu nanoparticles was measured by DLS with Zerasizer Nano ZS (Malvern Instrument Ltd. Worcestershire, UK). For structure properties of NPs, the Fourier transform infrared spectroscopy (FTIR) spectra were measured using a Perkin-Elmer Spectrum GX1. The optical property of the nanoparticles was tested on a Shimadzu UV-2550 spectrophotometer at room temperature. Stability of nanoparticles -------------------------- Catechin is unstably prone to the oxidation ([Fig. 10A](#f10){ref-type="fig"}). Herein, a novel Catechin-Cu nanoparticles based on the chelating of Cu(II) to Catechin in order to overcome the demerit of Catechin ([Fig. 10B](#f10){ref-type="fig"}). In this paper, we evaluated the stability of Catechin-Cu nanoparticles by observing dispersion of it in 10^th^, 20^th^, and 30^th^ day, the particle size of NPs and the average diameter used as the assessment indicators[@b31]. Analysis of the antibacterial activity of Catechin-Cu nanoparticles ------------------------------------------------------------------- For antibacterial tests, all plates and materials were sterilized in an autoclave before experiments. Two strains were used: *Escherichia Coli* (ATCC 8739) and *Staphylococcus aureus* CIP 65.8 T. The selected strains are typical representatives of two large bacterial taxonomic lineages and were obtained from American Type Culture Collection (ATCC, Manassas, VA, USA), Culture Collection of the Institute Pasteur (CIP, Paris, France) and the National Collection of Industrial, Food and Marine Bacteria (NCIMB, Aberdeen, UK). Prior to each bacterial attachment experiment, bacterial cultures were refreshed on nutrient agar from stocks (Oxoid, Basingstoke, Hampshire,UK). Fresh bacterial suspensions were grown overnight at 37 °C in 5 ml of nutrient broth (Oxoid, Basingstoke, Hampshire, UK). Bacterial cells were collected at the logarithmic stage of growth and the suspensions were adjusted to OD~600~ = 0.3. MICs and MBCs estimation ------------------------ All strains were cultured routinely, harvested by centrifugation (8000 g at 4 °C for 10 min), washed twice in phosphate-buffered saline (PBS, 0.2 mol L^−1^ at pH 7.4), and resuspended at a final concentration of approximately 10[@b7] cells/mL of PBS. To determine the MIC, MBC, the resuspended cells were inoculated into fresh medium supplemented with various concentrations of the NPs and grown overnight at 37 °C (or 30 °C) and then the minimum concentration of the NPs giving cultures that did not become turbid was taken to be the MIC and minimum bactericidal concentrations without any bacterial growth represented MBC. The determination of the MIC and MBC for each isolate was carried out in triplicate, and the results were taken when there was agreement in at least two of the three MIC and MBC results. Control experiments were performed with bacteria in the medium only. Cell viability analysis ----------------------- Confocal laser scanning microscopy (CLSM) was used to visualize the proportions of live cells and dead cells using LIVE/DEAD BacLight Bacterial Viability Kit, L7012. A mixture of SYTO 9 and propidium iodide fluorescent dyes (Molecular Probes, Invitrogen, Grand Island, NY, USA)[@b32]. The green fluorescent dye SYTO 9 permeated both intact and damaged membranes of the cells, binding to nucleic acids and fluorescing green when excited by a 485 nm wavelength laser. On the other hand, the red fluorescent dye propidium iodide(PI) alone entered only cells with significant membrane damage, which are considered to be non-viable, and binds with higher affinity to nucleic acids than SYTO 9. Bacterial suspensions were stained according to the manufacturer's protocol, and imaged using a Fluoview FV10i inverted microscope (Olympus, Tokyo, Japan). For spore staining, a minor modification was made to this protocol. Spores were stained with a mixture of 0.9 mmol l1^−1^ of propidium iodide and 5 mmol l1^−1^ of SYTO 9 for 15--20 min. The samples were then imaged under the confocal microscope. Microscopy investigation of bacteria ------------------------------------ Bacteria were treated with the Catechin-Cu nanoparticles, then collected by centrifugation, washed twice, and resuspended in PBS. The cells were fixed for 2 h in 2.5% glutaraldehyde at room temperature (\~25 °C), dehydrated, and then coated with gold. The interactions of the NPs with bacterial cells were examined using SEM. The sample preparation of transmission electron microscopy (TEM) was the same as SEM from the steps of harvest to centrifugation, and then a drop of the suspension was placed on a cooper grid and dried. Grids were conducted on a JEM-3010 TEM \[JEOL Ltd., Japan\] at 200 kV. Surface topography of photodynamically treated and untreated (control) bacteria were imaged using a multimode scanning probe microscope (NT-MDT, SOLVER-PRO, Russia). AFM experiments were performed by using a Veeco Multimode NS3A-02NanoscopeIII atomic force microscope. Scan size was set to obtain 2.0 μm × 2.0 μm images. Two to three areas of each bacterium were scanned using the tapping mode under nitrogen. The cantilever of the tip is a standard 115--135 μm long microlever with a force constant of 20--80 N/m and has a typical resonant frequency between 200 and 400 kHz. (SOLVER-PRO, Russia). The 3D images were obtained with the software WSxM 4.0 Develop 11.3-Package (2007, Nanotec Electronica S.L., Madrid, Spain), which was also used for image analysis. A 200 μL portion of the cell suspension was withdrawn from the above culture. The suspension was centrifuged at 4000 *g* in an Eppendorf centrifuge for 2 min. The supernatant was removed, and the cell pellet was resuspended in ice cold Tris-HCl (pH 8.0, 2 mmol/L). This procedure was repeated twice. Finally, the pellet was resuspended in Tris-HCl. A 5 μL portion of the bacteria suspension was placed on a freshly cleaved mica substrate and dried under N~2~ gas for 3 min immediately. For the topographic analysis of the bacteria with and without NPs, the parameter of surface roughness was used: the surface roughness includes mean roughness (Ra) and root-mean-square roughness (Rq). The Ra and Rq were calculated with the data of the topographical micrographs by means of the previously mentioned software and using the following expression \[1\], \[2\] and \[3\][@b33][@b34]: Where Z~ij~ is the height value of each single point (nm), is the average height (nm) and N is the number of experimental points. MTT assay --------- Human liver HepG2 cell line was cultured in Dulbecco's modified Eagle's medium (DMEM) supplemented with 10% fetal bovine serum (FBS), 1% penicillin--streptomycin, which were bought from Gibco, USA. To determine the cytotoxic activity of the Catechin-Cu NPs and Catechin, human liver HepG2 cell line were seeded onto 96-well culture plates (2 × 10^4^ cells/ml), and treated with different concentrations of Catechin-Cu NPs or Catechin (0, 1, 5, 10, 20, 40, 100, 200 ppm) at 37 °C in an atmosphere of 5% CO~2~ for 24 h. After removed the cell culture medium, cells were washed with PBS twice. 3-(4,5-dimethylthiazolyl-2)-2,5- diphenyltetrazolium bromide (MTT) at a concentration of 0.5 mg/ml was added to the wells and incubated for 4 h at 37 °C in an atmosphere of 5% CO~2~ in dark. In metabolically active cells, MTT was reduced to an insoluble dark purple formazan. The formazan crystals were dissolved with DMSO. The absorbance was read at 570 nm using a plate reader and the percent of cell viability was calculated from the percent ratio of the absorbance obtained from each treatment and that of the control. Additional Information ====================== **How to cite this article**: Li, H. *et al.* Enhancing the antimicrobial activity of natural extraction using the synthetic ultrasmall metal nanoparticles. *Sci. Rep.* **5**, 11033; doi: 10.1038/srep11033 (2015). This work was financially supported by the National Natural Science Foundation of China (31471646), and a Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD). We are also grateful to many of our colleagues for stimulating discussion in this field. **Author Contributions** Q.S.C. conceived the research. Q.S.C. and J.W.Z designed the experiment. H.H.L. performed the experiment and analyzed experimental data. K.U. polished the whole manuscript. All the authors prepared the manuscript and discussed the results. ![The characterization of Catechin-Cu nanoparticles.\ (**Panel A**) TEM images of Catechin-Cu nanoparticles. (**Panel B**) The size distribution of Catechin-Cu nanoparticles.d~A~ = 5.3 ± 0.1(nm). (**Panel C**) Typical XRD pattern of the obtained Catechin-Cu nanoparticles; inset: the pattern for Catechin. (**Panel D**) IR spectra of Catechin-Cu nanoparticles (**a**) and Catechin (**b**).](srep11033-f1){#f1} ![Typical UV-visible spectra of the Catechin-Cu nanoparticles synthesized at different a) pH values and b) reaction temperatures.](srep11033-f2){#f2} ![Live /Dead BacLight viability results and fluorescence images.\ (**A**) The survival rates of *E. coli* with different treatments () nanoparticles (20 ppm) treated, () Catechin (20 ppm) treated, and () Control. (**B**) The survival rates of *S. aureus* with different treatments () nanoparticles (10 ppm) treated, () Catechin (10 ppm) treated, and () Control. The error bars indicate standard deviations. The representative fluorescence images of *E. coli* (top row) and *S. aureus* (bottom row) by different treatments. (**C**) Fluorescence image of *E. coli* treated with Catechin-Cu nanoparticles (20 ppm). (**D**) Fluorescence image of *E. coli* treated with Catechin (20 ppm). (**E**) Fluorescence image of *S. aureus* treated with Catechin-Cu nanoparticles (10 ppm). (**F**) Fluorescence image of *S. aureus* treated with Catechin (10 ppm). *E. coli* and *S. aureus* all stained by the live/dead staining kit. The green and red fluorescence images are overlaid to one picture for better comparison of living and dead cells.](srep11033-f3){#f3} ![Typical scanning electron microscope (SEM) images.\ (**A**) Untreated *E. coli*. (**B**) Catechin-Cu nanoparticles (20 ppm) treated *E. coli*. (**C**) Untreated *S. aureus*. (**D**) Catechin-Cu nanoparticles (10 ppm) treated *S. aureus*.](srep11033-f4){#f4} ![Morphological comparison of bacteria by TEM imaging.\ (**A**) Untreated *E. coli*. (**B**) Catechin-Cu nanoparticles (20 ppm) treated *E. coli*. (**C**) Untreated *S. aureus*. (**D**) Catechin-Cu nanoparticles treated (10 ppm) *S. aureus* (The images B and D were taken at the MIC of Catechin-Cu nanoparticles).](srep11033-f5){#f5} ![Tapping-mode atomic force microscopy (AFM) images.\ (**A**) Untreated *E. coli*. (**B**) Catechin-Cu nanoparticles(20 ppm) treated *E. coli* (**C**) Untreated *S. aureus*. (**D**) Catechin-Cu nanoparticles (10 ppm) treated *S. aureus* (scan field area 2.0 μm × 2.0 μm).](srep11033-f6){#f6} ![Cytotoxicity of Catechin-Cu nanoparticle and Catechin in HepG2 cells as assessed by MTT assay.\ Cells were treated with silica nanoparticles at the concentrations of 0, 1, 5, 10, 20, 40, 100 and 200 ppm for 24 h. At the end of treatment cytotoxicity parameters were determined as described in the methods.](srep11033-f7){#f7} ![Schematic representation of antibacterial mechanism of Catechin-Cu nanoparticles.\ Firstly, the positive charged Catechin-Cu nanoparticles tend to be adsorbed and accumulated on the surface of negative charged cells by electrostatic attraction, which can change the permeability and enhance the antimicrobial activity. Secondly, the positive charged NPs mainly adsorb the negatively charged teichoic acid molecules in *S. aureus*, which made the NP can act on the cells effectively and fully, resulting in cell death.](srep11033-f8){#f8} ![The synthetic route of Catechin-Cu nanoparticles.](srep11033-f9){#f9} ![Oxidation reaction of Catechin(A), and complexation reaction between Catechin and Cu(II).](srep11033-f10){#f10} ###### **Minimum inhibitory concentration (MIC) and minimum bactericidal concentration (MBC) of Catechin solution, Catechin-Cu nanoparticles against various microorganisms.** **Bacteria** **Catechin** **Catechin-Cu nanoparticles** -------------- -------------- ------------------------------- ---- ---- *E. coli* 100 125 20 40 *S. aureus* 90 100 10 20 ^\*^Concentration (3 replications) where no turbidity was observed in culture. ^\*\*^Concentration (3 replications) where no growth was observed on agar plate. ###### **Effects of nanoparticles on the surface roughness of different bacteria.** **Sample** **Bacteria** **Surface Roughness (nm)** ------------ -------------- ---------------------------- ------ Untreated *E. coli* 6.32 4.88 treated   71.6 57.3 Untreated *S. aureus* 4.51 3.13 treated   76.1 59.9
{ "pile_set_name": "PubMed Central" }
--- docker_image_info_family: "{{ lookup('pipe', 'docker-image-info family') }}" docker_image_info_distribution: "{{ lookup('pipe', 'docker-image-info dist') }}" docker_image_info_distribution_version: "{{ lookup('pipe', 'docker-image-info dist-version') }}" docker_image_info_distribution_release: "{{ lookup('pipe', 'docker-image-info dist-release') }}" docker_image_info_distribution_codename: "{{ lookup('pipe', 'docker-image-info dist-codename') }}"
{ "pile_set_name": "Github" }
// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "ui/views/controls/menu/menu_listener.h" namespace views { MenuListener::MenuListener() { } MenuListener::~MenuListener() { } } // namespace views
{ "pile_set_name": "Github" }
289 F.Supp.2d 1072 (2003) Larry J. DOWNES, Plaintiff, v. Jo Anne B. BARNHART, Commissioner of Social Security, Defendant. No. 4:03-CV-90095. United States District Court, S.D. Iowa, Central Division. October 14, 2003. Timothy N. Tripp, Pella, IA, for Plaintiff. Gary L. Hayward, Asst US Atty, Des Moines, IA, for Defendant. ORDER PRATT, District Judge Plaintiff, Larry J. Downes, filed a Complaint in this Court on February 20, 2003, seeking review of the Commissioner's decision to deny his claim for Social Security benefits under Title II of the Social Security Act, 42 U.S.C. §§ 401 et seq. This Court may review a final decision by the Commissioner. 42 U.S.C. § 405(g). For the reasons set out herein, the decision of the Commissioner is reversed and remanded for further administrative proceedings. Plaintiff filed an application for Social Security Disability Benefits on March 13, 1997, claiming to be disabled since February 18, 1996. Tr. at 92. Plaintiff was last insured to receive disability benefits at the end of December, 2001. Tr. at 95. After the applications were denied, initially and on reconsideration, Plaintiff requested a hearing before an Administrative Law Judge. A hearing was held before Administrative Law Judge Thomas M. Donahue (ALJ) on April 9, 1998. Tr. at 19-76. The ALJ issued a Notice Of Decision — Unfavorable on August 10, 1998. Tr. at 9-15. After the decision was affirmed by the Appeals Council on December 27, 2002 (Tr. at 5-7), Plaintiff filed a Complaint in this Court on February 20, 2003. *1073 In this case, the ALJ stopped the sequential evaluation after finding that Plaintiff is engaged in substantial gainful activity. The ALJ found that Plaintiff was still engaging in his work as a farmer, and thus the other steps of the sequential evaluation were not relevant to determining the merits of Plaintiff's application. At the hearing, Plaintiff testified that when he gets up in the morning — about 6:30 — he walks about 200 feet to check on 19 cows. "If they need hay, I've got to get on the tractor and take them a big bale of hay..." Tr. at 24. Plaintiff said that he also oversees an isolation unit where pigs are raised. "... it's about a half mile from home. I'll get in the pickup, I drive over there ... I walk through to make sure that they got water and feed. That there's no sick ones, you know, just analyze them and just take your time and just walk along, and the feed system's all automatic." Tr. 25. To feed the animals, Plaintiff said he turns on an electrical switch and an auger brings feed to each pen. He said that he walks through the building which is a hundred feet long. Tr. at 26. Plaintiff said that in the afternoon, he walks back out to watch his cows. He said the cows were calving now (apparently referring to April 1998) and that he would summon help if any of them were having difficulty. Tr. at 33. He also makes a second trip to walk through the isolation unit. He said that he just makes sure that there are no problems. He said that someone else owns the pigs. Tr. at 34. He also said that another farmer owns the building where the pigs are kept. Plaintiff said that he is paid $800.00 per month when the pigs are in the building. He said that he gets paid only during those months when pigs are present. Even if there are no pigs, however, he still needs to pay the rent on the building and pay the utility bills. Tr. at 38. Plaintiff told the ALJ that the 19 cows were beef cows. He said that they were kept through the summer and then sold after the calves were weaned. Tr. at 49-50. Plaintiff said that he owns 80 acres of land of which as much as 7 is in corn, and the rest is pasture for the cows. Tr. at 50. Plaintiff said that he did not pay anyone to help him with the cattle. Plaintiff told the ALJ that he received $7,000.00 from the sale of calves and that he had been paid $2,500.00 for taking care of the hogs. Tr. at 51. Plaintiff said that his neighbor makes hay for him. "I go out and pick the bales up after he gets done — then I can do it at my own leisure time and there's no hurry. I can get a couple of them a day and just carry them up by the barn there and set them in a row with my tractor." Tr. at 52. Plaintiff said that before the onset of his disability in February of 1996, he did all the farm work himself and did not need to ask his neighbors for help. Tr. at 56. The ALJ asked Plaintiff's wife who makes the decisions regarding how the land is going to be used and when the animals are going to be sold. She responded that it was her husband who made the decisions. Tr. at 65-66. She said that she was not real sure how they were paid for the hogs, that her husband handled the financial part. Tr. at 66. At the conclusion of the hearing, the ALJ asked Plaintiff's counsel to submit copies of Plaintiff's 1996 and 1997 federal and state income tax reports. Tr. at 74. The 1996 Schedule F, Profit Or Loss From Farming, shows that Plaintiff had gross receipts of $4,661 from the sales of livestock, produce, grains, and other products (line 4). He also reported expenses in the amount of $22,535 (line 35) for a loss of $17,624 (line 36). Tr. at 109. The 1997 Schedule F, shows receipts of $5,038 from sales of livestock etc. (line 4). Total expenses *1074 for 1997 were $10,273 (line 35) leaving a loss of $2,385 (line 36). Tr. at 125. In his decision, the ALJ wrote: "... the undersigned finds that [plaintiffs farm work] is equivalent to substantial gainful activity in that he is performing work activity comparable to the salary that an owner would pay an employee to do the same work. Further, the undersigned finds that the services rendered are significant to the operation of the isolation unit business and that he receives a substantial income from the business." Tr. at 14. The ALJ found that Plaintiff was working as a farmer and was not, therefore, disabled nor entitled to the benefits for which he applied. Tr. at 15. DISCUSSION In Petersen v. Chater, 72 F.3d 675, 676-77 (8th Cir.1995), the Court, quoting 20 C.F.R. § 404.1575(a)(1)-(3) noted the three part test for determining if a self employed person is engaged in substantial gainful activity: (a) If you are a self-employed person... We consider that you have engaged in substantial gainful activity if — (1) Your work activity in terms of factors such as hours, skills, energy output, efficiency, duties, and responsibilities, is comparable to that of unimpaired individuals in your community who are in the same or similar businesses as their means of livelihood; (2) Your work activity, although not comparable to that of unimpaired individuals, is clearly worth the amount shown in § 404.1574(b)(2) when considered in terms of its value to the business, or when compared to the salary that an owner would pay to an employee to do the work you are doing; or (3) You render services that are significant to the operation of the business and receive substantial income from the business. The ALJ found that Plaintiff's work on his farm is substantial gainful activity because "... he is performing work activity comparable to the salary that an owner would pay an employee to do the same work." This is the standard set out in test 2 of the above cited regulation. The Court can find no substantial evidence to support this finding. In Petersen, at 677, the Court also cited to Social Security Ruling (SSR) 83-34, which describes the above quoted tests "in great detail, with illustrative examples." In this SSR, section B is entitled "Tests two and three: Comparability of work and worth of work." Section B(b)(2) states: ... To establish comparability of work activity, it is necessary to show that the disabled person is performing at a level comparable to that of unimpaired persons, considering the following factors: hours, skills, energy output, efficiency, duties and responsibilities. The lack of conclusive evidence as to the comparability of the required factors will result in a finding that work performed is not SGA. ... Development must be specific. Each work factor cited above must be described in detail, showing its contribution to the business operation. General descriptions are considered inconclusive evidence for the point-by-point comparison that is required. If only a general description is possible or available, any doubt as to the comparability of the factors should be resolved in favor of the impaired individual. Evidence of the impaired individual's activities accompanied by a statement that the work is comparable to the work of unimpaired persons is insufficient for a sound decision. If necessary, a description should be obtained through a personal interview with an unimpaired *1075 self-employed individual from the selected group. There is no evidence in this record which passes muster on the above quoted standard. The finding that Plaintiff meets the second regulatory test of substantial gainful activity, therefore, is not supported by substantial evidence on the record as a whole. The ALJ, went on to consider the third test set out in the regulation. The ALJ wrote: "Further, the undersigned finds that the services rendered are significant to the operation of the isolation unit business and that he receives a substantial income from the business." Tr. at 14. The SSR states: "The services of an individual in a one-person business are necessarily `significant'. The receipt of substantial income by the operator of a one-person business will result in a finding of SGA." Id. at § A(1)(a). Assuming, therefore, that Plaintiff's services to his farm business, are "significant," it is still necessary to show that he received "substantial income" in order to deny the claim on the basis that he is engaged in substantial gainful activity. The only substantial evidence of Plaintiff's income during the years 1996 and 1997, are the tax returns submitted at the request of the ALJ. These are joint returns filed by Plaintiff and his wife. Again SSR 83-34 provides guidance. The ruling states: "... before applying the Earnings Guidelines, it is necessary to ascertain what portion of the individual's income represents the actual value of the work he or she performed. To do so, the adjudicator must first determine the individual's net income (i.e., gross income less normal business expenses)...." Id. at § A(2)(b)(1). Here, the evidence is that in 1996, Plaintiff's farm realized a loss of $17,624. In 1997, there was a loss of $2,385. In other words, there was no net income in either year. The finding that Plaintiff is performing significant services and that he receives substantial income from the business, is not supported by substantial evidence on the record as a whole. In Carter v. Sullivan, 909 F.2d 1201, 1202 (8th Cir.1990), the Court noted that 20 C.F.R. § 422.408 states that Social Security Rulings are binding on all components of the Administration. The Court held that the failure of the Secretary to consider its own ruling constitutes a plain abuse of discretion. For the foregoing reasons, the Court finds that the ALJ's reasons for stopping the sequential evaluation at the first step are inadequate and that the finding is not supported by substantial evidence on the record as a whole. The Commissioner argued that if the Court finds, as it has, that the ALJ erred by stopping the sequential evaluation at the first step, that the proper remedy is a remand so that the ALJ can evaluate the evidence relevant to the other steps. The Court agrees with the Commissioner that the proper remedy in this case is a remand for further proceedings. On remand, the ALJ shall proceed to step two of the sequential evaluation and determine whether the case should be either approved or denied on the basis of steps two through five of the sequential evaluation. CONCLUSION AND DECISION The case is hereby remanded to the Commissioner for further administrative proceedings consistent with this opinion. The Clerk will enter judgment accordingly. The judgment to be entered will trigger the running of the time in which to file an application for attorney's fees under 28 U.S.C. § 2412(d)(1)(B) (Equal Access to Justice Act). See Shalala v. Schaefer, 509 U.S. 292, 113 S.Ct. 2625, 125 L.Ed.2d 239 (1993). See also, McDannel v. Apfel, 78 F.Supp.2d 944 (S.D.Iowa 1999) (discussing, among other things, the relationship between *1076 the EAJA and fees under 42 U.S.C. § 406 B), and LR 54.2(b). IT IS SO ORDERED.
{ "pile_set_name": "FreeLaw" }
High detection rate of Trichomonas vaginalis in benign hyperplastic prostatic tissue. While Trichomonas vaginalis, a protozoan parasite, is a well-investigated pathogen in the female population, there is little awareness of its significance in the male uro-genital tract. The presence of T. vaginalis in the prostate gland has only been scarcely investigated and has never been attested in conditions other than clinical prostatitis. Still, by some authors, this organ is regarded as ecologic niche for T. vaginalis. Since normal prostate tissue of sufficient quality is hard to come by, we investigated samples from 86 patients (mean age 68.7 ± 7.6 years) suffering from benign prostatic hyperplasia (BPH), a medical condition currently ranked as noninfectious, but characterized by chronic inflammatory tissue infiltrates of unknown etiology. Applying two different PCR protocols and sequence analysis of the respective amplicons, we detected T. vaginalis DNA in 29/86 (34%) BPH tissue samples, whereas in only 2/86 (2.3%) cases T. vaginalis grew in culture. Detection of T. vaginalis DNA correlated significantly (P < 0.01) with elevated peripheral blood monocytic cell counts, appearing along with protozoan infections. Given the unexpected high prevalence of T. vaginalis in BPH tissue of a nonselected, elderly study population from Austria, further epidemiological studies have to confirm this finding. Potential interactions of T. vaginalis in its prostatic habitat may be investigated with respect to their possible contribution to the inflammatory pathogenesis of BPH, since inflammatory cytokines have been shown to sustain prostatic hyperplastic growth.
{ "pile_set_name": "PubMed Abstracts" }
My name is Craig, and sometimes I review music. Jamie T – Carry On The Grudge (Review) Before sitting down to listen to Carry On The Grudge, the long-awaited third album by Wimbledon born troubadour (and personal here of mine) Jamie T I thought about where I was five years ago, seeing as there’s been a five-year gap between his releases. I was 15 when I first listened to Panic Prevention, and 16 when I first listened to its brilliant follow-up Kings & Queens and for some reason I connected with each, even without really knowing why I was at the time. Jamie Treays, much like Mike Skinner before him was a poet for the people; I got lost in Operation, a track I listened to plenty during nights spent trying to convince myself I was cooler than I actually was (not very cool I know), and even though I was perhaps too young to really relate to songs like Sheila (I didn’t understand the ‘Stella’ reference at the time, shame on me) I wanted to, because I felt like I was missing out on some sort of fucked up normality. The records were an insight into something I didn’t have, if that makes sense. Anyway, five years on some of my longing for that downbeat normality has become subdued reality, and it’s fitting that Carry On The Grudge arrives just in time to set me up for another humbling ‘things to look forward to in your twenties’ lesson. By the sounds of it there isn’t much good ahead, but that’s part of the appeal, and much like past works, Treays’ third album is beautifully grounded, a necessary release for the common man, a poignant tale of heartbreak and growing up told by one of the most painfully truthful and likable voices in modern music. There’s been plenty of speculation during the past five years about just what had happened to Jamie T, who had seemingly disappeared into the void that seems to swallow a large percentage of London. That void has spat him out, and although the energy of Kings & Queens and teen angst of Panic Prevention is diluted greatly Jamie T’s music sounds all the better for whatever experiences he’s been through in that time, it’s much slower and thoughtful, and his time in self-inflicted limbo makes up the general tone of the record as he explores his own melancholy state of mind. Sure, Jamie T has always been fairly troubled. His debut album took its name from the panic attacks he suffered, and his second was a more mature progression with its fair share of downcast eyes and sentimental, eclectic musings. This time around, Jamie T is still undoubtedly troubled, and the five years that separate his second and third record haven’t done much to help quell the Hell in his head; with tracks like Mary Lee and Peter some of his darkest, most brooding material yet. Peter, oddly enough, is the Hell in Treays’ head, his asshole ‘Mr Hyde’ alter-ego who features bitter alongside an anthemic, stomping guitar-driven track which perhaps stands out too much on a record which is mostly raw in a very different way. Part of this raw nature comes from Treays’ lyrics and vocals, which are still very well done despite losing their quickfire delivery and venomous potency. Tales of bar fights and piss-drinking (The Prophet, on which Treays sings ‘I haven’t cracked a smile since ’93’) are strangely intoxicating, whilst the expressive, crooning They Told Me It Rained stirs up goosebumps, absorbingly warm, overflowing with a genuine, almost crippling honesty as Treays laments ‘I give up, yeah I give in, just show me love‘ in the style of a man verging on broken. Again, sure, he’s always been several shades of that man, often as a bystander – the shaky bridge between the gutter and the down to earth grandeur of everyday life – but on the twelve tracks that make up his return he’s the one being watched, being dissected, and it makes for some incredibly personal insights into one of the most enigmatic and relatable characters in music. Jamie T is still the narrator and ring-leader, but now he’s the one in the spotlight, as opposed to the shady characters of English shadow. He lived in that void, that world he used to chronicle, it was the world we saw ourselves off in his earlier material, and Carry On The Grudge is a record born from that fuller, lived-well, experience – a harrowing but humbling account of a man teetering on the edge and acknowledging his own loose footing. The more memorable selections are those which showcase this vulnerability, and akin to the likes of Emily’s Heart they’re found here in the form of the aforementioned Mary Lee and Limits Lie, both of which are accounts of a love lost, a prominent topic on Carry On The Grudge. The former finds Treays in deep reflection, a slow, sombre song which inspires some sympathy even though he holds himself accountable (‘I can’t believe what a stupid drunk boy I was to let Mary leave’) over gorgeous blossoming horns. Opener Limits Lie is slightly more upbeat, unfurling for a great, perking chorus which somehow rouses a smile even though its lyrically defeated. Pair it with calming, almost laid back oozing lead single Don’t You Find and you have two opening songs which are pensive and unlike anything Treays has attempted before. The opener, like the excellent Murder Of Crows (which makes use of some delicate Bon Iver like harmonies) is more traditional in terms of its songwriting, and Treays has improved this area of music significantly. There’s a real streamlined feel to the record, which loses none of its impact in a more focused approach. It suits his style, which as a whole is more mature but still pleasingly rugged. Carry On The Grudge isn’t particularly spontaneous, and the hip-hop / rap influence has been toned down enormously – the last verse of Rabbit Hole is the closest you’ll get to the likes of Chaka Demus, and the Panic Prevention style borders on non-existent throughout – but there are shades of earlier material, it’s just that Treays has evolved greatly as a musician, and that’s potentially Carry On The Grudge‘s biggest strength, or weakness, depending on your stance. Personally, I loved the growth on Carry On The Grudge, and the likes of ballad Love Is A Heartbeat Away and the shifting Turn On The Light are, in my eyes, two of the best songs Jamie T has released thus far. Both suggest he’s aged well, musically more than mentally, and there’s something very impressive about the strides he’s made here, even though some tracks were recorded shortly after Kings & Queens. Fourth track Zombie is one of these older songs, and it’s infectious like its namesake, the records highlight, ridiculously cool once is kicks in with the lines ‘cos I’m a sad sack post-teen caught up in the love machine / No dream, come clean, walking like a zombie’ over churning, spirited instrumentation. The equally energetic Rabbit Hole is another highlight, playful in abundance, and both of these livelier tracks stand head and shoulders above the weakest track on the record Trouble, which is dynamic in a less convincing, more forced way. It’s difficult ska-punk feel is the only blemish on an otherwise superb release, and it’s a shame it falls midway through, upsetting the pace and momentum which had slowly and surely been gathering, as Treays seems to recapture some sort of now-foreign spark, and fails. If Panic Prevention was a record for the damaged adolescent then Carry On The Grudge is one for their world-weary, older selves. It’s personal and poetic, bolstered by some immaculate production, and in some regards its Jamie T’s best record to date, albeit one which might not appeal to the same audience he had five years ago; if you’ve been waiting five years for another Kings & Queens you may be disappointed. Carry On The Grudge is a masterpiece of a different nature, commendably changed, and even if it may leave listeners torn there’s still a great deal to enjoy here. It’s very, very good to have Jamie T back, and with him he’s brought one of 2014’s better releases, at least in my eyes.
{ "pile_set_name": "Pile-CC" }
The University of Washington Center on Outcomes Research in Rehabilitation (UWCORR) has the broad, long-term objectives of providin.q clinical researchers with better tools or methods to measure patientreported outcomes (PRO) in children and adults with chronic disease and disability by using modern measurement theory and other sophisticated approaches to improve instruments and approaches used to measure pain and fatigue, and understanding of associations between pain and fatigue, and their impact on important outcome variables. The independent research project proposes to conduct two studies. Study 1 is a cross-sectional study of pain and fatigue and their impact on important outcome measures (participation, depression, and disability level) in 1,200 adults and children. Study 2 is a prospective, longitudinal study with 300 adults and children assessed on the set of core measures over six, six month intervals. We will use item response theory modeling framework and other appropriate methods to refine the items and scales, and to propose a set of improved core measures/items for assessment of pain and fatigue in adults and youth with disabilities. We will also test the associations between pain and fatigue, and their relationship to depression, level of disability, and participation in activities using both cross-sectional and longitudinal data. Better understanding of the association of pain and fatigue with important outcomes will allow us to select those items/scales that are most strongly associated with the changes in the outcome variables. Data from Study 2 (longitudinal) will be used to identify reliable subgroups within and across different disability groups characterized by trajectories with a certain pattern of pain and fatigue symptoms. This will inform the final selection of items/scales most relevant to each of the subgroups identified as well as research on treatment and management of pain and fatigue. We propose that PROMISE adopt the following two concepts as Network Projects: (1) develop a psychometrically valid, dynamic system to measure participation in activities for individuals with a broad range of disabilities; utilize the universal design principles to ensure that item banks, CAT system, and supporting materials are fully accessible to researchers, participants, and other constituents, including those with disabilities.
{ "pile_set_name": "NIH ExPorter" }
Two exemplary and very similar inspection systems for pattern defects in photomasks employed in the large-scale manufacture of semiconductor devices and integrated circuits are described in U.S. Pat. Nos. 4,000,949 of Watkins and 3,614,232 of Mathisen. The systems of Watkins and Mathisen contemplate the simultaneous inspection of all of the dies on a photomask which contains a regular array of normally identical dies to detect the presence of nonperiodic defects, i.e., defects in one die not identically repeated in the remaining dies of the array. This task is accomplished by illuminating simultaneously all of the dies of a specimen photomask with collimated coherent light emanating from a laser to develop a composite diffraction pattern whose spatial distribution is the combination of two components. The first component is the interference pattern of the array of dies, and the second component is the interference pattern of a single die of the array. The first and second components are sometimes called an inter-die interference pattern and an intra-die interference pattern, respectively. The light transmitted by the photomask strikes a double-convex lens which distributes the light on a spatial filter positioned a distance equal to one focal length behind the lens. The spatial filter comprises a two-dimensional Fourier transform pattern of a known error-free reference photomask against which the specimen photomask is compared. The filter is opaque in the areas corresponding to spatial frequency components of the error-free Fourier transform pattern and is transparent in areas not included in the error-free Fourier transform pattern. Neither the Watkins patent nor the Mathisen patent specifies the design parameters of the lens. The Mathisen patent states only that the lens is of suitable numerical aperture and magnification power to cover the area of the specimen photomask. The spatial frequency components corresponding to the defects in the specimen photomask are largely transmitted through the spatial filter and can be processed in either one of two ways. In the Watkins system, the light transmitted through the spatial filter strikes another double-convex lens that is properly positioned to define an image of the specimen photomask, absent any information blocked by the spatial filter. The imaging light not blocked by the spatial filter appears in locations that represent the position in the specimen photomask where defects are present. In the Mathisen system, the light transmitted through the spatial filter is sensed by a photodetector that produces an output signal which activates a "no-go" alarm. The Watkins and Mathisen patents imply that systems of the type they describe require both inter- and intra-die interference pattern information to determine the presence of defects in the specimen pattern. The inter-die interference pattern information is of particular concern because it consists of very closely spaced light spots that are extremely difficult to resolve by a Fourier transform lens. The realization of such a lens is further complicated for inspection systems that use an inverse Fourier transform lens to form an image of the specimen pattern from the Fourier transform light pattern. The reason is that the design of each of the lenses is compromised to accomplish an overall system design that accomplishes both the Fourier transform pattern and image forming functions. It is, therefore, exceedingly difficult to obtain from such a system design the resolution required to acquire inter-die interference pattern information. The above lens design problem is encountered in systems of the type that simultaneously inspects the entire area of each of the dies of a specimen photomask array and, as a consequence, renders such systems unreliable and impracticable for commercial use.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Configure amazons3 to run WebAPI I have created an seprate Web API to provide functionality to angular2 form. This API accepts the data and write into file. This works perfectly on the localhost. How do I configure amazons3 to run this Web API sepretly ? Reference: Angular form service A: @Neerajkumar, try to setup your api in aws api gateway and for processing use aws lambda function using which you can also write a file on S3.
{ "pile_set_name": "StackExchange" }
Header Right GIFT CERTIFICATES Rooms OUR ESCAPE ROOMS ARE NOW AVAILABLE. In a biochemical lab, you will have to find a way to correct what an unstable biochemist has done. He has gone mad and created a biochemical bomb. Frederick is in grave danger! You have 60 minutes to find and defuse the bomb. Can you save the city? In this 1980’s mob boss office is the diamond you are looking for. The mob has pulled off the heist of the century. The police can’t do anything because they lack the evidence, so it’s up to you and your team to find the Diamond and steal it back. Can you do it before the mob finds you trespassing? You’re a trainee at the FBI Academy. There are two identical rooms with an unsolved crime. White team vs. Black team, only one team gets hired, the other team gets kicked out of the academy. Compete against your friends and find out which team has what it takes to solve the mystery and become a special agent! This room can be done as a one room escape room or a two room head to head competions.
{ "pile_set_name": "Pile-CC" }
<?xml version="1.0"?> <ZopeData> <record id="1" aka="AAAAAAAAAAE="> <pickle> <global name="Category" module="erp5.portal_type"/> </pickle> <pickle> <dictionary> <item> <key> <string>_count</string> </key> <value> <persistent> <string encoding="base64">AAAAAAAAAAI=</string> </persistent> </value> </item> <item> <key> <string>_mt_index</string> </key> <value> <persistent> <string encoding="base64">AAAAAAAAAAM=</string> </persistent> </value> </item> <item> <key> <string>_tree</string> </key> <value> <persistent> <string encoding="base64">AAAAAAAAAAQ=</string> </persistent> </value> </item> <item> <key> <string>categories</string> </key> <value> <tuple> <string>gap/ohada/syscohada/9/91/918</string> </tuple> </value> </item> <item> <key> <string>id</string> </key> <value> <string>918</string> </value> </item> <item> <key> <string>portal_type</string> </key> <value> <string>Category</string> </value> </item> <item> <key> <string>title</string> </key> <value> <string>Contrepartie des engagements accordés 908</string> </value> </item> </dictionary> </pickle> </record> <record id="2" aka="AAAAAAAAAAI="> <pickle> <global name="Length" module="BTrees.Length"/> </pickle> <pickle> <int>0</int> </pickle> </record> <record id="3" aka="AAAAAAAAAAM="> <pickle> <global name="OOBTree" module="BTrees.OOBTree"/> </pickle> <pickle> <none/> </pickle> </record> <record id="4" aka="AAAAAAAAAAQ="> <pickle> <global name="OOBTree" module="BTrees.OOBTree"/> </pickle> <pickle> <none/> </pickle> </record> </ZopeData>
{ "pile_set_name": "Github" }
Q: Find and replace $VARIABLE$ in files with powershell I'm making a simple powershell script to replace SubWCRev in our environment. So I have a lot of template files containing variables like $WCREV$ and so forth. I'm can't do a simple find and replace on those variables though.. I'm unable to escape the $-character properly. The find-and-replace is simple; function FindAndReplace { param( [string]$inputFile, [string]$outputFile, [string]$findString, [string]$replaceString) (Get-Content $inputFile) | foreach {$_ -replace $findString, $replaceString} | Set-Content $outputFile } And I've tried many alternatives for the $findString.. Tried; $findString = '$WCREV$' $findString = '`$WCREV`$' $findString = "`$WCREV`$" $findString = "$WCREV$" Can't make any of it work. If I try just WCREV it replaces it alright, but then I'm left with the $ of course.. I guess I could modify my templates but it seems like a silly little problem so it's probably doable, right? A: You are using -replace which supports regex. $ is the end of line anchor there. If you don't need regex then just use the string method replace instead. $findString = '$WCREV$' (Get-Content $inputFile) | foreach {$_.replace($findString,$replaceString)} To make your original $findString with your code then you would need to use regex escape characters which is the backslash for PowerShell it is the backtick like you were trying. The single quotes is important to prevent PowerShell from attempting to expand the string as a variable. Either of the following would work but my first snippet is what I suggest. $findString = '\$WCREV\$' $findString = [regex]::Escape('$WCREV$')
{ "pile_set_name": "StackExchange" }
[Superior mesenteric artery syndrome in a 12-year-old adolescent. Clinical case]. The superior mesenteric artery syndrome is rarely seen in children. It results from an intestinal obstruction due to compression of the third portion of duodenum between the superior mesenteric artery and the abdominal aorta. In most of the cases there are predisposing factors such as rapid weight loss or extra-abdominal compression. We report a case of a superior mesenteric artery syndrome in a twelve-year-old female patient without predisposing factors. The girl began suddenly with nauseas, continuous vomiting and abdominal pain. The abdominal pain was postprandial and it decreased in left lateral decubitus position. Clinically, this characteristic suggested superior mesenteric artery syndrome. Angio-computed tomography scan confirmed the diagnosis. Given that conservative treatment ultimately failed, patient was subjected to surgery and the illness was resolved.
{ "pile_set_name": "PubMed Abstracts" }
News & Missives Writer Q&As: Exploring Scene June 23, 2015 How do you “dig deep” in a scene to write it in the most compelling way possible? Are there techniques for exploring different options? [Carol Cram] Assume that you need you to dig deeper whenever you write a scene: it’s rare that this is not the case. Next, learn how to recognize what the narrative’s cues are that urge you to dig deeper. For example, it goes flat, looses momentum, confuses the reader, seems to be contradictory, feels rushed, is summarizing where it needs to evoke. In tandem with these results are the writer’s feelings of uneasiness, frustration, bafflement, fear, or avoidance. Identify which of these feelings is shaping your resistance: this will inform you about what has been preventing you from digger deeper. Then locate exactly where one of these feelings (say, avoidance) and narrative cues (say, loss of momentum) are limiting the narrative’s power and write freely into that spot. Think of it as opening a trap to go below the narrative’s oversimplified, flat surface. Finally, a simple diagnostic is to look at the length of paragraphs. If they tend to be of similar length then there’s a problem: find a paragraph that holds a pivotal moment and double or triple its size by slowing down and evoking more detail and sensation.
{ "pile_set_name": "Pile-CC" }
Detroit & Mackinac Scale Round-Roof Boxcar #3148 6-17773 | Price: $69.99 Round-Roof BoxcarIn the early 1930s, Pennsylvania developed a new round roof style of boxcar that allowed for a taller 10’ inner height and increased overall loading volume. By the end of the decade the efficient round roof design was adopted by the ARA and utilized on other railroads.
{ "pile_set_name": "Pile-CC" }
/* * Copyright 2002-2016 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the OpenSSL license (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* ==================================================================== * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. * * The Elliptic Curve Public-Key Crypto Library (ECC Code) included * herein is developed by SUN MICROSYSTEMS, INC., and is contributed * to the OpenSSL project. * * The ECC Code is licensed pursuant to the OpenSSL open source * license provided below. * * The software is originally written by Sheueling Chang Shantz and * Douglas Stebila of Sun Microsystems Laboratories. * */ #include <openssl/err.h> #include "internal/bn_int.h" #include "ec_lcl.h" #ifndef OPENSSL_NO_EC2M /*- * Compute the x-coordinate x/z for the point 2*(x/z) in Montgomery projective * coordinates. * Uses algorithm Mdouble in appendix of * Lopez, J. and Dahab, R. "Fast multiplication on elliptic curves over * GF(2^m) without precomputation" (CHES '99, LNCS 1717). * modified to not require precomputation of c=b^{2^{m-1}}. */ static int gf2m_Mdouble(const EC_GROUP *group, BIGNUM *x, BIGNUM *z, BN_CTX *ctx) { BIGNUM *t1; int ret = 0; /* Since Mdouble is static we can guarantee that ctx != NULL. */ BN_CTX_start(ctx); t1 = BN_CTX_get(ctx); if (t1 == NULL) goto err; if (!group->meth->field_sqr(group, x, x, ctx)) goto err; if (!group->meth->field_sqr(group, t1, z, ctx)) goto err; if (!group->meth->field_mul(group, z, x, t1, ctx)) goto err; if (!group->meth->field_sqr(group, x, x, ctx)) goto err; if (!group->meth->field_sqr(group, t1, t1, ctx)) goto err; if (!group->meth->field_mul(group, t1, group->b, t1, ctx)) goto err; if (!BN_GF2m_add(x, x, t1)) goto err; ret = 1; err: BN_CTX_end(ctx); return ret; } /*- * Compute the x-coordinate x1/z1 for the point (x1/z1)+(x2/x2) in Montgomery * projective coordinates. * Uses algorithm Madd in appendix of * Lopez, J. and Dahab, R. "Fast multiplication on elliptic curves over * GF(2^m) without precomputation" (CHES '99, LNCS 1717). */ static int gf2m_Madd(const EC_GROUP *group, const BIGNUM *x, BIGNUM *x1, BIGNUM *z1, const BIGNUM *x2, const BIGNUM *z2, BN_CTX *ctx) { BIGNUM *t1, *t2; int ret = 0; /* Since Madd is static we can guarantee that ctx != NULL. */ BN_CTX_start(ctx); t1 = BN_CTX_get(ctx); t2 = BN_CTX_get(ctx); if (t2 == NULL) goto err; if (!BN_copy(t1, x)) goto err; if (!group->meth->field_mul(group, x1, x1, z2, ctx)) goto err; if (!group->meth->field_mul(group, z1, z1, x2, ctx)) goto err; if (!group->meth->field_mul(group, t2, x1, z1, ctx)) goto err; if (!BN_GF2m_add(z1, z1, x1)) goto err; if (!group->meth->field_sqr(group, z1, z1, ctx)) goto err; if (!group->meth->field_mul(group, x1, z1, t1, ctx)) goto err; if (!BN_GF2m_add(x1, x1, t2)) goto err; ret = 1; err: BN_CTX_end(ctx); return ret; } /*- * Compute the x, y affine coordinates from the point (x1, z1) (x2, z2) * using Montgomery point multiplication algorithm Mxy() in appendix of * Lopez, J. and Dahab, R. "Fast multiplication on elliptic curves over * GF(2^m) without precomputation" (CHES '99, LNCS 1717). * Returns: * 0 on error * 1 if return value should be the point at infinity * 2 otherwise */ static int gf2m_Mxy(const EC_GROUP *group, const BIGNUM *x, const BIGNUM *y, BIGNUM *x1, BIGNUM *z1, BIGNUM *x2, BIGNUM *z2, BN_CTX *ctx) { BIGNUM *t3, *t4, *t5; int ret = 0; if (BN_is_zero(z1)) { BN_zero(x2); BN_zero(z2); return 1; } if (BN_is_zero(z2)) { if (!BN_copy(x2, x)) return 0; if (!BN_GF2m_add(z2, x, y)) return 0; return 2; } /* Since Mxy is static we can guarantee that ctx != NULL. */ BN_CTX_start(ctx); t3 = BN_CTX_get(ctx); t4 = BN_CTX_get(ctx); t5 = BN_CTX_get(ctx); if (t5 == NULL) goto err; if (!BN_one(t5)) goto err; if (!group->meth->field_mul(group, t3, z1, z2, ctx)) goto err; if (!group->meth->field_mul(group, z1, z1, x, ctx)) goto err; if (!BN_GF2m_add(z1, z1, x1)) goto err; if (!group->meth->field_mul(group, z2, z2, x, ctx)) goto err; if (!group->meth->field_mul(group, x1, z2, x1, ctx)) goto err; if (!BN_GF2m_add(z2, z2, x2)) goto err; if (!group->meth->field_mul(group, z2, z2, z1, ctx)) goto err; if (!group->meth->field_sqr(group, t4, x, ctx)) goto err; if (!BN_GF2m_add(t4, t4, y)) goto err; if (!group->meth->field_mul(group, t4, t4, t3, ctx)) goto err; if (!BN_GF2m_add(t4, t4, z2)) goto err; if (!group->meth->field_mul(group, t3, t3, x, ctx)) goto err; if (!group->meth->field_div(group, t3, t5, t3, ctx)) goto err; if (!group->meth->field_mul(group, t4, t3, t4, ctx)) goto err; if (!group->meth->field_mul(group, x2, x1, t3, ctx)) goto err; if (!BN_GF2m_add(z2, x2, x)) goto err; if (!group->meth->field_mul(group, z2, z2, t4, ctx)) goto err; if (!BN_GF2m_add(z2, z2, y)) goto err; ret = 2; err: BN_CTX_end(ctx); return ret; } /*- * Computes scalar*point and stores the result in r. * point can not equal r. * Uses a modified algorithm 2P of * Lopez, J. and Dahab, R. "Fast multiplication on elliptic curves over * GF(2^m) without precomputation" (CHES '99, LNCS 1717). * * To protect against side-channel attack the function uses constant time swap, * avoiding conditional branches. */ static int ec_GF2m_montgomery_point_multiply(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, const EC_POINT *point, BN_CTX *ctx) { BIGNUM *x1, *x2, *z1, *z2; int ret = 0, i, group_top; BN_ULONG mask, word; if (r == point) { ECerr(EC_F_EC_GF2M_MONTGOMERY_POINT_MULTIPLY, EC_R_INVALID_ARGUMENT); return 0; } /* if result should be point at infinity */ if ((scalar == NULL) || BN_is_zero(scalar) || (point == NULL) || EC_POINT_is_at_infinity(group, point)) { return EC_POINT_set_to_infinity(group, r); } /* only support affine coordinates */ if (!point->Z_is_one) return 0; /* * Since point_multiply is static we can guarantee that ctx != NULL. */ BN_CTX_start(ctx); x1 = BN_CTX_get(ctx); z1 = BN_CTX_get(ctx); if (z1 == NULL) goto err; x2 = r->X; z2 = r->Y; group_top = bn_get_top(group->field); if (bn_wexpand(x1, group_top) == NULL || bn_wexpand(z1, group_top) == NULL || bn_wexpand(x2, group_top) == NULL || bn_wexpand(z2, group_top) == NULL) goto err; if (!BN_GF2m_mod_arr(x1, point->X, group->poly)) goto err; /* x1 = x */ if (!BN_one(z1)) goto err; /* z1 = 1 */ if (!group->meth->field_sqr(group, z2, x1, ctx)) goto err; /* z2 = x1^2 = x^2 */ if (!group->meth->field_sqr(group, x2, z2, ctx)) goto err; if (!BN_GF2m_add(x2, x2, group->b)) goto err; /* x2 = x^4 + b */ /* find top most bit and go one past it */ i = bn_get_top(scalar) - 1; mask = BN_TBIT; word = bn_get_words(scalar)[i]; while (!(word & mask)) mask >>= 1; mask >>= 1; /* if top most bit was at word break, go to next word */ if (!mask) { i--; mask = BN_TBIT; } for (; i >= 0; i--) { word = bn_get_words(scalar)[i]; while (mask) { BN_consttime_swap(word & mask, x1, x2, group_top); BN_consttime_swap(word & mask, z1, z2, group_top); if (!gf2m_Madd(group, point->X, x2, z2, x1, z1, ctx)) goto err; if (!gf2m_Mdouble(group, x1, z1, ctx)) goto err; BN_consttime_swap(word & mask, x1, x2, group_top); BN_consttime_swap(word & mask, z1, z2, group_top); mask >>= 1; } mask = BN_TBIT; } /* convert out of "projective" coordinates */ i = gf2m_Mxy(group, point->X, point->Y, x1, z1, x2, z2, ctx); if (i == 0) goto err; else if (i == 1) { if (!EC_POINT_set_to_infinity(group, r)) goto err; } else { if (!BN_one(r->Z)) goto err; r->Z_is_one = 1; } /* GF(2^m) field elements should always have BIGNUM::neg = 0 */ BN_set_negative(r->X, 0); BN_set_negative(r->Y, 0); ret = 1; err: BN_CTX_end(ctx); return ret; } /*- * Computes the sum * scalar*group->generator + scalars[0]*points[0] + ... + scalars[num-1]*points[num-1] * gracefully ignoring NULL scalar values. */ int ec_GF2m_simple_mul(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, size_t num, const EC_POINT *points[], const BIGNUM *scalars[], BN_CTX *ctx) { BN_CTX *new_ctx = NULL; int ret = 0; size_t i; EC_POINT *p = NULL; EC_POINT *acc = NULL; if (ctx == NULL) { ctx = new_ctx = BN_CTX_new(); if (ctx == NULL) return 0; } /* * This implementation is more efficient than the wNAF implementation for * 2 or fewer points. Use the ec_wNAF_mul implementation for 3 or more * points, or if we can perform a fast multiplication based on * precomputation. */ if ((scalar && (num > 1)) || (num > 2) || (num == 0 && EC_GROUP_have_precompute_mult(group))) { ret = ec_wNAF_mul(group, r, scalar, num, points, scalars, ctx); goto err; } if ((p = EC_POINT_new(group)) == NULL) goto err; if ((acc = EC_POINT_new(group)) == NULL) goto err; if (!EC_POINT_set_to_infinity(group, acc)) goto err; if (scalar) { if (!ec_GF2m_montgomery_point_multiply (group, p, scalar, group->generator, ctx)) goto err; if (BN_is_negative(scalar)) if (!group->meth->invert(group, p, ctx)) goto err; if (!group->meth->add(group, acc, acc, p, ctx)) goto err; } for (i = 0; i < num; i++) { if (!ec_GF2m_montgomery_point_multiply (group, p, scalars[i], points[i], ctx)) goto err; if (BN_is_negative(scalars[i])) if (!group->meth->invert(group, p, ctx)) goto err; if (!group->meth->add(group, acc, acc, p, ctx)) goto err; } if (!EC_POINT_copy(r, acc)) goto err; ret = 1; err: EC_POINT_free(p); EC_POINT_free(acc); BN_CTX_free(new_ctx); return ret; } /* * Precomputation for point multiplication: fall back to wNAF methods because * ec_GF2m_simple_mul() uses ec_wNAF_mul() if appropriate */ int ec_GF2m_precompute_mult(EC_GROUP *group, BN_CTX *ctx) { return ec_wNAF_precompute_mult(group, ctx); } int ec_GF2m_have_precompute_mult(const EC_GROUP *group) { return ec_wNAF_have_precompute_mult(group); } #endif
{ "pile_set_name": "Github" }
1. Field of the Invention The present invention relates, in general, to a multi-mode SCSI backplane, and to configuration logic that detects whether the SCSI backplane is configured for simplex or duplex mode, and also detects illegal cabling configurations. 2. Relevant Background. The SCSI (small computer system interface) connection interface provides a fast, versatile way for PCs and servers to connect with a variety of storage devices including hard disk drives (HDDs), optical drives, and tape drives, among others. A common configuration for SCSI interfaces in servers includes a SCSI circuit board known as a backplane that typically includes SCSI connectors. In a typical configuration, the SCSI backplane is internal to a server box, and interfaces with the main motherboard of the server via a cabled SCSI connection. The SCSI controller circuitry is typically located on the server motherboard, the SCSI backplane, or both boards. Multi-mode SCSI backplanes are designed to support multiple connection configurations including simplex mode configuration and duplex mode configuration. While multi-mode SCSI backplanes have the advantage of supporting multiple configuration modes on a single SCSI backplane, they also have added expense and design complications. For example, multi-mode SCSI backplanes typically have to incorporate complex logic such as Programmable Array Logic (PALs) in the backplane. Furthermore, multi-mode SCSI backplanes often use sideband signals through additional connector interfaces external to the SCSI interface. Another problem occurs when an operator incorrectly attempts to connect peripheral devices to the SCSI backplane. These so called illegal configurations include illegal cabling configurations and improper termination of connectors that are not in use, among other errors. Illegal configurations can cause the SCSI interface to malfunction and may even result in permanent circuit damage.
{ "pile_set_name": "USPTO Backgrounds" }
{ "navigationBarTitleText": "英雄详情" }
{ "pile_set_name": "Github" }
Vaccination, simply the the Best Travel Insurance you'll every buy Did you know that overseas travellers have up to 50% chance of contracting a travel-related illness? Don’t be one of the over 500,000 Australians who put their lives at risk by exposing themselves to potentially serious infections when they travel. Be on the safe side and book your personalised medical check-up today to find out how to reduce your chances of getting sick when you travel. That’s where we come in! Appointments with the International Travel Vaccination Clinic (ITVC) with our knowledgeable and experienced travel health doctors will include individual advice on how to prevent infectious diseases that could be transmitted by people or animals on your trip. Whether you’re travelling for business, going on holiday or going overseas to catch up with friends and family, we’re here to help you do it safely. EXPERT SUPPORT AND ADVICE TO HELP YOU STAY HEALTHY ON YOUR TRAVELS The International Travel Vaccination Centre (ITVC) is a well established Travel vaccination centre boasting over 15 years of experience in protecting you on your travels. We provide full vaccination services on-site and are a Yellow Fever Accredited vaccination centre. We even have travel health accessories available for sale when you pop over to the clinic. ITVC is part of the Travel Medical Alliance (TMA), an Australian alliance of independent of travel medicine practitioners formed to help travel clinics offer better services to their customers. Our experienced and knowledgeable Travel Health Doctors have all completed the ITSM Certificate in Travel HealthTM through the International Society of Travel Medicine (ISTM) which includes a ten year programme designed to help us maintain and increase our skills and knowledge in Travel Medicine. When you come to the ITVC: You gain access to a full vaccination service You get personalised travel assessment, advice and support based on your travel itinerary You can buy specialised travel health products and accessories We offer vaccinations delivered at the time of consultation You can have treatment with Malaria Prophylaxis medication during your consultation if required You get a Yellow Fever accredited practice You can claim your consultation with our travel doctors back from Medicare You may be able to claim your vaccination charges back from your Private Health Insurance, if you have the right level of cover. Check with your Private Health Insurer directly whether you are eligible to claim. Yellow Fever Vaccination Accredited Centre Yellow fever is preventable! Book a vaccination appointment now to ensure you stay protected from infection. Student Travel &School Programmes Content Bottom Section ITVC is part of the Travel Medical Alliance (TMA), an Australian alliance of independent of travel medicine practitioners formed to help travel clinics offer better services to their customers. Read more ≫ Our experienced and knowledgeable Travel Health Doctors have all completed the ITSM Certificate in Travel Health through the International Society of Travel Medicine (ISTM). Read more ≫
{ "pile_set_name": "Pile-CC" }
Alabama passes harsh law restricting immigrant rights Following in the footsteps of states like Arizona, Georgia, Utah, and Indiana, Alabama has become the fifth state to pass harsh anti-immigrant laws within the last year. HB 56, also known as the Beason-Hammon Alabama Taxpayer and Citizen Protection Act, was passed into law on June 9. However, Alabama is the first state where some of the worst provisions of this legislation have actually gone into effect. HB 56 is a law modeled after Arizona’s notorious SB 1070, which sparked a nationwide resistance and economic boycott in 2010, costing the Arizona tourist industry an estimated $100 million. Before HB 56 was scheduled to take effect on Sept. 1, the Department of Justice issued a challenge to the law, which has been widely recognized as the harshest state immigration law on the books. On Sept. 28, U.S. District Judge Sharon Lovelace Blackburn returned her ruling on the controversial law. Judge Blackburn blocked certain parts of HB 56, including a provision that would have made it illegal for undocumented immigrants to enroll in state colleges and universities, provisions that criminalized day laborers’ and undocumented immigrants’ attempts to look for and get work, and a provision that would have made it illegal to give a ride to or harbor an undocumented person. However, Judge Blackburn also upheld some of the worst sections of HB 56, arguing that states have the right to enact their own immigration laws covering areas overlooked by federal law, an unusual decision. Blackburn refused to enjoin one of the harshest parts of the law, a provision that gives police and other law enforcement agents the power to detain and question anyone whom they have a “reasonable suspicion” may be undocumented. This is the first time that such a provision, which is widely acknowledged to promote the use of racial profiling among police officers and other agents, has been allowed to stand. Blackburn also let stand provisions of the law that require all K-12 schools in Alabama to track the immigration status of their students, and that make any business contract entered into with an undocumented person null and void. “Today is a dark day for Alabama,” Mary Bauer, the Southern Poverty Law Center’s legal director, said in a statement. “This decision not only places Alabama on the wrong side of history but also demonstrates that the rights and freedoms so fundamental to our nation and its history can be manipulated by hate and political agendas—at least for a time.” Laws such as SB 1070 and HB 56 are part of a wider philosophy known as “attrition through enforcement.” This strategy was the brainchild of the Center for Immigration Studies (CIS), which claims to be an impartial research organization but which is actually associated with FAIR, the oldest and largest anti-immigrant organization in the United States. FAIR and its associates are often quoted in the mainstream press. Its directors often testify in Congress, and its ideas have often been accepted by politicians on both sides of the aisle. “Attrition through enforcement” is essentially the idea that the immigrant population is largely made up of dangerous drug smugglers and criminals who are here to “steal” Americans’ jobs. They pose a “security risk” to our nation and must be dealt with accordingly. This idea serves to foster a feeling of anti-immigrant xenophobia in the general population and has often been used to justify the use of extremely harsh measures against undocumented immigrants. Laws such as HB 56 and SB 1070 and ICE Access programs such as Secure Communities are meant to make life so difficult for immigrants that they live in a constant state of fear. This makes it easier for employers to control and exploit an already vulnerable immigrant workforce, and it makes it even harder for immigrant workers to stand up for their rights. In this light, it is interesting to note that Judge Blackburn chose to enjoin the provisions of HB 56 that would have made it illegal for undocumented immigrants to look for or accept work. Since HB 56 has gone into effect, there have been reports of large numbers of immigrants pulling their children out of school or leaving the state; with no one to harvest them, crops have been rotting in the fields. According to one report, 50 Alabama farmers recently met with three legislators to beg them to make emergency changes to the law, citing the fact that they could lose millions of dollars worth of crops if there is no one to pick them. Meanwhile, the fear in the immigrant community continues to grow and spread in the weeks following its enactment. Since HB 56 took effect, a coalition of civil rights groups including the ACLU, the NationalImmigrationLawCenter, the Southern Poverty Law Center, and the Hispanic Interest Coalition of Alabama filed an emergency request with the 11th Circuit Court of Appeals to block some of the harshest provisions of the law from going into effect. On Oct. 14, the appeals court granted an emergency stay of two of the most severe provisions of the law. At least temporarily, public schools in the state will not be allowed to track the immigration status of their students, and it will no longer be considered a crime for a person not to be carrying proof of their immigration status with them. However, with provisions such as the one allowing law enforcement agents to question people regarding their status still in effect, many predict that it is likely that this issue will eventually reach the Supreme Court. HB 56 is only the tip of the iceberg, and it is clear that more states will soon follow suit with similar laws. With a philosophy like “attrition through enforcement” in play, more than a legal injunction is needed to stop this most recent wave of anti-immigrant legislation. However, local community organizing groups like the Alabama Coalition for Immigrant Justice, Alabama Dreamers for the Future, and many different local churches have observed an increasing outpouring of regional and national support for the movement against HB 56 in Alabama. “What’s happening is a continuing growth of the civil rights movement,” said Scott Douglas, director of the Greater Birmingham Ministries. “Back then [during the heyday of the civil rights movement] it was people in the black church [who were] involved, and the white church was silent. This time, there are black churches, brown churches and white churches saying ‘not in our names.’” While no official boycott of Alabama or similar long-term organizing strategy has yet been announced, it is this kind of solidarity across artificially constructed borders and racial lines that will eventually help defeat HB 56 and other anti-immigrant laws. > The article above was written by Lisa Luinenburg, and first appeared in the November 2011 print edition of Socialist Action newspaper.
{ "pile_set_name": "Pile-CC" }
In recent years, privacy and confidentiality, and conflicts of interest have become increasingly complex and contentious. The growth of genetics testing and research, proliferation of databanks, and use of the Internet and computers by investigators threaten individual and group privacy. The expansion of university industry partnerships continues to raise major and troubling questions regarding conflicts of interest for individual researchers, IRB members and institutions. While new regulations and guidance have been proposed and enacted (e.g., HIPAA), many in the research community remain ill informed about recent developments and new responsibilities that arise for protecting the rights and welfare of study participants. Using several innovative approaches, we have designed the "Current Issues in Research Ethics," (CIRE) Program, to fill gaps in knowledge and understanding among: researchers, research staff, IRB members, and administrators. We aim to advance awareness of these major topics, and stimulate new reflection and insight into their ethical, legal, and policy implications. Given tensions between researchers and IRB members, the ClRE Program will bring these two groups together to explore difficult issues collaboratively. We will examine critical aspects of privacy such as ramifications of HIPAA and other new regulations, third party consent, genetic privacy, use of the Internet for research, and conflicts of interest at varied levels. Over the three years of the proposed project, we will develop, implement and evaluate four day long university-hospital courses -- three times at Columbia University and once at our affiliate, Harlem [unreadable] Hospital Center. We will also partner with PRIM&R (Public Responsibility in Medicine and Research) to present a state-of-the-art two-day national conference addressing these areas in a broader format for a broader audience. We will focus on how issues of privacy arise with vulnerable populations (e.g., HIV, mental illness, genetic disorders) and underserved groups. Before each daylong course, we will conduct focus groups to assess the needs of future attendees. Comprehensive evaluations at the end of each course will help further develop and refine it. We will disseminate outcome products widely, including an ongoing "Ethics Challenge of the Month" on the CIRE Website. In Year Three, we will put a model syllabus (with resource materials and bibliography) on line using a technologically advanced e-seminar. [unreadable] [unreadable]
{ "pile_set_name": "NIH ExPorter" }
Situationist Comedy Situationist Comedy is a full-length album by Dillinger Four released in 2002. Track listing "Noble Stabbings!!" - 3:20 "A Floater Left with Pleasure in the Executive Washroom." - 2:37 "Fuzzy Pink Hand-Cuffs" - 2:09 "The Father, the Son, and the Homosexual/Single Parent" - 2:04 "Sell the House Sell the Car Sell the Kids Find Someone Else Forget It I'm Never Coming Back Forget It" - 2:02 "Folk Song." - 2:27 "Fired-Side Chat" - 2:56 "'I Was Born on a Pirate Ship' (Hold Your Tongue)" - 2:36 "D4=Putting the 'F' Back in 'Art'" - 2:12 "All Rise for the Rational Anthem" - 2:15 "Labour Issues in the Toy Department" - 3:45 "File Under 'Adult Urban Contemporary'" - 2:36 "New Punk Fashions for the Spring Formal" - 2:59 Trivia The song title "Sell the House Sell the Car Sell the Kids Find Someone Else Forget It I'm Never Coming Back Forget It" is a reference to the film Apocalypse Now. References Category:2002 albums Category:Dillinger Four albums Category:Fat Wreck Chords albums
{ "pile_set_name": "Wikipedia (en)" }
Effect of toremifene and ospemifene, compared to acolbifene, on estrogen-sensitive parameters in rat and human uterine tissues. Although the first generation selective estrogen receptor modulator (SERM) tamoxifen (TAM) is well known for its uterotrophic activity, this study compares the stimulatory effect of the TAM derivatives toremifene (TORE) and ospemifene (OSPE) on estrogen-sensitive parameters in rat and human uterine tissues. Ovariectomized female rats were treated daily orally for 10 days with 0.75 mg/rat of TORE, OSPE or acolbifene (ACOL, a pure estrogen antagonist in the uterus and mammary gland), which was used for comparison. Human endometrial carcinoma Ishikawa cells were incubated for 5 days with increasing doses of compounds, in the absence or presence of 1 nM estradiol (E2). TORE and OSPE revealed 52% and 56% increases, respectively, in uterine weight, whereas ACOL had no effect. Similar effects were observed on vaginal weight. Endometrial epithelial height increased from 15.82±0.20 to 48.94± 2.12 and 42.14±1.95 μm with TORE and OSPE, respectively, whereas ACOL had no effect. Alkaline phosphatase activity, an estrogen-sensitive parameter in Ishikawa cells, was increased by 144% and 135% with OH-TORE and OH-OSPE, respectively. Owing to their intrinsic estrogenic activity, at maximal concentrations, OH-TORE and OH-OSPE blocked the stimulatory effect of E2 by only 89% compared to 100% with ACOL. The present in vitro and in vivo data show similar stimulatory effects of 4-hydroxytoremifene (OH-TORE) and OH-OSPE on estrogen-sensitive parameters. ACOL, a third generation SERM, has no effect on any of these parameters. Such data add to the potential uterine safety limitations of triphenylethylene-derived SERMs for long-term use in humans.
{ "pile_set_name": "PubMed Abstracts" }
A Dog Called Ego A Dog Called Ego is a German post rock band from Hamburg, Germany formed in 2006 by Christoph Stepan (guitar, vocals), Dirk Bakker (drums), Marcel Habbe (guitar, vocals) and Gregor Kaisser (bass guitar). History Christoph Stepan and Gregor Kaisser had already been playing together in several musical projects when they started working on musical material for a project that carried the working title "A DOG CALLED EGO". In early 2006 they decided to record an album and asked two friends, Marcel Habbe and Dirk Bakker, to join them for a recording. The project quickly turned into a real band and the band started playing live. In Summer they recorded their debut album "Living Seriously Damages Health" in their own studio in Hamburg and it was described as the best alternative/Post Rock album of the last years by German Rock Hard Magazine. On the Album Chris Harms the singer of the German Gothic Rock band Lord Of The Lost played Cello for the song "Something Huge". After having played lots of concerts including a two-week tour through Bosnia and Herzegowina, A Dog Called Ego started writing new musical material and started recording at their own Little Big Ears Studio in Hamburg/Germany. During the recording process Marcel Habbe left the band due to personal reasons. In May 2011 A Dog Called Ego digitally released "Happy Happy Apocalypse" the second full-length record via bandcamp, physical copies are planned. Again Chris Harms contributed some chello lines. In summer 2012 the band released the "Don't Vote For Us"-EP and were asked by Anathema to support them on their European tour. Thereafter A Dog Called Ego locked down in their studio again to work on "Songs For Elevators" their latest album which was released on September 11, 2014. Discography 2006: Living Seriously damages Health 2011: Happy Happy Apocalypse 2012: Don't Vote For Us 2013: Songs For Elevators External links A Dog Called Ego official website Musik Terrorverlag review in German Whiskey Soda review in German Concert review with pictures Metal Inside review Rock Hard Magazine Bandpage Metal-District review Powermetal.de review Category:Musical groups established in 2006 Category:German post-rock groups
{ "pile_set_name": "Wikipedia (en)" }
@extends('layouts.app') @section('content') <div class="container"> <div class="row"> <div class="col-md-8 col-md-offset-2"> <div class="panel panel-default"> <div class="panel-heading">重置密码</div> <div class="panel-body"> @if (session('status')) <div class="alert alert-success"> {{ session('status') }} </div> @endif <form class="form-horizontal" role="form" method="POST" action="{{ route('password.request') }}"> {{ csrf_field() }} <input type="hidden" name="token" value="{{ $token }}"> <div class="form-group{{ $errors->has('email') ? ' has-error' : '' }}"> <label for="email" class="col-md-4 control-label">邮箱</label> <div class="col-md-6"> <input id="email" type="email" class="form-control" name="email" value="{{ $email or old('email') }}" required autofocus> @if ($errors->has('email')) <span class="help-block"> <strong>{{ $errors->first('email') }}</strong> </span> @endif </div> </div> <div class="form-group{{ $errors->has('password') ? ' has-error' : '' }}"> <label for="password" class="col-md-4 control-label">密码</label> <div class="col-md-6"> <input id="password" type="password" class="form-control" name="password" required> @if ($errors->has('password')) <span class="help-block"> <strong>{{ $errors->first('password') }}</strong> </span> @endif </div> </div> <div class="form-group{{ $errors->has('password_confirmation') ? ' has-error' : '' }}"> <label for="password-confirm" class="col-md-4 control-label">确认密码</label> <div class="col-md-6"> <input id="password-confirm" type="password" class="form-control" name="password_confirmation" required> @if ($errors->has('password_confirmation')) <span class="help-block"> <strong>{{ $errors->first('password_confirmation') }}</strong> </span> @endif </div> </div> <div class="form-group"> <div class="col-md-6 col-md-offset-4"> <button type="submit" class="btn btn-primary"> 确定重置 </button> </div> </div> </form> </div> </div> </div> </div> </div> @endsection
{ "pile_set_name": "Github" }