text
stringlengths
0
3.53M
meta
dict
A new phenylethanoid glucoside from Plantago depressa Willd. Chemical research of Plantago depressa Willd. led to one new phenylethanoid glucoside with α-L-rhamnosyl (1 → 2)-β-D-glucose structure, together with four known compounds. These five compounds (1-5) were isolated from the family Plantaginaceae for the first time; the chemotaxonomic significance of cerebrosides was also discussed.
{ "perplexity_score": 197.2, "pile_set_name": "PubMed Abstracts" }
#include <iostream> #include <nlohmann/json.hpp> using json = nlohmann::json; int main() { // create an array value json array = {1, 2, 3, 4, 5}; // get an iterator to the reverse-end json::const_reverse_iterator it = array.crend(); // increment the iterator to point to the first element --it; // serialize the element that the iterator points to std::cout << *it << '\n'; }
{ "perplexity_score": 1599.8, "pile_set_name": "Github" }
Seeing queerly: looking for lesbian presence and absence in United States visual art, 1890 to 1950. The biographies of some U.S. women artists who developed professional careers between 1890 and 1950 reveal clues that suggest lesbian same-sex affections, but their works usually focus on the outside world rather than recognizably "lesbian" iconographies. Failure to acknowledge this distinction has led to a silencing that transforms what was present in life to an absence from history. Closer analysis from a queerly curious positioning can reinterpret coded hints, subtle choices, and what might seem absent or invisible to the heteronormative eye. This article suggests new possibilities for discerning lesbian presence and resisting absence given extant historical and visual evidence.
{ "perplexity_score": 399.6, "pile_set_name": "PubMed Abstracts" }
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ /* * Description : Fuzzy self joins a dataset, DBLP, based on the edit-distance-check function of its authors. * DBLP has a 3-gram enforced open index on authors?, and we expect the join to be transformed into an indexed nested-loop join. * Success : Yes */ drop dataverse test if exists; create dataverse test; use test; create type test.DBLPType as { id : integer, dblpid : string, title : string, misc : string }; create dataset DBLP(DBLPType) primary key id; create index ngram_index on DBLP (authors:string?) type ngram (3) enforced; write output to asterix_nc1:"rttest/inverted-index-join_ngram-edit-distance-check_03.adm"; select element {'arec':a,'brec':b} from DBLP as a, DBLP as b where (test.`edit-distance-check`(a.authors,b.authors,3)[0] and (a.id < b.id)) ;
{ "perplexity_score": 1709.5, "pile_set_name": "Github" }
TV Our Sites 10 Things We Learned From Week 1 in the NFL We saw some storylines pick up right where they left off on Monday Night Football as Robert Griffin III took the field and struggled against the Eagles in Monday Night Football before pulling it together late in the game in Washington's 33-27 loss. There was also that crazy Texans comeback against the Chargers that was highlighted by an amazing interception by Brian Cushing. This all happened on Monday, and it was all very exciting. The rest of the excitement in the prior games came mixed in with some education as Adrian Peterson epicness continued (momentarily), the #ManningFace came back, and Ryan Seacrest more Peyton Manning goodness in the opening game showed us that was indeed still one of the greatest in the league. So what were the 10 Things We Learned From Week 1 in the NFL? Let's break it down.
{ "perplexity_score": 468.7, "pile_set_name": "Pile-CC" }
Waiting for a 'unicorn technology' that provides green energy at low cost could be more expensive than adopting low-carbon energy technologies now. Researchers from Imperial College London say if Britain invested more in today's low-carbon energy technologies, it would save more money in the long term than waiting for a mythical future technology that may never materialise. Waiting for a 'unicorn technology' that provides green energy at low cost could be more expensive than adopting low-carbon energy technologies now. Researchers from Imperial College London say if Britain invested more in today's low-carbon energy technologies, it would save more money in the long term than waiting for a mythical future technology that may never materialise. In a study published today in Nature Energy they say using existing technologies now -- even if they are imperfect -- could save 61 percent of future costs. Renewable energy technologies, such as solar panels and wind farms, are growing in use. They are a key part of plans to meet climate targets by 2050 and have so far benefited from substantial backing to aid their deployment. advertisement However, energy produced using other low-carbon technologies currently cost more to produce than traditional fossil fuels sources. These include carbon capture and storage (CCS), which removes carbon dioxide from fossil fuel power plant emissions. As a result, those planning new power systems often cite the cost of these technologies as a reason against greater adoption and investment in them. Researchers fear that when planning for the future some decision-makers prefer to wait for a "unicorn technology" that generates electricity at zero carbon emissions, low cost and high flexibility, rather than invest in imperfect current technologies. To find out the impact of this strategy, researchers from the Centre for Environmental Policy and the Department of Chemical Engineering at Imperial modelled a range of future scenarios between two extremes. The so-called 'go' option would see extensive investments in currently viable renewable technologies now. The 'wait' option advocates holding out for cheaper, more advanced low carbon energy technologies down the line. The team modelled the expansion of Britain's electrical grid under these scenarios, including government investment in technologies such as carbon sequestration and nuclear power now, to the appearance of a breakthrough unicorn technology and its immediate uptake. They found that whether the "unicorn" materialises or not, delaying investment in today's technologies can have high implications on cost and emissions. For example, waiting for technology that never materializes would increase costs by 61% over deploying existing technologies now. Even if a "unicorn" technology did appear, waiting would still increase costs, because a lot of fossil fuel infrastructure would still be built, but not used. For example, new natural gas plants and pipelines could be built that would simply not be used when the new technology emerged, meaning the cost of building them was wasted. Lead-author of the research Clara Heuberger, form the Centre for Environmental Policy, said: "We find that such myopic planning and investment delays lead to poor power systems planning. In particular, such scenarios result in either grossly oversized and underutilised power systems or ones which are far from being decarbonised by 2050."
{ "perplexity_score": 316.5, "pile_set_name": "OpenWebText2" }
Q: Remove last three characters from all filenames in a directory I have a directory with about 10 files and I want to remove the last three characters from the names of all of these files. Anyone know a terminal command that can do this? And separately, how would I change the characters in the names of all these files to lowercase? A: Remove last three characters from all filenames in current directory: rename 's/...$//' * Change the characters in the names of all files from current directory to lowercase: rename 'y/A-Z/a-z/' * For more info see man rename.
{ "perplexity_score": 653.1, "pile_set_name": "StackExchange" }
Q: SQL Count certain elements in a group showing each element and total count Imagine I have a table like this : +----+--------+--------+------+ | ID | NAME | DEPTNO | MGR | +----+--------+--------+------+ | 1 | AYEW | 10 | 4 | | 2 | JORDAN | 20 | 4 | | 3 | JAMES | 20 | 4 | | 4 | MESSI | 30 | NULL | +----+--------+--------+------+ I need to display a result like this : +----+---------+-------------+--------+-------+ | ID | MANAGER | SUBORDINATE | DEPTNO | COUNT | +----+---------+-------------+--------+-------+ | 4 | MESSI | AYEW | 10 | 1 | | 4 | MESSI | JORDAN | 20 | 2 | | 4 | MESSI | JAMES | 20 | 2 | +----+---------+-------------+--------+-------+ In other words, I have to count how many subordinates by department got each manager and also show the name and deptno of the subordinates. I know how to easily associate the managers and subordinates with a JOIN but the problem is in the column of count. How can i count the total subordinates by department showing subordinates names at the same time ? I assume I can't use GROUP BY to count the number of subordinates in each department so I have no idea how to do this. Figured out thanks to mathguy's answer it is also possible to do a second join like : join original_table c on (e.deptno=c.deptno and e.mgr=c.mgr) so the count column will also show the intended result. A: Not sure how the analytic functions are implemented internally - it is possible Gordon's solution is EXACTLY the same as below. (Ordering of rows will probably be different - add an explicit ORDER BY if needed.) NOTE: I took your lead and named a column "count" - in general that is best avoided, as "count" is a reserved word (use "cnt" or something like it instead). select m.id, m.name, e.name, e.deptno, c.count from emps e join emps m on e.mgr = m.id join (select mgr,deptno, count(*) count from emps where mgr is not null group by mgr, deptno) c on e.mgr = c.mgr and e.deptno = c.deptno SQL> / ID NAME NAME DEPTNO COUNT ---------- ------ ------ ---------- ---------- 4 MESSI JORDAN 20 2 4 MESSI JAMES 20 2 4 MESSI AYEW 10 1 3 rows selected. Elapsed: 00:00:00.01
{ "perplexity_score": 173.9, "pile_set_name": "StackExchange" }
// MIT License - Copyright (c) Callum McGing // This file is subject to the terms and conditions defined in // LICENSE, which is part of this source code package using System; using LibreLancer; namespace LibreLancer.Interface { [UiLoadable] public class ImageFile : UiWidget { public string Path { get; set; } public bool Flip { get; set; } = true; public InterfaceColor Tint { get; set; } public bool Fill { get; set; } private Texture2D texture; private bool loaded = false; public override void Render(UiContext context, RectangleF parentRectangle) { if (!Visible) return; var myPos = context.AnchorPosition(parentRectangle, Anchor, X, Y, Width, Height); var myRectangle = new RectangleF(myPos.X, myPos.Y, Width, Height); if (Fill) myRectangle = parentRectangle; if(Background != null) Background.Draw(context, myRectangle); if (!loaded) { texture = context.Data.GetTextureFile(Path); loaded = true; } if (texture != null) { context.Mode2D(); var color = (Tint ?? InterfaceColor.White).Color; context.Renderer2D.DrawImageStretched(texture, context.PointsToPixels(myRectangle), color, Flip); } } } }
{ "perplexity_score": 3382.2, "pile_set_name": "Github" }
Previous parts of this book explored in detail all the components of the PL/SQL language: cursors, exceptions, loops, variables, etc. While you certainly need to know about these components when you write applications using PL/SQL, putting the pieces together to create well structured, easily understood, and smoothly maintainable programs is even more important. Because this module building process goes to the core of our purpose, it is absolutely the most critical technique for a programmer to master. Few of our tasks are straightforward. Few solutions can be glimpsed in an instant and immediately put to paper or keyboard. The systems we build are, for the most part, large and complex, with many interacting, if not sometimes conflicting, components. Furthermore, as users deserve, demand, and receive applications that are easier to use and vastly more powerful than their predecessors, the inner world of those applications becomes correspondingly more complicated. One of the biggest challenges in our profession today is to find a way to reduce the complexity of our environment. When faced with a massive problem to solve, a mind is likely to recoil in horror. Where do I start? How can I possibly figure out a way through that jungle of requirements and features? A human being is not a massively parallel computer. Even the brightest of our bunch have trouble keeping track of more than seven or eight tasks at one time. We need to break down huge, intimidating projects into smaller, more manageable components, and then further decompose those components into individual programs with an understandable scope. The best way to deal with having too much to deal with is to not deal with it all at once. Use top-down design, or "step-wise refinement," to break down a seemingly impossible challenge into smaller components. Computer scientists have developed comprehensive methodologies (for top-down design and other approaches) and performed studies on this topic -- I urge you to study their findings. When it comes to developing applications in PL/SQL, however, there is a very clear path you must take to reduce complexity and solve your problems: modularize your code! Modularization is the process by which you break up large blocks of code into smaller pieces -- modules -- which can be called by other modules. Modularization of code is analogous to normalization of data, with many of the same benefits (and a few additional advantages which accrue specifically to code). With modularization, your code becomes: More reusable. By breaking up a large program or entire application into individual components which "plug-and-play" together, you will usually find that many modules will be used by more than one other program in your current application. Designed properly, these utility programs could even be of use in other applications! More manageable. Which would you rather debug: a 10,000-line program or five individual 2,000 line programs that call each other as needed? Our minds work better when we can focus on smaller tasks. You can also test and debug on a smaller scale (unit test) before individual modules are combined for a more complicated system test. More readable. Modules have names and names describe behavior. The more you move or hide your code behind a programmatic interface, the easier it is to read and understand what that program is doing. Modularization helps you focus on the big picture rather than the individual executable statements. More reliable. The code you produce will have fewer errors. The errors you do find will be easier to fix because they will be isolated within a module. In addition, your code will be easier to maintain since there is less of it and it is more readable. Once you have mastered the different control, conditional, and cursor constructs of the PL/SQL language (the IF statement, loops, etc.), you are ready to write programs. You will not really be ready, however, to build an application until you understand how to create and combine PL/SQL modules. PL/SQL offers the following structures which modularize your code in different ways: Procedure A named PL/SQL block that performs one or more actions and is called as an executable PL/SQL statement. You can pass information into and out of a procedure through its parameter list. Function A named PL/SQL block that returns a single value and is used just like a PL/SQL expression. You can pass information into a function through its parameter list. Anonymous block An unnamed PL/SQL block that performs one or more actions. An anonymous block gives the developer control over scope of identifiers and exception handling. Package A named collection of procedures, functions, types, and variables. A package is not really a module (it's more of a meta-module), but is so tightly related to modules that I mention it here. I use the term module to mean either a function, a procedure, or an anonymous block, which is executed as a standalone script. As is the case with many other programming languages, modules can call other named modules. You can pass information into and out of modules with parameters. Finally, the modular structure of PL/SQL also integrates tightly with exception handlers to provide all encompassing error checking techniques. This chapter will first review the PL/SQL block structure and anonymous blocks, and then move on to procedures and functions. The final portion of the chapter is devoted to parameters and some advanced features of PL/SQL modules, including overloading and forward referencing.
{ "perplexity_score": 384.3, "pile_set_name": "Pile-CC" }
The Why Behind Madison Park Foods Meet Christine, the co-founder of Madison Park Foods. In this brief video, Christine explains her motivation behind the company and how her background fuels her passion for great popcorn and seasonings.
{ "perplexity_score": 563.4, "pile_set_name": "Pile-CC" }
2018 BBVA Open Ciudad de Valencia – Singles Irina Bara was the defending champion, but lost in the second round to Paula Badosa Gibert. Badosa Gibert went on to win the title, defeating Aliona Bolsova Zadoinov in the final, 6–1, 4–6, 6–2. Seeds Draw Finals Top half Bottom half References Main Draw BBVA Open Ciudad de Valencia - Singles
{ "perplexity_score": 371.2, "pile_set_name": "Wikipedia (en)" }
Self-control is critical to productivity at work. It keeps you from zoning out, losing your cool, and giving up easily. However, a large body of research suggests that exercising self-control in a broad range of situations, including resisting chocolate and choosing which household products to buy, can make you a less motivated and responsible decision maker. This phenomenon is known as ego depletion. So how can that self-control be restored? One promising avenue is self-affirmation, which has been proven to make people less defensive. Because defensiveness is an impulse, researchers are now studying whether self-affirmation affects other impulses as well. In one recent study, subjects did a self-control exercise that involved writing a story without using the letters a and n. Some of the subjects were then asked to write about a value that was important to them. The other subjects were instructed to write about why one value might be important to the average student. Finally, all the participants took a pain tolerance test, holding their hands in freezing water. Subjects who had just affirmed their basic values lasted about 30 seconds longer on average than members of the no-affirmation group, according to Texas A&M's Brandon Schmeichel, a co-author of this study. Thinking about values encourages abstract thinking, which has long been considered a key factor in self-control. This research has implications for the workplace. "Self-control is about competition between immediate and delayed gratification," Schmeichel says. "If you're tempted to take a shortcut instead of a principled decision, reminding yourself of your mission statement or anything that reorients you to the long term should help you make the right choice."
{ "perplexity_score": 255.7, "pile_set_name": "Pile-CC" }
#include <pangolin/pangolin.h> #include <pangolin/utils/argagg.hpp> #include <pangolin/utils/file_utils.h> #include <functional> #include <thread> #include "csv_data_loader.h" namespace argagg{ namespace convert { template<> pangolin::Rangef arg<pangolin::Rangef>(char const* str) { std::stringstream ss(str); pangolin::Rangef r; ss >> r.min; ss.get(); ss >> r.max; return r; } }} int main( int argc, char* argv[] ) { // Parse command line argagg::parser argparser {{ { "help", {"-h", "--help"}, "Print usage information and exit.", 0}, { "header", {"-H","--header"}, "Treat 1st row as column titles", 0}, { "x", {"-x"}, "X-axis series to plot, seperated by commas (default: '$i')", 1}, { "y", {"-y"}, "Y-axis series to plot, seperated by commas (eg: '$0,sin($1),sqrt($2+$3)' )", 1}, { "delim", {"-d"}, "Expected column delimitter (default: ',')", 1}, { "xrange", {"-X","--x-range"}, "X-Axis min:max view (default: '0:100')", 1}, { "yrange", {"-Y","--y-range"}, "Y-Axis min:max view (default: '0:100')", 1}, { "skip", {"-s","--skip"}, "Skip n rows of file, seperated by commas per file (default: '0,...')", 1}, }}; argagg::parser_results args = argparser.parse(argc, argv); if ( (bool)args["help"] || !args.pos.size()) { std::cerr << "Usage: Plotter [options] file1.csv [fileN.csv]*" << std::endl << argparser << std::endl << " where: $i is a placeholder for the datum index," << std::endl << " $0, $1, ... are placeholders for the 0th, 1st, ... sequential datum values over the input files" << std::endl; return 0; } // Default values const std::string xs = args["x"].as<std::string>("$i"); const std::string ys = args["y"].as<std::string>("$0"); const char delim = args["delim"].as<char>(','); const pangolin::Rangef xrange = args["xrange"].as<>(pangolin::Rangef(0.0f,100.0f)); const pangolin::Rangef yrange = args["yrange"].as<>(pangolin::Rangef(0.0f,100.0f)); const std::string skips = args["skip"].as<std::string>(""); const std::vector<std::string> skipvecstr = pangolin::Split(skips,','); std::vector<size_t> skipvec; for(const std::string& s : skipvecstr) { skipvec.push_back(std::stoul(s)); } if( !(skipvec.size() == 0 || skipvec.size() == args.count()) ) { std::cerr << "Skip argument must be empty or correspond to the number of files specified (" << args.count() << ")" << std::endl; return -1; } pangolin::DataLog log; CsvDataLoader csv_loader(args.all_as<std::string>(), delim); if(args["header"]) { std::vector<std::string> labels; csv_loader.ReadRow(labels); log.SetLabels(labels); } // Load asynchronously incase the file is large or is being read interactively from stdin bool keep_loading = true; std::thread data_thread([&](){ if(!csv_loader.SkipStreamRows(skipvec)) { return; } std::vector<std::string> row; while(keep_loading && csv_loader.ReadRow(row)) { std::vector<float> row_num(row.size(), std::numeric_limits<float>::quiet_NaN() ); for(size_t i=0; i< row_num.size(); ++i) { try{ row_num[i] = std::stof(row[i]); }catch(const std::invalid_argument& e){ std::cerr << "Warning: couldn't parse '" << row[i] << "' as numeric data (use -H option to include header)" << std::endl; } } log.Log(row_num); } }); pangolin::CreateWindowAndBind("Plotter", 640, 480); pangolin::Plotter plotter(&log, xrange.min, xrange.max, yrange.min, yrange.max, 0.001, 0.001); if( (bool)args["x"] || (bool)args["y"]) { plotter.ClearSeries(); std::vector<std::string> xvec = pangolin::Split(xs,','); std::vector<std::string> yvec = pangolin::Split(ys,','); if( !(xvec.size() == 1 || xvec.size() == yvec.size()) ) { std::cout << "x-series dimensions must be one, or equal to y-series dimensions" << std::endl; return -1; } for(size_t i=0; i < yvec.size(); ++i) { plotter.AddSeries( (xvec.size()==1) ? xvec[0] : xvec[i],yvec[i]); } } plotter.SetBounds(0.0, 1.0, 0.0, 1.0); pangolin::DisplayBase().AddDisplay(plotter); while( !pangolin::ShouldQuit() ) { glClear(GL_COLOR_BUFFER_BIT | GL_DEPTH_BUFFER_BIT); pangolin::FinishFrame(); } keep_loading = false; data_thread.join(); return 0; }
{ "perplexity_score": 1812.5, "pile_set_name": "Github" }
Use our Julian Apothecary Lamp beside the sofa for reading or on your desk as a task lamp. Designed in the style of traditional pharmacy lamps, the stem telescopes, so you can set it to the perfect height. Pivoting shade and adjustable neck allow you to focus light exactly where you need it.Julian Apothecary Lamp features:* Weighted base to prevent tipping* Crafted of steel* 60W max. With our Karen Floor Lamp, you get light where you need it and style where you want it. Glass barrel shade pivots up and down and adjusts in height along the stem. Exposed cord is covered in brown fabric to complete the vintage look. Karen Floor Lamp features: * Coordinates with our Karen Task Lamp* Antique Brass finish* In-line switch Miles designed this deco-style floor lamp to cast a small pool of light. "I like a pair tucked on the sides of a sofa, in addition to a shaded lamp," Miles explains. "It's another layer and another source of light." Telescoping arm lets you adjust it the ideal height.Mile Redd Deco Floor Lamp features:* Polished Nickel finish* Handmade of steel* Premium brass socket* 3-way metal switch* Fabric cove... The shapely stack of graduated spheres and glossy color make our Lauren Table Lamp a striking accent on the desktop, side table or in the bedroom. Topped with a white linen tapered drum shade.Lauren Table Lamp features:* Crafted of ceramic* Fashion-forward look* 3 way switch* Works with our favorite seasonal fabrics With our Couture Drum lamp shade, you can dress your lamp up or down to suit the mood and occasion. Go from warm and cozy colors in winter to lighter and brighter for spring. Couture Drum Shade features: * Mix & match versatility* Hand finished
{ "perplexity_score": 1792.8, "pile_set_name": "Pile-CC" }
MATSOL Blog Low Incidence Programs The Low Incidence Special Interest Group (SIG) is a group for PK-12 educators working in low incidence districts in Massachusetts. The goal of the Low Incidence SIG is to provide ongoing support to educators who struggle with implementation of state and federal mandates for English learner education due to their low numbers of ELL students. Some of our activities include
{ "perplexity_score": 334.5, "pile_set_name": "Pile-CC" }
Pediatric wartime admissions to US military combat support hospitals in Afghanistan and Iraq: learning from the first 2,000 admissions. Humanitarian and civilian emergency care accounts for up to one-third of US military combat support hospital (CSH) admissions. Almost half of these admissions are children. The purpose of this study is to describe the features of pediatric wartime admissions to deployed CSHs in Iraq and Afghanistan. A retrospective database review was conducted using the Patient Administration Systems and Biostatistics Activity. Details of 2,060 pediatric admissions to deployed CSHs were analyzed. Nontraumatic diagnoses were responsible for 25% of all pediatric admissions. Penetrating injuries (76.3%) dominate the trauma admissions. The primary mechanisms of injury were gunshot wound (39%) followed by explosive injuries (32%). Categorizing the injuries by location revealed 38.3% extremity wounds, 23.6% torso injuries, 23.5% head, face, and neck injuries, and 13.3% burns. More than half of the children required two or more invasive or surgical procedures, 19.8% needed a transfusion, and 5.6% required mechanical ventilation. The mortality rate was 6.9%. The primary cause of death involved head trauma (29.5%) and burns (27.3%), followed by infectious diagnoses (7.2%). The case fatality rate for head injury and burn patients was 20.1% and 15.9%, respectively, in contrast to the fatality rate for all other diagnoses at 3.8% (p < 0.01). Excluding emergency department deaths, mortality rates for Afghanistan (6.2%) and Iraq (3.9%) significantly differ (p < 0.02). Pediatric patients account for approximately 10% of all CSH admissions in Afghanistan and Iraq. Burns and penetrating head injury account for the majority of pediatric mortality at the CSH.
{ "perplexity_score": 392.6, "pile_set_name": "PubMed Abstracts" }
Q: c++ error converting *char to int I have a char array that I need converted to int so that I can do math against the values. Right now the closest I can get is -> error: request for member 'str' in 'myData', which is of non-class type 'char*' code: char *getmyData() { static char buff[BUFSIZ]; FILE *fp = popen("php script.php 155", "r"); std::fgets(buff,sizeof(buff),fp); return buff; } void mathFunc(){ char *myData = getmyData(); for (int i = 0; myData[i]; ++i) { int x; const char * cstr2 = myData.str().c_str(); cstr2 >> x; for (int i = 0; i < size; ++i) cout << x[i] + 10; } } error: # g++ -g myDataunfuck.cpp -o myDataunfuck.o -std=gnu++11 -lcurl myDataunfuck.cpp: In function 'void mathFunc()': myDataunfuck.cpp:30:31: error: request for member 'str' in 'myData', which is of non-class type 'char*' myDataunfuck.cpp:31:12: error: invalid operands of types 'const char*' and 'int' to binary 'operator>>' myDataunfuck.cpp:32:23: error: 'size' was not declared in this scope myDataunfuck.cpp:33:15: error: invalid types 'int[int]' for array subscript myDataunfuck.cpp:44:1: error: a function-definition is not allowed here before '{' token myDataunfuck.cpp:47:1: error: expected '}' at end of input complete code A: You can simply do the following:- const char * cstr2 = myData;
{ "perplexity_score": 2711.1, "pile_set_name": "StackExchange" }
Q: Charles is not registering the localhost charles traffic I am using charles to get the traffic of some devices and it is working corectly. But for some reason it is not registering the traffic from the browser, specifically from localhost, for example: http://localhost:8080/apis/v1/homefeed?index=mobilefrontpage&hsvPubkey=espn-en-homescreen-video-qa&platform=android&profile=sportscenter_v1&locale=co&version=21&device=handset&lang=en&region=us&appName=espnapp&swid=57cb001d-71cb-4e37-a7a0-265d275e6752&enableHero=true&authorizedNetworks=buzzerbeater,espn1,espn2,espn3,espn_free,espnclassic,espndeportes,espnews,espnu,goalline,longhorn,sec&hasMVPDAuthedEver=false&freePreviewTimeAvailable=10&isAuthenticated=false&content=26199860 This petitiion is not registered in charles and I need to mock this one with some of its internal calls, but now it is not possible, because for the charles issue. I tried to use: http://localhost.charlesproxy.com, but I am getting a 404 issue. Any ideas? Thanks A: Using http://localhost.charlesproxy.com is the right choice. You get 404 because the expected resource in URL does not exist. It has nothing to do with Charles and HTTP proxy. According to Charles document: Some systems are hard coded to not use proxies for localhost traffic, so when you connect to http://localhost/ it doesn't show up in Charles. The workaround is to connect to http://localhost.charlesproxy.com/ instead. This points to the IP address 127.0.0.1, so it should work identically to localhost, but with the advantage that it will go through Charles. Actually, you can use any domain that point to 127.0.0.1, not just http://localhost.charlesproxy.com. For example, I have a domain donghz.com which is resolved to 127.0.0.1, you can access http://donghz.com:8080/apis/v1/home... and get the same response too, with HTTP intercepted by Charles.
{ "perplexity_score": 1208, "pile_set_name": "StackExchange" }
On Sunday, with English-speaking Protestant churches in short supply in The Eternal City, I took advantage of streaming audio but also decided to observe the 10:00 Mass at the Basilica of St. John Lateran. When in Rome do as some of the Romans do (I say some because the Saturday before Pentecost Sunday, Romans turned out loudly and brightly for a gay pride parade). While observing the proceedings, which included a Cardinal and about 25 assistants with the liturgy (how do they pay them all?), a choir that sang better than the liturgical music I’ve heard in U.S. Roman Catholic parishes but that did not hold a candle to the evensong performances in Christ’s Church Cathedral (Dublin) or St. Mary’s Cathedral (Edinburgh), and a surfeit of images (statues, paintings, tile work in the ceiling, I couldn’t help but think that U.S. Roman Catholics who worship in Rome must feel a tad underwhelmed when they return to their home parish. Rome simply has more stuff than Lansing, Michigan. In fact, place seems to matter for Roman Catholicism in ways that rival Judaism and Islam — certain locales are holy and function as the spiritual capital for the faith. In comparison, I can return to the States (in a week or so) after worshiping with Presbyterians in Dublin and Edinburgh and not think twice about missing the liturgical bling — and I can say that even while admitting Presbyterianism’s debt to the Scots, and to the charms of what might qualify as Presbyterianism’s capital city — Edinburgh. For Presbyterians, worship doesn’t depend on the tie between the minister and another church official, nor does it include relics or objects that point to holy persons who inhabited that space. The services in Dublin and Edinburgh were not any more special or meaningful because they were closer to Presbyterianism’s original space. That would seem to confirm Jesus’ point to the Samaritan woman at the well that Christian worship depends not on place or space but on word and Spirit. Sure, that’s a root-for-the-home-team point. But it does account for the lack of liturgical envy among New World Presbyterians. On the other side of the Atlantic, the Spirit and the word are just as much a part of worship as in the Presbyterian heartland.
{ "perplexity_score": 263.5, "pile_set_name": "OpenWebText2" }
1. Introduction =============== *Erwinia amylovora* is the type species of the genus *Erwinia* that belongs to the family *Enterobacteriaceae*. As is common in bacterial taxonomy in recent years, there have been a continuous description of novel *Erwinia* species as well as some species have been reclassified and transferred to other genera (<http://www.bacterio.net>). Most members of this genus cause diseases in plants and, historically, it is important to remember that *E. amylovora* was the first bacterium demonstrated to cause disease in plant, a discovery made in the late 1800s, at the same period as a similar discovery with human and animal diseases \[[@B1-ijms-16-12836],[@B2-ijms-16-12836]\]. *E. amylovora* causes fire blight, a devastating plant disease affecting a wide range of host species within the *Rosaceae* subfamily Spiraeoideae, and is a major global threat to commercial apple and pear production. Moreover strains infecting plants in the genus *Rubus* belonging to the subfamily Rosoideae, including blackberry and raspberry, have also been reported \[[@B3-ijms-16-12836],[@B4-ijms-16-12836],[@B5-ijms-16-12836],[@B6-ijms-16-12836],[@B7-ijms-16-12836]\]. In the last two centuries this pathogen has spread worldwide \[[@B6-ijms-16-12836],[@B7-ijms-16-12836],[@B8-ijms-16-12836]\] and, in consequence, *E. amylovora* has been cataloged as a quarantine organism in the European Union, where it is subject to phytosanitary legislation \[[@B8-ijms-16-12836]\], and, recently, has been included in the top 10 plant pathogenic bacteria published in the journal *Molecular Plant Pathology* \[[@B9-ijms-16-12836]\]. Among the limited number of control options currently available, prophylactic application of antibiotics (e.g., streptomycin or oxytetracycline) during the bloom period appears most effective \[[@B10-ijms-16-12836]\]. However, regulatory restriction, public health concerns, and pathogen resistance development severely limit the long-term prospects of antibiotic use \[[@B11-ijms-16-12836],[@B12-ijms-16-12836]\]. Biological control measures may offer promising alternatives to minimize or even substitute the use of antibiotics, and to mitigate occurrence of resistance \[[@B5-ijms-16-12836],[@B13-ijms-16-12836]\]. In the pathogenesis of *E. amylovora*, pathogen cells enter plants through the nectarthodes of flowers and other natural openings, such as wounds, and are capable of rapid movement within plants and the establishment of systemic infections \[[@B14-ijms-16-12836],[@B15-ijms-16-12836],[@B16-ijms-16-12836],[@B17-ijms-16-12836]\]. In susceptible hosts, bacteria first move through the intercellular spaces of parenchyma and, in a later stage, in the xylem vessels, thus provoking extensive lesions, and sometimes complete dieback of the tree, under favorable climatic conditions. The diseased parts of the plant become brown or black, as if they had been swept by fire \[[@B17-ijms-16-12836]\]. Many virulence determinants of *E. amylovora* have been characterized, including the Type III secretion system (T3SS), the exopolysaccharide (EPS) amylovoran, biofilm formation, and motility \[[@B15-ijms-16-12836],[@B18-ijms-16-12836]\]. To successfully establish an infection, *E. amylovora* uses a complex regulatory network to sense the relevant environmental signals and coordinate the expression of early and late stage virulence factors involving two component signal transduction systems, bis-(3′-5′)-cyclic di-GMP (c-di-GMP) and quorum sensing \[[@B15-ijms-16-12836]\]. In the present review, we present the recent findings on virulence factors of *E. amylovora* research, focusing on their role in bacterial pathogenesis and on the aspects that deserve future research. 2. Virulence Factors ==================== *E. amylovora* is highly virulent and capable of rapid systemic movement within plant hosts and of rapid dissemination among rosaceous species, including apple and pear trees, when environmental conditions are favorable. The internal movement of the pathogen through the vascular system of plants and the ability of the pathogen to infect flowers, actively growing shoots, and rootstocks makes the management of fire blight difficult \[[@B14-ijms-16-12836],[@B19-ijms-16-12836]\]. It has been shown that two major virulence determinants are required for *E. amylovora* to infect and cause disease on host plants: the EPS amylovoran and the Hrp type III secretion system (T3SS) \[[@B20-ijms-16-12836]\]. Previous results demonstrated that *E. amylovora* forms a biofilm *in vitro* and *in planta* \[[@B19-ijms-16-12836],[@B21-ijms-16-12836],[@B22-ijms-16-12836]\]. 2.1. Exopolysaccharides (EPS) Amylovoran and Levan -------------------------------------------------- Exopolysaccharides (EPS) have been suggested to play a key role in bypassing the plant defense system, in disturbing and obstructing the vascular system of the plant and in protecting the bacteria against water and nutrient loss during dry conditions \[[@B19-ijms-16-12836],[@B23-ijms-16-12836],[@B24-ijms-16-12836],[@B25-ijms-16-12836]\]. Previous work has demonstrated that EPS is an important element in the biofilm formation of *E. amylovora*, enabling the bacteria to attach to several surfaces and to each other \[[@B19-ijms-16-12836],[@B21-ijms-16-12836],[@B26-ijms-16-12836]\]. Amylovoran has been shown to be the main factor necessary for biofilm formation, and levan is a contributing factor \[[@B21-ijms-16-12836],[@B24-ijms-16-12836]\], the quantity of amylovoran produced by individual *E. amylovora* strains being correlated with the degree of virulence \[[@B24-ijms-16-12836],[@B27-ijms-16-12836]\]. Amylovoran is a polymer of a pentasaccharide repeating unit that generally consists of four galactose residues and one glucuronic acid residue \[[@B24-ijms-16-12836],[@B27-ijms-16-12836],[@B28-ijms-16-12836]\]. The molecular size of amylovoran is influenced by several environmental conditions and cell-metabolism-related factors \[[@B24-ijms-16-12836],[@B29-ijms-16-12836]\]. The strains of *E. amylovora* that do not have the capacity to produce amylovoran are non-pathogenic and are unable to spread in plant vessels \[[@B24-ijms-16-12836],[@B30-ijms-16-12836]\]. The amylovoran synthesis (*ams*) gene cluster involved in the biosynthesis of amylovoran produces 12 *ams*-encoded gene products (AmsA to AmsL). AmsC, AmsH, and AmsL are believed to be involved in oligosaccharide transport and assembly, while AmsA possesses a tyorisine kinase activity. AmsB, AmsD, AmsE, AmsG, AmsJ, and AmsK proteins appear to play a part in annealing the different galactose, glucuronic acid, and pyruvyl subunits to the lipid carrier in order to form an amylovoran unit. AmsF may process newly synthesized repeating units and/or be involved in their polymerization by adding them to an existing amylovoran chain. Finally, AmsI seems to have a distinct function in recycling of the diphosphorylated lipid carrier after release of the synthesized repeating unit \[[@B24-ijms-16-12836],[@B31-ijms-16-12836],[@B32-ijms-16-12836],[@B33-ijms-16-12836]\]. Levan is another EPS produced by *E. amylovora*, considered as a virulence factor \[[@B19-ijms-16-12836],[@B34-ijms-16-12836]\]. It has been shown that the lack of levan synthesis can result in a slow development of symptoms in the host plant \[[@B24-ijms-16-12836],[@B35-ijms-16-12836]\]. The specific role of levan in pathogenesis is still unknown and deserves further research. Interestingly, in recent studies, it has been demonstrated that the depolymerase (DpoL1) encoded by the T7-like *E. amylovora* phage L1 efficiently degrades amylovoran. Exposure of the bacteria to either L1 phage or recombinant DpoL1 led to EPS degradation and a phenotype similar to the one observed with EPS mutants. The enzyme strips the cells, thereby paving the way for infection by providing access of L1 phage to the cell wall, and also facilitating the infection by other phages, as Dpo-negative Y2 phages \[[@B5-ijms-16-12836]\]. 2.2. Type III Secretion System (T3SS) ------------------------------------- The type III secretion system (T3SS) is one of the important virulence factors used by *E. amylovora* in order to successfully infect its hosts \[[@B24-ijms-16-12836],[@B36-ijms-16-12836]\]. As with other Gram negative phytopathogenic bacteria, *E. amylovora* uses this evolutionarily conserved secretion system to export and deliver effector proteins into the cytosol of host plant cells through a pilus-like structure, which forms the central core element of T3SS \[[@B24-ijms-16-12836]\] ([Figure 1](#ijms-16-12836-f001){ref-type="fig"}). *E. amylovora* pathogenicity relies on a type III secretion system and on a single effector DspA/E. This effector belongs to the widespread AvrE family of effectors whose biological function is not fully understood \[[@B37-ijms-16-12836]\]. T3SS is composed of a large, cylindrically shaped macromolecular complex organized into a series of ring-like structures with inner rings, outer rings and neck structure. It is embedded in the inner and outer membrane of the bacteria, while spanning the periplasmic membrane and extending into the extracellular environment with a pilus filament \[[@B24-ijms-16-12836],[@B37-ijms-16-12836]\] ([Figure 1](#ijms-16-12836-f001){ref-type="fig"}). It has been shown that T3SS occurs only at the site of Hrp pilus assembly and that pilus guides the transfer of effector proteins outside the bacterial cell, favoring the "conduit/guiding filament" model \[[@B37-ijms-16-12836]\] ([Figure 1](#ijms-16-12836-f001){ref-type="fig"}). The T3SS of plant-pathogenic bacteria is mainly made out of Hrc proteins, encoded by *hrp*-conserved (*hrc*) genes among plant-pathogenic bacteria and Hrp proteins, encoded by hypersensitive response and pathogenicity (*hrp*) genes. In *E. amylovora*, *hrc* and *hrp* genes are clustered in a pathogenicity island, which contains four regions, *i.e.*, an *hrc*/*hrp* region, an Hrc effectors and elicitors region, an Hrp-associated enzymes region, and an island transfer region \[[@B24-ijms-16-12836],[@B38-ijms-16-12836]\]. ![Schematic representation of the T3SS from plant pathogenic bacteria \[[@B39-ijms-16-12836]\] (modified from \[[@B39-ijms-16-12836]\], with permission from American Society of Plant Biologists).](ijms-16-12836-g001){#ijms-16-12836-f001} 2.3. Curli ---------- Curli are the major proteinaceous component of a complex extra-cellular matrix produced by many *Enterobacteriaceae*, including *E. amylovora*. Curli fibres are known to be involved in adhesion to surfaces, cell aggregation and biofilm formation. Curli can also mediate host cell adhesion and invasion and they stimulate the host inflammatory responses \[[@B19-ijms-16-12836],[@B40-ijms-16-12836],[@B41-ijms-16-12836]\]. The structure and biogenesis of curli are unique among the bacterial fibres that have been described to date, belonging to a growing class of fibres, known as amyloids, which are associated with diverse neurological diseases in humans. Curli fibres are 4--6 nm-wide and, like other amyloid fibres, are β sheet-rich self-assembling protein polymers that are resistant to chemical and temperature denaturation, and to digestion by proteinases \[[@B41-ijms-16-12836]\]. Recent results have showed reductions in virulence due to deletion of a regulator of curli genes, *crl*, suggesting that not only functional attachment but also mature biofilm formation is needed for full virulence in the host \[[@B19-ijms-16-12836]\]. Further research is necessary to charaterize the chemical structures and genes encoding this structure and its specific role in pathogenicity, as it is also in process for other Enterobacteria as *E. coli* or *Salmonella* \[[@B40-ijms-16-12836]\]. 2.4. Biofilm Formation ---------------------- In addition to the specific role of the exopolysaccharides amylovoran and levanin in the biofilm formation of *E. amylovora*, as mentioned above, a recent study has suggested that type I fimbriae, flagella, type IV pili, and curli of *E. amylovora* may contribute to biofilm formation in static and flowing environments and that defects in many of the genes encoding these appendages result in decreased virulence in planta \[[@B19-ijms-16-12836]\]. Previous results of the same group demonstrated that *E. amylovora* forms a biofilm *in vitro* and *in planta* \[[@B19-ijms-16-12836],[@B21-ijms-16-12836]\]. Pathogenesis and biofilm formation appear to be linked, but without identifying genes encoding traits independent of amylovoran production, the mechanistic role in virulence of biofilm formation in *E. amylovora* could not be studied. Interestingly, mutants with reduced biofilm-formation ability appear unable to successfully establish large populations in apple xylem. Colonization of xylem is critical to the systemic movement of the pathogen through plants \[[@B19-ijms-16-12836],[@B22-ijms-16-12836]\]. Therefore, biofilm-deficient mutants remain localized within an inoculated leaf and are strongly impaired in the ability to invade the rest of the plant \[[@B19-ijms-16-12836]\]. In a study using a bioinformatic approach and the recently sequenced genome of *E. amylovora* \[[@B19-ijms-16-12836],[@B42-ijms-16-12836],[@B43-ijms-16-12836]\], genes encoding putative cell surface attachment structures were identified \[[@B19-ijms-16-12836]\]. A time course assay indicated that type I fimbriae function earlier in attachment, while type IV pilus structures appeared to function later in attachment. Deficiencies in type I fimbriae lead to an overall reduction in *E. amylovora* virulence. By deletion of individual genes and gene clusters and using a combination of *in vitro* attachment assays and plant virulence assays it was demonstrated that multiple attachment structures are present in *E. amylovora* and play a role in mature biofilm formation, which is critical to pathogenesis and systemic movement in the host ([Figure 2](#ijms-16-12836-f002){ref-type="fig"}). In contrast, a fully functional biofilm was not necessary to survival and growth *in planta* \[[@B19-ijms-16-12836]\]. Although the mechanistic details behind biofilm formation remain largely unknown and genetic and structural analyses should be done for full characterization of these structures, it is suggested that they are formed in response to environmental triggers \[[@B24-ijms-16-12836],[@B44-ijms-16-12836]\] and quorum sensing signals \[[@B24-ijms-16-12836],[@B45-ijms-16-12836]\]. ![Images of putative attachment structures of *E. amylovora* \[[@B19-ijms-16-12836]\] (adapted from \[[@B19-ijms-16-12836]\], with permission from American Society for Microbiology). (**A**) TEM imaging of a planktonic *E. amylovora* cell grown in broth culture and negatively stained. Peritrichous flagella are indicated by arrows (scale: 1 µm); (**B**) TEM image of *E. amylovora* in planta. Putative attachment structures connect bacterial cells to host cells (scale: 1 µm); (**C**) SEM image of *E. amylovora* cells found within a biofilm, with multiple appendages that protrude from the bacterial cell and attach to the host surface, as indicated by the arrows (scale: 2 µm).](ijms-16-12836-g002){#ijms-16-12836-f002} 2.5. Motility ------------- *E. amylovora* is a nonobligate pathogen able to survive outside the host under starvation conditions, allowing its spread by various means, such as rainwater \[[@B46-ijms-16-12836]\]. In fact, motility mechanisms have been shown to be of relevance for the survival of the bacteria ouside the host \[[@B46-ijms-16-12836]\] and also for the attachment to the host cell surfaces, together with other virulence factors as type IV pili, type I fimbriae and curli by biofilm formation \[[@B19-ijms-16-12836]\]. In different studies, long peritrichous flagella have been observed ([Figure 2](#ijms-16-12836-f002){ref-type="fig"}) \[[@B19-ijms-16-12836],[@B46-ijms-16-12836]\], although chemical structural data have not been published yet. In a study where two of the four gene clusters encoding the production and regulation of flagella in *E. amylovora* were deleted, various effects of flagella on biofilm formation and virulence were demonstrated. Results obtained also showed that flagellum production appeared to be controlled by multiple gene clusters that may function independently. Consequently, it was suggested that the flagella of *E. amylovora* have multifaceted functions in the biofilm formation process \[[@B19-ijms-16-12836]\]. Swarming motility has also been described in *E. amylovora* \[[@B15-ijms-16-12836],[@B47-ijms-16-12836]\], although, as in other *Enterobacteria*, its role remains unknown, requiring further research. *E. amylovora* responses to starvation revealed that cells lost motility but most of them exhibited long peritrichous flagella attached to the bacterial surface. Motility inactivation during starvation would be reversible since flagella could enable a rapid recovery of motility under favorable conditions \[[@B46-ijms-16-12836]\]. 2.6. Lipopolysaccharide (LPS) ----------------------------- LPS is a factor that has been described recently to be involved in the virulence of *E. amylovora* \[[@B48-ijms-16-12836]\], although the complete chemical structure of LPS and its relationship with the pathogenicity has not yet been described. Interestingly, in *Erwinia carotovora*, a comprehensive physicochemical analysis of highly purified mono- and bis-phosphoryl hexa- to heptaachyl and pentaacyl lipid A part structures has been published. The distinct differences observed between different Lipid A structures could explain differences in the biological activity, such as the cytokine inducing activity \[[@B49-ijms-16-12836]\]. At the genetic level, comparative genomic analysis revealed differences in the LPS biosynthesis gene cluster between the *Rubus*-infecting strain ATCC BAA-2158 and the Spiraeoideae-infecting strain CFBP 1430 of *E. amylovora*. These differences were restricted to the core region that could be involved in a process of adaptation to the new host. Genetic differences observed in the LPS biosynthetic gene cluster corroborate *rpoB*-based phylogenetic clustering of *E. amylovora* into four different groups and enable the discrimination of Spiraeoideae- and *Rubus*-infecting strains \[[@B48-ijms-16-12836]\]. 2.7. Metalloprotease PrtA ------------------------- A metalloprotease with a molecular mass of 48 kDa secreted by *E. amylovora* has been characterized \[[@B50-ijms-16-12836]\]. The protease is apparently secreted into the external medium through the type I secretion pathway via PrtD, PrtE, and PrtF, which share more than 90% identity with the secretion apparatus for lipase of *S. marcescens* \[[@B50-ijms-16-12836]\]. A gene cluster encodes four genes connected to protease expression, including a structural gene (*prtA*) and three genes (*prtD*, *prtE*, *prtF*) for secretion of the protease, which are transcribed in the same direction. The organization of the protease gene cluster in *E. amylovora* is different from that in other Gram-negative bacteria, such as *Erwinia chrysanthemi*, *Pseudomonas aeruginosa*, and *Serratia marcescens*. On the basis of the conservative motif of metalloproteases, PrtA has been identified to be a member of the metzincin subfamily of zinc-binding metalloproteases, and has been confirmed to be the 48 kDa protease on gels by sequencing of tryptic peptide fragments derived from the protein \[[@B50-ijms-16-12836]\]. In a protease mutant created by mutations with Tn 5--insertions in the *prtD* gene, the lack of protease reduced colonization of an *E. amylovora* secretion mutant, labeled with the gene for the green fluorescent protein (*gfp*) in the parenchyma of apple leaves \[[@B50-ijms-16-12836]\]. Further research is necessary, however, to assess its structural characteristics, activity, substrates, the specific role of this metalloprotease in the pathogenic mechanisms of *E. amylovora*, and also the possible practical applications of this protein, based on the differences observed with other Gram negative bacteria, as already proposed for this interesting wide family of proteins \[[@B51-ijms-16-12836]\]. 2.8. Iron-Scavenging Siderophore Desferrioxamine ------------------------------------------------ Under iron-limiting conditions, *E. amylovora* CFBP 1430 produces hydroxamate-type siderophores \[[@B52-ijms-16-12836]\], characterized as cyclic desferrioxamines (DFOs), mostly DFO E \[[@B53-ijms-16-12836],[@B54-ijms-16-12836]\] and the specific receptor FoxR, a 70,000-Da protein needed for the passage of ferric complexes across the outer membrane \[[@B17-ijms-16-12836],[@B54-ijms-16-12836]\]. Several iron uptake negative mutants of *E. amylovora* CFBP 1430 isolated by insertional mutagenesis have been identified. In mutant VD61, the mutation (dfo-61::MudIIpR13) disrupts the DFO biosynthetic pathway; in VD17, the mutation (foxR-17::MudIIpR13) affects the synthesis of the FoxR receptor and the mutant accumulates DFO in the external medium because of its failure to transport back the DFO ferric complex \[[@B17-ijms-16-12836],[@B54-ijms-16-12836]\]. In the pathogenic analysis of these mutants, results obtained demonstrated that, in *E. amylovora*, production of DFOs is a critical function for bacterial iron acquisition during pathogenesis, as well as for bacterial induction of electrolyte leakage from plant cells \[[@B17-ijms-16-12836]\]. Based on this, a dual role of DFO during plant/*E. amylovora* interactions has been proposed \[[@B17-ijms-16-12836]\], which deserve further research. 2.9. Multidrug Efflux Pump AcrAB -------------------------------- During pathogenesis, *E. amylovora* is exposed to a variety of plant-borne antimicrobial compounds, which in the case of plants of *Rosaceae*, many are constitutively synthesized as isoflavonoids \[[@B22-ijms-16-12836]\]. Then, bacterial multidrug efflux transporters, which mediate resistance toward structurally-unrelated compounds, might confer tolerance to these antimicrobial compounds (phytoalexins) \[[@B22-ijms-16-12836]\]. In this regard, it has been observed that clonation of the *acrAB* locus from *E. amylovora*, encoding a resistance nodulation division-type transport system, in *E. coli* conferred resistance to hydrophobic and amphiphilic toxins \[[@B22-ijms-16-12836]\]. An *acrB*-deficient *E. amylovora* mutant was impaired in virulence on apple rootstock MM 106 and was susceptible toward extracts of leaves of MM 106, as well as to the apple phytoalexins phloretin, naringenin, quercetin, and (+)-catechin \[[@B22-ijms-16-12836]\]. These results strongly suggest that the AcrAB transport system plays an important role as a protein complex required for the virulence of *E. amylovora* in resistance toward apple phytoalexins and that it is required for successful colonization of a host plant \[[@B22-ijms-16-12836]\]. 2.10. Other Virulence Factors ----------------------------- Other virulence factors of *E. amylovora* have been proposed, as the case of the sorbitol transporter, encoded by the *srl* operon \[[@B55-ijms-16-12836]\]. It has been shown that expression of the *srl* operon in *E. amylovora* is high in the presence of sorbitol in medium and is repressed by glucose. Mutants with a sorbitol deficiency were still virulent on slices of immature pears, but were unable to cause significant fire blight symptoms on apple shoots. Since sorbitol is used for carbohydrate transport in host plants of *E. amylovora*, this sugar alcohol has been proposed to be an important factor in determining host specificity for the fire blight pathogen \[[@B55-ijms-16-12836]\]. Moreover, Rosaceous plants also contain sucrose as storage and transport carbohydrates \[[@B56-ijms-16-12836],[@B57-ijms-16-12836],[@B58-ijms-16-12836]\]. The regulation and biochemistry of sucrose metabolism of *E. amylovora* has also been studied, demonstrating that sucrose mutants (in the *scr* regulon), created by site-directed mutagenesis, did not produce significant fire blight symptoms on apple seedlings, thus, indicating the importance of sucrose metabolism for colonization of host plants by *E. amylovora* \[[@B58-ijms-16-12836]\]. 3. Genetics =========== The genome of *E. amylovora* consists of a circular chromosome of 3,805,874 bp and two plasmids: AMYP1 (28,243 bp), also reported as PEA29, and the larger plasmid AMYP2 (71,487 bp), also named pEA72. The small size of the *E. amylovora* genome (3.8 Mb) in comparison with most free-living enterobacteria, including plant pathogens, with genomes of 4.5--5.5 Mb, and the preponderance of pseudogenes, genome reduction can have occurred via mutational inactivation and subsequent deletion and, as a consequence, has led to the loss of most of the genes involved in anaerobic respiration and fermentation found in typical, related enterobacteria, with the consecuent reduction of the capacity to live in anaerobic environments \[[@B42-ijms-16-12836]\]. The genome sequence of *E. amylovora* has revealed clear signs of pathoadaptation to the rosaceous plant environment. For example, T3SS-related proteins are more similar to proteins of other plant pathogens than to proteins of closely related enterobacteria \[[@B42-ijms-16-12836]\]. Comparative genomic analysis of 12 strains representing distinct populations (e.g., geographic, temporal, host origin) of *E. amylovora* has allowed to describe the pan-genome of this species. The pan-genome contains 5751 coding sequences and is a highly conserved relative to other phytopathogenic bacteria, comprising on average 89% conserved core genes. While the chromosones of Spiraeoideae-infecting strains are highly homogeneous, greater genetic diversity was observed between Spiraeoideae- and *Rubus*-infecting strains (and among individual *Rubus*-infecting strains) \[[@B20-ijms-16-12836]\]. Using molecular approaches based on the study of repetitive elements, such as Multiple Loci Variable Number of Tandem Repeats Analysis (MLVA) \[[@B59-ijms-16-12836]\] or sequencing of Clustered Regularly Interspaced Short Palindromic Repeats (CRISPR) \[[@B60-ijms-16-12836]\], this diversity has also been especially observed among strains isolated from *Rubus* plants and, to a lesser extent, in Spiraeoideae-infecting strains \[[@B48-ijms-16-12836]\]. In comparison with other plant pathogens, however, *E. amylovora* has relatively low genetic diversity, with a limited genetic recombination, this being associated with its exposure to limited selection pressures due to pome fruit breeding strategically favoring only high-valued varieties, which are often highly susceptible to fire blight \[[@B20-ijms-16-12836],[@B61-ijms-16-12836],[@B62-ijms-16-12836]\]. On the basis of the current available data, it has been hypothesized that the critical event for adaptation to *Rubus* spp. took place after species separation of *E. amylovora* and *E. pyrifoliae*, as the Spiraeoideae infecting isolates of *E. amylovora* and *E. pyrifoliae* (including Japanese strains), as well as *E. tasmaniensis* and *E. piriflorinigrans*, all sharing the Spiraeoideae-type LPS biosynthetic cluster \[[@B48-ijms-16-12836]\]. Interestingly, genome sequencing of three Mexican *E. amylovora* strains have revealed an *rpsL* chromosal mutation conferring high-level of streptomycin resistance \[[@B63-ijms-16-12836]\]. This chromosomal mutation is the predominant *E. amylovora* mechanism, typically appearing after years of intensive application with long persistence in populations \[[@B10-ijms-16-12836],[@B63-ijms-16-12836]\], explaining the observed inefficacy of streptomycin in Mexico \[[@B63-ijms-16-12836],[@B64-ijms-16-12836]\] and underscoring the need of revision of pesticide use strategies to avoid similar resistance evolution against other antimicrobial drugs as oxytetracycline or gentamicin \[[@B63-ijms-16-12836]\]. The expression of genes related to starvation, oxidative stress, motility, pathogenicity, and virulence have been detected during the entire experimental period with different regulation patterns observed during the first 24 h. Further, starved cells remained as virulent as nonstressed cells. Overall, these results provide new knowledge on the biology of *E. amylovora* under conditions prevailing in nature, which could contribute to a better understanding of the life cycle of this pathogen \[[@B46-ijms-16-12836]\]. No major differences among 12 strains of *E. amylovora* were reported in the amylovoran biosynthesis cluster (\>98% amino acid indentity across the whole region) \[[@B20-ijms-16-12836]\]. Variation, however, has been observed in the Hrp cluster, a pathogenicity island that encodes the hypersensitive response and pathogenicity (hrp) T3SS and the majority of known T3SS effector proteins \[[@B20-ijms-16-12836],[@B38-ijms-16-12836]\]. Variation was identified in HrpK, the putative chaperones OrfA and OrfC (which varied between host specific grouping of *Rubus*- and Spiraeoideae-infecting strains) and, more significantly, Eop 1, which has been shown to function as a host-limiting factor \[[@B20-ijms-16-12836],[@B38-ijms-16-12836],[@B65-ijms-16-12836],[@B66-ijms-16-12836]\]. Three gene clusters related to the Type 6 Secretion System (T6SS) have also been identified in *E. amylovora* \[[@B20-ijms-16-12836],[@B43-ijms-16-12836]\], although their exact role in this species is unknown \[[@B20-ijms-16-12836]\] and should deserve further research. In other bacteria, T6SS has been shown to play a significant role in bacterial-bacterial and bacterial-host interactions, suggesting a role for niche specialization \[[@B67-ijms-16-12836]\]. 4. Regulation of Virulence Factors ================================== 4.1. Two Component Transduction Systems --------------------------------------- The phoPQ two component transduction system has been genetically characterized in *E. amylovora* \[[@B68-ijms-16-12836]\] and it has been demonstrated that this system in *E. amylovora* plays major roles in virulence on immature pear fruit and in regulating amylovoran biosynthesis and swarming motility \[[@B47-ijms-16-12836]\]. It has also been shown that phoPQ mutants were more resistant to strong acidic conditions (pH 4.5 or 5) than that of the wild-type (WT) strain, suggesting that this system in *E. amylovora* may negatively regulate acid resistance gene expression. Furthermore, the PhoPQ system negatively regulated gene expression of two novel T3SS in *E. amylovora*. These results are in contrast to those reported for the PhoPQ system in *Salmonella* and *Xanthomonas*, where it positively regulates T3SS and acid resistance. In addition, survival of phoPQ mutants was about 10-fold lower than that of WT when treated with cecropin A at pH 5.5, suggesting that the PhoPQ system renders the pathogen more resistant to cecropin A \[[@B68-ijms-16-12836]\]. These results suggest that the the PhoPQ system may act as a part of a regulatory network that governs *E. amylovora* in a wide variety of cellular functions, thus enhancing its survival under the changing environments of different hosts or in different environments, such as the acidic plant apoplast, a major barrier for plant pathogenic bacteria to cause disease \[[@B68-ijms-16-12836]\]. 4.2. Small RNA -------------- Recently, different regulatory small RNAs (sRNAs) requiring the RNA chaperone Hfq for both stability and functional activation have been identified in *E. amylovora*, and further, being some of them involved in the regulation of various virulence traits including motility, amylovoran EPS production, biofilm formation, and T3SS. This discovery is of relevance since, although sRNAs have been increasingly recognized as pivotal regulators in bacteria, genome-wide identification of sRNAs has only been performed in a limited number of bacteria \[[@B15-ijms-16-12836]\]. 4.3. Quorum Sensing ------------------- Quorum sensing systems have been described in *E. amylovora*, both QS-1, relying on an *N*-homoserine lactone autoinducer-1 signal (AI-1) \[[@B69-ijms-16-12836],[@B70-ijms-16-12836],[@B71-ijms-16-12836]\] and QS-2 reliant on LuxS as the enzyme responsible for signal (AI-2) production \[[@B72-ijms-16-12836]\]. However, a global regulatory function has not yet been explored. Although previous studies reported that *luxS* did not affect quorum sensing in *E. amylovora* \[[@B71-ijms-16-12836]\], recent results have indicated that some strains of *E. amylovora* have *luxS-*dependent AI-2 activity, and that inactivation of *luxS* affects some phenotypes, including virulence *in* *planta* \[[@B72-ijms-16-12836]\], although the molecular basis of *luxS*-dependent regulation remains to be determined \[[@B72-ijms-16-12836]\]. It was observed that AI-2 produced in *E. amylovora* activated the expression of bioluminescence in the *Vibrio harveyi* BB170 reporter strain. Findings showed that AI-2 in *Ea*1665 was dependent on *EaluxS* because expression of *EaluxS* in the *luxS* frame-shift mutation of *E. coli* DH5α demonstrated its importance in AI-2 synthesis. The pattern of AI-2 production with respect to growth phase and environmental changes deserves further research, and may give some insight into the function of this signaling system \[[@B72-ijms-16-12836]\]. Moreover, using comparative genomic analyses to search homologs of genes involved, several genes were identified corresponding to the Autoinducer-3/Epinephrine/Norepinephrine signaling system in *E. coli*. Particularly, the putative homologs to the two component system QseEF and the transcriptional regulator QseA are highly conserved in *E. amylovora*. Gene-knockout experiments revealed that the QseEFEa system is involved in the regulation of swarming motility, biosynthesis of amylovoran, and biofilm formation \[[@B73-ijms-16-12836]\]. 4.4. c-di-GMP ------------- It has been shown that *E. amylovora* encodes eight genes involved in the biosynthesis and/or degradation of cyclic-di-GMP (c-di-GMP), a second messenger signaling compound. Individual knockout mutations in each of these genes revealed that c-di-GMP positively regulated biofilm formation and negatively regulated motility. These results demonstrated that *E. amylovora* possesses several regulatory networks that govern the expression of virulence genes \[[@B73-ijms-16-12836],[@B74-ijms-16-12836]\]. 4.5. ppGpp ---------- In a recent study, the role of the bacterial alarmone ppGpp in activating the T3SS and virulence of *E. amylovora* was investigated using ppGpp mutants generated by Red recombinase cloning. The virulence of a ppGpp-deficient mutant (ppGpp(0)), as well as a *dksA* mutant of *E. amylovora*, was completely impaired, and bacterial growth was significantly reduced, suggesting that ppGpp is required for full virulence of *E. amylovora*. Expression of T3SS genes was greatly downregulated in the ppGpp(0) and *dksA* mutants. Western blotting showed that accumulations of the HrpA protein in the ppGpp(0) and dksA mutants were about 10% and 4%, respectively, of that in the wild-type strain. Furthermore, higher levels of ppGpp resulted in a reduced cell size of *E. amylovora*. Moreover, serine hydroxamate and α-methylglucoside, which induce amino acid and carbon starvation, respectively, activated hrpA and hrpL promoter activities in hrp-inducing minimal medium. These results demonstrated that ppGpp and DksA play central roles in *E. amylovora* virulence and indicated that *E. amylovora* utilizes ppGpp as an internal messenger to sense environmental/nutritional stimuli for regulation of the T3SS and virulence \[[@B75-ijms-16-12836]\]. 4.6. Type 3 Effectors --------------------- There are several effectors in *E. amylovora* that have been described \[[@B36-ijms-16-12836]\], although recent findings have been focused on DspA/E since it has been shown that the ability of *E. amylovora* to promote disease mainly depends on this single injected T3E \[[@B76-ijms-16-12836]\]. DspA/E belongs to the widespread AvrE family of type III effectors that suppress plant defense responses and promote bacterial growth following infection \[[@B76-ijms-16-12836],[@B77-ijms-16-12836],[@B78-ijms-16-12836]\]. In recent studies, expression of dspA/E in the yeast *Saccharomyces cerevisiae* inhibited cell growth, this effect associated with perturbations of the actin cytoskeleton and endocytosis \[[@B77-ijms-16-12836]\], activation of phosphatase 2A, and downregulation of the sphingolipid biosynthetic pathway leading to growth arrest \[[@B76-ijms-16-12836]\]. In nonhost *Arabidopsis thaliana* leaves, DspA/E was required for transient bacterial growth, as an *E. amylovora* *dspA/E* mutant was unable to grow. Study of transgenic *Arabidopsis* lines expressing DspA/E indicated that DspA/E promotes modifications of plant cell metabolism among which the repression of protein synthesis could be determinant in the facilitation of necrosis and bacterial growth \[[@B78-ijms-16-12836]\]. 4.7. Hrp X/Y, HrpS and HrpL Cascade Leading to Activation of hrpT3SS -------------------------------------------------------------------- Two regulatory components, *hrpX* and *hrpY*, of the *hrp* system of *Erwinia amylovora* have been identified \[[@B79-ijms-16-12836]\]. The *hrpXY* operon is expressed in rich media, but its transcription is increased threefold by low pH, nutrient, and temperature levels, conditions that mimic the plant apoplast. *hrpXY* is autoregulated and directs the expression of *hrpL*, which, in turn, activates transcription of other loci in the *hrp* gene cluster \[[@B80-ijms-16-12836]\]. The deduced amino-acid sequences of *hrpX* and *hrpY* are similar to bacterial two-component regulators including VsrA/VsrD of *Pseudomonas* (*Ralstonia*) *solanacearum*, DegS/DegU of *Bacillus subtilis*, and UhpB/UhpA and NarX/NarP, NarL of *Escherichia coli*. The N-terminal signal-input domain of HrpX contains PAS domain repeats \[[@B79-ijms-16-12836]\]. *hrpS*, located downstream of hrpXY, encodes a protein with homology to WtsA (HrpS) of *Erwinia* (*Pantoea*) *stewartii*, HrpR and HrpS of *Pseudomonas syringae*, and other σ^54^-dependent, enhancer binding proteins. Transcription of *hrpS* also is induced under conditions that mimic the plant apoplast. However, *hrpS* is not autoregulated, and its expression is not affected by *hrpXY* \[[@B79-ijms-16-12836]\]. As a member of the NtrC family, HrpS is unusual in that it lacks a long N-terminal receiver domain \[[@B79-ijms-16-12836]\]. The structure of the input domain of *E. amylovora* HrpX appears to be exceptional, compared with sensor proteins involved in other type III systems, which contain two transmembrane regions and a periplasmic domain \[[@B79-ijms-16-12836]\]. Thus, at least two types of transmitter-receiver systems appear to have evolved for control of type III systems in response to environmental stimuli in hosts \[[@B79-ijms-16-12836]\]. 4.8. Regulatory Cascade for Amylovoran Synthesis ------------------------------------------------ The biosynthesis of amylovoran is regulated by another two-component signal transduction system, the RcsCDB phosphorelay system, which has been found to be essential for virulence in *E. amylovora* \[[@B47-ijms-16-12836]\]. 5. Discussion ============= Nowadays, there is a high amount of interest to find and apply biological measures to combat and prevent plant diseases to avoid the use of chemical compounds in agriculture \[[@B81-ijms-16-12836],[@B82-ijms-16-12836]\]. In this context, it is fundamental to understand the host (plant)-parasite interactions \[[@B81-ijms-16-12836]\]. In this review, we have summarized the most recent findings regarding virulence factors of *E. amylovora*, having seen that, although the most relevant virulence mechanisms have been described, there is substantial further research to completely characterize, at the chemical and functional levels, the different factors involved in pathogenicity. In this regard, recent genome sequencing should accelerate the knowledge on this species, particularly in regards to pathogenicity, considering the limited genetic diversity observed in the different strains. Overall, these data will help to understand the whole mechanism of the specific interactions of *E. amylovora* with its hosts, thus, allowing better diagnosis and control strategies, which can include biological measures, such as the design of lytic bacteriophages, competitive attenuated strains, *etc*. For most of the virulence factors identified, even for the two main factors (the EPS amylovoran and T3SS), further research is necessary to fully understand their role in the pathogenic network of the bacteria, including the main mechanism of adhesion via the biofilm and the interaction of the different elements with the plant structures, including the acidic plant apoplast and the plant defenses, under different environmental conditions. Complete characterization of the structures involved in virulence, and their regulation mechanisms and further genetic analysis, will allow to design more precise diagnostic and control strategies (including a more rational use of antimicrobials), together with a more precise phylogenetic classification of *E. amylovora*, across the genus, and the Enterobacterial family. This work was supported by Plan Nacional de I + D+ i (Ministerio de Educación, Ciencia y Deporte and Ministerio de Sanidad, Spain) and from Generalitat de Catalunya (Centre de Referència en Biotecnologia, Barcelona, Spain). The authors declare no conflict of interest.
{ "perplexity_score": 590.9, "pile_set_name": "PubMed Central" }
Hi I do not know which services you are using. But i can explain to you that as far as I have seen ISPConfig changes httpd.conf. When it changes it does make a backup copy of httpd.conf renaming it to httpd.conf.orig, it also creates an exact copy of the changed file but with a different name httpd.conf appending at the end of the name the date and time of when that change was made. It also changes /etc/postfix/main.cf It does include the following orders virtual_maps = hash:/etc/mail/virtusertable mydestination = /etc/mail/local-host-names In my case it commented this one. virtual_alias_maps = hash:/etc/postfix/virtual which was fed by virtualmin where all my email address names are stored. /home/my_IP_number folder was created and access logs can be found there. /home/admispconfig folder was created inside various files and mail stats folder /home/web1 folder /home/web2 folder also created
{ "perplexity_score": 862.7, "pile_set_name": "Pile-CC" }
Grasso named D3baseball.com player of the year; four earn all-region honors May 23, 2017 SALISBURY, Md. – The organization D3baseball.com released its 2017 D3baseball.com All-South Region team Tuesday morning as four Salisbury University players earned recognition. Pete Grasso garnered top honors by the organization as he was named South Region Player of the Year. Grasso completed an outstanding senior season from both the plate and the mound. He played in 45 of 46 games, totaled team-highs in hits (72), batting average (.381), and at-bats (189). On the mound Grasso posted a 9-1 record with a team best 2.17 ERA while totaling 89 strikeouts and allowing only 22 earned runs. For his career Grasso will finish top-10 in multiple statistical categories for the maroon and gold including tied for fourth in games played (169); first in at-bats (690), hits (252), triples (13), and runs scored (198); second in RBI (177); tied for fifth in doubles (43); third in total bases (381); fourth in strikeouts (192); and third in saves with 10. This is the third postseason award for Grasso as he was named the Capital Athletic Conference Player of the Year and was also named to the CoSIDA Academic All-District team. Joining Grasso on the first team was fellow senior Tom LaBriola and sophomore Jack Barry. LaBriola completed a solid senior year campaign in which he started every game at catcher for the Gulls, totaled team-highs in RBI (50) and doubles (16), and finished with 348 putouts while catching 13 runners stealing. Barry turned in a solid second year in the maroon and gold leading the team in both home runs (12) and slugging percentage (.618) while finishing third on the team in doubles (11). He was the only player for Salisbury who tallied both double digit home runs and doubles this past season. Barry also finished one RBI away from tying for the team lead knocking 49 in 2017. Both LaBriola and Barry were also named All-CAC first-team selections earlier this month while LaBriola garnered CoSIDA Academic All-District honors as well. Jeff Oster rounded out the group being named to the second team. Oster completed his senior season with career-highs in starts (14), wins (10), complete games (2), and strikeouts (93) which was also a team-high. For the season he averaged 8.15 strikeouts per nine innings pitched while holding opponents to a team-low .225 batting average. This is Oster's second postseason accolade as he was an All-CAC first-team selection earlier this month. The 2017 season marks the sixth year that D3baseball.com has named All-Region teams, with 800 players nominated. The ballot was then made available to SIDs, who voted for a predetermined number of players in their region, as well as D3baseball.com staff and contributors. To view the D3baseball.com All-Region article in its entirety, click here.
{ "perplexity_score": 270.3, "pile_set_name": "Pile-CC" }
I listened to this one, narrated by Justine Eyre. It was about 12 hours long, but it passed by quickly with this fun read. It's not particularly deep or magical and it doesn't call life as we know it into question. It's a nice read/listen, light and intriguing for anyone in the mood for a little escape from the disappointments that have been abounding. Funny enough, the only problems with the book are also reasons why I liked it. Lily Kaiser's journey is a little too convenient throughout the book but that can be just perfect sometimes. It can be exactly what I need to read or listen in order to balance out the pressure of the world. So, yes, the book is a little too neat. The story a little too beautiful and coincidental and works a little too well, but I didn't mind it at all. Mostly because it was also written incredibly well. It moves between times, giving insight into Rose Gallway's life that Lily doesn't readily have and let's the reader piece some of it together on our own. I do enjoy that. And then the author lays it all out and it's just perfect. A little too perfect, like in one of those rom-coms that we watch to feel good but that we all know aren't the way the world works. I really loved that about it. It's going to be one of my comfort books, to peruse when I'm down, maybe listen to when I wanna revel in new beginnings, like the mood I re-watch Stardust in. If you've read a few too many mysteries lately, or too many books that ripped your heart out (like I have recently), than this is the perfect book to recover with. It's comforting and sweet and romantic and doesn't take itself too seriously. But it's not the book for that serious deep read. Don't expect it to be.
{ "perplexity_score": 297.8, "pile_set_name": "Pile-CC" }
Opinions of the United 2005 Decisions States Court of Appeals for the Third Circuit 1-25-2005 Coast Auto Grp Ltd v. VW Credit Inc Precedential or Non-Precedential: Non-Precedential Docket No. 03-1418 Follow this and additional works at: http://digitalcommons.law.villanova.edu/thirdcircuit_2005 Recommended Citation "Coast Auto Grp Ltd v. VW Credit Inc" (2005). 2005 Decisions. Paper 1555. http://digitalcommons.law.villanova.edu/thirdcircuit_2005/1555 This decision is brought to you for free and open access by the Opinions of the United States Court of Appeals for the Third Circuit at Villanova University School of Law Digital Repository. It has been accepted for inclusion in 2005 Decisions by an authorized administrator of Villanova University School of Law Digital Repository. For more information, please contact Benjamin.Carlson@law.villanova.edu. NOT PRECEDENTIAL UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT No. 03-1418 COAST AUTOM OTIVE GROUP, LTD., DELAWARE CORPORATION d/b/a TSE MOTOR CARS; ASPEN KNOLLS AUTOMOTIVE GROUP, LLC, (Intervenor in D.C.) v. VW CREDIT, INC., A CORPORATION; VOLKSWAGEN OF AMERICA, A CORPORATION; AUDI OF AMERICA, A CORPORATION; MARGE YOST; MICHAEL RUECKERT; STEPHEN JOHNSON Coast Automotive Group, Ltd., Appellant On Appeal from the United States District Court for the District of New Jersey (D.C. No. 97-cv-02601) District Judge: Hon. Garrett E. Brown Submitted Under Third Circuit LAR 34.1(a) on March 22, 2004 Before: Roth, Ambro, and Chertoff, Circuit Judges. (Filed: January 25, 2005) OPINION OF THE COURT ROTH, Circuit Judge. This case concerns a jury verdict in favor of Volkswagen of America and Audi of America (VOA/AOA) on two claims brought by VOA/AOA’s franchisee, Coast Automotive Group, Ltd. Coast alleged that VOA/AOA’s failure to make a fair and equitable allocation of motor vehicles to Coast after Coast lost its line of credit and went into bankruptcy violated both the New Jersey Franchise Practices Act (NJFPA), N.J. Stat. Ann. § 56:10-7(e), and the Automobile Dealers’ Day in Court Act (Dealers’ Act), 15 U.S.C. § 1221 et seq. Although the jury decided that VOA/AOA violated § 56:10-7(e) of the NJFPA by failing to make a fair and equitable allocation, it also found that VOA/AOA was not liable because Coast failed to substantially comply with the franchise agreement. As for the Dealers’ Act claim, the jury found that VOA/AOA’s conduct was not an attempt to coerce or intimidate Coast into giving up or selling its franchise. The main issues we face on this appeal are whether the jury instruction and related verdict sheet question addressing § 56:10-9 as a complete defense to liability under the NJFPA wERE an accurate statement of the law, and whether the jury verdict on VOA/AOA’s 2 defense to the NJFPA claim and the verdict on the Dealers’ Act claim were against the weight of the evidence. I. FACTUAL AND PROCEDURAL HISTORY Coast was an authorized retailer of Volkswagen and Audi vehicles that owned new vehicle dealerships in Toms River, New Jersey. Beginning in 1991,Volkswagen Credit, Inc. (VCI), a subsidiary of VOA/AOA, provided Coast with floor plan financing so that Coast could purchase vehicles for its inventory. In December 1995, VCI called Coast into default under the provisions of their agreements and, soon thereafter, filed a state court action in the Law Division of a New Jersey Superior Court seeking repayment of the debt, VW Credit, Inc. v. Coast Automotive Group, Ltd., et al., Docket No. OCN-L- 1162-96. On December 15, 1995, Coast filed a Chapter 11 petition in the United States Bankruptcy Court for the District of New Jersey. The bankruptcy action was dismissed on September 18, 1997. Although Coast lost its wholesale line of credit during the pendency of the bankruptcy, it continued to acquire inventory by paying with checks or drafts against its regular checking account or through a series of cash collateral orders that allowed Coast to use the proceeds from the sale of new vehicles to purchase replacement vehicles. Because Coast did not have a wholesale line of credit which would provide for timely replacement of the new vehicle inventory, however, VOA/AOA representatives had to intervene to get new vehicles assigned to Coast, and then arrange for and confirm payment and shipment on each new vehicle. This process both delayed 3 and reduced the allocation of new vehicles to Coast. Coast also complained that, in order to force the dealership to fold, VOA/AOA was deliberately giving it vehicles that were hard to move such as cars of an undesirable color or cars with stick shifts. In January 1997, Coast filed a complaint in the Bankruptcy Court against VCI, several VCI employees, and VOA/AOA, essentially alleging that VCI wrongfully called Coast into default. That action was withdrawn from the Bankruptcy Court in May 1997 and transferred to the United States District Court for the District of New Jersey. In April 1998 and October 1999, the District Court granted VCI summary judgment on all counts of Coast’s initial sixteen count complaint. Coast appealed. Meanwhile, Coast amended its complaint adding two claims against VOA/AOA, alleging that VOA/AOA failed to provide sufficient inventory to Coast during the course of Coast’s Bankruptcy proceedings in violation of the NJFPA and the Dealers’ Act. VOA/AOA amended its Answer in October 1999 to assert a counterclaim under New Jersey law seeking equitable rescission of its franchise agreements with Coast. 1 The District Court held a jury trial in September 2001 on the NJFPA and Dealers’ Act claims. The jury returned its verdict in favor of VOA/AOA on both of Coast’s statutory causes of action. On October 30, 2002, the District Court entered judgment in VOA/AOA’s favor on the NJFPA and Dealers’ Act claims. Earlier in 2002, this Court had affirmed in part 1 On October 30, 2002, the District Court rendered a bench opinion on VOA/AOA’s counterclaim, finding that although Coast made material misrepresentations in its franchise application, VOA/AOA was not entitled to rescission because it failed to prove damages. Neither party has appealed the District Court’s ruling. 4 and vacated in part the District Court’s grant of summary judgment in VCI’s favor, remanding the vacated claims against VCI for trial. Judgment became final on January 8, 2003, when the District Court dismissed the remanded claims against VCI as moot after Coast had prevailed in the state court action on identical claims against VCI. As for the state court action, it had proceeded on a parallel course with the Federal action. In April 1998, Coast impleaded VOA/AOA, alleging the same NJFPA and Dealers’ Act claims as those raised in the federal action, along with other statutory and common law claims against VCI. VOA/AOA asserted an identical counterclaim for equitable rescission of its franchise agreements. In July 2002, the state court denied VOA/AOA’s summary judgment motion seeking claim and/or issue preclusion as to the NJFPA and Dealers’ Act claims and the case proceeded to trial in August 2002.2 At the conclusion of the presentation of evidence, Coast’s NJfPA claims against VOA/AOA were dismissed with prejudice at Coast’s request. The jury found in VOA/AOA’s favor on the Dealers’ Act claim. The state court entered judgment in VOA/AOA’s favor on April 7, 2003. Coast’s state court appeal is pending. II. JURISDICTION AND STANDARDS OF REVIEW 2 We find no merit in VOA/AOA’s argument that the judgment in the state court action is entitled to res judicata effect, precluding further proceedings in this Court. VOA/AOA’s motion to preclude the state action on grounds of res judicata has already been rebuffed by the New Jersey Superior Court. We agree with Coast that VOA/AOA’s appeal in this Court of the first adjudication does not constitute a third forum in which the NJFPA and Dealers’ Act claims are being litigated. 5 We have jurisdiction under 28 U.S.C. § 1291.3 We employ plenary review to determine whether jury instructions misstate a legal standard. Savarese v. Agriss, 883 F.2d 1194, 1202 (3d Cir. 1989). We look at the entire set of instructions to the jury and ascertain if they adequately contain the law applicable to the case and properly apprise the jury of the issues in the case. Douglas v. Owens, 50 F.3d 1226, 1233 (3d Cir. 1995). A jury verdict will not be overturned unless the record is critically deficient of that quantum of evidence from which a jury could have rationally reached its verdict. Swineford v. Snyder County, Pa., 15 F.3d 1258, 1265 (3d Cir. 1994). III. DISCUSSION A. The Jury Instruction and Verdict Sheet Coast’s main contention is that it was entitled to a verdict on the NJFPA claim because § 56:10-9 is not a defense to Coast’s 1996-1997 allocation claims. It argues that the jury instruction and verdict sheet question completely misstated the law and essentially deprived Coast of its proper NJFPA claim under § 56:10-7(e). According to Coast, the District Court erred in instructing the jury to excuse VOA/AOA from all 3 Shortly before trial in the federal action in 2001, Aspen-Knolls Automotive Group, LLC, the contract purchaser of Coast’s franchises, intervened in the federal action, seeking a ruling that any judgment or other relief obtained by VOA/AOA on its equitable rescission counterclaim would not adversely impact Aspen’s right to acquire Coast’s Volkswagen and Audi franchises. None of the District Court orders expressly disposed of the complaint. Upon review of the parties’ responses to our inquiry as to the status of the Aspen complaint, we are now satisfied that we have jurisdiction to consider the matter. VOA/AOA did not prevail on its counterclaim, and thus, it was not necessary for the District Court to adjudicate Aspen’s complaint in intervention and the Judgment and Order closing the federal action entered on January 8, 2003, was final as to all claims. 6 liability based on Coast’s alleged substantial noncompliance with the franchise agreement because VOA/AOA never elected to terminate the contract in the relevant time period and because no factual nexus existed between Coast’s inequitable allocation claim and the alleged material breach. The question before us is whether § 56:10-9 applies in actions brought under § 56:10-7(e). The parties have cited no New Jersey law on point and we have found no decision of the New Jersey Supreme Court, or of lower state courts, on point. We must, as a federal court asked to decide an open question of state law, look to the fundamental principles of statutory construction that would inform the New Jersey court’s consideration of the issue. New Jersey abides by well-known rules of statutory construction. In New Jersey, when a statute is clear and unambiguous on its face, “the sole function of the courts is to enforce it according to its terms.” Velazquez v. Jiminez, 798 A.2d 51, 61 (2002). “All terms in the statute should be accorded their normal sense and significance.” Id. The “overriding objective in determining the meaning of a statute is to effectuate the legislative intent in light of the language used and the objectives sought to be achieved.” McCann v. Clerk of the City of Jersey City, 771 A.2d 1123, 1128 (N.J. 2001) (quoting State v. Hoffman, 695 A.2d 236, 243 (N.J. 1997)). Section 56:10-9 provides that “[i]t shall be a defense for a franchisor, to any action brought under this act by a franchisee, if it be shown that said franchisee has failed to substantially comply with requirements imposed by the franchise and other agreements 7 ancillary or collateral thereto.” Giving these terms their normal meaning, as we must, we find no support for Coast’s contention that the statutory defense does not apply to actions brought under § 56:10-7(e). To the contrary, § 56:10-9 provides a complete defense to a franchisor in “ any action” brought under the NJFPA where the franchisee has itself committed a material breach of the franchise agreement. The plain meaning of § 56:10-9 is consistent with the NJFPA’s stated legislative policy of regulating the responsibilities of both the franchisee and the franchisor. In Westfield Centre Service, Inc. v. Cities Service Oil Co., 432 A.2d 48, 55 (N.J. 1981), the New Jersey Supreme Court construed the “good cause” language of § 56:10-5 as limiting termination of the franchise agreement under the NJFPA only in cases where the franchisee committed a breach. The New Jersey Supreme Court recognized that the plain meaning of the “good cause” provision supported the “legislative desire to protect the innocent franchisee when the termination occurs at the franchisor’s convenience.” Id. The same can be said of § 56:10-9 and its application to § 56:10-7(e). The statutory defense does not protect the franchisor from suit brought under § 56:10-7(e) by an “innocent franchisee.” This Court and federal district courts have recognized that § 56:10-9 allows a franchisee’s substantial noncompliance to serve as a complete defense to any action brought under the NJFPA. See General Motors Corp. v. New A.C. Chevrolet, Inc., 263 F.3d 296, 321 n. 11 (3d Cir. 2001); In re The Matterhorn Group, Inc., Nos. 97B 41274- 8 97B 41278, 2002 Bankr. Lexis 1275 (Bkr. S.D.N.Y. November 15, 2002); Zaro Licensing, Inc. v. Cinmar, Inc., 779 F.Supp. 276, 286 (S.D.N.Y. 1991) (“It is a defense to a claim brought under the act [NJFPA] by a franchisee that the franchisee has failed to comply substantially with the requirements imposed by the franchisor”). Coast argues that § 56:10-9 is contrary to the common law duty of good faith and fair dealing as codified in § 56:10-7(e). Even if we assume that § 56:10-7(e) codifies the common law duty of good faith and fair dealing and that § 56:10-9 effects a change by providing a defense to franchisors not available at common law, we are not persuaded that § 56:10-9 is inconsistent with or inapplicable to actions brought under § 56:10-7(e). In New Jersey, statutes that impose duties or burdens, or establish rights, or provide benefits not recognized by common law, are subject to strict construction. State v. International Fed’n of Prof’l and Technical Engrs., 780 A.2d 525 (2001). It is clear that if the statutory defense makes any change in the common law at all, it does so only with regard to those cases where the franchisee also breached the franchise agreement. And, as we have already discussed, § 56:10-9 so construed does not circumvent the Legislature’s intended purpose for enacting NJFPA, that is to protect the innocent franchisee. Accordingly, we conclude that the District Court did not err in its instruction to the jury with regard to the NJFPA statutory defense. The District Court accurately stated that VOA/AOA cannot be held responsible under the NJFPA if Coast did not substantially 9 comply with the franchise agreement. And we find that jury question 6 did not misstate the law in asking “did Defendant’s (sic) prove by a preponderance of the evidence that Plaintiff failed to substantially comply with requirements of the Franchise Agreement?” B. The Sufficiency of the Evidence. At trial, VOA/AOA offered evidence that Coast failed to substantially comply with its obligations under the franchise agreements in two ways. First, Coast failed to maintain the required financial arrangements for the purchase of new vehicles. Second, Coast made material misrepresentations about its financial ability when it applied to become a dealer. Coast argues that the verdict as to Coast’s substantial noncompliance on VOA/AOA’s first ground was against the weight of the evidence as a matter of law because Coast’s method of purchasing vehicles during the bankruptcy period was found by the Appellate Division of the New Jersey Superior Court to be substantially compliant. Our review of a jury’s verdict is limited to determining whether some evidence in the record supports the jury verdict. As VOA/AOA correctly noted, jury question 6 did not require the jury to specify which one of the two bases for the defense they relied on. For our purposes we need only find the evidence sufficient as to one of the proffered bases. We agree with VOA/AOA that the New Jersey Superior Court’s statement in the context of a preliminary injunction proceeding has no bearing on the facts adduced at trial in this case, and we find that there is sufficient evidence supporting VOA/AOA’s theory that Coast breached the franchise agreement by failing to maintain an adequate floor plan 10 for purchasing new vehicles. But even assuming that Coast was substantially compliant with regard to its method of purchasing vehicles, we find the evidence is sufficient to support the verdict based on Coast’s substantial noncompliance in materially misrepresenting its financial ability in the dealer application. We note that Coast does not offer any argument with regard to the insufficiency of the factual evidence on the material mispresentation ground. Coast only contends that such a “breach” was not material. We disagree. Under § 56:10- 6, a franchisor may reject a dealership’s application to transfer a franchise based on lack of financial ability of the prospective transferee. As in transfer of dealership cases, the prospective franchisee’s financial ability is a key factor in the franchisor’s decision to grant a dealership in the first instance. Ensuring that a prospective dealer has the necessary financial resources to make the franchise succeed ultimately protects the trade name, image, and good will of the franchisor. See Amerada Hess Corp. v. Quinn, 362 A.2d 1258, 1266 (N.J. Super. 1976) (defining substantiality of noncompliance in terms of its effect or potential effect on the franchisor’s trademark, trade name, image, and good will). Here, Tamim Shansab and Nasir Shansab represented on the dealer application that their personal investments of $1.6 million and $400,000 respectively were unencumbered. Nowhere did they disclose that the money actually came from investors in Japan. In a separate agreement with these investors, Tamim Shansab agreed to repay $1.7 million and 11 to grant the investors a beneficial ownership interest in the dealership. VOA/AOA relied on Shansab’s representations of his financial ability and those representations were central to VOA/AOA’s decision to grant the dealership to Coast. Shansab’s failure to disclose that the money he promised was not his and that investors wholly unknown to VOA/AOA had an ownership interest in the dealership constituted a material breach of the express terms of the dealership application. Thus, the evidence was sufficient for the jury to find under § 56:10-9, that Coast failed to substantially comply with the franchise dealership application. Turning to the Dealers’ Act claim, we find that, taken as a whole, all of the District Court’s jury instructions regarding the Dealers’ Act claim, including the charge on good faith, accurately stated the law, and that there was sufficient evidence to support the jury’s finding that VOA/AOA’s conduct did not constitute “coercion, intimidation, or threats of coercion or intimidation.” 15 U.S.C. § 1221(e). We have held that evidence that a franchisor advanced its own interests and urged compliance with franchise obligations, without more, does not constitute coercion under the Dealers’ Act. General Motors Corp. v. New A.C. Chevrolet, Inc., 263 F.3d 296, 326 (3d Cir. 2001). However, evidence that the franchisor’s reliance on franchise obligations was pretextual or in bad faith may be sufficient to show coercion. Id. at 327. Although Coast asserts that it was VOA/AOA that pressured it to sell its franchise, Coast represented in bankruptcy proceedings that its inability to maintain adequate floor plan financing caused it to conclude that it had to sell 12 the dealership. The fact that the bankruptcy proceedings were a “going concern” to VOA/AOA does not itself indicate that VOA/AOA’s reliance on franchise obligations was pretextual or in bad faith. Nor did the District Court abuse its discretion in precluding the admission of evidence as to the allegedly coercive and intimidating actions of VCI employees. Coleman v. Home Depot, Inc., 306 F.3d 1333, 1341 (3d Cir. 2002) (standard of review). Coast failed to offer any evidence to show that the actions of VCI employees should be imputed to VOA/AOA. We have thoroughly reviewed the remaining arguments on appeal and find them to be without merit. The judgment of the district court will be affirmed. VOA/AOA’s motion to expand the record is denied. 13
{ "perplexity_score": 437.2, "pile_set_name": "FreeLaw" }
Till We Have Faces (Steve Hackett album) Till We Have Faces is the eighth solo album by guitarist Steve Hackett. The album is rock, with elements of world music. The majority of the album was recorded in Brazil, while the final mixing was done in London. The name of the album comes from a novel by C.S.Lewis, whose work is a long-time influence on Hackett. As with most of Steve Hackett's records, the sleeve painting was created by his wife at the time, Kim Poor, the Brazilian artist, under the title Silent Sorrow in Empty Boats, after an instrumental piece by Hackett's former group Genesis, on the album The Lamb Lies Down on Broadway. "A Doll That's Made in Japan" was released as a single. The 7” featured an instrumental version of the song on the B-side. The 12" featured a longer version of the A-side and an exclusive track, "Just the Bones". Apart from the 7” A-side, none of the tracks appeared on the album or its 1994 re-issue. Track listing (original LP/CD version) "Duel" (Steve Hackett) – 4:50 "Matilda Smith-Williams Home for the Aged" (Hackett, Nick Magnus) – 8:04 "Let Me Count the Ways" (Hackett) – 6:06 "A Doll That's Made in Japan" (Hackett) – 3:57 "Myopia" (Hackett, Magnus) – 2:56 "What's My Name" (Hackett, Magnus) – 7:05 "The Rio Connection" (Hackett) – 3:24 "Taking the Easy Way Out" (Hackett) – 3:49 "When You Wish upon a Star" (Ned Washington, Leigh Harline) – 0:51 Track listing (1994 CD reissue) "What's My Name" – 7:06 "The Rio Connection" – 3:21 "Matilda Smith-Williams Home for the Aged" (modified version) – 8:07 "Let Me Count the Ways" – 6:06 "A Doll That's Made in Japan" – 3:57 "Duel" – 4:48 "Myopia" – 2:56 "Taking the Easy Way Out" – 3:50 "The Gulf" – 6:33 "Stadiums of the Damned" – 4:37 "When You Wish Upon a Star" – 0:48 Note: Bonus tracks "The Gulf" and "Stadiums of the Damned" were from the (then) unreleased Feedback 86. The version of "The Gulf" heard here is missing a brief intro, is faded out early, and has added backing vocals. Personnel Steve Hackett – guitars, guitar synth, koto, rainstick, Etruscan guitar, marimba, percussion, harmonica, vocals Nick Magnus – keyboards, percussion, drum programming Rui Mota – drums Sérgio Lima – drums Ian Mosley – drums, percussion Waldemar Falcão – flute, percussion Fernando Moura – Rhodes piano Ronaldo Diamante – bass Clive Stevens – wind synthesizer Kim Poor – Japanese voice on "Doll" The Brazilian Percussionists – Sidinho Moreira, Junior Homrich, Jaburu, Peninha, Zizinho, Baca References See also Till We Have Faces – A novel by C.S. Lewis Category:1984 albums Category:Steve Hackett albums Category:Music based on novels
{ "perplexity_score": 288.7, "pile_set_name": "Wikipedia (en)" }
5% Dining Rewards **Delivery date is approximate and not guaranteed. Estimates include processing and shipping times, and are only available in US (excluding APO/FPO and PO Box addresses). Final shipping costs are available at checkout. Oops, something went wrong. Details ITEM#: 12934300 Give your bride-to-be this stunning three-piece bridal rings set featuring over 1-carat t.w. diamonds. This extravagant yet simplistic style is hard not to fall in love with and will be adored by all your friends and family. With over 80 diamonds carefully placed in prong and pave settings on 14-karat gold, this bridal set has no shortage of sparkles. The cluster center is outlined with a halo and brought to a slender curve along the band. Diamonds are conflict-free and each handpicked for the stated color and clarity. Center Diamonds: Seven Cut: Round Color: G-H Clarity: I1-I2 Weight: 1/2 carat Setting: Prong Side stones Diamonds: 40 Cut: Round Color: G-H Clarity: I1-I2 Weight: 2/5 carats Setting: Pave Wedding bands Diamonds: 38 Cut: Round Color: G-H Clarity: I1-I2 Weight: 1/3 carats Setting: Pave Metal and dimensions Metal: 14-karat white, yellow, or rose gold Center halo: 11.20 mm long x 11.30 mm wide x 4.75 mm high Shank: 2 mm wide at narrowest point Wedding bands: 1.85 mm wide Diamond total weight: 1 1/5* carat(s) TW All weights and measurements are approximate and may vary slightly from the listed information. *T.W. (total weight) is approximate. 1 1/5 carat T.W. may be 1.17 to 1.23 carat. Treatment code N. See Gemstone Treatments for further information. Love love it. I got it in rose gold and I couldn't be happier. The only issue I think i had is that I need .5 size up. I had read that In another review and decided to still order my true size. Now I see that because it ends up talking up most the space between the knuckles it is kinda tight Most Helpful Better than the picture! Verified Purchase My honey proposed with this ring , (I picked it out) and it is AMAZING!!! I have bigger hands and it looks so beautiful! I get compliments from strangers everyday! I have showered in it and done dishes in it and it still looks as sparkly as the day he gave it to me. Also someone commented on how it appraised for double what they paid for it and guess what, mine did too. I took mine in to be sized and the guy knew it came from Overstock so he said just looking at it he would have guessed somewhere in the ballpark of 2200... yeah! Thank you Overstock. Guys if you are planning on getting this ring hesitate no longer, it is worth every penny and then some. Also I had all the prongs checked and not one was loose. Great buy! I had been looking for the perfect bridal set for myself, (LOL) and I just couldn't decide. I had been seeing a ring very similar to this one, but the pricing was kind of up there. I received an email from this site and decided to log in. I started looking and there it was. I couldn't believe it. I took a picture of it and sent it to my fiance' and asked what did he think. He replied YES! So, without reservation, I ordered it. He texted and told me that was the exact ring he had been looking at. On Valentine's Day, he delivered some roses to me and while he was there, the ring was delivered. What a coincidence! I was excited and so was he! I LOVE IT!!!! I was looking for a ring that had a low profile without sacrificing quality, as my fiancee works with her hands a lot. This ring is nearly perfect; the diamonds appear to be of fair quality, the three pieces fit together well and it never snags. Her only complaint is that when she forgets to take off her ring when she is cooking, the ridges on either side of the ring gather any soft material; though I imagine this would happen with any if not most rings. Hello mssarah01, that is difficult question to answer as it is really about personal taste. We suggest you read through the 19 reviews to see what others say. We hope this helps and thank you ro shopping with us. Hello tamara2645, We should have this ring in gold in 3 days. I think it will be on this same page but there will be an option for yellow gold. We also do have the band #12982801. Thank you for shopping with us! "Looking for the perfect ring and I love this one. Always loved round diamonds, although hesitant to buy off a website. Any input from those who own this ring? I hope this is a great thing because I love it...." The most brilliant of all cuts, round halo diamonds are the traditional choice for all occasions and are preferred by many connoisseurs. For many years, white gold has been chosen as a substitute for platinum because of the significant cost savings. Shopping Tips & Inspiration How to Buy an Engagement Ring in 5 Easy Steps Finding the perfect engagement ring that expresses your love and complements their style isn't always a piece of cake. We'll walk you through the process step by step so you can buy an engagement ring that's just as dazzling as they are. How to Buy a Diamond Engagement Ring Whether you want to get the most bling for your buck or customize to your heart's content, choosing an engagement ring is a big decision. Let us guide you through all the ins and outs of finding the perfect ring. Top 5 Reasons to Consider Bridal Sets Top 5 Reasons to Consider Bridal Sets from Overstock.com. Our guides provide customers with the top 5 reasons to consider bridal Sets. How to Clean an Engagement Ring How to Clean an Engagement Ring from Overstock.com. Learn the right and wrong ways to clean a diamond engagement ring to keep it looking beautiful. Luckily, it isn't difficult to clean a diamond ring at home. Gemstone Treatment Guide The term "treatment" is an indicator of whether a gemstone has been treated or not. Enhancements are the specific changes that have been applied to treated gemstones. Both gemstone treatments and gemstone enhancements have codes that indicate what has been done to the gemstone's appearance. These codes are usually indicated on jewelry product pages if you're shopping for jewelry online. Best Engagement Rings for Christmas If you're giving the ultimate Christmas gift by taking the next step with the one you love, then congratulations! Since it's a time when family and friends gather and celebrate, the holidays are a romantic time to propose. Before you pop the question, make sure you're ready with the perfect engagement ring to make the moment unforgettable. Keep reading to learn about the best engagement ring styles to help you pick the right one for your loved one this Christmas. Gemstone Buying Guide Gemstones have long held cultural significance in the fashion world as dazzling accessories and signifiers of important milestones. From classic sparkle to exotic hues, gemstone jewelry can amplify personal style, perfect an outfit, and make a meaningful gift or keepsake. Whether you're expanding your personal jewelry collection or giving a gift to someone you care about, keep reading for more tips on how to buy a gemstone. Standard Return Policy for Jewelry: Items must be returned in new or unused condition and contain all original materials included with the shipment. More Details For your protection, all orders are screened for security purposes. If your order is selected for review, our Loss Prevention Team may contact you by phone or email. There may be a two business day delay to process your order. ** Most Oversize orders are delivered within 1-4 weeks. Some orders may take 6 weeks to be delivered. Shop Overstock.com and find the best online deals on everything for your home. We work every day to bring you discounts on new products across our entire store. Whether you're looking for memorable gifts or everyday essentials, you can buy them here for less. Eziba® | Shop Eziba.com® O.com® Over half a million prices checked each week. Overstock.com strives to deliver the lowest prices and the biggest savings on all the products you need for your home.
{ "perplexity_score": 624.6, "pile_set_name": "Pile-CC" }
L’enquête fut longue (1), mais aujourd’hui les « ichnologues », ces géologues spécialisés dans l’analyse des traces fossiles animales, ont trouvé le coupable : un dinosaure d’au moins 35 m de long et de plus de 35 tonnes, présent il y a 150 millions d’années. Découvertes en 2009, dans le massif du Jura, sur le site de Plagne (Ain) près d’Oyonnax, par deux naturalistes amateurs, ces traces ont été ensuite longuement étudiées par plusieurs équipes de géologues (universités de Lyon, Saint-Étienne, Clermont-Ferrand, ENS, CNRS, IRD, et musée de la Plage aux ptérosaures) et notamment par Jean-Michel Mazin. Une prairie aux nombreuses traces de dinosaures Les fouilles ont révélé que cette « prairie » de 3 hectares contenait de très nombreuses autres traces de dinosaures. Surtout, les empreintes découvertes en 2009 s’insèrent sur une piste de 110 pas successifs, sur 155 mètres de long : un record mondial pour des sauropodes, c’est-à-dire des herbivores, les plus imposants des dinosaures. « La datation des niveaux calcaires montre que la piste remonte à 150 millions d’années, à une période du jurassique appelée tithonien inférieur, et que le site de Plagne se situait alors sur une vaste plateforme carbonatée (calcaire), où s’étendait une mer chaude et peu profonde, explique Nicolas Olivier, chercheur au laboratoire de géologie de Lyon. La présence de grands dinosaures indique que la région devait être parsemée de nombreuses îles, à la végétation suffisamment fournie pour nourrir de telles créatures. Au gré des fluctuations du niveau marin, ces chapelets d’îles devaient se connecter afin que ces grands vertébrés puissent migrer depuis les terres émergées du massif rhénan. » Des fouilles pour affiner l’étude des empreintes de dinosaures Des fouilles complémentaires ont permis d’affiner l’étude des empreintes. « Celles des pieds mesurent de 94 à 103 cm, mais peuvent atteindre jusqu’à 3 mètres en incluant le bourrelet de boue périphérique expulsé lors de l’impact », précise le géologue. Ces empreintes portent cinq marques de doigts elliptiques, tandis que les mains présentent cinq marques de doigts circulaires, organisées en arc de cercle. Les analyses biométriques décrivent un animal d’au moins 35 m de long et de 35 à 40 tonnes, avec des enjambées de 2,80 m en moyenne et une vitesse de 4 km à l’heure. Il appartient à un nouveau genre : le Brontopodus plagnensis. Le site comprend également différentes pistes, dont une de 18 pas et 38 mètres, laissée par un carnivore du genre Megalosauripus.
{ "perplexity_score": 1096.3, "pile_set_name": "OpenWebText2" }
Welcome to the PokéCommunity! Hi there! Thanks for visiting PokéCommunity. We’re a group of Pokémon fans dedicated to providing the best place on the Internet for discussing ideas and sharing fan-made content. Welcome! We’re glad you’re here. In order to join our community we need you to create an account with us. Doing so will allow you to make posts, submit and view fan art and fan fiction, download fan-made games, and much more. It’s quick and easy; just click here and follow the instructions. PGM is all set for February. This month, we're playing through a game known as Eevee's Tile Trial. If you wish to earn rewards, please head over to our event thread by clicking on the provided link and give yourself a shot at the game! Hey Unregistered! How fast can you game? The Marathon II is up and running in Video Game's - compete against your friends to see how quickly you can complete sixty intense in-game challenges. See you there! Easing Back In So I've been spat out of the other end of University this week and I am now living in the real world. That's it for me so far a full-time education is concerned. Not sure how I feel about that - it will probably hit me in a few weeks that I need to look for a job else I end up living in a box on a street corner saying 'Will badly draw Pokémon for food..." to passing strangers. ...sorry, panicked for a second there. I'm going to ease myself back into PC after a kinda-sorta-hiatus for the last two years (honestly too busy with film work). I've been on and off occasionally but never really did anything other than reply to my wall posts (thanks to you guys keeping in touch!! <3 ) and of course taking part in PCX last year. Egg Swap will be making a comeback at this year's Get-Together so that should be an ideal way to get me into the swing - I guess I'll see most of you properly there and meet up with some new people that have joined up. I need to get back into writing my fanfic too - I've filled up three A4 pages worth of notes on it, it's sequel and it's next sequel (jeez " )... I need to get writing else I may explode. I've got a few edit jobs to complete first (I now have a website - cloud13.net - where I try to promote myself for freelance work), and once those are done I can really start getting into it (I hope). I wanna do more Pokémon movie trailers too (youtube.com/KipTheReal if you haven't seen them yet). I'm getting my marks back slowly - so long as I don't fail anything, I'm on course for graduating with a 2.1 BA (Hons) degree. Fingers crossed. The PokéCommunity Meta Pokémon characters and images belong to The Pokémon Company International and Nintendo. This website is in no way affiliated with or endorsed by Nintendo, Creatures, GAMEFREAK, or The Pokémon Company International. We just love Pokémon.
{ "perplexity_score": 470, "pile_set_name": "Pile-CC" }
Factors affecting outcomes of liver transplantation: an analysis of OPTN/UNOS database. This was a historic cohort analysis based on 110,521 patients who underwent liver transplant between 1987 and July 2011 in the United States and were reported to the UNOS registry. In addition to univariate Kaplan-Meier survival analyses, we used cox proportional hazard analysis and multiple logistic regression analysis to evaluate hazard ratios adjusted for clinical factors. The overall 5- and 10-year patient survival rates were 81% and 72%, respectively, for 4,412 recipients of living donor livers and 73% and 59%, respectively, for 106,109 recipients of deceased donor livers. Multivariate analyses suggest that these differences are due to demographics, including patient age rather than differences due to the donor organs. Recipients of zero HLA-mismatched livers had significantly worst graft survival (HR 1.29, p = 0.02) compared with those given an HLA mismatched graft. This appears to be due in part to graft versus host disease. Among recipients who experienced GVHD, multivariate analysis revealed that zero mismatch of HLA-A (HR 2.75), zero mismatch of HLA-B (HR 4.79), recipient age > 65 (HR 2.57) and Asian recipient (HR 2.70) were significant risk factors for GVHD respectively.
{ "perplexity_score": 382.3, "pile_set_name": "PubMed Abstracts" }
#ifndef __PX_XMODEM_CFG_H__ #define __PX_XMODEM_CFG_H__ /* ============================================================================= ____ ___ ____ ___ _ _ ___ __ __ ___ __ __ TM | _ \ |_ _| / ___| / _ \ | \ | | / _ \ | \/ | |_ _| \ \/ / | |_) | | | | | | | | | | \| | | | | | | |\/| | | | \ / | __/ | | | |___ | |_| | | |\ | | |_| | | | | | | | / \ |_| |___| \____| \___/ |_| \_| \___/ |_| |_| |___| /_/\_\ Copyright (c) 2012 Pieter Conradie <https://piconomix.com> License: MIT https://github.com/piconomix/piconomix-fwlib/blob/master/LICENSE.md Title: px_xmodem_cfg.h : XMODEM Peripheral Driver configuration Author(s): Pieter Conradie Creation Date: 2013-01-15 ============================================================================= */ /* _____STANDARD INCLUDES____________________________________________________ */ /* _____PROJECT INCLUDES_____________________________________________________ */ #include "px_defines.h" #include "px_xmodem_glue.h" /* _____DEFINITIONS__________________________________________________________ */ #define PX_XMODEM_CFG_MAX_RETRIES 4 #define PX_XMODEM_CFG_MAX_RETRIES_START 4 /** * See if a received byte is available and store it in the specified location. * * @param[out] data Pointer to location where data byte must be stored * * @retval true Received byte is stored in specified location * @retval false No received data available (receive buffer empty) */ #define PX_XMODEM_CFG_RD_U8(data) px_xmodem_rd_u8(data) /** * Write one byte. * * This function blocks until space is available in the transmit buffer. * * @param[in] data Byte to be written */ #define PX_XMODEM_CFG_WR_U8(data) px_xmodem_wr_u8(data) /** * Start timeout timer. * * This function starts the XMODEM timeout timer. * * @param[in] time_ms Time in milliseconds to wait before timer has expired */ #define PX_XMODEM_CFG_TMR_START(time_ms) px_xmodem_tmr_start(time_ms) /** * See if timer has expired. * * @retval true Timer has expired * @retval true Timer has not expired */ #define PX_XMODEM_CFG_TMR_HAS_EXPIRED() px_xmodem_tmr_has_expired() /// @} #endif // #ifndef __PX_XMODEM_CFG_H__
{ "perplexity_score": 218.9, "pile_set_name": "Github" }
Salem Township, Illinois Salem Township, Illinois may refer to one of the following townships: Salem Township, Carroll County, Illinois Salem Township, Knox County, Illinois Salem Township, Marion County, Illinois There is also: New Salem Township, McDonough County, Illinois New Salem Township, Pike County, Illinois See also Salem Township (disambiguation) Category:Illinois township disambiguation pages
{ "perplexity_score": 188.1, "pile_set_name": "Wikipedia (en)" }
Thermal Activation of CH4 and H2 as Mediated by the Ruthenium Oxide Cluster Ions [RuOx ]+ (x=1-3): On the Influence of Oxidation States. Thermal gas-phase reactions of the ruthenium-oxide clusters [RuOx ]+ (x=1-3) with methane and dihydrogen have been explored by using FT-ICR mass spectrometry complemented by high-level quantum chemical calculations. For methane activation, as compared to the previously studied [RuO]+ /CH4 couple, the higher oxidized Ru systems give rise to completely different product distributions. [RuO2 ]+ brings about the generations of [Ru,O,C,H2 ]+ /H2 O, [Ru,O,C]+ /H2 /H2 O, and [Ru,O,H2 ]+ /CH2 O, whereas [RuO3 ]+ exhibits a higher selectivity and efficiency in producing formaldehyde and syngas (CO+H2 ). Regarding the reactions with H2 , as compared to CH4 , both [RuO]+ and [RuO2 ]+ react similarly inefficiently with oxygen-atom transfer being the main reaction channel; in contrast, [RuO3 ]+ is inert toward dihydrogen. Theoretical analysis reveals that the reduction of the metal center drives the overall oxidation of methane, whereas the back-bonding orbital interactions between the cluster ions and dihydrogen control the H-H bond activation. Furthermore, the reactivity patterns of [RuOx ]+ (x=1-3) with CH4 and H2 have been compared with the previously reported results of Group 8 analogues [OsOx ]+ /CH4 /H2 (x=1-3) and the [FeO]+ /H2 system. The electronic origins for their distinctly different reaction behaviors have been addressed.
{ "perplexity_score": 551, "pile_set_name": "PubMed Abstracts" }
Hoping to be a different person tomorrow from the one I am today... May 03, 2009 I write this as an observer of the culture, and as someone who is interested in the burgeoning of the multifaceted culture of spirituality, apparent in almost every area of life. This is a quick summation of the thoughts that have been running through my head following the ROMBS Conference last weekend. Almost ten years agonow I was invited to be a part of a Christian group who placed stalls into Mind Body Soul exhibitions, at the time what we called New Age Spirituality was becoming a noticeable part of culture. This rise in a search for spirituality away from the mainstream religions ( or possibly because of them) reflected the cultural shift from modernity to post-modernity. Questions were being asked of the religion and its power bases and at the same time the search for spirituality was being spoken about in ways it had not been before, being a spiritual person was a good thing to be and topics that would have previously been taboo were suddenly firmly on the agenda. For the following 5 years the Mind Body Soul exhibitions grew in popularity and attracted larger and larger crowds, to be spiritual said something really positive about you as a person. Supermarkets and advertisers were quick to catch on and products were marketed according to the experience they might give you rather than on a list of facts and figures, a spiritual experience was a plus. In the subsequent 5 years something interesting began to happen, some of the big exhibitions were replaced by a proliferation of smaller ones, village halls and pubs became popular venues, I have even been asked to advise a schools on the subject of hosting spirituality fairs as fundraisers. Spirituality is still firmly on the agenda, people are more open to speak about spiritual things and see spirituality as an essential part of being human. One thing that challenges me is the current readiness of folk to talk about Jesus in a positive manner, most recently this trend has been highlighted for us by Jade Goody and her statements about faith and baptism. The question to the Church today is, are we ready to engage with the God who has gone before us, do we have eyes to see, and ears to hear where he is working so that we can join in? March 22, 2009 Jade Goody was a controversial figure, for the last seven years ever since she hit the TV screens through the reality TV show Big Brother she has been loved and hated by the tabloid press and the public alike. Her death was reported this morning. Over the last few weeks her battle with terminal cancer has been documented and we have watched a brave young woman deal with her last days in a glare of invited publicity. It is easy to critisise Jade, in our Mothering Sunday Service this morning a request for prayer was made for her children, the request was phrased that no matter what we thought of the mother we should pray for her children. I tend to think that we might do well to listen to some of Jade's words during her last few weeks; yes she sold her story for a handsome sum of money, but as she explained she did not do so in order to buy flashy cars and big houses, but in order to provide for her sons so that they could have a better childhood than she had had! Jade has also been generous in support for charities including cancer charities. Jade often displayed hidden depths, she weathered the storm of racism accusations emerging eventually to take part in an Indian version of Big Brother where she explained that she did not realise how offensive she had been. If anyone else had made such a statement would and should have been met with suspicion, but Jade wore her heart on her sleeve, and I for one suspect that she meant what she said. When confronted with the fact that her behavior was unreasonable Jade usually listened to reason, it was not her fault that she did not know another way. I have been struck by her recent desire to know Jesus, her theology might well be shaky but her desire was genuine, and I explained here why I felt that her desire to be baptised and to see her boys baptised should be welcomed rather than frowned upon. So today I prayed for Jade and for her family, and I pray that her example of love and care for her family might be one that challenges us this Mothering Sunday to open our eyes and see even through this flawed image the evidence of the God of love at work, a God who loves each one of us more than we can possibly imagine. Did Jade find God as some newspapers are quoting, I don't know how to answer that, but this I know for sure, God would not turn Jade away!
{ "perplexity_score": 354.1, "pile_set_name": "Pile-CC" }
<?php /* * This file is part of PHPExifTool. * * (c) 2012 Romain Neutron <imprec@gmail.com> * * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace PHPExiftool\Driver\Tag\ASF; use JMS\Serializer\Annotation\ExclusionPolicy; use PHPExiftool\Driver\AbstractTag; /** * @ExclusionPolicy("all") */ class Text extends AbstractTag { protected $Id = 'Text'; protected $Name = 'Text'; protected $FullName = 'ASF::ExtendedDescr'; protected $GroupName = 'ASF'; protected $g0 = 'ASF'; protected $g1 = 'ASF'; protected $g2 = 'Video'; protected $Type = '?'; protected $Writable = false; protected $Description = 'Text'; }
{ "perplexity_score": 2826.4, "pile_set_name": "Github" }
[Diagnostic principles in myopathies]. Myopathies include a broad range of disorders. Diagnostic steps in muscle disorders should therefore be followed sequentially, in order not to miss important information and to avoid unnecessary and cost intensive diagnostic procedures. Specific care should be applied in taking patient's history to ascertain myopathy related complaints, triggers and concomitant diseases possibly being accompanied by a myopathy. Clinical examination may reveal a distribution pattern already suggestive for a specific disorder. An elevated creatine kinase, often leading to neurological evaluation, should at least be repeated once after resting. Metabolic myopathies might be detected by exercise testing. Electromyography, muscle imaging and, usually as the last diagnostic step, muscle biopsy represent further diagnostic tools in the assessment of myopathies. In some disorders molecular genetic techniques can be applied.
{ "perplexity_score": 471.8, "pile_set_name": "PubMed Abstracts" }
Q: How to send a query to the database using GET through an REST API (Ruby on Rails) I would like to add a query parameter to a GET request such a way that my REST API returns the query's result instead of the result from default index method. Is this possible? Here is my index method: def index users = User.all render( json: ActiveModel::ArraySerializer.new( users, each_serializer: Api::V1::UserSerializer, root: 'users' ) ) end I would like to have an additional method named my_new_index executable by a GET or I would like to have a query submitted as a parameter to the default index method, lets say something like this: query = "select * from users where name like 'A%' order by name desc" A: I'm not sure I understand exactly what you're trying to do but what I would suggest is using the same end point index to return your content filtered. First I'll start by creating a scope like: scope :starting_with, ->(letter) { where('users.name like ?', "#{letter}%") if letter } Then update you index end point to something like: def index users = User.starting_with(params[:letter]).all render( json: ActiveModel::ArraySerializer.new( users, each_serializer: Api::V1::UserSerializer, root: 'users' ) ) end In this quick example the end point receive the params, if it contains a letter params, it will render users filtered by the scope query. If the param is not present, it return all users. FYI it's just a quick example and not perfect, I'm sure you could find ways improve it. Hope it helps :)
{ "perplexity_score": 1497.4, "pile_set_name": "StackExchange" }
Known biological processes for producing an .alpha.-hydroxyamide include a process comprising reacting lactonitrile, hydroxyacetonitrile, .alpha.-hydroxymethylthiobutyronitrile etc. with a microorganism belonging to the genus Bacillus, Bacteridium, Micrococcus or Brevibacterium to obtain a corresponding amide as disclosed in JP-B-62-21519 (corresponding to U.S. Pat. No. 4,001,081) (the term "JP-B" as used herein means an "examined published Japanese patent application"). It is also reported in Grant, D. J. W., Antonie van Leeuwenhoek; J. Microbiol. Serol. Vol. 39, p. 273 (1973) that hydrolysis of lactonitrile by the action of a microorganism belonging to the genus Corynebacterium to produce lactic acid involves accumulation of lactamide as an intermediate. Known biological processes for producing an .alpha.-hydroxy acid include a process for obtaining glycolic acid, lactic acid, .alpha.-hydroxyisobutyric acid etc. from the corresponding .alpha.-hydroxynitrile by the action of a microorganism of the genus Corynebacterium (see JP-A-61-56086, the term "JP-A" as used herein means an "unexamined published Japanese patent application"), a process for obtaining lactic acid, glycolic acid etc. from the corresponding .alpha.-hydroxynitrile by using a microorganism of the genus Bacillus, Bacteridium, Micrococcus or Brevibacterium (see JP-B-58-15120, corresponding to U.S. Pat. No. 3,940,316), a process for obtaining lactic acid, .alpha.-hydroxyisobutyric acid, mandelic acid, .alpha.-hydroxybutyric acid, .alpha.-hydroxyvaleric acid, .alpha.-hydroxy-.alpha.-phenylpropionic acid, .alpha.-hydroxy-.alpha.-(p-isobutylphenyl)propionic acid etc. from the corresponding .alpha.-hydroxynitrile by using a microorganism of the genus Pseudomonas, Arthrobacter, Aspergillus, Penicillium, Cochliobolus or Fusarium (see JP-A-63-222696) and a process for obtaining .alpha.-hydroxy-.beta.,.beta.-dimethyl-.gamma.-butyrolactone from the corresponding .alpha.-hydroxynitrile by using a microorganism of the genus Arthrobacter. Aspergillus, Bacillus, Bacteridium, Brevibacterium, Cochliobolus, Corynebacterium. Micrococcus, Nocardia. Penicillium, Pseudomonas or Fusarium (see JP-A-64-10996). It is known, however, that an .alpha.-hydroxynitrile is, more or less, partially dissociated into the corresponding aldehyde and hydrogen cyanide in a polar solvent as taught in V. Okano et al., J. Am. Chem. Soc., Vol. 98, p. 4201 (1976). Since an aldehyde generally is bound to proteins to deactivate enzymes as described in G. E. Means et al. (ed.), Chemical Modification of Proteins, p. 125, Holden-Day (1971), enzymatic hydration or hydrolysis of an .alpha.-hydroxynitrile is accompanied with the problem that the enzyme is deactivated in a short time. It therefore has been difficult to obtain an .alpha.-hydroxyamide or an .alpha.-hydroxy acid in high concentration with high productivity.
{ "perplexity_score": 261.7, "pile_set_name": "USPTO Backgrounds" }
Note: This drop is for the K70 or K95 keyboard and Sabre Laser RGB Bundle. You can remove the mouse at checkout (-$45) if you only want the keyboard. Additional Note: The keyboards on this drop will ship within 5 business days (July 10th) of the drop ending irrespective of the option chosen. The mice will ship based on the estimated shipping time given below.
{ "perplexity_score": 663, "pile_set_name": "OpenWebText2" }
// Copyright (c) 2005-2008 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us) // (c) 2005-2008 Sammi Williams (http://www.oriontransfer.co.nz, sammi@oriontransfer.co.nz) // // script.aculo.us is freely distributable under the terms of an MIT-style license. // For details, see the script.aculo.us web site: http://script.aculo.us/ if(Object.isUndefined(Effect)) throw("dragdrop.js requires including script.aculo.us' effects.js library"); var Droppables = { drops: [], remove: function(element) { this.drops = this.drops.reject(function(d) { return d.element==$(element) }); }, add: function(element) { element = $(element); var options = Object.extend({ greedy: true, hoverclass: null, tree: false }, arguments[1] || { }); // cache containers if(options.containment) { options._containers = []; var containment = options.containment; if(Object.isArray(containment)) { containment.each( function(c) { options._containers.push($(c)) }); } else { options._containers.push($(containment)); } } if(options.accept) options.accept = [options.accept].flatten(); Element.makePositioned(element); // fix IE options.element = element; this.drops.push(options); }, findDeepestChild: function(drops) { deepest = drops[0]; for (i = 1; i < drops.length; ++i) if (Element.isParent(drops[i].element, deepest.element)) deepest = drops[i]; return deepest; }, isContained: function(element, drop) { var containmentNode; if(drop.tree) { containmentNode = element.treeNode; } else { containmentNode = element.parentNode; } return drop._containers.detect(function(c) { return containmentNode == c }); }, isAffected: function(point, element, drop) { return ( (drop.element!=element) && ((!drop._containers) || this.isContained(element, drop)) && ((!drop.accept) || (Element.classNames(element).detect( function(v) { return drop.accept.include(v) } ) )) && Position.within(drop.element, point[0], point[1]) ); }, deactivate: function(drop) { if(drop.hoverclass) Element.removeClassName(drop.element, drop.hoverclass); this.last_active = null; }, activate: function(drop) { if(drop.hoverclass) Element.addClassName(drop.element, drop.hoverclass); this.last_active = drop; }, show: function(point, element) { if(!this.drops.length) return; var drop, affected = []; this.drops.each( function(drop) { if(Droppables.isAffected(point, element, drop)) affected.push(drop); }); if(affected.length>0) drop = Droppables.findDeepestChild(affected); if(this.last_active && this.last_active != drop) this.deactivate(this.last_active); if (drop) { Position.within(drop.element, point[0], point[1]); if(drop.onHover) drop.onHover(element, drop.element, Position.overlap(drop.overlap, drop.element)); if (drop != this.last_active) Droppables.activate(drop); } }, fire: function(event, element) { if(!this.last_active) return; Position.prepare(); if (this.isAffected([Event.pointerX(event), Event.pointerY(event)], element, this.last_active)) if (this.last_active.onDrop) { this.last_active.onDrop(element, this.last_active.element, event); return true; } }, reset: function() { if(this.last_active) this.deactivate(this.last_active); } }; var Draggables = { drags: [], observers: [], register: function(draggable) { if(this.drags.length == 0) { this.eventMouseUp = this.endDrag.bindAsEventListener(this); this.eventMouseMove = this.updateDrag.bindAsEventListener(this); this.eventKeypress = this.keyPress.bindAsEventListener(this); Event.observe(document, "mouseup", this.eventMouseUp); Event.observe(document, "mousemove", this.eventMouseMove); Event.observe(document, "keypress", this.eventKeypress); } this.drags.push(draggable); }, unregister: function(draggable) { this.drags = this.drags.reject(function(d) { return d==draggable }); if(this.drags.length == 0) { Event.stopObserving(document, "mouseup", this.eventMouseUp); Event.stopObserving(document, "mousemove", this.eventMouseMove); Event.stopObserving(document, "keypress", this.eventKeypress); } }, activate: function(draggable) { if(draggable.options.delay) { this._timeout = setTimeout(function() { Draggables._timeout = null; window.focus(); Draggables.activeDraggable = draggable; }.bind(this), draggable.options.delay); } else { window.focus(); // allows keypress events if window isn't currently focused, fails for Safari this.activeDraggable = draggable; } }, deactivate: function() { this.activeDraggable = null; }, updateDrag: function(event) { if(!this.activeDraggable) return; var pointer = [Event.pointerX(event), Event.pointerY(event)]; // Mozilla-based browsers fire successive mousemove events with // the same coordinates, prevent needless redrawing (moz bug?) if(this._lastPointer && (this._lastPointer.inspect() == pointer.inspect())) return; this._lastPointer = pointer; this.activeDraggable.updateDrag(event, pointer); }, endDrag: function(event) { if(this._timeout) { clearTimeout(this._timeout); this._timeout = null; } if(!this.activeDraggable) return; this._lastPointer = null; this.activeDraggable.endDrag(event); this.activeDraggable = null; }, keyPress: function(event) { if(this.activeDraggable) this.activeDraggable.keyPress(event); }, addObserver: function(observer) { this.observers.push(observer); this._cacheObserverCallbacks(); }, removeObserver: function(element) { // element instead of observer fixes mem leaks this.observers = this.observers.reject( function(o) { return o.element==element }); this._cacheObserverCallbacks(); }, notify: function(eventName, draggable, event) { // 'onStart', 'onEnd', 'onDrag' if(this[eventName+'Count'] > 0) this.observers.each( function(o) { if(o[eventName]) o[eventName](eventName, draggable, event); }); if(draggable.options[eventName]) draggable.options[eventName](draggable, event); }, _cacheObserverCallbacks: function() { ['onStart','onEnd','onDrag'].each( function(eventName) { Draggables[eventName+'Count'] = Draggables.observers.select( function(o) { return o[eventName]; } ).length; }); } }; /*--------------------------------------------------------------------------*/ var Draggable = Class.create({ initialize: function(element) { var defaults = { handle: false, reverteffect: function(element, top_offset, left_offset) { var dur = Math.sqrt(Math.abs(top_offset^2)+Math.abs(left_offset^2))*0.02; new Effect.Move(element, { x: -left_offset, y: -top_offset, duration: dur, queue: {scope:'_draggable', position:'end'} }); }, endeffect: function(element) { var toOpacity = Object.isNumber(element._opacity) ? element._opacity : 1.0; new Effect.Opacity(element, {duration:0.2, from:0.7, to:toOpacity, queue: {scope:'_draggable', position:'end'}, afterFinish: function(){ Draggable._dragging[element] = false } }); }, zindex: 1000, revert: false, quiet: false, scroll: false, scrollSensitivity: 20, scrollSpeed: 15, snap: false, // false, or xy or [x,y] or function(x,y){ return [x,y] } delay: 0 }; if(!arguments[1] || Object.isUndefined(arguments[1].endeffect)) Object.extend(defaults, { starteffect: function(element) { element._opacity = Element.getOpacity(element); Draggable._dragging[element] = true; new Effect.Opacity(element, {duration:0.2, from:element._opacity, to:0.7}); } }); var options = Object.extend(defaults, arguments[1] || { }); this.element = $(element); if(options.handle && Object.isString(options.handle)) this.handle = this.element.down('.'+options.handle, 0); if(!this.handle) this.handle = $(options.handle); if(!this.handle) this.handle = this.element; if(options.scroll && !options.scroll.scrollTo && !options.scroll.outerHTML) { options.scroll = $(options.scroll); this._isScrollChild = Element.childOf(this.element, options.scroll); } Element.makePositioned(this.element); // fix IE this.options = options; this.dragging = false; this.eventMouseDown = this.initDrag.bindAsEventListener(this); Event.observe(this.handle, "mousedown", this.eventMouseDown); Draggables.register(this); }, destroy: function() { Event.stopObserving(this.handle, "mousedown", this.eventMouseDown); Draggables.unregister(this); }, currentDelta: function() { return([ parseInt(Element.getStyle(this.element,'left') || '0'), parseInt(Element.getStyle(this.element,'top') || '0')]); }, initDrag: function(event) { if(!Object.isUndefined(Draggable._dragging[this.element]) && Draggable._dragging[this.element]) return; if(Event.isLeftClick(event)) { // abort on form elements, fixes a Firefox issue var src = Event.element(event); if((tag_name = src.tagName.toUpperCase()) && ( tag_name=='INPUT' || tag_name=='SELECT' || tag_name=='OPTION' || tag_name=='BUTTON' || tag_name=='TEXTAREA')) return; var pointer = [Event.pointerX(event), Event.pointerY(event)]; var pos = Position.cumulativeOffset(this.element); this.offset = [0,1].map( function(i) { return (pointer[i] - pos[i]) }); Draggables.activate(this); Event.stop(event); } }, startDrag: function(event) { this.dragging = true; if(!this.delta) this.delta = this.currentDelta(); if(this.options.zindex) { this.originalZ = parseInt(Element.getStyle(this.element,'z-index') || 0); this.element.style.zIndex = this.options.zindex; } if(this.options.ghosting) { this._clone = this.element.cloneNode(true); this._originallyAbsolute = (this.element.getStyle('position') == 'absolute'); if (!this._originallyAbsolute) Position.absolutize(this.element); this.element.parentNode.insertBefore(this._clone, this.element); } if(this.options.scroll) { if (this.options.scroll == window) { var where = this._getWindowScroll(this.options.scroll); this.originalScrollLeft = where.left; this.originalScrollTop = where.top; } else { this.originalScrollLeft = this.options.scroll.scrollLeft; this.originalScrollTop = this.options.scroll.scrollTop; } } Draggables.notify('onStart', this, event); if(this.options.starteffect) this.options.starteffect(this.element); }, updateDrag: function(event, pointer) { if(!this.dragging) this.startDrag(event); if(!this.options.quiet){ Position.prepare(); Droppables.show(pointer, this.element); } Draggables.notify('onDrag', this, event); this.draw(pointer); if(this.options.change) this.options.change(this); if(this.options.scroll) { this.stopScrolling(); var p; if (this.options.scroll == window) { with(this._getWindowScroll(this.options.scroll)) { p = [ left, top, left+width, top+height ]; } } else { p = Position.page(this.options.scroll); p[0] += this.options.scroll.scrollLeft + Position.deltaX; p[1] += this.options.scroll.scrollTop + Position.deltaY; p.push(p[0]+this.options.scroll.offsetWidth); p.push(p[1]+this.options.scroll.offsetHeight); } var speed = [0,0]; if(pointer[0] < (p[0]+this.options.scrollSensitivity)) speed[0] = pointer[0]-(p[0]+this.options.scrollSensitivity); if(pointer[1] < (p[1]+this.options.scrollSensitivity)) speed[1] = pointer[1]-(p[1]+this.options.scrollSensitivity); if(pointer[0] > (p[2]-this.options.scrollSensitivity)) speed[0] = pointer[0]-(p[2]-this.options.scrollSensitivity); if(pointer[1] > (p[3]-this.options.scrollSensitivity)) speed[1] = pointer[1]-(p[3]-this.options.scrollSensitivity); this.startScrolling(speed); } // fix AppleWebKit rendering if(Prototype.Browser.WebKit) window.scrollBy(0,0); Event.stop(event); }, finishDrag: function(event, success) { this.dragging = false; if(this.options.quiet){ Position.prepare(); var pointer = [Event.pointerX(event), Event.pointerY(event)]; Droppables.show(pointer, this.element); } if(this.options.ghosting) { if (!this._originallyAbsolute) Position.relativize(this.element); delete this._originallyAbsolute; Element.remove(this._clone); this._clone = null; } var dropped = false; if(success) { dropped = Droppables.fire(event, this.element); if (!dropped) dropped = false; } if(dropped && this.options.onDropped) this.options.onDropped(this.element); Draggables.notify('onEnd', this, event); var revert = this.options.revert; if(revert && Object.isFunction(revert)) revert = revert(this.element); var d = this.currentDelta(); if(revert && this.options.reverteffect) { if (dropped == 0 || revert != 'failure') this.options.reverteffect(this.element, d[1]-this.delta[1], d[0]-this.delta[0]); } else { this.delta = d; } if(this.options.zindex) this.element.style.zIndex = this.originalZ; if(this.options.endeffect) this.options.endeffect(this.element); Draggables.deactivate(this); Droppables.reset(); }, keyPress: function(event) { if(event.keyCode!=Event.KEY_ESC) return; this.finishDrag(event, false); Event.stop(event); }, endDrag: function(event) { if(!this.dragging) return; this.stopScrolling(); this.finishDrag(event, true); Event.stop(event); }, draw: function(point) { var pos = Position.cumulativeOffset(this.element); if(this.options.ghosting) { var r = Position.realOffset(this.element); pos[0] += r[0] - Position.deltaX; pos[1] += r[1] - Position.deltaY; } var d = this.currentDelta(); pos[0] -= d[0]; pos[1] -= d[1]; if(this.options.scroll && (this.options.scroll != window && this._isScrollChild)) { pos[0] -= this.options.scroll.scrollLeft-this.originalScrollLeft; pos[1] -= this.options.scroll.scrollTop-this.originalScrollTop; } var p = [0,1].map(function(i){ return (point[i]-pos[i]-this.offset[i]) }.bind(this)); if(this.options.snap) { if(Object.isFunction(this.options.snap)) { p = this.options.snap(p[0],p[1],this); } else { if(Object.isArray(this.options.snap)) { p = p.map( function(v, i) { return (v/this.options.snap[i]).round()*this.options.snap[i] }.bind(this)); } else { p = p.map( function(v) { return (v/this.options.snap).round()*this.options.snap }.bind(this)); } }} var style = this.element.style; if((!this.options.constraint) || (this.options.constraint=='horizontal')) style.left = p[0] + "px"; if((!this.options.constraint) || (this.options.constraint=='vertical')) style.top = p[1] + "px"; if(style.visibility=="hidden") style.visibility = ""; // fix gecko rendering }, stopScrolling: function() { if(this.scrollInterval) { clearInterval(this.scrollInterval); this.scrollInterval = null; Draggables._lastScrollPointer = null; } }, startScrolling: function(speed) { if(!(speed[0] || speed[1])) return; this.scrollSpeed = [speed[0]*this.options.scrollSpeed,speed[1]*this.options.scrollSpeed]; this.lastScrolled = new Date(); this.scrollInterval = setInterval(this.scroll.bind(this), 10); }, scroll: function() { var current = new Date(); var delta = current - this.lastScrolled; this.lastScrolled = current; if(this.options.scroll == window) { with (this._getWindowScroll(this.options.scroll)) { if (this.scrollSpeed[0] || this.scrollSpeed[1]) { var d = delta / 1000; this.options.scroll.scrollTo( left + d*this.scrollSpeed[0], top + d*this.scrollSpeed[1] ); } } } else { this.options.scroll.scrollLeft += this.scrollSpeed[0] * delta / 1000; this.options.scroll.scrollTop += this.scrollSpeed[1] * delta / 1000; } Position.prepare(); Droppables.show(Draggables._lastPointer, this.element); Draggables.notify('onDrag', this); if (this._isScrollChild) { Draggables._lastScrollPointer = Draggables._lastScrollPointer || $A(Draggables._lastPointer); Draggables._lastScrollPointer[0] += this.scrollSpeed[0] * delta / 1000; Draggables._lastScrollPointer[1] += this.scrollSpeed[1] * delta / 1000; if (Draggables._lastScrollPointer[0] < 0) Draggables._lastScrollPointer[0] = 0; if (Draggables._lastScrollPointer[1] < 0) Draggables._lastScrollPointer[1] = 0; this.draw(Draggables._lastScrollPointer); } if(this.options.change) this.options.change(this); }, _getWindowScroll: function(w) { var T, L, W, H; with (w.document) { if (w.document.documentElement && documentElement.scrollTop) { T = documentElement.scrollTop; L = documentElement.scrollLeft; } else if (w.document.body) { T = body.scrollTop; L = body.scrollLeft; } if (w.innerWidth) { W = w.innerWidth; H = w.innerHeight; } else if (w.document.documentElement && documentElement.clientWidth) { W = documentElement.clientWidth; H = documentElement.clientHeight; } else { W = body.offsetWidth; H = body.offsetHeight; } } return { top: T, left: L, width: W, height: H }; } }); Draggable._dragging = { }; /*--------------------------------------------------------------------------*/ var SortableObserver = Class.create({ initialize: function(element, observer) { this.element = $(element); this.observer = observer; this.lastValue = Sortable.serialize(this.element); }, onStart: function() { this.lastValue = Sortable.serialize(this.element); }, onEnd: function() { Sortable.unmark(); if(this.lastValue != Sortable.serialize(this.element)) this.observer(this.element) } }); var Sortable = { SERIALIZE_RULE: /^[^_\-](?:[A-Za-z0-9\-\_]*)[_](.*)$/, sortables: { }, _findRootElement: function(element) { while (element.tagName.toUpperCase() != "BODY") { if(element.id && Sortable.sortables[element.id]) return element; element = element.parentNode; } }, options: function(element) { element = Sortable._findRootElement($(element)); if(!element) return; return Sortable.sortables[element.id]; }, destroy: function(element){ element = $(element); var s = Sortable.sortables[element.id]; if(s) { Draggables.removeObserver(s.element); s.droppables.each(function(d){ Droppables.remove(d) }); s.draggables.invoke('destroy'); delete Sortable.sortables[s.element.id]; } }, create: function(element) { element = $(element); var options = Object.extend({ element: element, tag: 'li', // assumes li children, override with tag: 'tagname' dropOnEmpty: false, tree: false, treeTag: 'ul', overlap: 'vertical', // one of 'vertical', 'horizontal' constraint: 'vertical', // one of 'vertical', 'horizontal', false containment: element, // also takes array of elements (or id's); or false handle: false, // or a CSS class only: false, delay: 0, hoverclass: null, ghosting: false, quiet: false, scroll: false, scrollSensitivity: 20, scrollSpeed: 15, format: this.SERIALIZE_RULE, // these take arrays of elements or ids and can be // used for better initialization performance elements: false, handles: false, onChange: Prototype.emptyFunction, onUpdate: Prototype.emptyFunction }, arguments[1] || { }); // clear any old sortable with same element this.destroy(element); // build options for the draggables var options_for_draggable = { revert: true, quiet: options.quiet, scroll: options.scroll, scrollSpeed: options.scrollSpeed, scrollSensitivity: options.scrollSensitivity, delay: options.delay, ghosting: options.ghosting, constraint: options.constraint, handle: options.handle }; if(options.starteffect) options_for_draggable.starteffect = options.starteffect; if(options.reverteffect) options_for_draggable.reverteffect = options.reverteffect; else if(options.ghosting) options_for_draggable.reverteffect = function(element) { element.style.top = 0; element.style.left = 0; }; if(options.endeffect) options_for_draggable.endeffect = options.endeffect; if(options.zindex) options_for_draggable.zindex = options.zindex; // build options for the droppables var options_for_droppable = { overlap: options.overlap, containment: options.containment, tree: options.tree, hoverclass: options.hoverclass, onHover: Sortable.onHover }; var options_for_tree = { onHover: Sortable.onEmptyHover, overlap: options.overlap, containment: options.containment, hoverclass: options.hoverclass }; // fix for gecko engine Element.cleanWhitespace(element); options.draggables = []; options.droppables = []; // drop on empty handling if(options.dropOnEmpty || options.tree) { Droppables.add(element, options_for_tree); options.droppables.push(element); } (options.elements || this.findElements(element, options) || []).each( function(e,i) { var handle = options.handles ? $(options.handles[i]) : (options.handle ? $(e).select('.' + options.handle)[0] : e); options.draggables.push( new Draggable(e, Object.extend(options_for_draggable, { handle: handle }))); Droppables.add(e, options_for_droppable); if(options.tree) e.treeNode = element; options.droppables.push(e); }); if(options.tree) { (Sortable.findTreeElements(element, options) || []).each( function(e) { Droppables.add(e, options_for_tree); e.treeNode = element; options.droppables.push(e); }); } // keep reference this.sortables[element.id] = options; // for onupdate Draggables.addObserver(new SortableObserver(element, options.onUpdate)); }, // return all suitable-for-sortable elements in a guaranteed order findElements: function(element, options) { return Element.findChildren( element, options.only, options.tree ? true : false, options.tag); }, findTreeElements: function(element, options) { return Element.findChildren( element, options.only, options.tree ? true : false, options.treeTag); }, onHover: function(element, dropon, overlap) { if(Element.isParent(dropon, element)) return; if(overlap > .33 && overlap < .66 && Sortable.options(dropon).tree) { return; } else if(overlap>0.5) { Sortable.mark(dropon, 'before'); if(dropon.previousSibling != element) { var oldParentNode = element.parentNode; element.style.visibility = "hidden"; // fix gecko rendering dropon.parentNode.insertBefore(element, dropon); if(dropon.parentNode!=oldParentNode) Sortable.options(oldParentNode).onChange(element); Sortable.options(dropon.parentNode).onChange(element); } } else { Sortable.mark(dropon, 'after'); var nextElement = dropon.nextSibling || null; if(nextElement != element) { var oldParentNode = element.parentNode; element.style.visibility = "hidden"; // fix gecko rendering dropon.parentNode.insertBefore(element, nextElement); if(dropon.parentNode!=oldParentNode) Sortable.options(oldParentNode).onChange(element); Sortable.options(dropon.parentNode).onChange(element); } } }, onEmptyHover: function(element, dropon, overlap) { var oldParentNode = element.parentNode; var droponOptions = Sortable.options(dropon); if(!Element.isParent(dropon, element)) { var index; var children = Sortable.findElements(dropon, {tag: droponOptions.tag, only: droponOptions.only}); var child = null; if(children) { var offset = Element.offsetSize(dropon, droponOptions.overlap) * (1.0 - overlap); for (index = 0; index < children.length; index += 1) { if (offset - Element.offsetSize (children[index], droponOptions.overlap) >= 0) { offset -= Element.offsetSize (children[index], droponOptions.overlap); } else if (offset - (Element.offsetSize (children[index], droponOptions.overlap) / 2) >= 0) { child = index + 1 < children.length ? children[index + 1] : null; break; } else { child = children[index]; break; } } } dropon.insertBefore(element, child); Sortable.options(oldParentNode).onChange(element); droponOptions.onChange(element); } }, unmark: function() { if(Sortable._marker) Sortable._marker.hide(); }, mark: function(dropon, position) { // mark on ghosting only var sortable = Sortable.options(dropon.parentNode); if(sortable && !sortable.ghosting) return; if(!Sortable._marker) { Sortable._marker = ($('dropmarker') || Element.extend(document.createElement('DIV'))). hide().addClassName('dropmarker').setStyle({position:'absolute'}); document.getElementsByTagName("body").item(0).appendChild(Sortable._marker); } var offsets = Position.cumulativeOffset(dropon); Sortable._marker.setStyle({left: offsets[0]+'px', top: offsets[1] + 'px'}); if(position=='after') if(sortable.overlap == 'horizontal') Sortable._marker.setStyle({left: (offsets[0]+dropon.clientWidth) + 'px'}); else Sortable._marker.setStyle({top: (offsets[1]+dropon.clientHeight) + 'px'}); Sortable._marker.show(); }, _tree: function(element, options, parent) { var children = Sortable.findElements(element, options) || []; for (var i = 0; i < children.length; ++i) { var match = children[i].id.match(options.format); if (!match) continue; var child = { id: encodeURIComponent(match ? match[1] : null), element: element, parent: parent, children: [], position: parent.children.length, container: $(children[i]).down(options.treeTag) }; /* Get the element containing the children and recurse over it */ if (child.container) this._tree(child.container, options, child); parent.children.push (child); } return parent; }, tree: function(element) { element = $(element); var sortableOptions = this.options(element); var options = Object.extend({ tag: sortableOptions.tag, treeTag: sortableOptions.treeTag, only: sortableOptions.only, name: element.id, format: sortableOptions.format }, arguments[1] || { }); var root = { id: null, parent: null, children: [], container: element, position: 0 }; return Sortable._tree(element, options, root); }, /* Construct a [i] index for a particular node */ _constructIndex: function(node) { var index = ''; do { if (node.id) index = '[' + node.position + ']' + index; } while ((node = node.parent) != null); return index; }, sequence: function(element) { element = $(element); var options = Object.extend(this.options(element), arguments[1] || { }); return $(this.findElements(element, options) || []).map( function(item) { return item.id.match(options.format) ? item.id.match(options.format)[1] : ''; }); }, setSequence: function(element, new_sequence) { element = $(element); var options = Object.extend(this.options(element), arguments[2] || { }); var nodeMap = { }; this.findElements(element, options).each( function(n) { if (n.id.match(options.format)) nodeMap[n.id.match(options.format)[1]] = [n, n.parentNode]; n.parentNode.removeChild(n); }); new_sequence.each(function(ident) { var n = nodeMap[ident]; if (n) { n[1].appendChild(n[0]); delete nodeMap[ident]; } }); }, serialize: function(element) { element = $(element); var options = Object.extend(Sortable.options(element), arguments[1] || { }); var name = encodeURIComponent( (arguments[1] && arguments[1].name) ? arguments[1].name : element.id); if (options.tree) { return Sortable.tree(element, arguments[1]).children.map( function (item) { return [name + Sortable._constructIndex(item) + "[id]=" + encodeURIComponent(item.id)].concat(item.children.map(arguments.callee)); }).flatten().join('&'); } else { return Sortable.sequence(element, arguments[1]).map( function(item) { return name + "[]=" + encodeURIComponent(item); }).join('&'); } } }; // Returns true if child is contained within element Element.isParent = function(child, element) { if (!child.parentNode || child == element) return false; if (child.parentNode == element) return true; return Element.isParent(child.parentNode, element); }; Element.findChildren = function(element, only, recursive, tagName) { if(!element.hasChildNodes()) return null; tagName = tagName.toUpperCase(); if(only) only = [only].flatten(); var elements = []; $A(element.childNodes).each( function(e) { if(e.tagName && e.tagName.toUpperCase()==tagName && (!only || (Element.classNames(e).detect(function(v) { return only.include(v) })))) elements.push(e); if(recursive) { var grandchildren = Element.findChildren(e, only, recursive, tagName); if(grandchildren) elements.push(grandchildren); } }); return (elements.length>0 ? elements.flatten() : []); }; Element.offsetSize = function (element, type) { return element['offset' + ((type=='vertical' || type=='height') ? 'Height' : 'Width')]; };
{ "perplexity_score": 3310.4, "pile_set_name": "Github" }
126 S.E.2d 590 (1962) 257 N.C. 572 Rufus L. DUDLEY v. W. Lonnie STATON and wife, Bettie Ruth Staton. No. 101. Supreme Court of North Carolina. July 10, 1962. *591 Blount & Taft by Fred T. Mattox, Greenville, for respondent appellants. Lewis G. Cooper and Louis W. Gaylord, Jr., Greenville, for petitioner appellee. PARKER, Justice. The Constitution of North Carolina adopted 24 April 1868 contains the following words: ARTICLE X, "§ 6. Property of married women secured to them.— The real and personal property of any female in this State acquired before marriage, and all property, real and personal, to which she may, after marriage, become in any manner entitled, shall be and remain the sole and separate estate and property of such female, and shall not be liable for any debts, obligations, or engagements of her husband, and may be devised and bequeathed, and, with the written assent of her husband, conveyed by her as if she were unmarried." A one sentence amendment to this section adopted by a vote of the people of the State at a general election held 8 September 1956, giving a married woman the right to exercise powers of attorney conferred upon her by her husband, including power to execute and acknowledge deeds to property, is not relevant to this appeal. The power conferred by Article X, section 6, of the 1868 Constitution upon married women in this State to devise and bequeath their real and personal property as if they were unmarried is confirmed by statute, G.S. § 52-1, in the same words as set forth in the constitutional section. *592 This constitutional power conferred upon married women is further confirmed by statute. G.S. § 52-8 provides that "every married woman 21 years of age or over has power to devise and bequeath her real and personal estate as if she were a feme sole; and her will shall be proved as is required of other wills." This statute, except for the words "21 years of age or over," was enacted by the General Assembly at its 1871-72 session, and appears in Public Laws of North Carolina, session 1871-72 in Chapter 193, section 31. The General Assembly at its 1959 session enacted a statute, which appears in the 1959 Session Laws of North Carolina in Chapter 880 (codified in the 1959 Cumulative Supplement to Recompiled Vol. 2A of G.S. as sections 30-1, 30-2, and 30-3), and is entitled "AN ACT TO REWRITE THE STATUTES ON DISSENT FROM WILLS." Section 30-1(a) of this statute, and as it is codified, provides: "Except as provided in subsection (b) of this Section, any surviving spouse may dissent from his or her deceased spouse's will." Section 30-2 of the statute, and as it is codified, provides as to the time and manner of dissent. Section 30-3 of the statute, and as it is codified, provides as to the effect of a dissent. Subsection (a) provides that "upon dissent as provided for in G.S. 30-2, the surviving spouse, except as provided in subsection (b) of this Section, shall take the same share of the deceased spouse's real and personal property as if the deceased had died intestate," with a proviso that if the deceased spouse is not survived by a child, children, or any lineal descendant of such, or by a parent, the surviving spouse shall receive only one-half of the deceased spouse's estate, which one-half shall be determined before any federal estate tax is deducted or paid, and shall be free of such tax. Subsection (b) provides that whenever the surviving spouse is a second spouse, as here, he or she shall take only one-half of the amount provided by the Intestate Succession Act for the surviving spouse if the testator has surviving him lineal descendants by a former marriage, as here, but there are no lineal descendants surviving him by the second or successive marriage. Subsection (c) provides: "If the surviving spouse dissents from his or her deceased spouse's will and takes an intestate share as provided herein, the residue of the testator's net estate, as defined in G.S. 29-2, shall be distributed to the other devisees and legatees as provided in the testator's last will, diminished pro rata unless the will otherwise provides." Emphasis ours. The statute provides that it shall become effective on 1 July 1960, and shall be applicable only to estates of persons dying on or after 1 July 1960. Eva Staton Harris Dudley, the testatrix here, died on 14 February 1961. The parties have stipulated that none of the exceptions set forth in G.S. § 30-1, subsection (b), exist, which would prevent petitioner from filing a dissent. It is admitted that on 1 May 1961, and within the time and in the manner prescribed by G.S. § 30-2, petitioner filed a dissent from the will of his deceased wife. The parties have further stipulated that the four parcels of realty described in the petition were acquired by the testatrix subsequent to the year 1868. The General Assembly at its 1961 session enacted a statute, which appears in the 1961 Session Laws in Chapter 959 (codified in the 1961 Cumulative Supplement to Recompiled Vol. 2A of G.S. as sections 30-1, 30-2, and 30-3), and is entitled "AN ACT TO AMEND CHAPTER 30 OF THE GENERAL STATUTES RELATING TO SURVIVING SPOUSES." Section 30-1 of the 1959 Act, and as it is codified, was rewritten to read as follows: "§ 30-1. Right of dissent.—(a) A spouse may dissent from his deceased spouse's will in those cases where * * *." The statute then sets forth in detail the cases in which a dissent may be filed. The 1961 Act became effective on 1 July 1961. It seems certain from the pleadings, admissions, and stipulations here that nothing exists as set forth in the 1961 Act, which would prevent petitioner from dissenting from his deceased *593 wife's will, if she had died after 1 July 1961. G.S. § 30-2 of the 1959 Act, and as it is codified, as to time and manner of dissent was rewritten. If petitioner's wife had died after 1 July 1961, petitioner's dissent complies with this section as rewritten. G.S. § 30-3 of the 1959 Act, and as it is codified, was not rewritten, but merely amended as to a part of subsection (a), and that as to the proviso therein. The 1961 Act did not repeal the right given by the 1959 Act to a husband to dissent from his deceased spouse's will, though it more elaborately defines the circumstances when he may dissent, and did not repeal the provisions of subsection (a) of section 30-3 of the 1959 Act, and as it is codified, that "upon dissent as provided for in G.S. 30-2, the surviving spouse, except as provided in subsection (b) of this section, shall take the same share of the deceased spouse's real and personal property as if the deceased had died intestate," though it amended the proviso, and it did not change the provisions of subsections (b) and (c) of the 1959 Act, and as it is codified. The question for decision here is this: Do the provisions of G.S. §§ 30-1, 30-2, and 30-3, insofar as they give a husband a right in certain cases to dissent from his deceased wife's will, and to take a specified share of his deceased wife's real and personal property, whereby the residue of his deceased wife's net estate, as defined in G.S. § 29-2, shall be distributed to the devisees and legatees, as provided in her last will, diminished pro rata by the share taken by the husband, violate the provisions of Article X, section 6, of the North Carolina Constitution? The answer is, Yes. The Court in a scholarly opinion, written by Judge Gaston, who was one of the most eminent jurists who ever sat upon this Court, said in Newlin v. Freeman, 23 N.C. 514: "By the common law of England, after the conquest, lands could not be devised; but the Statute of Wills, 32 H. VIII., ch. 1, explained, because of abundant caution, by Stat. 34 H. VIII, ch. 5, enacted that all persons seized in fee simple (except femes covert, infants, idiots, and persons of nonsane memory) might devise to any other person, except bodies corporate, twothirds of their land held in chivalry, and the whole of those holden in socage. This was the law brought over to this country by our ancestors, and, as all tenures here before the Revolution were by free and common socage, this power of devising applied to all lands within the colony. Many laws have since the Revolution been enacted by our Legislature on the subject of devises, but none extending or abridging the power of tenant in fee simple, such as it existed at the Revolution. A married woman, neither in the country of our ancestors nor with us, ever had capacity to devise. It is true that she might by means of a power, properly created, appoint a disposition of her real estate after death, which power must be executed, like the will of a feme sole, and is subject very much to the same rules of construction. But the act, if good, is valid as an appointment under a power, and it is not a devise; for to hold it such would be to give to a married woman a capacity which she did not possess at common law and which no statute has conferred upon her." The General Assembly at its Session of 1844-45, it would seem as a result of the decision in Newlin v. Freeman, enacted a statute set forth in Chapter LXXXVIII, subsection VIII, Public Laws of North Carolina from 1844 to 1847, as follows: "That when any married woman, under any will, deed, settlement, or articles, shall have power, by an instrument in nature of a will, to appoint or dispose of any property, real or personal, and she shall have executed, or shall execute any such instrument, the same may be admitted to probate in the proper Court of Pleas and Quarter *594 Sessions, or may be proved originally in a Court of Equity, upon a proper bill for that purpose; and either mode of probate shall be conclusive as to the due execution thereof." This subsection was codified in Rev.Code, Ch. 119, sec. 3. Article X, section 6, of the 1868 State Constitution completely abolished the general doctrine of the common law that as to property husband and wife are in legal contemplation but one person, and the husband is that one, and made very material and far-reaching changes as to the rights respectively of husband and wife in respect to her property, both real and personal, and enlarged her power in respect to and control over her property. Walker v. Long, 109 N.C. 510, 14 S.E. 299; 41 C.J.S. Husband and Wife § 5a. This section of the State Constitution established for a married woman the ownership and control of all her property, real and personal, as her sole and separate estate and property, and further provided that it shall not be liable for any debts, obligations, or engagements of her husband. It further established for a married woman that she could devise and bequeath all her property as if she were unmarried, and with the written assent of her husband conveyed by her as if she were unmarried. In Walker v. Long, supra, the Court held, inter alia, that the common law estate of the husband as tenant by the curtesy initiate in the lands of his wife was abolished by section 6, Article X of the 1868 State Constitution. Chief Justice Merrimon writing the opinion for the Court said in respect to this constitutional provision: "This provision is very broad, comprehensive, and thorough in its terms, meaning, and purpose, and plainly gives and secures to the wife the complete ownership and control of her property, as if she were unmarried, except in the single respect of conveying it. She must convey the same with the assent of the husband. It clearly excludes the ownership of the husband as such, and sweeps away the commonlaw right, or estate, he might at one time have had as tenant by the curtesy initiate." In Perry v. Stancil, 237 N.C. 442, 75 S.E. 2d 512, the Court held "that the limitation upon the right of a married woman to convey her real property, contained in Art. X, sec. 6, of the Constitution, applies only to conveyances executed by her to third parties, that is, persons other than her husband." This decision does not abridge the wife's rights, but enlarges them. In Tiddy v. Graves, 126 N.C. 620, 36 S.E. 127, (1900), the Court held, inter alia, that "it is clear that under the present constitution there is no curtesy, after the death of the wife, in property which she has devised." The opinion written by Clark, J., after quoting extensively from Walker v. Long, supra—a part of which we have quoted above—then says: "This is necessarily so, as the separate estate remains the wife's during coverture with unrestricted power to devise and bequeath it. With this explicit provision in the Constitution, no statute and no decision could restrict the wife's power to devise and bequeath her property as fully and completely as if she had remained unmarried. "The plaintiff insists that curtesy in the husband of the whole of the wife's realty is the correlative of dower in the wife of one-third of the husband's realty, and, if the Legislature can confer dower it can retain curtesy. That is true, when the feme covert dies intestate, as is pointed out in Walker v. Long, supra; but the constitution having guarantied that a married woman shall be and remain sole owner of her property with unrestricted power to devise it, the legislature cannot restrict it. Blackstone justly says that no one has the natural right to dispose of any *595 property after death. The power to do so is conferred by law, and varies in different countries. In England it did not exist after the Conquest, till the statute of wills, (32 Hen. VIII). Of course, as the legislature confers the right to devise, in the absence of constitutional inhibition it can repeal or restrict the power of devise; and, till the Constitution of 1868, which gave a married woman the unrestricted power to devise and bequeath her property as if unmarried, the limitation of such power could be made by legislation allowing curtesy as well as dower. If the constitution had gone further and provided that the property rights of a married man should remain as if he were single, and expressly conferred the unrestricted right to devise his realty, then, certainly, when he had devised it in fee there could be no right of dower. The legislature could only prescribe for dower in realty not devised, as it can now only confer curtesy in realty not devised." The learned dean of the Law School of Trinity College, now Duke University, states in his Law Lectures, Vol. 1, p. 371, (1916): "They [married women] had no power to make any will in this state prior to the constitution of 1868, except when such a power was given them in some instrument by which property was vested in them; but they could make testamentary dispositions of their property with the consent of their husbands, and if the husband had agreed, by marriage settlement, that the wife should have this right, he could not revoke such agreement * * But now, married women can devise and bequeath their separate estates just as though they were femes sole; and an act of the legislature attempting to forbid their devising their lands so as to deprive their husbands of an estate by the curtesy, is unconstitutional." Dean Mordecai cites in support of the last sentence quoted Article X, section 6, of the present Constitution; Walker v. Long, supra; Tiddy v. Graves, supra; Rev., secs. 3112, 2102, 2098; Hallyburton v. Slagle, 132 N.C. 947, 44 S.E. 655; Watts v. Griffin, 137 N.C. 572, 50 S.E. 218. Walker v. Long and Tiddy v. Graves we have above discussed and quoted from. Revisal sec. 3112 stated: "A married woman owning real or personal property may dispose of the same by will." Revisal sec. 2102 is in respect to an estate by the curtesy. The Intestate Succession Act, enacted by the 1959 General Assembly, and applicable only to estates of persons dying on or after 1 July 1960, abolished the estates of curtesy and dower. 1959 Session Laws of North Carolina, Chapter 879, sec. 1—codified G.S. § 29-4 in the 1959 and 1961 Cumulative Supplement to Recompiled Volume 2A of G.S. Revisal 2098 (now G.S. § 52-8) we have quoted above, including the words "21 years of age or over" inserted by the 1953 amendment. Hallyburton v. Slagle and Watts v. Griffin hold that since the 1868 Constitution a married woman may by will deprive her husband of curtesy in her separate estate. Petitioner relies upon the case of Flanner v. Flanner, 160 N.C. 126, 75 S.E. 936, (1912), which he contends is controlling here. In that case it was contended by defendant that section 3145 of the 1905 Revisal, which provides that "children born after the making of the parent's will and where parent shall die without making any provision for them, shall be entitled to such share and proportion of such parent's estate as if he or she had died intestate," is unconstitutional, in that it deprives a married woman of the right to dispose of her property by will as if she were unmarried, as provided in Article X, section 6, of the State Constitution of 1868. The Court said: "Under the principles of the common law as understood and allowed to prevail in this state, the subsequent birth *596 of a child did not of itself amount to revocation of a testator's will. McCay v. McCay, 5 N.C. 447. That case presented at nisi prius in Rowan county at October term, 1808, seems to have attracted the attention of the Legislature, and at November session following a statute was enacted, regulating the subject and in terms substantially similar to the provision as it now appears in Revisal 1905, § 3145." The Court in its opinion, after stating that defendant's contention cannot be upheld, because the contention involves a misconception of the meaning of Article X, section 6, of the 1868 Constitution, as applied to the facts of the present case, says: "The section referred to, after providing that the property of a married woman acquired before marriage, and all to which she may become entitled afterwards, shall remain her sole and separate estate, etc., continues as follows: `And may be devised and bequeathed and, with the written assent of her husband conveyed by her as if she were unmarried.' This right to dispose of property by will is a conventional, rather than an inherent, right, and its regulation rests largely with the Legislature, except where and to the extent that same is restricted by constitional inhibition. Thomason v. Julian, supra [133 N.C. 309, 45 S.E. 636]; 1 Underhill on Wills, p. 1; 2 Blackstone, Comm., pp. 488-492. "Being properly advertent to this principle, a perusal of the section relied upon will disclose that its principal purpose, in this connection, was to remove to the extent stated, the common-law restrictions on the right of married women to convey their property and dispose of same by will, and was not intended to confer on them the right to make wills freed from any and all legislative regulation. The right conferred is not absolute, but qualified." The case of Thomason v. Julian holds a will of a father expressly excluding the children of the testator born after the execution thereof makes a provision for them within the meaning of The Code, sec. 2145, and such children do not share in the estate as though the testator had died intestate. Article X, section 6, of the present Constitution had no application, and is not mentioned in the case. 1 Underhill on Wills, p. 1; 2 Blackstone Common., pp. 488-492 make no reference to our constitutional provision here, or any one of similar import. When the opinion in the Flanner case was filed, the writer of the opinion in Tiddy v. Graves, supra, was Chief Justice. Why that case and Walker v. Long, supra, were not mentioned in the Flanner case, we can never know. Article X, section 6, of our present Constitution expresses as directly, plainly, clearly, unambiguously, and explicitly as words can that "the real and personal property of any female in this State * *, shall be and remain the sole and separate estate and property of such female, * * and may be devised and bequeathed, * * by her as if she were unmarried." It seems perfectly clear and plain to us that these words used by the framers of our present Constitution plainly and explicitly and directly and unambiguously show an intention on their part not only to remove the incapacity of a married woman to dispose of her property by will, but also to write into the Constitution that a married woman could dispose of her property by will as if she were unmarried, so as to put it beyond the power of the General Assembly to restrict, or abridge, or impair, or destroy such right, and that they did so effect their intent by the words they used. It is difficult, if not impossible, to conceive of any words that the framers of our present Constitution could have used to express such an intent and purpose more directly, plainly, clearly, unambiguously, and explicitly. We are not convinced by the reasoning in the Flanner case that this constitutional right of a married woman to dispose of her *597 property by will is not absolute, but qualified so that the General Assembly can impair or abridge it; if the General Assembly can impair or abridge it, the General Assembly can destroy it. Even if we concede that the statement in Tiddy v. Graves, supra, "with this explicit provision in the constitution [Article X, section 6], no statute and no decision could restrict the wife's power to devise and bequeath her property as fully and completely as if she had remained unmarried," is obiter dictum, it is sufficiently persuasive to be followed here. 21 C.J.S. Courts § 190, p. 314. The decision and the reasoning in the Flanner case are not controlling here. The Court has held that there is no constitutional inhibition on the power of the Legislature to declare where and how the wife may become a free trader, because Article X, section 6, of the 1868 Constitution "was not intended to disable, but to protect her." Hall v. Walker, 118 N.C. 377, 24 S.E. 6. It has also been held by this Court that where a husband has abandoned his wife, she may convey her property without his consent under C.S. 2530 and that such statute was not inhibited by Article X, section 6, of the 1868 Constitution, for the reason this section of the Constitution "was not intended to disable, but to protect her." Keys v. Tuten, 199 N.C. 368, 154 S.E. 631. Clearly, these cases, and others of similar import, are plainly distinguishable from the instant case, because the statutes we are considering giving to a surviving husband the right, in certain cases, to dissent from his deceased wife's will, and thereby to take a specified share of her property, diminish her estate disposed of by her will to that extent, and restrict and abridge her constitutional power to dispose of her property by will as if she were unmarried: this is not a protection of, but an abridgment of her constitutional right. Under all the facts here petitioner owns no interest in the four tracts of land described in the petition, and devised by his deceased wife in her last will to her son W. Lonnie Staton, pursuant to the right given her by Article X, section 6, of our present Constitution. When this case is certified down to the superior court, it will enter a judgment reversing the judgment below, and dismissing the case. Reversed.
{ "perplexity_score": 286.6, "pile_set_name": "FreeLaw" }
I have an eBook on list building for female coaches. I typed it all in Canva (in 3 separate documents). I was a bit overzealous and now I just want it DONE. - You will need to edit the table of contents so that it matches the headings of each chapter. - You will need to tie up any loose ends (does the book deliver what it promises?), and write a strong ...interest of support sets is in diagnosis. Let v be the vector of attributes on the support set of a new patient. If v matches with some vector in the projection on S of O+ it is likely that the patient has the condition. If v matches with some vector in the projection on S of O- it is unlikely that the patient has the condition. Since we may need to ...interest of support sets is in diagnosis. Let v be the vector of attributes on the support set of a new patient. If v matches with some vector in the projection on S of O+ it is likely that the patient has the condition. If v matches with some vector in the projection on S of O- it is unlikely that the patient has the condition. Since we may need to ...table will be echoable from the XML as <LALIGA> </LALIGA> etc. 2 - The scraper will also need to visit selected pages to scrape the results of the past 5 matches and the list of the next 5 matches to a file for each team in these leagues, such as FC Barcelona, scraping and storing as <BARCELONA> in an XML file called "[login to view URL]". The ... ...Plus level account. Phase 1 of the project is the delivery of a Landing page with 4-5 sections of static content. The only capability is for a customer to signup for an email list. (Example of this is attached) Phase 2 will include the development and design of ~4 additional pages, and add the ability to pre-orders for 1 single product. (timeline is We are looking few candidates who have good knowledge cricket national and internal matches fantasy tip and predictions. It's long term work, need to spend daily 1-2 hours for inserting the data to our admin panel. Candidate should havez; 1. Android phone 2. PC or Laptap 3. Good internet connectivity. 4. Basic knowledge on HTML tags 5. Good knowledge We are looking few candidates who have good knowledge cricket national and internal matches fantasy tip and predictions. It's long term work, need to spend daily 1-2 hours for inserting the data to our admin panel. Candidate should havez; 1. Android phone 2. PC or Laptap 3. Good internet connectivity. 4. Basic knowledge on HTML tags 5. Good knowledge ...requests per second • Integrating this with payment gateways (paypall , skrill etc ) • Creating a Matching Engine Trade Engine that looks at the current buy and sell orders and matches orders together and executes the trades. • Establishing wallets within the exchange to actually store each user's Crypto Currencies including a HOT AND COLD wallet system ...to take ownership of your work. To apply for this role: 1. please tell us in detail how your profile matches with each of the above selection criteria, 2. please send us your code samples and portfolio (github URL if applicable), 3. Don't send us list of URLs of sites you have worked on because there is no way we can verify that it is truly your work I would like an application - in step 1 : that takes pict...receipts, convert it to text, and detecting purchased articles names with price, total amount, store name. I have example of some receipts. - in step 2 : that matches each line to a product list because the naming of one product varies depending on receipts origin. Machine learning is needed. ...same rating, provide the complete list. Task 2 ------------ Extend your code using a user based collaborative filtering approach to make an individual recommendation to a user based on the set of movie ratings they have provided. It is suggested that you use k-nearest neighbour in order to identify the closest matches, however, you are free to use ...on this skills Angular JS,PHP,MongoDB,MySQL,NGINX,Ubuntu 14.0.4,websockets, web scraping , JavaScript , Yii2, Linux 3 . what is full sport betting ? we will provide a full list of full sports betting service and all option what your team must develop for us please check yourself correctly Full Sport Betting Parts : Free Sport betting page ( for registered ...I'll provide a spreadsheet full of UPC codes that will need to be searched on Amazon. If the browser extension does not trigger on an active product page, that matches the UPC, you will need to list the URL and applicable information in a separate spreadsheet. This project will be on a small sample size of UPCs (~200) to ensure that you're able to handle ...interest of support sets is in diagnosis. Let v be the vector of attributes on the support set of a new patient. If v matches with some vector in the projection on S of O+ it is likely that the patient has the condition. If v matches with some vector in the projection on S of O- it is unlikely that the patient has the condition. Since we may need to I have a list of names on two teams each with 20 members. Each member is ranked 1-40. Each week a random number of players from each team sign up to play. We only play doubles, so two players from each per match. I would like to check each player that signs up for a particular week and then have the program list each match-up that fits into three ...competitions/dates etc. 3. On the third tab, I'd want the fixture/result list for Serie A with a shortcut to the actual match where I can note the different happenings and stats. 4. Going forward, each of the remaining tabs should be of all the Serie A teams. Here it should also be possible to add matches for the specific team if they're playing in a European competition ...competitions/dates etc. 3. On the third tab, I'd want the fixture/result list for Serie A with a shortcut to the actual match where I can note the different happenings and stats. 4. Going forward, each of the remaining tabs should be of all the Serie A teams. Here it should also be possible to add matches for the specific team if they're playing in a European competition I'm looking to be able to import a list of Whoscored URLs into some sort of tool that will extract the match commentary. The data can be exported into either once workbook or one per match. I've attached a workbook with an example of what the data should look like (doesn't have to be exactly the same). Raw output in another worksheet would be good ...competitions/dates etc. 3. On the third tab, I'd want the fixture/result list for Serie A with a shortcut to the actual match where I can note the different happenings and stats. 4. Going forward, each of the remaining tabs should be of all the Serie A teams. Here it should also be possible to add matches for the specific team if they're playing in a European competition hello, i wrote index match formula to return a number that matches another if the sum of both their weights is less than 35180. the problem is that it is returning the same number to match again for the entire list, i need it to only match that number once until the list is complete. ...competitions/dates etc. 3. On the third tab, I'd want the fixture/result list for Serie A with a shortcut to the actual match where I can note the different happenings and stats. 4. Going forward, each of the remaining tabs should be of all the Serie A teams. Here it should also be possible to add matches for the specific team if they're playing in a European competition I have a list of institutions and companies for which I am looking for contact details based on specfic job titles. I have attached a spreadsheet with the list in 2 tabs, first tab is the list of institutions and companies and the second list is the job titles I am interested in getting contact persons. I need someone to search the lists of companies/institutions ...End-points screens. Show * or similar in place of each character. - restructure so that the list of FTP Endpoints is common across all watched folders. A watched folder will be linked to one or more FTP End-points by a Check-box type selection from the list of all defined FTP End-points. There will then be another menu bar icon for "End-points", at I need to map a list of 446 qty Names/OldID to NewID. Please search NewIDs for an Reference ID that matches the Name/OldID. I have done a few examples in colored green and the ones not colored (white) are the ones that will need to be done. Please take a look, and let me know if you are interested in the job. I need this done as soon as possible, but ...someone whose design aesthetic matches my existing brand designs, and who has the technical skills to design and set up sites in Wordpress or Squarespac. I also need someone to set up all my content in webinar functionality in Kajabi, Webinarjam or similar. Experience with leadpages, ontraport and creating email lists and list management is also preferred ...competitions/dates etc. 3. On the third tab, I'd want the fixture/result list for Serie A with a shortcut to the actual match where I can note the different happenings and stats. 4. Going forward, each of the remaining tabs should be of all the Serie A teams. Here it should also be possible to add matches for the specific team if they're playing in a European competition Please read the instructions carefully before you apply. I am trying to create a table that looks like one I will give in the link. The table is for football matches. It has Jquery filters. The data is NOT stored in database! I intend to use data from excel into WordPress post. So you will be affecting a html table inside a WordPress post. The filters ...the link. The table is for football matches. It has Jquery filters but my data is NOT stored in database! I intend to use data from excel into WordPress post. I want static but filters require jquery. Can you create a table that uses jquery to filter data from my table according to competition and home/away matches? Then you will create 3 classes for Hello! I have a list of 70K wine names (column B). I need you to search each of these wine names on https://www.wine-searcher.com/find/chateau+du+tariquet+chenin+-+chardonnay . As you can see, there are 2 search types: Prices & Stores and Closest Matches. I want you to use both of the search types. If you identified the correct wine, I need: Grape/Blend I need a list of backpacks retailers that matches the following criteria. - Retailer sells not only one backpack brand, but multiple backpack brands. - Price range of one of their backpacks are in $100 to $150 (USD) or equivalent in other currencies (for example, if a store sells 10 backpacks from different brands and only one backpack is sold at $100 ...per second • Integrating this with payment gateways (paypall , skrill etc ) • Creating a Matching Engine/ Trade Engine that looks at the current buy and sell orders and matches orders together and executes the trades. • Establishing wallets within the exchange to actually store each user's Crypto Currencies including a HOT AND COLD wallet system I need a person to create a Python script which accesses the live section of [login to view URL] and saves some concrete information for all live matches to a .csv (or similar). A .csv file (or similar) for each live match should be created with the following information: 1. name of players & name of tournament (see [login to view URL]) 2. Pre-match We want to create a new Download page for our software. It must match...download files, Each file will have the following information Download File Version Info Repository Version Date File Size SHA 256 Each file will then also have List of Issues Fixed List of Known Issues Then one more section with installation information for OSX, Windows, Linux Hello i need somebody that creates an app to filter/sort matches on Tinder by distance. For Android or Pc. Output should be the name of the match. Ability to chat within the app not necessary. Maybe more functions requested on later projects. i want a...permits the user to choose bride assistant this assistant helps the bride to choose suitable and appropriate wedding dress that matches with her so the user will open the home page and then choose an assistant from a list thus the bride writes her name the date and the name of the boutique to book an assistant to choose her wedding dress ...a new post on my WordPress website ( or check for new post every hour ) 2) the users in the list will have an interest column 3) the posts will be tagged with a certain taxonomy 4) users will get massages only if the interest value in the post matches the interest value they have entered in mail chimp. 5) I will prefer if it will be a plugin where .../listrads >>> list all entries from x_eu_rad and link them to the seared page /seerad/X >>> just printout the details for the rad chosen from x_eu_rad /euroschool >> just printout list of entries from x_site where type =2 /europeandays >> just printout list of entries from x_site where type =1 /events >> just printout list... Someone with good experience in App development he should be able to develop this aap in a short period of time & provide integration if required with any of the stadium application for booking the facilities in the stadium there are similar APPS like Maleeb available and we want something similar for Indian market ...find friends from outside tiers) - Add friends in favorite list. (only in their own tiers. Subscribers can find friends from outside tiers) - Chat with nears users. (only in their own tiers. Subscribers can find friends from outside tiers) - User can find his/her friends based on Matches settings (Gender and distance based). (only in their own tiers
{ "perplexity_score": 662.8, "pile_set_name": "Pile-CC" }
Walmart foes take Antioch expansion challenge to state Supreme Court SAN FRANCISCO -- The legal wrangling continues over Walmart's plans to expand its Antioch store into the East Bay's first supercenter. The California Healthy Communities Network, a coalition of environmental, civil rights and labor groups, filed a petition with the state Supreme Court last week, challenging a recent appellate court decision affirming Antioch City Council's September 2010 application of its development plan when it approved the retailer's expansion without looking at environmental issues. "There are still significant questions left unanswered. There is an interpretation of law that needs to be clarified," said Phil Tucker, project director for the Healthy Communities Network. In a 31-page filing, the Healthy Communities Network asked the court to consider whether an appellate court decision involving a San Diego redevelopment project means agencies don't have to consider full environmental studies when looking at design review applications. The Jan. 4 petition also asks if a city can interpret land use laws in a manner that conflicts with its own historic interpretation to avoid full environmental review. "We're asking the court to look at how the San Diego case was applied. We feel it was used inappropriately in Antioch, but it has more far-reaching implications as far as the interpretation of its use, " Tucker said. "It's worth a shot." The court has 100 days to review and respond to the petition either by accepting it for review or dismissing it. Advertisement Walmart first approached Antioch in 2004 -- four years after its store opened -- about expanding the 141,500-square-foot store in Williamson Ranch Plaza. In both 2007 and 2010, Antioch required Walmart to review the environmental effects of building the supercenter, twice rejecting its environmental documents in split decisions. In July 2010, a majority of the council said the study underestimated potential urban decay, or economic and environmental effects, in the area. Antioch's council reversed its decision a month later after legal counsel for Walmart and the city argued that it could not consider environmental issues in a design review application, citing the San Diego case, and said that Walmart's expansion was allowed in the original approval for Williamson Ranch Plaza in 1998. A Contra Costa Superior judge disagreed in fall 2011, saying that Antioch had required environmental studies in the past and could not change its interpretation of its laws. The 1st District Court of Appeal reversed that ruling in November. City Attorney Lynn Tracy Nerland reiterated this week that the appellate court found Antioch's actions to be "legal and appropriate" and it will "wait to see" if the decision is reviewed. Walmart officials say they are pleased with the appellate court decision, and are reviewing its legal options in regards to the latest matter. The company remains committed to the 33,575-square-foot expansion, which would bring 85 new jobs, said Rachel Wall, a Walmart spokeswoman. "We believe Antioch residents will benefit from the jobs and affordable groceries coming to their neighborhood," Wall said.
{ "perplexity_score": 392.7, "pile_set_name": "Pile-CC" }
This specification relates to generating phoneme representations of acoustic sequences. Acoustic modeling systems receive an acoustic sequence and generate a phoneme representation of the acoustic sequence. The acoustic sequence for a given utterance includes, for each of a set of time steps, an acoustic feature representation that characterizes the utterance at the corresponding time step. The phoneme representation is a sequence of phonemes or phoneme subdivisions that the acoustic modeling system has classified as representing the received acoustic sequence. An acoustic modeling system can be used in, for example, a speech recognition system, e.g., in conjunction with a pronunciation modeling system and a language modeling system.
{ "perplexity_score": 333.6, "pile_set_name": "USPTO Backgrounds" }
(Reuters Health) - Very few smokers know there is sugar added to cigarettes, a new survey suggests. In addition, very few realize that added sugar increases toxins in cigarette smoke, the study authors wrote in the journal Nicotine and Tobacco Research. “Knowledge is power and there is a clear gap in awareness,” said lead researcher Andrew Seidenberg, a public health doctoral student at the University of North Carolina at Chapel Hill. Cigarettes contain natural and added sugars to reduce the harshness of smoke, making it easier to inhale. This also increases the amount of harmful chemicals in smoke and the addictive potential of smoking, Seidenberg said. “Many participants told us they wanted to learn more about sugar in cigarettes,” Seidenberg told Reuters Health by email. “So there is an opportunity to educate the public.” Seidenberg and colleagues surveyed 4,350 adult cigarette smokers by recruiting them through Amazon Mechanical Turk to participate in an online experiment on e-cigarette advertising. At the end of the experiment, survey takers answered two questions about added sugars in cigarettes: “Is sugar added to cigarettes?” and “Adding sugar to cigarettes increases toxins in cigarette smoke. Before this survey, had you ever heard of this effect of added sugar?” Participants also had the option of providing open-ended comments at the end of the study. The researchers found that 5.5 percent of survey takers knew sugar was added to cigarettes. The proportion who knew this was never higher than 10 percent when respondents were grouped by characteristics like gender, age, income, education level, race and ethnicity. And only 3.8 percent of survey respondents knew added sugar increases toxins in smoke. “We were really surprised that nearly all of the smokers surveyed didn’t know that sugar is added to their cigarettes,” Seidenberg said. He and colleagues are developing messages about added sugar in cigarettes to determine if they’re helpful for smoking cessation programs. In a television campaign in Australia, for instance, an ad set to the popular song “Sugar, Sugar” by The Archies concluded with the following text on the screen: “Additives such as sugar and honey can hide the bitter taste of tobacco. But the damage cigarettes do can’t be hidden.” Noel Brewer, who has researched cigarette pack messages about toxic chemicals, as well as public understanding of cigarette smoke ingredients, is, like Seidenberg, from the University of North Carolina at Chapel Hill, but he isn’t a coauthor of the current study. “Added sugar in cigarettes creates a trifecta of death,” Brewer told Reuters Health by email. “It makes cigarettes more appealing, more addictive and more lethal. Smokers should be able to know what they are smoking and they don’t.” “Cigarettes are dangerous in so many different ways that it’s hard for people to keep track,” Brewer said. “Scientists keep finding new ways that cigarettes create harm and death.” SOURCE: bit.ly/2yBTBmF Nicotine and Tobacco Research, online October 17, 2018.
{ "perplexity_score": 304, "pile_set_name": "OpenWebText2" }
--- abstract: 'One finding of cognitive research is that people do not automatically acquire usable knowledge by spending lots of time on task. Because students’ knowledge hierarchy is more fragmented, “knowledge chunks” are smaller than those of experts. The limited capacity of short term memory makes the cognitive load high during problem solving tasks, leaving few cognitive resources available for meta-cognition. The abstract nature of the laws of physics and the chain of reasoning required to draw meaningful inferences makes these issues critical. In order to help students, it is crucial to consider the difficulty of a problem from the perspective of students. We are developing and evaluating interactive problem-solving tutorials to help students in the introductory physics courses learn effective problem-solving strategies while solidifying physics concepts. The self-paced tutorials can provide guidance and support for a variety of problem solving techniques, and opportunity for knowledge and skill acquisition.' author: - Chandralekha Singh title: Problem Solving and Learning --- [ address=[Department of Physics and Astronomy, University of Pittsburgh, Pittsburgh, Pennsylvania, 15260]{} ]{} Cognitive Research and Problem Solving ====================================== Cognitive research deals with how people learn and solve problems [@nrc1; @joe]. At a coarse-grained level, there are three components of cognitive research: how do people acquire knowledge, how do they organize and retain the knowledge in memory (brain) and how do they retrieve this knowledge from memory in appropriate situations including to solve problems. These three components are strongly coupled, e.g., how knowledge was organized and retained in memory during acquisition will determine how effectively it can be retrieved in different situations to solve problems. We can define problem solving as any purposeful activity where one must devise and perform a sequence of steps to achieve a set goal when presented with a novel situation. A problem can be quantitative or conceptual in nature. Using the findings of cognitive research, human memory can be broadly divided into two components: the working memory or the short term memory (STM) and the long term memory (LTM). The long term memory is where the prior knowledge is stored. Appropriate connections between prior knowledge in LTM and new knowledge that is being acquired at a given time can help an individual organize his/her knowledge hierarchically. Such hierarchical organization can provide indexing of knowledge where more fundamental concepts are at the top of the hierarchy and the ancillary concepts are below them. Similar to an index in a book, such indexing of knowledge in memory can be useful for accessing relevant knowledge while solving problems in diverse situations. It can also be useful for inferential recall when specific details may not be remembered. The working memory or STM is where information presented to an individual is processed. It is the conscious system that receives input from memory buffers associated with various sensory systems and can also receive input from the LTM. Conscious human thought and problem solving involves rearranging and synthesizing ideas in STM using input from the sensory systems and LTM. One of the major initial findings of the cognitive revolution is related to Miller’s magic numbers 7$\pm$2 (5 to 9), i.e., how much information can STM hold at one time. [@miller] Miller’s research found that STM can only hold 5 to 9 pieces of information regardless of the IQ of an individual. Here is an easy way to illustrate this. If an individual is asked to memorize the following sequence of 25 numbers and letters in that order after staring at it for 30 seconds, it is a difficult task: 6829-1835-47DR-LPCF-OGB-TWC-PVN. An individual typically only remembers between 5 to 9 things in this case. However, later research shows that people can extend the limits of their working memory by organizing disparate bits of information into chunks or patterns. [@chunk] Using chunks, STM can evoke from LTM, highly complex information. An easy way to illustrate it is by asking an individual to memorize the following sequence of 25 numbers and letters: 1492-1776-1865-1945-AOL-IBM-USA. This task is much easier if one recognizes that each of the four digit number is an important year in history and each of the three letters grouped together is a familiar acronym. Thus, an individual only has to remember 7 separate chunks rather than 25 disparate bits. This chunking mechanism is supported by research in knowledge rich fields such as chess and physics where experts in a field have well organized knowledge. [@chess] For example, research shows that if experts in chess are shown a very good chess board that corresponds to the game of a world-class chess player, they are able to assemble the board after it is disassembled because they are able to chunk the information on the board and remember the position of one piece with respect to another. If chess novices are shown the same board, they are only able to retrieve 5-9 pieces after it is jumbled up because they are not able to chunk large pieces of information present on the chess board. On the other hand, both chess experts and novices are poor at assembling a board on which the chess pieces are randomly placed before it was jumbled up. In this latter case, chess experts are unable to chunk the random information due to lack of pattern. A crucial difference between expert and novice problem solving is the manner in which knowledge is represented in their memory and the way it is retrieved to solve problems. Experts in a field have well organized knowledge. They have large chunks of “compiled" knowledge in LTM and several pieces of knowledge can be accessed together as a chunk [@automatic]. For example, for an expert in physics, vector addition, vector subtraction, displacement, velocity, speed, acceleration, force etc. can be accessed as one chunk while solving problems while they can be seven separate pieces of information for beginning students. If a problem involves all of these concepts, it may cause a cognitive overload if students’ STM can only hold 5 or 6 pieces of information. Experts are comfortable going between different knowledge representations, e.g., verbal, diagrammatic/pictorial, tabular etc. and employ representations that make problem solving easier. [@rep] Experts categorize problems based upon deep features unlike novices who can get distracted by context dependent features. For example, when physics professors and introductory physics students are asked to group together problems based upon similarity of solution, professors group them based upon physics concepts while students can choose categories that are dependent on contexts such as ramp problems, pulley problems, spring problems etc [@chi; @hardiman; @reif2; @larkin]. Of course, an important goal of most physics courses is to help students develop expertise in problem solving and improve their reasoning skills. In order to help students, instructors must realize that the cognitive load, which is the amount of mental resources needed to solve a problem, is subjective [@cogload]. The complexity of a problem not only depends on its inherent complexity but also on the expertise, experience and intuition of an individual [@intuition]. It has been said that problems are either “impossible" or “trivial". A ballistic pendulum problem that may be trivial for a physics professor may be very difficult for a beginning student [@rosengrant]. Cognitive load is higher when the context is abstract as opposed to concrete. The following Wason tasks [@wason] are examples of abstract and concrete problems which are conceptually similar, but the abstract problem turns out to be cognitively more demanding. - You will lose your job unless you enforce the following rule: “If a person is rated K, then his/her document must be marked with a 3".\ Each card on the table for a person has a letter on one side and a number on the other side. Indicate only the card(s) shown in Figure 1 that you definitely need to turn over to see if the document of any of these people violates this rule.\ - You are serving behind the bar of a city centre pub and will lose your job unless you enforce the following rule: “If a person is drinking beer, then he/she must be over 18 years old".\ Each person has a card on the table which has his/her age on one side and the name of his/her drink on the other side. Indicate only the card(s) shown in Figure 2 that you definitely need to turn over to see if any of these people are breaking this rule. The correct answer for the abstract case is that you must turn the cards with K and 7 (to make sure that there is no K on the other side). Please note that the logic presented in the task is one sided in that it is ok for a document with a 3 to have anything on the other side. The correct answer for the concrete case is “beer" and “16 years old", and it is much easier to identify these correct answers than the correct answers for the abstract case. A major reason for why the cognitive load is high during problem solving in physics is because the laws of physics are abstract. It is important to realize that it is not easy to internalize them unless concrete contexts are provided to the students. Another difficulty is that, once the instructor has built an intuition about a problem, it may not appear difficult to him/her even if it is abstract. In such situations the instructor may overlook the cognitive complexity of the problem for a beginning student unless the instructor puts himself/herself in the students’ shoes. An important lesson from cognitive research is that new knowledge that an individual acquires builds on prior knowledge. This idea is commensurate with Piaget’s notion of “optimal mismatch" [@piaget] or Vygotsky’s idea of “zone of proximal development" (ZPD) [@vygotsky]. ZPD is the zone defined by what a student can do on his/her own vs. with the help of a guide who is familiar with the student’s initial knowledge and targets instruction somewhat above it continuously for effective learning. This is analogous to the impedance matching of a transformer in which the power transfer can be maximized if the input and output impedances are matched. Another analogy is with light passing through two polarizers placed perpendicular to each other vs. having several polarizers stacked one after another where the transmission axes of adjacent polarizers are slightly different from each other. In the first case of crossed polarizer, no light passes through whereas in the second case most of the light passes through if the angle $\theta$ between the transmission axes of the adjacent polarizers is small enough. Similarly, if the instruction is targeted significantly above students’ prior knowledge, learning won’t be meaningful and even if the students make an effort to store some hap-hazardous information in their brain till the final exam, it will get “shampooed out" soon after that. On the other hand, if the instructional design takes into account students’ initial knowledge and builds on it, learning will be meaningful. Another important lesson from cognitive research is that students must construct their own understanding. This implies that we should give students an opportunity to reconstruct, extend, and organize their knowledge. Such opportunities will come from ensuring that the students are actively engaged in the learning process and take advantage of their own knowledge resources and also benefit from interactions with their peers. Computer-based Interactive Tutorials ==================================== We now describe computer-based interactive problem solving tutorials that we have been developing that build on introductory physics students’ prior knowledge and keep them actively engaged in the learning process. The tutorials combine quantitative and conceptual problem solving. They focus on helping students develop a functional understanding of physics while learning useful skills [@singh]. It is worthwhile thinking about why quantitative problem solving alone often fails to help most students extend and organize their physics knowledge. Without guidance, most students do not exploit the problem solving opportunity to reflect upon what they have actually learned and build a more robust knowledge structure. If only quantitative problems are asked, students often view them as “plug-and-chug" exercises, while conceptual problems alone are often viewed as guessing tasks with little connection to physics content. The interactive tutorials we have been developing combine quantitative and conceptual problem solving and provide guidance and support for knowledge and skill acquisition. They provide a structured approach to problem solving and promote active engagement while helping students develop self reliance. Other computer-based tutorials are also being developed [@tutor]. Our tutorials are unique in that they focus on helping students learn effective problem solving strategies and the conceptual questions are developed based upon the common difficulties found via research on students’ difficulties in learning a particular topic in physics. Development of Problem Solving Skills in Introductory Physics ------------------------------------------------------------- A major goal of an introductory physics course for science and engineering majors is to enable students to develop complex reasoning and problem solving skills to explain and predict diverse phenomena in everyday experience. However, numerous studies show that students do not acquire these skills from a [*traditional*]{} course [@chi; @hardiman; @reif2; @hake]. The problem can partly be attributed to the fact that the kind of reasoning that is usually learned and employed in everyday life is not systematic or rigorous. Although such hap-hazardous reasoning may have little measurable negative consequences in an individual’s personal life, it is insufficient to deal with the complex chain of reasoning that is required in rigorous scientific field such as physics [@reif2]. Educational research suggests that many introductory physics students solve problems using superficial clues and cues, applying concepts at random without thinking whether they are applicable or not [@chi; @hardiman; @reif2]. Also, most traditional courses do not [*explicitly*]{} teach students effective problem solving strategies. Rather, they may reward inferior problem solving strategies in which many students engage. Instructors often implicitly assume that students know that the analysis, planning, evaluation, and reflection phases of problem solving are as important as the implementation phase. Consequently, they may not discuss these strategies explicitly while solving problems during the lecture. There is no mechanism in place to ensure that students make a conscious effort to interpret the concepts, make qualitative inferences from the quantitative problem solving tasks, or relate the new concepts to their prior knowledge. In order to develop scientific reasoning by solving quantitative problems, students must learn to exploit problem solving as an opportunity for knowledge and skill acquisition. Thus, students should not treat quantitative problem solving merely as a mathematical exercise but as a learning opportunity and they should engage in effective problem solving strategies. Effective Problem Solving Strategies ------------------------------------ Effective problem solving begins with a conceptual analysis of the problem, followed by planning of the problem solution, implementation and evaluation of the plan, and last but not least reflection upon the problem solving process. As the complexity of a physics problem increases, it becomes increasingly important to employ a systematic approach. In the qualitative or conceptual analysis stage, a student should draw a picture or a diagram and get a visual understanding of the problem. At this stage, a student should convert the problem to a representation that makes further analysis easier. After getting some sense of the situation, labeling all known and unknown numerical quantities is helpful in making reasonable physical assumptions. Making predictions about the solution is useful at this level of analysis and it can help to structure the decision making at the next stage. The prediction made at this stage can be compared with the problem solution in the reflection phase and can help repair, extend and organize the student’s knowledge structure. Planning or decision making about the applicable physics principles is the next problem solving heuristic. This is the stage where the student brings everything together to come up with a reasonable solution. If the student performed good qualitative analysis and planning, the implementation of the plan becomes easy if the student possesses the necessary algebraic manipulation and mathematical skills. After implementation of the plan, a student must evaluate his/her solution, e.g., by checking the dimension or the order of magnitude, or by checking whether the initial prediction made during the initial analysis stage matches the actual solution. One can also ask whether the solution is sensible and, possibly, consistent with experience. The reflection phase of problem solving is critical for learning and developing expertise. Research indicates that this is one of the most neglected phase of problem solving [@chi; @hardiman; @reif2]. Without guidance, once a student has an answer, he/she typically moves on to the next problem. At the reflection stage, the problem solver must try to distill what he or she has learned from solving the problem. This stage of problem solving should be used as an opportunity for reflecting upon why a particular principle of physics is applicable to the problem at hand and how one can determine in the future that the same principle should be applicable even if the problem has a new context. Description of the Tutorials ---------------------------- The development of the computer-based tutorials to help students learn effective problem solving strategies is guided by a learning paradigm which involves three essential components: modeling, coaching, and weaning [@cog]. In this approach, “modeling" means that the instructor demonstrates and exemplifies the skills that students should learn (e.g., how to solve physics problems systematically). “Coaching" means providing students opportunity, guidance and practice so that they are actively engaged in learning the skills necessary for good performance. “Weaning" means reducing the support and feedback gradually so as to help students develop self-reliance. Each of the tutorials starts with an overarching problem which is quantitative in nature. Before using a tutorial, students use a pre-tutorial worksheet which divides each quantitative problem given to them into different stages involved in problem solving. For example, in the conceptual analysis stage of problem solving, the worksheet explicitly asks students to draw a diagram, write down the given physical quantities, determine the target quantity, and predict some features of the solution. After attempting the problem on the worksheet to the best of their ability, students access the tutorial on the computer (or use a paper version for evaluation purposes as discussed in the evaluation section below). The tutorial divides an overarching problem into several sub-problems, which are research-guided conceptual multiple-choice questions related to each stage of problem solving. The alternative choices in these multiple-choice questions elicit common difficulties students have with relevant concepts as determined by research in physics education. Incorrect responses direct students to appropriate help sessions where students have the choice of video, audio or only written help with suitable explanations, diagrams, and equations. Correct responses to the multiple-choice questions give students a choice of either advancing to the next sub-problem or directs them to the help session with the reasoning and explanation as to why the alternative choices are incorrect. While some reasonings are problem-specific, others focus on more general ideas. After students work on the implementation and assessment phase sub-problems posed in the multiple-choice format, they answer reflection sub-problems. These sub-problems focus on helping students reflect upon what they have learned and apply the concepts learned in different contexts. If students have difficulty answering these sub-problems, the tutorial provides further help and feedback. Thus, the tutorials not only model or exemplify a systematic approach to problem solving, they also engage students actively in the learning process and provide feedback and guidance based upon their need. Each tutorial problem is matched with other problems (which we call paired problems) that use similar physics principles but which are somewhat different in context. Students can be given these paired problems as quizzes so that they learn to de-contextualize the problem solving approach and concepts learned from the tutorial. The paired problems play an important role in the weaning part of the learning model and ensure that students develop self-reliance and are able to solve problems based upon the same principle without help. These paired problems can also be assigned as homework problems and instructors can inform students that they can use the tutorials as a self-paced study tool if they have difficulty in solving the paired problems assigned as homework related to a particular topic. We have developed computer-based tutorials related to introductory mechanics, electricity, and magnetism. Topics in mechanics include linear and rotational kinematics, Newton’s laws, work and energy, and momentum. Topics in electricity and magnetism include Coulomb’s law, Gauss’s law, potential and potential energy, motion of charged particles in an electric field, motion of charged particles in a magnetic field, Faraday’s law, and Lenz’s law. Figures 3-6 show screen captures from a computer-based tutorial which starts with a quantitative problem in which two blocks with masses $m_1$ and $m_2$ are in contact on a frictionless horizontal surface and a horizontal force $F_H$ is applied to the block with mass $m_1$. Students are asked to find the magnitude of force exerted by the block with mass $m_2$ on $m_1$. We have found that this problem is sufficiently challenging for students in both algebra and calculus-based introductory physics courses that most students are unable to solve it without help. In the tutorial, the quantitative problem is broken down into several conceptual problems in the multiple-choice format that students have to answer. For example, one of the conceptual questions related to the initial analysis of the problem is shown in Figure 3 along with a screen capture of a help session that a student is directed to if he/she chooses an incorrect response. Figure 4 is a multiple-choice question about the free body diagram and figure 5 is a screen capture of a help screen in which an instructor explains relevant concepts to the students related to difficulty with the question asked in Figure 4. Figure 6 is a help screen related to a reflection question in which students are asked about the force exerted by the block of mass $m_1$ on $m_2$ if the force of the hand $F_H$ was applied to the block of mass $m_2$ in the opposite direction (instead of being applied to the block of mass $m_1$ as in the tutorial). Case-Study for Evaluating the Computer-based Tutorials ------------------------------------------------------ Below, we describe a case-study to evaluate the tutorials. In one case study, we compared three different groups who were given different aid tools: - Group (1) consists of students who used the tutorials as aid tool. - Group (2) consists of students who were given the solved solutions for the tutorial problems which were similar to the solutions in the textbook’s solutions manual. However, the solutions were not broken down into the multiple-choice questions with alternative choices targeting common misconceptions as was done in the tutorials. - Group (3) consists of students who were given the textbook sections that dealt with the relevant concepts as the aid tool and were asked to brush up on the material for a quiz on a related topic. Fifteen students were recruited and divided into two pools based upon their prior knowledge. Then, the students from each of these pools were randomly assigned to one of the three groups discussed above. During the interview session, students in each group initially answered a pre-questionnaire to determine their level of preparation, their views about problem solving in physics, and their perception of physics instruction. It was interesting to note that a majority of the students (regardless of the group to which they belonged) disagreed with the statement “When confronted with a physics problem, I first spend a reasonable amount of time planning how to solve the problem before actually solving it". Half of the students also agreed with the statement “Physics problem solving is all about matching given quantities in the problem to the formula in the book". Half of the students thought that the pace of their introductory physics courses was very fast. After this pre-questionnaire, all students were given the following problem on a worksheet and were asked to solve it to the best of their ability before using their aid tools: - [*An insulating sphere of radius $b$ has a spherical cavity of radius $a$ located within its volume and centered a distance $R$ from the center of the sphere. A cross section of the sphere is shown in Figure 7. The solid part of the insulating sphere has a uniform volume charge density $\rho$. Find the electric field $\vec E$ at a point inside the cavity.*]{} All students identified the correct principle to use (Gauss’s law) when asked to solve the problem to the best of their ability on the worksheet. The above problem is challenging enough that none of the interviewed students could solve it without help. Most students initially thought that the problem was relatively easy. Except for one student who came up with a different incorrect answer, the rest of the students came up with the same incorrect answer: the electric field is zero everywhere inside the cavity. All of them invoked Gauss’s law, which states that the total electric flux through a closed surface is equal to the net charge inside the surface divided by $\epsilon_0$. Their reasoning for zero electric field in the cavity was based on the incorrect interpretation that whenever the electric flux through a closed surface is zero, the electric field at every point inside the surface must be zero too regardless of whether there was a symmetric charge distribution to justify such claims. Thus, students drew a Gaussian sphere inside the hole and concluded that the electric field must be zero everywhere inside since the enclosed charge is zero. Students ignored the asymmetric charge distribution surrounding the cavity, which is a common difficulty. [@gauss] Among many of the difficulties the interviewed students faced, one difficulty was not recognizing that the charge distribution was not symmetric enough and therefore the net electric field at a point inside the cavity cannot be zero. When asked to show why the electric field should be zero everywhere inside, most students drew a spherical Gaussian surface inside the hole, wrote down Gauss’s law in the integral form and pulled out the electric field from inside the integral. Interviews show that many students believed that the electric field can always be pulled out from the surface integral regardless of the symmetry of the charge distribution. When pressed harder about why the electric field should be equal everywhere on the Gaussian surface and why it can be pulled out of the integral, some students noted that one should not worry about this issue at least in this case since the zero charge enclosed implies zero electric field everywhere inside anyway. Their convoluted reasoning showed that many students have difficulty in organizing different knowledge resources and applying them at the same time. After the students tried to solve the problem on the worksheet on their own to the best of their ability, students in Group 1 were given the corresponding tutorial to work on, those in Group 2 were given a textbook-style solution for the problem (similar to the solutions in a textbook solution manual), and those in Group 3 were given the section in the textbook, University Physics by Young and Freedman, which deals with this topic. Each student used his/her respective aid tool for the same amount of time (20 minutes). All students were told that they would have to solve a paired problem involving similar concepts after help from the tools they were provided (tutorial, textbook-style solution, relevant chapter from textbook). All students were informed that aid tool was only for learning the material and could not be used while working on the paired problem they will be given later. The paired problem that followed tested whether students could transfer relevant knowledge acquired from the aid tools to the paired problem. [@transfer] For example, for the Gauss’s law problem discussed above, the paired problem was similar to the tutorial problem but was for an infinite solid insulating cylinder with a uniform volume charge and an asymmetric cylindrical cavity inside it. We used a rubric to grade students. The average performance of the tutorial group was approximately $85\%$. All of them made the correct assumption that the electric field is not zero inside the cavity due to the asymmetry of the charge distribution and explained how Gauss’s law cannot be used in such cases to conclude that the electric field is zero in the cavity. During the interviews, these students were able to explain verbally their thought processes and how they solved the problem to find the electric field. By analyzing the students’ thought processes during the interviews, it appears that the pattern of reasoning employed by these students was significantly better on an average than the reasoning of students from the other two groups. The other two groups didn’t show as much improvement as the tutorial group when graded on a rubric after using the aids. Between Groups 2 and 3, the students who used the textbook-style solution as a guide did better on the paired problem than those who used the relevant textbook section. The average performance of Group 2 was approximately $60\%$ and Group 3 was less than $30\%$. Students who used the textbook-style solution still had difficulties in solving the paired problem and four of them did not solve the entire problem correctly. The solution of the problem involves breaking the problem into subproblems each of which has a spherical symmetry and can be solved by known methods using Gauss’s law. Most of the students in the second group (those who were given a solution of the type given in solutions manual) realized that they had to combine or superpose two electric fields. However, their most common difficulty was in using vectors in order to relate the final solution to the solutions to the two subproblems which have a spherical symmetry. The textbook-type solution showed them that calculating the electric field at a point in the cavity involved subtracting from the electric field due to the full insulating sphere as though there was no cavity, the electric field due to an insulating sphere of the size of the cavity. From the surveys given after the paired problem, some students mentioned that the textbook-style solutions didn’t explain in words the steps used thoroughly. Since the misconceptions students had at the beginning were not explicitly targeted by asking explicit questions in the textbook-type solution (as was done explicitly in the multiple-choice questions which were part of the tutorials), students did not transfer relevant knowledge from the solved example to the paired problem as well as the tutorial group did. All of the students who made use of the textbook as an aid for learning (rather than the tutorial or the solved example) did poorly on the paired problem. This finding is consistent with another study that shows that unless introductory physics students have seen solved examples. [@iso2] Students in this group realized that the problem solution could not be that the magnitude of the electric field inside the cavity is $\vert \vec E \vert=0$ because otherwise they would not be given 20 minutes to browse over the section of the textbook trying to formulate a solution. But the responses they provided after browsing over the book were often difficult to understand and dimensionally incorrect. When asked to explain what they had done, students noted that they were not very sure about how to solve the problem. They added that the relevant section of the textbook did not help because it did not have a solved example exactly like the problem that was asked. Summary ======= People do not automatically acquire usable knowledge by spending lots of time on task. Limited capacity of STM can make cognitive load high for beginning students. For learning to be meaningful, students should be actively engaged in the learning process. Moreover, it is important to consider the difficulty of a problem from students’ perspective and build on their prior knowledge. We are developing computer-based interactive tutorials for introductory mechanics and electricity and magnetism that are suited for a wide variety of students. The self-paced tutorials combine quantitative and conceptual problem solving. They engage students actively in the learning process and provide feedback based upon their needs. They focus on helping students learn problem solving and reasoning skills while helping them build a more coherent knowledge structure related to physics. They can be used as a self-study tool by students. The paired problems can be incorporated into regular quizzes or assigned as homework problems. We thank Daniel Haileselassie and Josh Bilak for help in the development and evaluation of the tutorials and thank F. Reif, J. Levy, and R. Devaty for helpful discussions. We are grateful to the NSF for award DUE-0442087. [9]{} National Reserach Council, [*How people learn: Bridging research and practice*]{}, Committee on learning research and educational practices, Eds. M. Donovan, J. Bransford, and J. Pellegrino, National Academy Press, Washington, DC, 1999; National Reserach Council, [*How people learn: Brain, mind, experience and school*]{}, Committee on developments in science on learning, Eds. J. Bransford, A. Brown and R. Cocking, National Academy Press, Washington, DC, 1999; H. A. Simon, and C. A. Kaplan, [*Foundations of cognitive science*]{}, (M. I. Posner editor, MIT press, 1989); J. R. Anderson, [*The adaptive character of thought*]{}, Hillsdale, NJ: Lawrence Erlbaum, 1990; J. Anderson and C. Lebiere, [*Atomic components of thoughts*]{}, Mahwah NJ: Lawrence Erlbaum, 1998; A. Newell, [*Unified theories of cognition*]{}, cambridge, MA: Harvard University Press, 1990; A. Newell and H. Simon, [*Human Problem Solving*]{}, Englewood Cliffs NJ: Prentice Hall, 1972; E. Thorndike, [*Human Learning*]{}, New York: Century, 1931; R. D. Tennyson and R. L. Elmore, [*Learning theory foundations for instructional design*]{} in [Instructional Design: International Perspectives]{}, (Vol. 1: Theory, Research, Models), R. D. Tennyson, F. Schott, N. Seel, and S. Dijkstra, Mhawah, NJ: Lawr. Erlb., 1997; R. G. Glaser, [*Education and thinking: The role of knowledge*]{}, Am. Psychologist, [**39**]{}, 93-104, (1984). F. Reif, [*Scientific approaches to science education*]{}, Phys. Today [**39**]{}, 48, 1986; F. Reif, [*Interpretation of scientific or mathematical concepts: Cognitive issues and instructional implications*]{} [**11**]{}, 395, 1987; F. Reif and S. Allen, [*Cognition of interpreting scientific concepts: A study of acceleration*]{}, Cognition and Instruction [**9(1)**]{}, 1-44, (1992); J. Mestre and J. Touger, [*Cognitive Research-what’s in it for physics teachers?*]{}, Phys. Teach. [**27**]{}, 447 (1989); E. F. Redish, [*Implications of cognitive studies for teaching physics*]{}, Am. J. Phys. [**62**]{}, 796, 1994; E. Redish, [*Teaching Physics with the physics suite*]{}, Wiley, 2003. G. Miller, [*The magical number seven, plus or minus two: Some limits on our capacity for processing information*]{}, Psychological Review, [**63**]{}, 81-97, 1956. H. Simon, [*How big is a chunk?*]{}, Science, [**183**]{} (4124), 482-488, 1974; P. Kyllonen and R. Christal, [*Reasoning ability is (little more than) working memory capacity?!*]{}, Intelligence, [**14**]{}, 389-433, 1990; A. Baddeley, [*Working Memory*]{}, Oxford: Clarendon Press/Oxford University Press, 1986; M. Miyake, M. Just and P. Carpenter, [*Working memory contraints on the resolution of lexical ambiguity: Maintaining multiple interpretationsin neutral contexts*]{}, J. Memory and Language, [**33(2)**]{}, 175-202, 1994; A. Fry, S. Hale, [*Processing speed, working memory and fluid intelligence: Evidence for a developmental cascade*]{}, Psychological Science, [**7(4)**]{}, 237-241, 1996; R. Kail and T. Salthouse, [*Processing speed as a mental capacity*]{}, Acta Psychologica, [**86**]{}, 199-225, 1994. W. Chase and H. Simon, [*The mind’s eye in chess*]{}, In Visual information processing, Ed. W. Chase, New York: Academic Press, 1973 W. Chase and H. Simon, [*Perception in chess*]{}, Cognitive Psychology, [**4**]{}, 55-81, 1973; F. Gobert and H. Simon, [*Recall of random and distorted chess positions: Implication of the theory of expertise*]{}, Memory and Cognition, [**24(4)**]{}, 493-503, 1996; P. Rosenbloom and A. Newell, [*Learning by chunking: A production system model of practice*]{}, in Production system models of learning and development, Eds. D. Klahr and P. Langley, Cambridge, MA:MIT press, pp. 221-286, 1987; D. Broadbent, [*The magic number severn after fifteen years*]{}, in Eds. A. Kennedy and A. Wilkes, Studies in long term memory, NY: Wilet, 1975. D. Neves and J. Anderson, [*Knowledge Compilation: Mechanisms for automatization of cognitive skills*]{}, in Cognitive skills $\&$ their acquisition, Ed. J. Anderson, Hills., NJ: Lawr. Erl., 1981. J. Larkin, and H. Simon, [*Why a diagram is (sometimes) worth ten thousand words*]{}, In H. A. Simon, [Models of Thought]{} (Yale Univ. Press, New Haven), Vol. II, pp. 413-437 (1989); J. Larkin, [*Understanding, problem representations, and skill in physics*]{} In S. F. Chipman, J. W. Segal and R. Glaser (Eds.), [Thinking and learning skills]{} (Lawrence Erl., Hillsdale, NJ), [**2**]{}, pp. 141-159 (1985); J. Kaput, [*Representation and problem solving: Methodological issues related to modeling*]{}, E. A. Silver (Ed.), in Teaching and Learning Mathematical Problem Solving: Multiple Research Perspectives, Lawrence Erl., Hillsale, NJ, pp. 381-398, 1985; D. Norman, [*Things that make us smart*]{}, Addison-Wesley, p. 49, 1993; J. Zhang, [*The nature of external representations in problem solving*]{}, Cog. Sci. 21, 179-217 (1997); J. Zhang, and D. Norman, "Representations in distributed cognitive tasks, Cog. Sci., 18, 87-122 (1994); K. Reusser, [*Tutoring Systems and pedagogical theory: Representational tools for understanding, planning, and reflection in problem solving*]{}, in S. Lajoie and S. Derry (Eds.), Computer as Cognitive Tools, Lawrence Erl., Hillsdale, NJ, 1993; T. de Jong and M. Ferguson-Hessler, [*Cognitive structure of good and poor problem solvers in physics*]{}, J. Ed. Psych. [**78**]{}, 279-288 (1986); H. Simon, [*On the forms of mental representation*]{}, In C. Savage (Ed.), Minnesota studies in the philosophy of science (Univ. Minnesota Press, Minneapolis), Vol. IX, [*Perception and cognition: Issues in the foundations of psychology*]{} (1978); H. Simon and D. Simon, [*Individual differences in solving physics problems*]{}, in Models of thought, Vol. II, Yale Univ. Press, (1989). M. T. H. Chi, P. J. Feltovich, and R. Glaser, [*Categorization and representation of physics knowledge by experts and novices*]{}, Cog. Sci. [**5**]{}, 121-152 (1981); P. W. Cheng and K. J. Holyoak, [*Pragmatic reasoning schema*]{}, Cognitive Psychology, [**17**]{}, 391-416, 1985; K. Johnson and C. Mervis, [*Effects of varying the levels of expertise on the basic level of categorization*]{}, 1997; P. Johnson-Laird, [*Psychology of reasoning, structure and content*]{}, Cambridge, MA, 1972; S. Marshall, [*Schemas in problem solving*]{}, New York, NY: Cambridge University Press, 1995; D. Bobrow and D. Norman, [*Some principles of memory schemata*]{}, in Representation and understanding: Studies in cognitive science, Eds. D. Bobrow and A. Collins, New York: Academic Press, pp 131-149, 1975. P. T. Hardiman, R. Dufresne and J. P. Mestre, [*The relation between problem categorization and problem solving among novices and experts*]{}, Memory and Cognition, [**17**]{}, 627-638, (1989). B. Eylon, and F. Reif, [“Effect of knowledge organization on task performance"]{}, Cognition and Instruction [**1**]{}, 5 (1984); J. I. Heller, and F. Reif, [*Prescribing effective human problem solving processes: Problem description in physics*]{}, Cognition and Instruction, [**1**]{}, 177, (1984). M. Chi, R. Glaser, and E. Rees, [*Expertise in problem solving*]{}, in [Advances in the psychology of]{} [human intelligence]{}, Vol. 1, pp. 7-75, R. J. Sternberg (editor), Hillsdale, NJ: Lawrence Erlbaum (1982); R. E. Mayer, [*Thinking, Probelm solving, Cognition*]{}, Second Edition, New York: Freeman, 1992; J. Larkin, J. McDermott, D. Simon, and H. Simon, [*Expert and novice performance in solving physics problems*]{}, Science [**208**]{}, 1335-1362 (1980); J. Larkin, [*The role of problem representation in physics*]{}, In D. Gentner and A. L. Stevens (Eds.), [Mental models]{} (Lawrence Erlbaum, Hillsdale, NJ), pp. 75-98 (1983); J. Larkin, [*Cognition of learning physics*]{}, Am. J. Phys. [**49(6)**]{}, 534-541, (1981); J. Larkin, [*Skilled problem solving in physics: A hierarchical planning approach*]{}, J. of Structured Learn. [**6**]{}, 121-130 (1980); A. H. Schoenfeld, [*Mathematical problem solving*]{}, New York: Academic press, 1985; A. H. Schoenfeld, [*Teaching mathematical thinking and problem solving*]{}, pp. 83-103, in [Toward the thinking curriculum: Current cognitive research]{} (L. B. Resnick and B. L. Klopfer Eds.), Washington, Dc: ASCD, 1989; A. Schoenfeld and D. J. Herrmann, [*Problem perception and knowledge structure in expert novice mathematical problem solvers*]{}, J. Exp. Psych., Learning, Memory, and Cognition [**8**]{}, 484-494 (1982); Y. Anzai and T. Yokoyama, [*Internal models in physics problem solving*]{}, Cognition and instruction [**1(4)**]{}, 397-450, (1984); C. Schunn and J. Anderson, [*Acquiring expertise in science: Explorations of what, when and how*]{}, in Designing for science, Implications from everyday, classroom and professional settings, Eds. K. Crowley, C. D. Schuun and T. Okada, Lawrence Erlbaum, 2001. J. Sweller, [*Cognitive load during problem solving: Effects on learning*]{}, Cognitive science [**12**]{}, 257, 1988; J. Sweller, R. Mawer, and M. Ward, [*Development of expertise in mathematical problem solving*]{}, J. Exptal. Psychology: General [**112**]{}, 639, 1983. C. Singh, [*When physical intuition fails*]{}, Am. J. Phys, [**70(11)**]{}, 1103-1109, 2002. C. Singh and D. Rosengrant, Multiple-choice test of energy and momentum concepts, Am. J. Phys.,71(6), 607-617, (2003). P. Wason, [*Reasoning about a rule*]{}, Quarterly Journal of experimental psychology, [**20**]{}, 273-281, 1968; P. Wason and P. Johnson-Laird, [*Psychology of reasoning: Structure and content*]{}, Cambridge, MA: Harvard University Press, 1972. H. Ginsberg, and S. Opper, [*Piaget’s theory of intellectual development*]{}, Englewood cliffs, Prentice Hall, N.J., 1969; R. Gorman, [*Discovering Piaget: A guide for teachers*]{}, Merrill, Columbus, 1972; J. Piaget, [*The language and thought of a child*]{}, NY: Meridian, (1974); J. Piaget, [*Success and understanding*]{}, Cambridge, MA: Harvard University Press, 1978; A. Lawson, [*A review of research on formal reasoning and science teaching*]{}, J. Research in Science Teaching, [**22(7)**]{}, 569-617, 1985. L. Vygotsky, [*Mind in Society: The development of higher psychological processes*]{}, Harvard University Press, 1978; J. Wertsch, [*Mind in Action*]{}, NY: Oxford University Press, (1998); J. Valsiner, and R. van der Veer, [*The encoding of distance: The concept of the zone of proximal development and its interpretations*]{}. In (R. R. Cocking and K. A. Renninger Eds.) [The development and meaning of psychological distance]{} (pp 35-62), Hillsdale, NJ: Lawrence Erlbaum Associates. C. Singh, “Interactive video tutorials for enhancing problem solving, reasoning, and meta-cognitive skills of introductory physics students", Proceedings of the 2003 Physics Education Research Conference, edited by J. Marx, S. Franklin and K. Cummings, AIP Conf. Proc., volume 720, Melville, New York, 177-180, 2004. For example, see http://www.andes.pitt.edu/, http://www.webassign.net, http://www.masteringphysics.com R. Hake, “ Interactive-engagement versus traditional methods: A six-thousand-student survey of mechanics test data for introductory physics courses,” Am. J. Phys. [**66**]{}, 64 (1998). A. Collins, J. Brown, and S. Newman, [*Cognitive Apprenticeship: Teaching the crafts of reading, writing and mathematics*]{}, In L. B. Resnick (Ed.), “Knowing, learning, and instruction: Essays in honor of Robert Glaser", Hillsdale, NJ: Lawrence Erlbaum., 453-494, (1989). C. Singh, “Student understanding of symmetry and Gauss’s law of electricity", Am. J. Phys., [**[74]{}**]{}(10), 923-936, (2006). M. Gick and K. Holyoak, [*The cognitive basis of knowledge transfer*]{}, in Transfer of learning: Contemporary research and applications, Cornier $\&$ Hagman (Eds.), New York, Academic Press (1987); M. Gick and K. Holyoak, [*Schema induction and analogical transfer*]{}, Cognitive Psychology, [**15**]{}, 1-38, 1983; K. Holyoak, [*The pragmatics of analogical transfer*]{}, In The Psychology of learning and motivation, Ed. G. Bower, (Vol. 19), New York: Academic Press, 1985; K. Holyoak and P. Thagard, [*Mental Leaps: Analogy in creative thought*]{}, Cambridge, MA: MIT press, 1995; R. Dufresne, J. Mestre, T. Thaden-Koch, W. Gerace and W. Leonard, [*Knowledge representation and coordination in the transfer process*]{} 155-215, in [Transfer of learning from a modern multidisciplinary perspective]{}, J. P. Mestre (Ed.), 393 pages, Greenwich, CT: Information Age Publishing, (2005); J. Lobato, [*How design experiments can inform a rethinking of transfer and vice versa*]{}, Educational Researcher, 32(1), 17-20, (2003); J. Lobato, [*Alternative perspectives on the transfer of learning: History, issues and challenges for future research*]{}, J. Learning Sciences, [**15(4)**]{}, 431-439, (2006); D. J. Ozimek, P. V. Engelhardt, A. G. Bennett, N. S. Rebello, [*Retention and transfer from trigonometry to physics*]{}, Proceedings of the Physics Education Research Conference, [eds. J. Marx, P. Heron, S. Franklin]{}, 173-176, (2004); J. D. Bransford and D. Schwartz, [*Rethinking transfer: A simple proposal with multiple implications*]{}, Review of Research in Education, [**24**]{}, 61-100, (1999); L. Novick, [*Analogical transfer, problem similarity and expertise*]{}, J. Experimental Psychology: Learning, memory and cognition, [**14(3)**]{}, 510-520, (1988). C. Singh, Assessing student expertise in introductory physics with isomorphic problems, Part II: Examining the effect of some potential factors on problem solving and transfer", Phys. Rev. ST Phys. Educ. Res. [**4**]{}, 010105, (2008).
{ "perplexity_score": 377.5, "pile_set_name": "ArXiv" }
In the technical field constituted by the production of satellite structures made of composite materials, it is essential to provide strict thermic control of the elements constituting the structure by equipping them with both cooling units and heaters distributed at appropriate locations on the assembly. In fact, it is known that, depending on their position in sunlight or in shade, the various parts of a satellite are subjected to extremely wide temperature variations which, despite the choice of appropriate materials, may result in spacial deformations which, even if minimal, may render inoperative observation and communication transmission devices. One known solution consists of gluing to the appropriate elements of the structure a heater mainly consisting of a heating resistor, such as a printed circuit mounted on a plastic strip. This technique can be combined with another known technique and used in aeronautics so as to ensure the deicing of the fuselage or wings of an aircraft. This other technique consists of placing a composite structure with current conducting fibers at the critical zones to be de-iced, as described in the document FR-A 2 356 336. The feeding of electric current needing to traverse the fibers is effected via the connection of wires to a metallic frame mounted at the edge of the critical zones which is kept in contact with the fibers, or to a metallic deposit which is produced by vaporization or electrolytic means at the extremities of the critical zones containing the fibers. Apart from the drawback of being complex to mount and dispose, these devices have one major defect as regards the electric contacts required between the fibers and the feed wires owing to the fragility of gluings of the electric link. Moreover, the excess thicknesses existing at the locations of the electric connections are detrimental to the aerodynamic profile of the wings and impede the correct placing of structures for shielding and protecting the leading edges against impacts and erosion. By virtue of the document FR-A 2 578 377 in the name of the Applicant, there exists a de-icing device able to avoid these drawbacks, a device in which the conductive fibers are carbon fiber appearing in the form of at least one strip in which the fibers are orientated longitudinally, the strip being preimpregnated with resin and having at least one extremity being fixed in the shape of a deformable tubular element with a metallic meshwork ensuring the required electric link via contact with said strip and by welding or crimping such to the corresponding feed wire. However, as regards the embodiment of elementary parts made of a composite material and intended to form the load bearing structure of a satellite which are needing to be equipped with a heater, it seems impossible to add a strip and tubular element such as is shown in the prior art to each part. The document FR-A 2 339 314 also describes conductive heating very thin layers incorporating conductors parallel to the direction of the orientation of these layers. The documents FR-A 2 233 487 or FR-A 1 533 941 describe motor vehicles with heated windows or laminated panels equipped with incorporated resistance wires, but these production techniques clearly prove to be totally unsuitable for employment in a satellite load bearing structure. At the current moment, the adding of a heater to a composite support requires the prior cleaning of said support at the same time as the preparation of the surface quality of the heater, followed by masking of the support receiving the heater and then spreading a coating of glue on the assembled elements. Finally, after polymerization of the glue, the gluing zones need to be demasked and cleaned before fixing the connection cables, for example with the aid of collars. This gluing needs to be effectedly fully and evenly, firstly to ensure a correct regular thermic contact with the support, and secondly so as to avoid the risks of tearing or hooking of the corners of the heater during its various handlings and avoid leaving any air bubbles caught under the heater and which would burst in space! This production technique does nevertheless have a certain number of drawbacks. In addition, it requires the passage of each elementary part through at least two workshops or production zones, namely firstly to make the basic part according to either of the known methods, namely via filamentary winding, draping of strips, etc., and then of adding to it the heating element. These operations not covered by each of these techniques and dealt with by the same specialists are thus effected one after the other and thus they double the production time and risks of pollution, and thus require that constricting precautions be taken as regards cleanness.
{ "perplexity_score": 319.9, "pile_set_name": "USPTO Backgrounds" }
Transforming simple achiral molecules into stereochemically complex molecules remains a central challenge in organic synthesis. Asymmetric metal catalysis provides an avenue to meet this challenge. However, the majority of asymmetric organometallic catalysts mediates one type of reaction and allows one transformation. Therefore, traditionally complex organic molecules are often built transformation by transformation. This process is tedious and expensive. This proposal describes an innovative approach to asymmetric catalysis, asymmetric tandem organocatalysis, which uses one catalyst to mediate multiple transformations. The utility of tandem organocatalysis will be demonstrated in a very concise synthesis of Eiseniachloride A, a molecule of potential great medicinal interest. The completion of this proposed research would show the concept of tandem organocatalysis is valid and superior to the traditional one catalyst-one transformation organometallic catalysis. More importantly, the realization of asymmetric tandem organocatalysis would provide large quantities of potential drug candidates that can not be obtained otherwise.
{ "perplexity_score": 366.8, "pile_set_name": "NIH ExPorter" }
Typically, website developers test websites under construction as part of a multiphase process. Specifically, websites under construction are typically tested in a “test” phase using test data. The websites are then transitioned (through a variety of test phases) to a “production” phase, where the production phase utilizes real-time transaction data and is exposed to the public as a live website. Errors may occur during the initial launch period. Thus, systems and methods for mitigating or minimizing such errors are desirable.
{ "perplexity_score": 381.3, "pile_set_name": "USPTO Backgrounds" }
The public will get a rare glimpse of the 11th century Celtic Psalter The oldest book in Scotland is going on public display for the first time in its history. The Celtic Psalter dates from the 11th Century and contains hand-written psalms in Latin, with Celtic and Pictish illustrations. It has been kept under lock and key at the University of Edinburgh and has been available to only a few scholars. But for the next three months the public will have the chance to view the book at the university's library. The psalter, which is thought to be almost 1,000 years old, has been described as Scotland's version of the famous Book of Kells in Dublin. It contains a handwritten copy of the Psalms of King David in Latin, and has ornate pictures of dragons and beasts. Edinburgh University's rare book librarian Joseph Marshall said: "People have been reluctant to show it, but now we have a special display case, and really this is the book's first public outing in 1,000 years." The origin of the psalter is a mystery but experts believe it was probably produced by monks in Iona, who were also associated with the making of the Book of Kells. It's as beautiful today as it was when it was first written Joseph Marshall Edinburgh University It is thought that the pocket-sized book was donated to Edinburgh University's library around the 17th century, but it has only been available to students of medieval manuscripts. It is still in pristine condition because it has been kept out of public view for so long. Although the original binding has been lost, the script is bold and clear and the red, green, purple and gold in the illustrations are still vivid. Mr Marshall said: "It is a riot of colour. You would think someone had gone over it with a felt-tip pen." He added that he thought the book was probably commissioned by a figure of importance, such as St Margaret, Queen of Scotland. Mr Marshall said:"Someone has gone to town to make it look beautiful and it's as beautiful today as it was when it was first written." The psalter is part of a display which marks the refurbishment of the university library's exhibition room. "Masterpieces 1" also includes Scotland's only copy of the first book printed in any of the Gaelic languages. Also on display is the finest surviving copy of Scotland's first substantial printed book, the Aberdeen Breviary which dates back to 1509. There is also a copy of Shakespeare's Romeo and Juliet published during the playwright's lifetime. The exhibition opens on Friday and lasts until 14 March. Bookmark with: Delicious Digg reddit Facebook StumbleUpon What are these? E-mail this to a friend Printable version
{ "perplexity_score": 133.8, "pile_set_name": "OpenWebText2" }
Electrospun polycaprolactone scaffolds with tailored porosity using two approaches for enhanced cellular infiltration. The impact of mat porosity of polycaprolactone (PCL) electrospun fibers on the infiltration of neuron-like PC12 cells was evaluated using two different approaches. In the first method, bi-component aligned fiber mats were fabricated via the co-electrospinning of PCL with polyethylene oxide (PEO). Variation of the PEO flow rate, followed by selective removal of PEO from the PCL/PEO mesh, allowed for control of the porosity of the resulting scaffold. In the second method, aligned fiber mats were fabricated from various concentrations of PCL solutions to generate fibers with diameters between 0.13 ± 0.06 and 9.10 ± 4.1 μm. Of the approaches examined, the variation of PCL fiber diameter was found to be the better method for increasing the infiltration of PC12 cells, with the optimal infiltration into the ca. 1.5-mm-thick meshes observed for the mats with the largest fiber diameters, and hence largest pore sizes.
{ "perplexity_score": 390.8, "pile_set_name": "PubMed Abstracts" }
Indian Lucknow Girl Reyanka Acharya Mobile Number Friendship Photo Today you will get my Indian Girls Mobile Numbers here. I have shared it here marriage and friendship purpose. My name is Reyanka Acharya and I am from India Lucknow. Recently I have completed my education. So I along with my family has decided for my marriage. But I want to find my life partner myself and online. Therefore I have joined this website. It is not first website, where I have shared my profile. But still I have not become successful. But I have joined this website with great hope that I will be surely become successful here. On these websites, it is necessary to share your profile and photo. And good profile title is also important. So today I have shared my complete profile with photo and Mobile Number. And I have given my profile title as Indian Lucknow Girl Reyanka Acharya Mobile Number Friendship Photo. Now I am waiting for result. But I want to tell you that there was no need to wait more. Because now I started to get good result. And I have made many friends from different countries and cities. They all are well-educated and decent. Because their style of speaking is frankly. When I joined this website, I also found many other Girls Mobile Numbers here. I asked them reason of joining this website. They told me that we have also joined for same purpose. So if you want to be my life partner and interested in me. Then contact me on my Mobile Number. We can be good life partner.
{ "perplexity_score": 788.1, "pile_set_name": "Pile-CC" }
President Donald Trump, who launched his campaign with a forceful attack on immigrants, is now the man responsible for catapulting immigration reform back into contention. Attorney General Jeff Sessions announced Tuesday that the administration would rescind the Deferred Action for Childhood Arrivals program, an Obama-era executive action that protected from deportation about 800,000 young undocumented immigrants who came to the United States as children — people known as “Dreamers,” after the failed 2010 DREAM Act. Immigration advocates blasted the decision as a moral failing on the part of the Trump administration. But they also acknowledged on Tuesday that Trump provided a renewed political opening none of them had expected from a man who barnstormed the presidency by referring to Mexican immigrants as drug dealers, criminals and rapists. Chances of passing a new DREAM Act remain a long shot, and some Republicans in Congress said Tuesday that they were skeptical that any stand-alone bill granting legal status to Dreamers could pass. White House officials said they hoped to use the impetus to win concessions on a border wall and other priorities. But despite major hurdles ahead, immigration activists said, Trump has single-handedly revived chances for the DREAM Act, if not for something larger. The president “has really tossed the issue onto the table — not putting pressure on Democrats, but into the lap of Republicans,” said Frank Sharry, founder and executive director of the immigration reform group America’s Voice. “This is not the issue Republicans would have chosen. Trump chose it for them. In a backhanded way, he’s made it more likely that the DREAM Act will be passed.” Trump acted on Tuesday in response to a Sept. 5 deadline imposed on him by a coalition of attorneys general from across the country — led by Texas. The group had threatened to sue the administration if the president did not take any action to end the program. Breaking News Alerts Get breaking news when it happens — in your inbox. Email Sign Up By signing up you agree to receive email newsletters or alerts from POLITICO. You can unsubscribe at any time. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. The decision — one that the president “wrestled with,” according to White House press secretary Sarah Huckabee Sanders — has created momentum for Congress to take action on immigration reform, which stalled on the Hill in 2010 and again in 2013. Trump has given Congress a six-month window to pass legislation. Hundreds of protesters swarmed the gates in front of the White House and gathered on Fifth Avenue in front of Trump Tower yelling “Shame!” at the administration for rescinding a backstop for hundreds of thousands of undocumented individuals who have served in the military, contributed to the economy, and pursued college plans in the country where they grew up. But immigration activists conceded that if Trump had instead decided to let the fight over DACA play out in the courts, there might not have been any window for reviving consideration of immigration reform legislation. In that scenario, “the pressure on Congress wouldn’t have been nearly as intense,” said Sharry. “It would be, ‘Let’s see what the courts do.’ In this scenario, there’s no ambiguity as to who is responsible. It’s cleaner.” Ironically, it’s Sessions — who for years has been one of the biggest forces on the Hill pushing attempts to kill any comprehensive immigration reform — who’s been part of the brain trust advising Trump to take action that puts the onus on Congress to act. “The fact that the Trump administration ended DACA creates a sense of urgency for Congress to pass the DREAM Act,” said Tyler Moran, managing director of the DC Immigration Hub. “Republicans are in control of both the House and the Senate, and they need to make a decision if they’re going to be part of the solution, or if they’re going to side with [White House senior policy adviser] Stephen Miller and Jeff Sessions.” Other immigration activists were not eager to see any silver lining in Tuesday's announcement. “Whatever happens in Congress, the notion of using Dreamers as pawns to leverage to pass legislation is a very distasteful one,” said Jeremy Robbins, executive director of the New American Economy, a pro-immigration reform group launched by former New York City Mayor Michael Bloomberg and the conservative media mogul Rupert Murdoch. But Robbins conceded that Trump’s move revives the issue, which has been lagging for years. In December 2010, the DREAM Act failed, with 55 in favor, 41 opposed and four senators abstaining. Only three Republicans voted in favor of the bill that year. In 2013, a comprehensive immigration reform bill passed the Senate, only to die in the House. In a statement he released on Tuesday, House Speaker Paul Ryan struck a sympathetic tone and expressed hope for a “permanent legislative solution that includes ensuring that those who have done nothing wrong can still contribute as a valued part of this great country.” But Trump may have set Ryan up not for a test of his own principles, but of his backbone, as he seeks to pass a bill that is likely to be unpopular with the Republican base. “Speaker Ryan and Leader [Mitch] McConnell know how cold-hearted and senseless it would be to round these bright young Americans up and kick them out of the only home they’ve ever known,” said Jesse Lehrich, communications director for Obama for America. “The administration has dared Speaker Ryan and Leader McConnell to summon the moral courage and leadership to do something about it, once and for all.”
{ "perplexity_score": 268.3, "pile_set_name": "OpenWebText2" }
Grimes said his client decided to come clean about the hoax in an attempt to “heal.” “He knows that if he doesn’t come out and tell the truth, it will interfere with him getting out of this place that he is in,” Grimes said. “This is part of my public healing,” Grimes quoted Tuiasosopo as saying. Dr. Phil McGraw, who spoke with Tuiasosopo for an interview set to air this week, described the 22-year-old as “a young man that fell deeply, romantically in love” with Te’o. McGraw, speaking on the “Today” show, said he asked Tuiasosopo about his sexuality, and the 22-year-old said he was “confused.” In a short clip of the “Dr. Phil” interview, Tuiasosopo told McGraw that he wanted to end his relationship with Te’o because he “finally realized that I just had to move on with my life.”
{ "perplexity_score": 234.2, "pile_set_name": "Pile-CC" }
/* * Copyright (c) Facebook, Inc. and its affiliates. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.facebook.buck.util.environment; public enum CommandMode { RELEASE, TEST; private boolean loggingEnabled; static { RELEASE.loggingEnabled = true; TEST.loggingEnabled = false; } public boolean isLoggingEnabled() { return loggingEnabled; } }
{ "perplexity_score": 1127.3, "pile_set_name": "Github" }
Q: How to implode JavaScript into PHP's return function? I have a PHP function: function output_errors($errors) { return '<ul><li>' . implode('</li><li>', $errors) . '</li></ul>'; } But instead of <ul> and <li>s I wish to use jQuery to show errors: $(function() { $.pnotify({ title: 'Update Successful!', text: '<p>Error text here!</p>', }); }); I tried a lot of combinations but it doesn't work. A: What specifically doesnt work ? Just Simply implode with a comma : function output_errors($errors) { $error = implode(', ', $errors); echo <<< xyz <script> $(function() { $.pnotify({ title: 'Update Successful!', text: '$error', }); }); </script> xyz; }
{ "perplexity_score": 2243.3, "pile_set_name": "StackExchange" }
/** * \file lzma/subblock.h * \brief Subblock filter */ /* * Author: Lasse Collin * * This file has been put into the public domain. * You can do whatever you want with this file. * * See ../lzma.h for information about liblzma as a whole. */ #ifndef LZMA_H_INTERNAL # error Never include this file directly. Use <lzma.h> instead. #endif /** * \brief Filter ID * * Filter ID of the Subblock filter. This is used as lzma_filter.id. */ #define LZMA_FILTER_SUBBLOCK LZMA_VLI_C(0x01) /** * \brief Subfilter mode * * See lzma_options_subblock.subfilter_mode for details. */ typedef enum { LZMA_SUBFILTER_NONE, /**< * No Subfilter is in use. */ LZMA_SUBFILTER_SET, /**< * New Subfilter has been requested to be initialized. */ LZMA_SUBFILTER_RUN, /**< * Subfilter is active. */ LZMA_SUBFILTER_FINISH /**< * Subfilter has been requested to be finished. */ } lzma_subfilter_mode; /** * \brief Options for the Subblock filter * * Specifying options for the Subblock filter is optional: if the pointer * options is NULL, no subfilters are allowed and the default value is used * for subblock_data_size. */ typedef struct { /* Options for encoder and decoder */ /** * \brief Allowing subfilters * * If this true, subfilters are allowed. * * In the encoder, if this is set to false, subfilter_mode and * subfilter_options are completely ignored. */ lzma_bool allow_subfilters; /* Options for encoder only */ /** * \brief Alignment * * The Subblock filter encapsulates the input data into Subblocks. * Each Subblock has a header which takes a few bytes of space. * When the output of the Subblock encoder is fed to another filter * that takes advantage of the alignment of the input data (e.g. LZMA), * the Subblock filter can add padding to keep the actual data parts * in the Subblocks aligned correctly. * * The alignment should be a positive integer. Subblock filter will * add enough padding between Subblocks so that this is true for * every payload byte: * input_offset % alignment == output_offset % alignment * * The Subblock filter assumes that the first output byte will be * written to a position in the output stream that is properly * aligned. This requirement is automatically met when the start * offset of the Stream or Block is correctly told to Block or * Stream encoder. */ uint32_t alignment; # define LZMA_SUBBLOCK_ALIGNMENT_MIN 1 # define LZMA_SUBBLOCK_ALIGNMENT_MAX 32 # define LZMA_SUBBLOCK_ALIGNMENT_DEFAULT 4 /** * \brief Size of the Subblock Data part of each Subblock * * This value is re-read every time a new Subblock is started. * * Bigger values * - save a few bytes of space; * - increase latency in the encoder (but no effect for decoding); * - decrease memory locality (increased cache pollution) in the * encoder (no effect in decoding). */ uint32_t subblock_data_size; # define LZMA_SUBBLOCK_DATA_SIZE_MIN 1 # define LZMA_SUBBLOCK_DATA_SIZE_MAX (UINT32_C(1) << 28) # define LZMA_SUBBLOCK_DATA_SIZE_DEFAULT 4096 /** * \brief Run-length encoder remote control * * The Subblock filter has an internal run-length encoder (RLE). It * can be useful when the data includes byte sequences that repeat * very many times. The RLE can be used also when a Subfilter is * in use; the RLE will be applied to the output of the Subfilter. * * Note that in contrast to traditional RLE, this RLE is intended to * be used only when there's a lot of data to be repeated. If the * input data has e.g. 500 bytes of NULs now and then, this RLE * is probably useless, because plain LZMA should provide better * results. * * Due to above reasons, it was decided to keep the implementation * of the RLE very simple. When the rle variable is non-zero, it * subblock_data_size must be a multiple of rle. Once the Subblock * encoder has got subblock_data_size bytes of input, it will check * if the whole buffer of the last subblock_data_size can be * represented with repeats of chunks having size of rle bytes. * * If there are consecutive identical buffers of subblock_data_size * bytes, they will be encoded using a single repeat entry if * possible. * * If need arises, more advanced RLE can be implemented later * without breaking API or ABI. */ uint32_t rle; # define LZMA_SUBBLOCK_RLE_OFF 0 # define LZMA_SUBBLOCK_RLE_MIN 1 # define LZMA_SUBBLOCK_RLE_MAX 256 /** * \brief Subfilter remote control * * When the Subblock filter is initialized, this variable must be * LZMA_SUBFILTER_NONE or LZMA_SUBFILTER_SET. * * When subfilter_mode is LZMA_SUBFILTER_NONE, the application may * put Subfilter options to subfilter_options structure, and then * set subfilter_mode to LZMA_SUBFILTER_SET. No new input data will * be read until the Subfilter has been enabled. Once the Subfilter * has been enabled, liblzma will set subfilter_mode to * LZMA_SUBFILTER_RUN. * * When subfilter_mode is LZMA_SUBFILTER_RUN, the application may * set subfilter_mode to LZMA_SUBFILTER_FINISH. All the input * currently available will be encoded before unsetting the * Subfilter. Application must not change the amount of available * input until the Subfilter has finished. Once the Subfilter has * finished, liblzma will set subfilter_mode to LZMA_SUBFILTER_NONE. * * If the intent is to have Subfilter enabled to the very end of * the data, it is not needed to separately disable Subfilter with * LZMA_SUBFILTER_FINISH. Using LZMA_FINISH as the second argument * of lzma_code() will make the Subblock encoder to disable the * Subfilter once all the data has been ran through the Subfilter. * * After the first call with LZMA_SYNC_FLUSH or LZMA_FINISH, the * application must not change subfilter_mode until LZMA_STREAM_END. * Setting LZMA_SUBFILTER_SET/LZMA_SUBFILTER_FINISH and * LZMA_SYNC_FLUSH/LZMA_FINISH _at the same time_ is fine. * * \note This variable is ignored if allow_subfilters is false. */ lzma_subfilter_mode subfilter_mode; /** * \brief Subfilter and its options * * When no Subfilter is used, the data is copied as is into Subblocks. * Setting a Subfilter allows encoding some parts of the data with * an additional filter. It is possible to many different Subfilters * in the same Block, although only one can be used at once. * * \note This variable is ignored if allow_subfilters is false. */ lzma_filter subfilter_options; } lzma_options_subblock;
{ "perplexity_score": 2012.7, "pile_set_name": "Github" }
5. The place or honor, or of command; the most important or foremost position; the front; as, the head of the table; the head of a column of soldiers. "An army of fourscore thousand troops, with the duke Marlborough at the head of them." (Addison) 6. Each one among many; an individual; often used in a plural sense; as, a thousand head of cattle. "It there be six millions of people, there are about four acres for every head." (Graunt) 7. The seat of the intellect; the brain; the understanding; the mentalfaculties; as, a good head, that is, a good mind; it never entered his head, it did not occur to him; of his own head, of his own thought or will. "Men who had lost both head and heart." (Macaulay) <anatomy> The most anterior of the three pairs of embryonicrenalorgans developed in most vertebrates the pronephors. Head money, a capitation tax; a poll tax. Head pence, a poll tax. Head sea, a sea that meets the head of a vessel or rolls against her course. Head and shoulders. By force; violently; as, to drag one, head and shoulders. "They bring in everyfigure of speech, head and shoulders." . By the height of the head and shoulders; hence, by a great degree or space; by far; much; as, he is head and shoulders above them. Head or tail, this side or that side; this thing or that; a phrase used in throwing a coin to decide a choice, guestion, or stake, head being the side of the coin bearing the effigy or principal figure (or, in case there is no head or face on either side, that side which has the date on it), and tail the other side. Neither head nor tail, neither beginning nor end; neither this thing nor that; nothing distinct or definite; a phrase used in speaking of what is indefinite or confused; as, they made neither head nor tail of the matter. Head wind, a wind that blows in a direction opposite the vessel's course. Out one's own head, according to one's own idea; without advice or cooperation of another. Over the head of, beyond the comprehension of. To be out of one's head, to be temporarily insane. To come or draw to a head. See Come, Draw. To give (one) the head, or To give head, to let go, or to give up, control; to free from restraint; to give license. "He gave his able horse the head." . "He has so longgiven his unruly passions their head." . To his head, before his face. "An uncivil answer from a son to a father, from an obliged person to a benefactor, is a greater indecency than if an enemy should storm his house or revile him to his head." . To lay heads together, to consult; to conspire. To lose one's head, to lose presence of mind. To make head, or To make head against, to resist with success; to advance. To show one's head, to appear. To turn head, to turn the face or front. "The ravishers turn head, the fight renews." .
{ "perplexity_score": 420.1, "pile_set_name": "Pile-CC" }
You are here We Buy Books Selling secondhand books to us We buy good condition secondhand books over a range of subjects. It should be noted that our speciality is military history so our buying dollar is more likely to be spent in that area. We are also, however, keen on looking at books relating to fishing, Aboriginal history/studies/art, Australian local histories, bushranging, trains and railways, Australian history, and a wide range of other topics. Ultimately, what we are after at any given time—and what we can purchase—depends on what gaps we have on our shelves and in storage! If what you wish to sell does not meet our needs, we will try to point you to appropriate outlets. If you live locally, and only have a few books to sell (say, up to two boxes), you may bring them to the shop anytime during our opening hours of Wednesday to Saturday 10.00 a.m. to 4.00 p.m. If you wish to bring in more than two boxes please ring to make an appointment. Our shop is quite small, so if you have more than five boxes of books, we would prefer to arrange a home visit to appraise and quote. When phoning to make an appointment to appraise your books at your home, it helps us if you can tell us how many books you have. If there are too many to count, an estimate of the linear metres will give us a good idea. If your library consists of books on different subjects, please tell us what those subjects are. If you don’t live in Canberra, we may ask you for a list of your books with specific details. We do visit interstate if the collection is of interest to us. If you are only selling a portion of your collection, please separate these from those you don’t want to sell. It can be a disappointing experience for both of us if you have not, and can result in delays to the appraisal process. Usually, our price offered is a total one, which takes into account all the books offered. If you want us to price something separately, please let us know beforehand. Whether you bring books to the shop or we visit you, please note that we do not buy books in poor condition i.e. anything not attached to covers, that has heavy marking throughout, is water damaged or with any evidence of mould, that has torn or missing pages or plates. We only occasionally purchase ex library books. A good usual test to determine if we would be interested in purchasing a less than pristine book is to ask yourself, would you yourself purchase that book from a secondhand bookseller? If, objectively you can’t see yourself buying a book in poor condition, chances are we would not want to purchase it either. Please feel free to phone us first on 02 6290 0140 to discuss the books you wish to sell. Selling new books to us As well as secondhand books, we stock a range of carefully selected new military titles. If you are about to publish or have just released a book relating to Australian military history, please email your release sheet, ordering terms and retail/wholesale price details to us at alexfax@alexanderfaxbooks.com.au Please note: we only purchase new Australian titles from Australian publishers/authors. We prefer aviation and unit history titles, but will also consider other subject matter including Australian trout fishing and Canberra local histories. We no longer stock new naval titles, POW accounts, books relating to 19th century wars or the post-Second World War conflicts.
{ "perplexity_score": 509.8, "pile_set_name": "Pile-CC" }
730 N.W.2d 152 (2007) 2007 WI 43 In the Matter of DISCIPLINARY PROCEEDINGS AGAINST Arthur L. SCHUH, Jr., Attorney at Law: Office of Lawyer Regulation, Complainant, v. Arthur L. Schuh, Jr., Respondent. No. 2006AP2235-D. Supreme Court of Wisconsin. Decided April 19, 2007. ¶ 1 PER CURIAM. We review a stipulation filed by the Office of Lawyer Regulation (OLR) and Attorney Arthur L. Schuh, Jr., pursuant to SCR 22.12[1] requesting this court to revoke Attorney Schuh's license to practice law in Wisconsin due to his professional misconduct, effective July 27, 2006, the date of the summary suspension of Attorney Schuh's license. Attorney Schuh's misconduct consisted of committing criminal acts, conspiring to distribute a controlled substance and knowingly possessing a firearm in furtherance of a drug trafficking crime, that reflect adversely on his honesty, trustworthiness and fitness as a lawyer, in violation of SCR 20:8.4(b).[2] ¶ 2 Having independently reviewed the matter, we approve the SCR 22.12 stipulation and adopt its stipulated facts and conclusions of law. We agree that the serious nature of Attorney Schuh's professional misconduct requires the revocation of his *153 license to practice law in this state. We also agree to the parties' request that the revocation be made effective on the date of the summary suspension of Attorney Schuh's license. ¶ 3 Attorney Schuh was admitted to the practice of law in Wisconsin in 1982. He previously practiced in the Appleton area. Prior to the summary suspension of his license due to his criminal convictions, he had not been subject to professional discipline. ¶ 4 On April 3, 2006, pursuant to a plea agreement, Attorney Schuh pled guilty to two criminal counts in the United States District Court for the Eastern District of Wisconsin. In Count 1, Attorney Schuh pled guilty to conspiring to distribute a controlled substance, 500 grams or more of a mixture containing cocaine, in violation of Title 21, United States Code, Sections 841(a)(1) and (b)(1)(B), and 846. In Count 2, Attorney Schuh pled guilty to knowingly possessing a firearm in furtherance of the drug trafficking crime, in violation of Title 18, United States Code, Section 924(c)(1)(A)(i). According to the plea agreement, which the parties stipulate to including in the record of this proceeding, from 2000 to 2003 Attorney Schuh routinely obtained one to three ounces of cocaine from a supplier, used some of it for personal consumption, and distributed the rest to friends and associates. ¶ 5 On July 13, 2006, the federal district court sentenced Attorney Schuh to a total of 123 months of imprisonment, to be followed by four years of supervised release. The court also ordered Attorney Schuh to pay a $2000 fine and to forfeit his ownership interest in a motorcycle and a cabin in Pine River, Wisconsin. ¶ 6 On July 27, 2006, this court summarily suspended Attorney Schuh's license to practice law in this state pursuant to SCR 22.20 and based on his federal criminal convictions. ¶ 7 In the SCR 22.12 stipulation, Attorney Schuh agrees that his criminal acts of conspiring to distribute cocaine and knowingly possessing a firearm in furtherance of that drug trafficking crime reflect adversely on his honesty, trustworthiness and fitness as a lawyer, and constitute a violation of SCR 20:8.4(b). On the basis of that violation, Attorney Schuh and the OLR jointly request that the court revoke his license to practice law in Wisconsin, effective as of July 27, 2006. ¶ 8 The stipulation notes that Attorney Schuh's misconduct is aggravated by the willful nature of his violations of the law and the damage his criminal acts have done to the perception of lawyers and the legal system in this state. On the mitigating side, the stipulation notes that Attorney Schuh does not have a prior disciplinary history and the OLR has no information that Attorney Schuh failed to represent his clients diligently. Moreover, Attorney Schuh has experienced significant consequences including a prison term of ten years and three months, which is close to the mandatory minimum total of ten years required for the two federal offenses. ¶ 9 The stipulation properly states that Attorney Schuh understands the misconduct allegations against him, the ramifications of the stipulated level of discipline, his right to contest the matter, and his right to consult with counsel.[3] Further, Attorney Schuh verifies that he is entering the stipulation knowingly and voluntarily. ¶ 10 Finally, the stipulation contains several requests and statements by Attorney Schuh. He requests the court to take note of his assertions that he did not engage in selling drugs for profit and distributed *154 drugs to a limited number of acquaintances in connection with his own use of drugs. He also asserts that he responsibly transferred his client files to other attorneys prior to his conviction. The stipulation states that Attorney Schuh accepts responsibility and expresses "heartfelt remorse" for his actions. ¶ 11 After independently considering this matter, we accept the SCR 22.12 stipulation and its joint request for the revocation of Attorney Schuh's license to practice law in this state. Whether or not Attorney Schuh sold the cocaine for profit or simply distributed it to his friends and associates, his actions constitute serious criminal offenses and violations of his obligations as an attorney, and require the revocation of his license to practice law in Wisconsin. Nonetheless, as we have done in similar cases, we accept the stipulation's request that the revocation be deemed to have commenced on July 27, 2006, when this court summarily suspended Attorney Schuh's license due to his criminal convictions. ¶ 12 Because Attorney Schuh has stipulated to the revocation of his license, eliminating the need for the appointment of a referee, and because the OLR has not requested the imposition of costs, we do not assess the costs of this disciplinary proceeding against Attorney Schuh. ¶ 13 IT IS ORDERED that the license of Arthur L. Schuh, Jr., to practice law in Wisconsin is revoked, effective as of July 27, 2006. ¶ 14 IT IS FURTHER ORDERED that if he has not already done so, Attorney Schuh shall comply with the requirements of SCR 22.26 pertaining to the duties of a person whose license to practice law in Wisconsin has been revoked. NOTES [1] SCR 22.12 provides: Stipulation. (1) The director may file with the complaint a stipulation of the director and the respondent to the facts, conclusions of law regarding misconduct, and discipline to be imposed. The supreme court may consider the complaint and stipulation without the appointment of a referee. (2) If the supreme court approves a stipulation, it shall adopt the stipulated facts and conclusions of law and impose the stipulated discipline. (3) If the supreme court rejects the stipulation, a referee shall be appointed and the matter shall proceed as a complaint filed without a stipulation. (4) A stipulation rejected by the supreme court has no evidentiary value and is without prejudice to the respondent's defense of the proceeding or the prosecution of the complaint. [2] SCR 20:8.4(b) provides that it is professional misconduct for a lawyer to "commit a criminal act that reflects adversely on the lawyer's honesty, trustworthiness or fitness as a lawyer in other respects." [3] The stipulation is also signed by Attorney Schuh's counsel.
{ "perplexity_score": 294.3, "pile_set_name": "FreeLaw" }
Effect of intra-operative mechanical ventilation using 50% inspired oxygen on pulmonary oxygenation. Forty-three ASA Grade I patients scheduled for elective abdominal surgery received at random either 25% or 50% inspired oxygen for intra-operative mechanical ventilation lasting 4-6 h. Pulse oximetry was monitored continuously. Venous admixture was assessed from the PaO2/FIO2 ratio and was measured twice intraoperatively: at the time of incision, and during surgical wound closure. PaO2 was measured 1 h after extubation having breathed room air for 10 min, if tolerated. The patients in the two groups were similar in regard to general characteristics, and had similar operations. Patients given oxygen 50% had operations that lasted longer, which made the trial more sensitive. The inspired oxygen did not affect pulmonary gas exchange either within each group or between groups under the conditions of the study. In no patient did pulse oximetry record an oxygen saturation below 95% intra-operatively.
{ "perplexity_score": 770.6, "pile_set_name": "PubMed Abstracts" }
Britain is doubling its support to help developing countries reduce their greenhouse gas emissions and help people adapt to the impacts of climate change. The government’s Green Climate Fund (GCF) supports projects to protect and preserve natural habitats in the developing world, including in the Amazon where wildfires are destroying large areas of the forest. The Department for International Development and Department for Business, Energy and Industrial Strategy (BEIS) have pledged to contribute £1.44bn to the GCF over the next four years. Existing GCF projects are estimated to help around 300 million people cope with the effects of climate change and reduce the equivalent of 1.5 billion tonnes of carbon dioxide. That’s equivalent to taking around 300 million cars off the road over a year or every plane out of the sky for 18 months. The World Bank estimates 100 million people are at risk of being pushed into poverty by 2030 if action isn’t taken to tackle climate change. Business and Energy Secretary Andrea Leadsom said: “I am delighted that the UK is leading the world in a fight against climate change. Having committed to achieving net zero emissions by 2050, we have a responsibility to help other countries do the same. “The Green Climate Fund has supported millions of people in developing countries deal with the impacts of a changing climate. I’m really proud to announce that we are doubling our contribution to work with other nations to tackle this global issue.” More than 40 countries are currently funding projects through the GCF, many alongside the private sector.
{ "perplexity_score": 177.5, "pile_set_name": "OpenWebText2" }
#include "test.h" #include <stdio.h> int main(int argc, char** argv) { int s = TestClass::someFunction("foobar"); printf("jadda %d\n", s); return 0; }
{ "perplexity_score": 2827.4, "pile_set_name": "Github" }
Q: Delete first child node using BeautifulSoup import os from bs4 import BeautifulSoup do = dir_with_original_files = 'C:\FOLDER' dm = dir_with_modified_files = 'C:\FOLDER' for root, dirs, files in os.walk(do): for f in files: print f.title() if f.endswith('~'): #you don't want to process backups continue original_file = os.path.join(root, f) mf = f.split('.') mf = ''.join(mf[:-1])+'_mod.'+mf[-1] # you can keep the same name # if you omit the last two lines. # They are in separate directories # anyway. In that case, mf = f modified_file = os.path.join(dm, mf) with open(original_file, 'r') as orig_f, \ open(modified_file, 'w') as modi_f: soup = BeautifulSoup(orig_f.read()) for t in soup.find_all('table'): for child in t.find_all("table"):#*****this is fine for now, but how would I restrict it to find only the first element? child.REMOVE() #******PROBLEM HERE******** # This is where you create your new modified file. modi_f.write(soup.prettify().encode(soup.original_encoding)) Hi all, I am trying to do some parsing of files using BeautifulSoup to clean them up slightly. The functionality I want is that I want to delete the first table which is anywhere within a table, eg : <table> <tr> <td></td </tr> <tr> <td><table></table><-----This will be deleted</td </tr> <tr> <td><table></table> --- this will remain here.</td </tr> </table> At the moment, my code is set to find all tables within a table and I have a made up a .REMOVE() method to show what I wish to accomplish. How can I actually remove this element? Tl;dr - How can I adapt my code to find only the first nested table in a file. How can I remove this table? A: Find the first table inside the table and call extract() on it: inner_table = soup.find('table').find('table') # or just soup.table.table inner_table.extract()
{ "perplexity_score": 1768.2, "pile_set_name": "StackExchange" }
Tesla Shareholders Approved The Offer to Buy SolaCity Shareholders of Tesla Motors Inc. and SolarCity Corp. approved Tesla’s $2.1 billion all-stock offer to merge and create one company headed by Elon Musk that would sell emissions-free cars and rooftop solar panels that power them.Tesla and SolarCity shareholders on Thursday overwhelmingly approved Tesla’s acquisition of SolarCity in a stock transaction, valued at about $2 billion, that is designed to create one-stop shopping for homeowners’ power generation, energy storage, and electric vehicles. The takeover will expand the electric car maker’s clean energy business.Some investors had opposed the move, citing a conflict of interest. “Your faith will be rewarded,” -Mr. Musk told Tesla investors on Thursday after the company announced shareholders overwhelmingly approved the deal.But Tesla said the tie-up was “overwhelmingly” approved by 85% of shareholders not affiliated with the energy business. With the acquisition, one of the first steps Tesla will need to take is to integrate SolarCity into Tesla and produce sales synergies. Cost cutting of duplicate departments are the easier tasks to perform in a merger, one of the harder steps will be to merge the sales forces in Tesla’s locations and drive lower-cost sales. Tesla’s stock increased $4.73, or 2.6%, to $188.66 a share Thursday, before the shareholder vote was announced, and shares continued to rise slightly in after-hours trading. SolarCity was up 57 cents, or 2.9%, to $20.40 share and also continued rising in after-hours trading.
{ "perplexity_score": 470, "pile_set_name": "Pile-CC" }
We had the chance to talk to Bram Cohen , the inventor of BitTorrent and the co-founder if BitTorrent Inc. He goes into detail about the recent the acquisition of uTorrent, how to deal with encrypting ISPs, a streamable version of BitTorrent, BitTorrent's arrangement with the MPAA, and much more. TorrentFreak: What is the best thing about your job at BitTorrent Inc? Bram Cohen: I really enjoy making products which I personally want to use, and like to empower people to do things they couldn’t do without BitTorrent’s efficiency and reliability. I also enjoy working with my team. We’ve recruited a really talented group of engineers from the P2P community and the tech industry, as well as some of the best business people in Silicon Valley. Together, we’re taking BitTorrent to new heights while still remaining true to our original goal of delivering content to the masses. TorrentFreak: How do you see the future of BitTorrent Inc, what will its core business be? Bram Cohen: We have two core businesses. We have a content delivery service to power websites which have downloadable and streaming objects on them, and we also have an entertainment destination at BitTorrent.com which will allow consumers to both publish and download high-quality digital content. Professional publishers have licensed over 5,000 downloadable video, music and game files, some of which will be free, and some for rent or purchase. We expect our network to be very prominent and an extension of our well-known brand. TorrentFreak: Are there still “puzzles” that need to be solved to improve the BitTorrent protocol? Bram Cohen: I had lunch with Vint Cerf at Google last week, and we discussed this at length. BitTorrent is a mature protocol at this point, but there are still a number of interesting things to work on. For example, improving tit for tat, making seeding optimizations for enterprise use, and trying to figure out if there’s any good use for error correcting codes. Regarding that last one, it turns out that there are, but most of the academic work has been barking up the wrong tree. We also have a great testing environment built, so we can test the impact of protocol extensions on real, live swarms, which is critical when making enhancements that benefit the BitTorrent community at large. TorrentFreak: More and more ISPs have started to throttle BitTorrent traffic. How do you feel about this, especially related to the upcoming BitTorrent video store? Bram Cohen: ISPs have historically thought that all P2P traffic is illegal, which most definitely is not the case today. Identifying traffic as BitTorrent versus http is a very poor proxy for determining legal versus illegal. Even more so as content creators have begun using our self-publishing service to distribute their own work and major studios have signed up because they recognize the enormous potential of BitTorrent as a sales channel. Legal traffic is growing within the P2P ecosystem and piracy also travels with HTTP and FTP in high volumes. ISPs have to invest in making their networks better and faster rather than stifling applications which consumers use and love. That’s just bad marketing and customer service, especially given the competition which exists in the broadband industry and consumer focus on network neutrality. For instance, in Japan and Korea, consumers currently enjoy true all-you-can eat symmetric fiber-to-the-home at 100 mbps. That’s a great environment for P2P development to make the Web a truly powerful medium for on-demand media, with broadcast economics. Of course, it also leads to the question: Why is the United States two generations behind? TorrentFreak: What would you advise BitTorrent users to do, when they find out that their ISP is throttling BitTorrent traffic? Bram Cohen: Switch. Competition is the best thing for the consumer. If you’ve got a couple of options, try the alternatives. If you have no alternatives or both alternatives suck, call customer service. And call them a lot. It turns out that angry customers are more expensive to ISPs than providing unadulterated access to popular applications and websites. TorrentFreak: The mainline client now supports encryption, but there are no settings to control this (correct me if I’m wrong). Does this mean that the client encrypts all transfers? Bram Cohen: No. The mainline client accepts incoming encrypted connections, but makes unencrypted outgoing connections by default. We added support for that primarily for our users in unfriendly ISP environments. As I’ve said before, protocol encryption is at best a temporary hack around ISP rate limiting, until identification techniques are put in place which use transfer patterns rather than packet inspection to identify traffic. There are better approaches to evade traffic shaping, although we’re still trying to work productively with ISPs, who own the network after all. But if we can’t find a way to work together to provide a better experience for BitTorrent users, then the arms race will begin. TorrentFreak: You said before that you’re not a big fan of encryption. What would you suggest as an alternative? Bram Cohen: I say just leave things in the clear, and try to use caching technology to improve the ISP network. Or better yet, ISPs should lay more fiber and build bigger pipes. The so-called ‘encryption’ of BitTorrent traffic isn’t really encryption, it’s obfuscation. It provides no anonymity whatsoever, and only temporarily evades traffic shaping. There are better approaches to obfuscation, and I’ve got a great team of engineers who are quite eager to fight that battle, but I’m hoping that everything can be resolved amicably without getting into a serious arms race. TorrentFreak: What was the main reason behind the acquisition of uTorrent? Bram Cohen: uTorrent has both an impressively clean codebase and large user community, although we were already working on our own C++ implementation. Moving forward, you’ll see announcements related to BitTorrent being embedded on silicon and on non-PC hardware thanks to the new C codebase we have (based on uTorrent and our protocol extensions). TorrentFreak: Are their plans to remove any of the present features uTorrent has? Bram Cohen: No, uTorrent users are quite happy with it, and we wish to keep things that way. In fact, be on the lookout for a Mac and Unix port, which we have the resources to do thanks to the size of our engineering team. TorrentFreak: What will happen to the mainline client in the future? Bram Cohen: Our mainline extensions and uTorrent’s will converge. However, we are still committed to offering an open source BitTorrent reference implementation. TorrentFreak: Will the uTorrent client be integrated into the BitTorrent Video Store? Bram Cohen: We’re going to launch our entertainment network with support for whichever BitTorrent client the user wishes to install. TorrentFreak: Can you give us any details on the pricing of the products in the BitTorrent Video Store, and the quality of the video files? Bram Cohen: We haven’t announced any firm pricing yet. The video quality will be the best possible with the available codecs. In addition to being a “store,” our site will be a destination for publishing and discovering digital entertainment, and will have plenty of free files in addition to the pay ones. TorrentFreak: You said before that some of the content from the video store will be “protected” by Windows DRM. What is your personal view on DRM, do you see other, more user friendly alternatives? Bram Cohen: Right now most of our content partners are insisting on DRM for the content we’re making available. It’s causing an awful lot of headaches, but we’re trying to minimize the impact on user experience and support. TorrentFreak: Over the past year we’ve heard quite a lot of rumors about the arrangement between BitTorrent and the MPAA. Can you tell a little more about the nature of this agreement? Bram Cohen: We support keeping copyright infringing material off of our site, and have deals with most of the MPAA member companies to make their content available through our entertainment network. The MPAA is actually a lot less of a hive mind than many people think. We’ve had to negotiate individually with each member company regarding business deals. We don’t currently have any investment from any of them. TorrentFreak: Several other BitTorrent sites like mininova.org and torrentspy.com have the exact same policy, and remove infringing material whenever they are asked to. Though, they are often seen as the bad guys. The MPAA even sued torrentspy and isohunt, and refuses to start a dialogue, while they index the same torrents and bittorrent.com does. What’s your opinion about this? Bram Cohen: It’s easy to make the mistake that thinking the exact letter of the law is all that matters in such situations. I have no legal opinion of what mininova and torrentspy are doing, since I’m not familiar with the exact details. But being antagonistic will result in predictable outcomes, regardless of how well defended one thinks one is legally. TorrentFreak: Due to the arrangement with the MPAA most people might think that most of the content they search for on bittorrent.com is legal. However bittorrent.com does index a lot of copyrighted work. Don’t you think this might confuse some of the users of the site? Bram Cohen: We’re cooperating to get copyrighted work out of our search index, and when our new site launches, much more emphasis will be placed on the self-published and licensed content within our own index, instead of the general Web search. TorrentFreak: In March the MPAA urged the Swedish government to take down the site because it is linking to infringing material. bittorrent.com indexes the torrents from thepiratebay.org , a site that is often referred to as “Pirate Heaven”. Has the MPAA ever asked BitTorrent Inc to stop indexing The Pirate Bay? Bram Cohen: The focus of takedown notices has primarily been on particular pieces of content, not so much where they came from. TorrentFreak: Is there a future for BitTorrent in the development of streaming online content. For example, would it be possible for video streaming sites like YouTube to use (a modified version of) BitTorrent? Bram Cohen: Yes, we’ve developed a streaming version of BitTorrent. Stay tuned for more details around the middle of this year. TorrentFreak: BitTorrent is slowly starting to replace the video recorder, especially among younger people. Popular episodes of TV shows like LOST are downloaded (illegally) more than 500,000 times in just one week over BitTorrent. These figures clearly show the potential that BitTorrent has, and it’s an indication that TV as we know it is about to change. Do you think BitTorrent Inc can play a role in the future of TV? And what kind of product or business model do you think could compete with these pirated shows? Bram Cohen: Our new site will launch with thousands of movies and TV shows, so yes, we clearly have a role in the future of video. As far as competing with the piracy experience, the better consumer experience we provide, the less people will feel the need to rely on piracy. To do that, we’ll be providing an extensive and valuable catalog of content at a good price. In the future, we’ll expand into free, ad-supported content as an integral part of our site. We’re also going to give independent publishers a platform to distribute, promote, and ultimately sell their own content as part of that experience. TorrentFreak: If you look back at the past 5 years, what is the thing you’re most proud of? Bram Cohen: Looking back at the past 5 years, I can still say that I’m proud of getting BitTorrent to work in the first place. When I first started working on it, nobody knew whether it was possible to overcome all the logistical problems of handling a flash crowd. It was challenging, but not only did I get it to work at all, but got it to work extremely efficiently. More recently, I’m proud of being part of the team that has worked hard to convince content publishers and enterprise businesses that unlike other p2p architectures, BitTorrent is a legitimate and incredibly powerful tool for content delivery. TorrentFreak: Thanks for taking the time to answer these questions!
{ "perplexity_score": 310.4, "pile_set_name": "OpenWebText2" }
/*! * \file file_configuration.h * \brief A ConfigurationInterface that reads the configuration from a file. * \author Carlos Aviles, 2010. carlos.avilesr(at)googlemail.com * * This implementation has a text file as the source for the values of the parameters. * The file is in the INI format, containing sections and pairs of names and values. * For more information about the INI format, see https://en.wikipedia.org/wiki/INI_file * * ----------------------------------------------------------------------------- * * Copyright (C) 2010-2020 (see AUTHORS file for a list of contributors) * * GNSS-SDR is a software defined Global Navigation * Satellite Systems receiver * * This file is part of GNSS-SDR. * * SPDX-License-Identifier: GPL-3.0-or-later * * ----------------------------------------------------------------------------- */ #ifndef GNSS_SDR_FILE_CONFIGURATION_H #define GNSS_SDR_FILE_CONFIGURATION_H #include "INIReader.h" #include "configuration_interface.h" #include "in_memory_configuration.h" #include "string_converter.h" #include <cstdint> #include <memory> #include <string> /*! * \brief This class is an implementation of the interface ConfigurationInterface * * Derived from ConfigurationInterface, this class implements an interface * to a configuration file. This implementation has a text file as the source * for the values of the parameters. * The file is in the INI format, containing sections and pairs of names and values. * For more information about the INI format, see https://en.wikipedia.org/wiki/INI_file */ class FileConfiguration : public ConfigurationInterface { public: explicit FileConfiguration(std::string filename); FileConfiguration(); ~FileConfiguration() = default; std::string property(std::string property_name, std::string default_value) const override; bool property(std::string property_name, bool default_value) const override; int64_t property(std::string property_name, int64_t default_value) const override; uint64_t property(std::string property_name, uint64_t default_value) const override; int32_t property(std::string property_name, int32_t default_value) const override; uint32_t property(std::string property_name, uint32_t default_value) const override; int16_t property(std::string property_name, int16_t default_value) const override; uint16_t property(std::string property_name, uint16_t default_value) const override; float property(std::string property_name, float default_value) const override; double property(std::string property_name, double default_value) const override; void set_property(std::string property_name, std::string value) override; bool is_present(const std::string& property_name) const; private: void init(); std::string filename_; std::unique_ptr<INIReader> ini_reader_; std::unique_ptr<InMemoryConfiguration> overrided_; std::unique_ptr<StringConverter> converter_; int error_{}; }; #endif // GNSS_SDR_FILE_CONFIGURATION_H
{ "perplexity_score": 432.8, "pile_set_name": "Github" }
Q: How to pass values across the pages in ASP.net without using Session I am trying to improve performance of my web portal. I'm using Session to store state information. But I heard that using session will decrease the speed of the application. Is there any other way to pass values across the page in asp.net. A: You can pass values from one page to another by followings.. Response.Redirect Cookies Application Variables HttpContext Response.Redirect SET : Response.Redirect("Defaultaspx?Name=Pandian"); GET : string Name = Request.QueryString["Name"]; Cookies SET : HttpCookie cookName = new HttpCookie("Name"); cookName.Value = "Pandian"; GET : string name = Request.Cookies["Name"].Value; Application Variables SET : Application["Name"] = "pandian"; GET : string Name = Application["Name"].ToString(); Refer the full content here : Pass values from one to another A: There are multiple ways to achieve this. I can explain you in brief about the 4 types which we use in our daily programming life cycle. Please go through the below points. 1 Query String. FirstForm.aspx.cs Response.Redirect("SecondForm.aspx?Parameter=" + TextBox1.Text); SecondForm.aspx.cs TextBox1.Text = Request.QueryString["Parameter"].ToString(); This is the most reliable way when you are passing integer kind of value or other short parameters. More advance in this method if you are using any special characters in the value while passing it through query string, you must encode the value before passing it to next page. So our code snippet of will be something like this: FirstForm.aspx.cs Response.Redirect("SecondForm.aspx?Parameter=" + Server.UrlEncode(TextBox1.Text)); SecondForm.aspx.cs TextBox1.Text = Server.UrlDecode(Request.QueryString["Parameter"].ToString()); URL Encoding Server.URLEncode HttpServerUtility.UrlDecode 2. Passing value through context object Passing value through context object is another widely used method. FirstForm.aspx.cs TextBox1.Text = this.Context.Items["Parameter"].ToString(); SecondForm.aspx.cs this.Context.Items["Parameter"] = TextBox1.Text; Server.Transfer("SecondForm.aspx", true); Note that we are navigating to another page using Server.Transfer instead of Response.Redirect.Some of us also use Session object to pass values. In that method, value is store in Session object and then later pulled out from Session object in Second page. 3. Posting form to another page instead of PostBack Third method of passing value by posting page to another form. Here is the example of that: FirstForm.aspx.cs private void Page_Load(object sender, System.EventArgs e) { buttonSubmit.Attributes.Add("onclick", "return PostPage();"); } And we create a javascript function to post the form. SecondForm.aspx.cs function PostPage() { document.Form1.action = "SecondForm.aspx"; document.Form1.method = "POST"; document.Form1.submit(); } TextBox1.Text = Request.Form["TextBox1"].ToString(); Here we are posting the form to another page instead of itself. You might get viewstate invalid or error in second page using this method. To handle this error is to put EnableViewStateMac=false 4. Another method is by adding PostBackURL property of control for cross page post back In ASP.NET 2.0, Microsoft has solved this problem by adding PostBackURL property of control for cross page post back. Implementation is a matter of setting one property of control and you are done. FirstForm.aspx.cs <asp:Button id=buttonPassValue style=”Z-INDEX: 102″ runat=”server” Text=”Button” PostBackUrl=”~/SecondForm.aspx”></asp:Button> SecondForm.aspx.cs TextBox1.Text = Request.Form["TextBox1"].ToString(); In above example, we are assigning PostBackUrl property of the button we can determine the page to which it will post instead of itself. In next page, we can access all controls of the previous page using Request object. You can also use PreviousPage class to access controls of previous page instead of using classic Request object. SecondForm.aspx TextBox textBoxTemp = (TextBox) PreviousPage.FindControl(“TextBox1″); TextBox1.Text = textBoxTemp.Text; As you have noticed, this is also a simple and clean implementation of passing value between pages. Reference: MICROSOFT MSDN WEBSITE HAPPY CODING! A: If it's just for passing values between pages and you only require it for the one request. Use Context. Context The Context object holds data for a single user, for a single request, and it is only persisted for the duration of the request. The Context container can hold large amounts of data, but typically it is used to hold small pieces of data because it is often implemented for every request through a handler in the global.asax. The Context container (accessible from the Page object or using System.Web.HttpContext.Current) is provided to hold values that need to be passed between different HttpModules and HttpHandlers. It can also be used to hold information that is relevant for an entire request. For example, the IBuySpy portal stuffs some configuration information into this container during the Application_BeginRequest event handler in the global.asax. Note that this only applies during the current request; if you need something that will still be around for the next request, consider using ViewState. Setting and getting data from the Context collection uses syntax identical to what you have already seen with other collection objects, like the Application, Session, and Cache. Two simple examples are shown here: // Add item to Context Context.Items["myKey"] = myValue; // Read an item from the Context Response.Write(Context["myKey"]); http://msdn.microsoft.com/en-us/magazine/cc300437.aspx#S6 Using the above. If you then do a Server.Transfer the data you've saved in the context will now be available to the next page. You don't have to concern yourself with removing/tidying up this data as it is only scoped to the current request.
{ "perplexity_score": 1340.9, "pile_set_name": "StackExchange" }
The Cleveland State University wrestling team won each of the first three bouts Saturday afternoon, but visiting Binghamton stormed back to claim a 22-13 victory in the Vikings' regular-season finale inside Woodling Gymnasium. The dual began at 149 pounds, and redshirt junior Grant Turnmire got the Vikings off to a good start. Filling in for primary starter Brady Barnett, Turnmire built a 5-0 lead after two periods. His opponent broke the shutout with an escape in the third, but Turnmire would a point of riding time to claim a 6-1 victory. After a scoreless first period at 157, redshirt sophomore Nico O'Dor found himself trailing after five minutes. However, after tying the bout with an escape, he secured a takedown and held on for a two-point win. Redshirt sophomore Ryan Ford was tied, 1-1, in the third period at 165 with each wrestler having secured an escape. Like O'Dor, Ford secured the tiebreaking takedown and was able to claim a 3-2 victory. The Vikings would drop the next two bouts but still held the team score lead halfway through the dual. Junior Chris Morrow had fought valiantly against a top-10 opponent at 184 pounds, trailing by a single point late in the bout, but his opponent held off the upset bid. True freshman Ben Smith never trailed in collecting a bonus-point win at 197 pounds. He had a two-point lead after five minutes but really poured it on in the final frame. He used three takedowns and an escape in the third stanza before adding a point of riding time to claim the major decision. Junior Collin Kelly held the lead after the first period at heavyweight but was unable to hang on. Redshirt sophomore Cameron Lathem was tied, 2-2, with his foe in the third period, but this time the Bearcats got the final takedown to claim the win. After trailing by as many as seven points in his match, redshirt senior Armando Torres had cut his deficit to just three points late in the bout. In the top position, Torres was fighting to earn back points, but the period expired before he was able to do so.
{ "perplexity_score": 433.2, "pile_set_name": "Pile-CC" }
In vivo hair growth promotion effects of ultra-high molecular weight poly-γ-glutamic acid from Bacillus subtilis (Chungkookjang). We investigated the effect of ultra-high molecular weight poly-γ-glutamic acid (UHMW γ-PGA) on hair loss in vitro and in vivo. 5-Alpha reductase is an enzyme that metabolizes the male hormone testosterone into dihydrotestosterone. By performing an in vitro experiment to analyze the inhibitory effects of UHMW γ-PGA on 5-alpha reductase activity, we determined that UHMW γ-PGA did in fact inhibit 5-alpha reductase activity, indicating the use of UHMW γ-PGA as a potential 5-alpha reductase inhibitor in the treatment of men with androgenetic alopecia. To evaluate the promotion of hair growth in vivo, we topically applied UHMW γ-PGA and minoxidil on the shaved dorsal skin of telogenic C57BL/6 mice for 4 weeks. At 4 weeks, the groups treated with UHMW γ-PGA showed hair growth on more than 50% of the shaved skin, whereas the control group showed less hair growth. To investigate the progression of hair follicles in the hair cycle, hematoxylin and eosin staining was performed. Histological observations revealed that the appearance of hair follicles was earlier in the UHMW γ-PGA-treated group than in the control group. The number of hair follicles on the relative area of shaved skin in the UHMW γ-PGA-treated group was higher than that observed on the shaved skin in the control group. These results indicate that UHMW γ-PGA can promote hair growth by effectively inducing the anagen phase in telogenic C57BL/6 mice.
{ "perplexity_score": 255.4, "pile_set_name": "PubMed Abstracts" }
Q: WIX-Installer MSI Publisher Unknown How to provide publisher Name for MSI installer which is developed using WIX Installer? While installing my .msi installer it's showing unknown publisher, how to provide a name for publisher?Is it possible to do this within WIX? If so kindly help me how to implement this using WIX installer. A: I think you are looking to avoid the security warning that is displayed when someone installs your setup. For this you would need to sign the setup with your certificate and a private key. You can try to do this by following the steps explained in the following links: How to Digitally Sign Microsoft Files Signing .MSI and .EXE files Everything you need to know about Authenticode Code Signing Assuming you are looking for a publisher name in the control panel Programs and Features. You could use the Manufacturer attribute in your Product tag. <Product Id="PUT-YOUR-GUID" Manufacturer="PublisherName" Name="ProductName" UpgradeCode="PUT-YOUR-GUID" Version="1.0.0"> A: Using WiX's in-built tool insignia is fairly straight-forward. Here's the steps to do code-sign a WiX MSI: Set up the signtool as a batch file in my PATH so that I can call it and change it easily. I'm running Windows 10 and so my "signtool.bat" looks like this: "c:\Program Files (x86)\Windows Kits\10\bin\x64\signtool.exe" %* Set up insignia as a batch file in my PATH too so you can change it with new WiX builds as they come. My "insignia.bat" looks like this: "C:\Program Files (x86)\WiX Toolset v3.10\bin\insignia.exe" %* Sign my MSI in a post-build event (MSI Project -> Properties -> Build Events) by calling this: signtool sign /f "c:\certificates\mycert.pfx" /p cert-password /d "Your Installer Label" /t http://timestamp.verisign.com/scripts/timstamp.dll /v $(TargetFileName) Further notes and thoughts: I have also signed the application (I think) by just doing Project Properties -> Signing and enabling click-once manifests, selecting the certificate and checking the Sign the assembly option. Here's my similar answer on how to do the same but for a bootstrap bundle: using insignia to sign WiX MSI and bootstrap bundle
{ "perplexity_score": 1129.8, "pile_set_name": "StackExchange" }
Gangs of Tooting Broadway Gangs of Tooting Broadway is a 2013 British-Tamil crime drama film directed by Devanand Shanmugam. The film features Nav Sidhu and Kabelan Verlkumar in lead roles. It released on 4 February 2013. The story is based on gang wars between Tamil people and Black people living in Tooting Broadway. Plot The main protagonist Arun (Nav Sidhu) is a disillusioned former member of the Wolf Pack, now returned to Tooting after some years. His mother tells him that his younger brother Ruthi has turned into a gangster and that he is planning a big war to take place in Tooting Broadway. Arun is sent to stop and protect his brother. The film then turns to a flashback four years ago. Arun was a popular gangster who was taken by a police officer (Oliver Cotton) to be an undercover informer. Now back in reality, Arun meets Karuna, his old boss. Karuna tells him that another gang wants a war, and the only way Arun can protect his brother, is by finishing the war by killing all of the members of the other gang in Tooting. Persuaded, they go to finish off the war, however a completely unexpected twist takes place leading to Karuna's death. Production Film production began in 2011. A teaser of the film was uploaded to YouTube in February 2012, however the film was then delayed. It finally was released on 4 February 2013. References External links Tooting Broadway at the Internet Movie Database
{ "perplexity_score": 105.9, "pile_set_name": "Wikipedia (en)" }
Q: what is the difference between ndk-build and make APP for android? I am having too many confusions in native coding for android. My application wants to play mms:// stream and I'm facing some serious problems in that. But the basic question is What is the difference between ndk-build (that i usually use) and make APP (i have seen many blogs on them one of them is this) Another related question Suppose my project is in E:\WorkSpace\mmsTests\AnotherMMS (path edited if you want to test : it contained whitespace) And my ndk path is D:\android-ndk-r4b-windows\android-ndk-r4b How can i use make APP with cygwin? My os is windows xp sp2. EDIT : I have added ndk location in my PATH variable Thanks in advance A: The 'make APP=...' method was the original NDK build system but is now deprecated in favor of the ndk-build method. Anything that can be built with make APP=xxx can be built with ndk-build. ndk-build requires less manual setup and hard coded paths.
{ "perplexity_score": 1055.6, "pile_set_name": "StackExchange" }
Jorginho ‘amazed’ by Chelsea change By Football Italia staff Jorginho says he is ‘very happy’ and ‘amazed’ by how he has won the Chelsea fans over in recent months. Jorginho’s position has remained the same during the transition from Maurizio Sarri to Frank Lampard, but Chelsea supporters are no longer on his back. “It’s amazing because last season it was impossible,” the Italy midfielder told The Sun. “I’m very happy how they have changed their mind about me. I have worked a lot. “I never said anything, I just work and work and work and I think the results are coming — and I am very happy with that. “It is an opportunity for me to show I’m here not just for the Coach. I’m thankful of what we did together because it was amazing. “We worked four years together and I’m very thankful for what I learned from him. But I’m here also for my quality — but the people could not see that last season. “[The criticism made me] a little sad. I just had to work hard and change their minds — and to make them know they had made a mistake about me. “This season, we are playing with more long balls, so less short passing. It has changed a little bit but the mentality is the same, to press the other team and try to have control of the match. “I have to be there to control all the team. If I leave my position it is a big problem for everybody because there will be too much space in the midfield. “I try to do what the Coach wants so I can adapt myself. He wants the ball forward quicker and not have too much short passing, so I am trying to do that. Yes, it is simple.” The 27-year-old is now default penalty taker at Stamford Bridge and considered one of the Blues’ leaders. “That is not new for me because I always tried to play like this — but nobody was talking about it. I was trying to help my mates. “It is a thing not everybody sees but when someone like Frank Lampard talks about it, then maybe people look for it.” Watch Serie A live in the UK on Premier Sports for just £9.99 per month including live LaLiga, Eredivisie, Scottish Cup Football and more. Visit: https://www.premiersports.com/subscribenow
{ "perplexity_score": 354, "pile_set_name": "OpenWebText2" }
Comparison of biofilm formation and water quality when water from different sources was stored in large commercial water storage tanks. Rain-, ground- and municipal potable water were stored in low density polyethylene storage tanks for a period of 90 days to determine the effects of long-term storage on the deterioration in the microbial quality of the water. Total viable bacteria present in the stored water and the resultant biofilms were enumerated using heterotrophic plate counts. Polymerase chain reaction (PCR) and Colilert-18(®) tests were performed to determine if the faecal indicator bacteria Escherichia coli was present in the water and in the biofilm samples collected throughout the study. The municipal potable water at the start of the study was the only water source that conformed to the South African Water Quality Guidelines for Domestic Use. After 15 days of storage, this water source had deteriorated microbiologically to levels considered unfit for human consumption. E. coli was detected in the ground- and potable water and ground- and potable biofilms periodically, whereas it was detected in the rainwater and associated biofilms at every sampling point. Imperfections in the UV resistant inner lining of the tanks were shown to be ecological niches for microbial colonisation and biofilm development. The results from the current study confirmed that long-term storage can influence water quality and increase the number of microbial cells associated with biofilms on the interior surfaces of water storage tanks.
{ "perplexity_score": 211.8, "pile_set_name": "PubMed Abstracts" }
Diao Ying Diao Ying (born 24 November 1974) is a Chinese ice hockey player. She competed in the women's tournament at the 1998 Winter Olympics. References Category:1974 births Category:Living people Category:Chinese women's ice hockey players Category:Olympic ice hockey players of China Category:Ice hockey players at the 1998 Winter Olympics Category:Place of birth missing (living people) Category:Asian Games gold medalists for China Category:Ice hockey players at the 1999 Asian Winter Games Category:Medalists at the 1999 Asian Winter Games Category:Asian Games medalists in ice hockey
{ "perplexity_score": 151.9, "pile_set_name": "Wikipedia (en)" }
858 N.E.2d 109 (2006) Terry KINSLOW, Individually and as Personal Representative of the Estate of Marshall Lee Kinslow, Deceased, Appellant-Plaintiff, v. GEICO INSURANCE COMPANY and Lucille Taylor, Appellees-Defendants. No. 49A04-0604-CV-197. Court of Appeals of Indiana. December 6, 2006. *110 Nathaniel Lee, Robert E. Feagley, II, Lee Cossell Kuehn & Love, LLP, Indianapolis, IN, Attorneys for Appellant. Mark D. Gerth, Kightlinger & Gray, LLP, Indianapolis, IN, Attorney for Appellee. OPINION BARNES, Judge. Case Summary Terry Kinslow, individually and as personal representative of her husband's estate, appeals the trial court's entry of summary judgment in favor of GEICO Insurance Company ("GEICO"). We affirm. Issue The sole restated issue is whether the trial court properly concluded that GEICO is not required to provide uninsured motorist benefits to Kinslow. Facts On July 19, 2003, Kinslow and her husband, Marshall Kinslow, were on a motorcycle traveling westbound on 34th Street in Indianapolis. Lucille Taylor was traveling eastbound on 34th Street and attempted to make a left turn onto Rural Street. When she did so, she struck the Kinslows' motorcycle. Another vehicle struck the rear of the Kinslows' motorcycle, but it left the scene of the accident. The accident caused fatal injuries to Marshall and serious bodily injuries to Kinslow. At the time of the accident, the Kinslows were covered by two policies issued by GEICO, a general automobile policy and a specific motorcycle policy. Both policies had UM bodily injury limits of $100,000 per person and $300,000 per occurrence. Kinslow sued Taylor on her own behalf and on behalf of her husband's estate. She also sued GEICO, seeking recovery of uninsured motorist ("UM") benefits, which GEICO had refused to pay, related to the unknown vehicle that fled the scene of the accident. Taylor and Taylor's insurer settled with Kinslow for a total of $200,000, or $100,000 for Kinslow's own injuries and $100,000 for the fatal injuries suffered by Marshall. GEICO thereafter moved for summary judgment on the basis that Taylor's $200,000 payment completely set off any and all UM benefits it might have been required to pay Kinslow. The general automobile policy issued by GEICO read in part: LIMITS OF LIABILITY * * * * * 1. The limit of Bodily Injury Liability for Uninsured Motorists Coverage stated in the declarations for "each person" is the limit of our liability for all damages, including those for care or loss of services, due to bodily injury sustained by one person as the result of one accident. * * * * * The amount payable under this Coverage will be reduced by all amounts: (a) paid by or for all persons or organizations liable for the injury. . . . *111 App. p. 45. The motorcycle policy read in part: Limit of Liability * * * * * * 1. The limit of bodily injury shown on the Declarations as applying to "each person" is the maximum we will pay for all damages sustained by one person as a result of one accident covered by this Part. * * * * * Any amounts otherwise payable for damages under this coverage shall be reduced by: 1. All sums paid because of the bodily injury by or on behalf of persons or organizations who may be legally responsible. This includes all sums paid under the Liability coverage or Motorcycle Medical Payments coverage of this policy; and 2. All sums paid or payable because of the bodily injury under any workers' or workmen's compensation, disability benefits or any similar law. App. p. 32.[1] The trial court granted GEICO's summary judgment motion. Kinslow now appeals. Analysis Summary judgment is appropriate only if the evidence shows there is no genuine issue of material fact and the moving party is entitled to a judgment as a matter of law. Ind. Trial Rule 56(C); Bowman ex rel. Bowman v. McNary, 853 N.E.2d 984, 988 (Ind.Ct.App.2006). We must construe all facts and reasonable inferences drawn from those facts in favor of the nonmoving party. Bowman, 853 N.E.2d at 988. Our review of a summary judgment motion is limited to those materials designated to the trial court, and we must carefully review decisions on such motions to ensure that parties are not improperly denied their day in court. Id. Assuming that there was an uninsured motorist involved in the accident here, the question before us is strictly one of law involving interpretation of an insurance policy. The proper interpretation of an insurance policy, even if it is ambiguous, is generally a question of law appropriate for summary judgment. Progressive Ins. Co., Inc. v. Bullock, 841 N.E.2d 238, 240 (Ind. Ct.App.2006), trans. denied. Setoff provisions in UM and underinsured ("UIM") motorist policies have generated frequent litigation, often focusing on whether payment to an insured from a third party should be deducted from the total amount of damages sustained by the insured or from the limits of liability of the UM/UIM coverage. Kinslow argues for the former proposition in this case; that is, assuming (for example) that her and Marshall's total damages totaled $400,000,[2] Taylor's payment of $200,000 would be deducted from that amount, leaving GEICO liable for the remaining $200,000 in damages sustained. GEICO argues for the latter proposition, with which the trial court agreed; that is, Taylor's payment of $200,000 should be deducted from GEICO's policy limits for UM/UIM coverage that would apply to this case, or $200,000, leaving GEICO with zero liability, regardless of the total damages. In 1992, our supreme court decided two cases involving UM/UIM setoff provisions, *112 Tate v. Secura Insurance, 587 N.E.2d 665 (Ind.1992) and American Economy Insurance Company v. Motorists Mutual Insurance Company, 605 N.E.2d 162 (Ind.1992). In Tate, the UM/UIM portion of the policy had a provision stating, "Amounts payable will be reduced by . . . [a]mounts paid because of the bodily injury by, or on behalf of, persons or organizations who may be legally responsible." Tate, 587 N.E.2d at 668. The Tate court construed this language as meaning, "It is [the] amount of damages, not the coverage limit, which is the `amounts payable' to be reduced by the amount paid to Tate by or on behalf of the tortfeasor." Id. In American, the court considered a UM/UIM provision that stated, under a section denominated "LIMIT OF LIABILITY," as follows: "Any amounts otherwise payable for damages under this coverage shall be reduced by all sums . . . [p]aid because of the bodily injury or property damage by or on behalf of persons or organizations who may be legally responsible." American, 605 N.E.2d at 164. This language was found to be distinguishable from the language considered in Tate. Id. Thus, the court held that the amount already recovered from the insured by a third party would be deducted from the insured's UIM policy limits, not the total damages sustained, unlike in Tate. Id. The court gave two reasons for this holding. First, the setoff clause was found within the "LIMIT OF LIABILITY" section of the policy. Id. Second, the court emphasized the following additional language in the policy: "The limit of liability shown in the Declarations for this coverage is our maximum limit of liability for all damages resulting from any one accident. This is the most we will pay. . . ." Id. Ten years later, our supreme court granted transfer in Beam v. Wausau Insurance Company, 765 N.E.2d 524 (Ind. 2002), to address two different lines of interpretation involving UM/UIM setoff clauses that this court had developed after Tate and American. See Beam, 765 N.E.2d at 529. The policy at issue in Beam stated in part: D. LIMIT OF INSURANCE . . . 2. The Limit of Insurance under this coverage shall be reduced by all sums paid or payable by or for anyone who is legally responsible, including all sums paid under the Coverage Form's LIABILITY COVERAGE. 3. Any amount payable for damages under this coverage shall be reduced by all sums paid or payable under any workers' compensation, disability benefits or similar law. Id. at 527. The court concluded that the policy was unambiguous and provided that any reduction for worker's compensation benefits the insured had received would "be taken from the amount of damages Beam incurred rather than from the policy limit." Id. at 530. It noted that the policy expressly provided for a reduction from the insured's "damages," not policy limits. Id. The court also stated that the phrase, "`under this coverage,' is a general phrase contained in insurance agreements that refers to the scope of the initial insuring agreement, not the dollar amount of the policy limit." Id. at 530-31. The "scope of coverage" was compensatory damages the insured was entitled to recover from the owner of an underinsured vehicle. The court concluded: any reduction for worker's compensation and disability benefits should come from [the amount of damages to which the insured was legally entitled], irrespective of whether that amount is above or below the policy limits. If that amount is above the limit, this helps the insured, and if it is below the limit, it helps the *113 insurer. We think this is not only a neutral rule, but also consistent with the language of the policy and its purpose to provide indemnity for covered losses subject to policy limits. Id. at 531. After reaching this conclusion, the court also noted that the insurance policy, immediately before the setoff provision regarding worker's compensation benefits, had explicitly used language unmistakably providing that any reduction had to be taken from the policy limits when it said, "The Limit of Insurance under this coverage shall be reduced by all sums paid or payable by or for anyone who is legally responsible. . . ." Id. (emphasis added by Beam). Not surprisingly, Kinslow argues that this case is governed by Beam, while GEICO argues that American is controlling. Although GEICO argues that Beam "reaffirmed the validity of the American Economy opinion," it is not clear to us that that was the case. Appellee's Br. p. 9. The Beam court did not expressly state whether it was approving or disapproving of American. The language the Beam court considered is remarkably similar to the language the American court considered, yet the opinions reached opposite results. The only material difference between the policies is that the Beam setoff provision addressed worker's compensation benefits, while the American setoff provision referred more generally to any payments from those legally responsible. That difference seemed to play no part in the Beam court's analysis, however. Ultimately, we conclude that it is unnecessary to resolve whether Beam impliedly overruled American. We do not perceive much, if any, difference between the language of GEICO's policy and the policy language addressed by our supreme court in Beam. We also believe we are between a rock and a hard place here. As GEICO observes, there is a statute apparently directly on point that would compel a result opposite from Beam, Indiana Code Section 27-7-5-5(c). This statutory provision provides: The maximum amount payable for bodily injury under uninsured or underinsured motorist coverage is the lesser of: (1) the difference between: (A) the amount paid in damages to the insured by or for any person or organization who may be liable for the insured's bodily injury; and (B) the per person limit of uninsured or underinsured motorist coverage provided in the insured's policy; or (2) the difference between: (A) the total amount of damages incurred by the insured; and (B) the amount paid by or for any person or organization liable for the insured's bodily injury. Ind.Code § 27-7-5-5(c). Although this statutory provision has been in existence since 1987, few of the several cases decided since then regarding setoffs and uninsured or underinsured motorist coverage have mentioned the provision, including Beam.[3] The Tate court acknowledged its existence, but noted that the policy in that case had been issued before the provision was enacted. Tate, 587 N.E.2d at 668. The court, therefore, declined to consider the provision in deciding the setoff question before it because *114 when the policy was issued, "Indiana did not then require Secura to provide underinsured motorists coverage, nor did it impose statutory limits upon the nature and operation of such coverage." Id. (emphasis added). Such limits existed when GEICO issued these policies to the Kinslows. Kinslow fails to cite or analyze this statute in her brief. As a general matter, the statutes governing UM/UIM insurance are considered a part of every automobile liability policy the same as if written therein. United Nat'l Ins. Co. v. DePrizio, 705 N.E.2d 455, 460 (Ind.1999) (addressing I.C. § 27-7-5-2). Additionally, UM/UIM legislation is to be liberally construed in a light most favorable to the insured. Id. at 459-60. It is also true, however, that the first step in interpreting any Indiana statute is to determine whether the legislature has spoken clearly and unambiguously on the point in question. St. Vincent Hosp. and Health Care Ctr., Inc. v. Steele, 766 N.E.2d 699, 703-04 (Ind. 2002). If a statute is clear and unambiguous, we need not apply any rules of construction other than to require that words and phrases be taken in their plain, ordinary, and usual sense. Id. at 704. "Clear and unambiguous statutory meaning leaves no room for judicial construction." Id. The language of Indiana Code Section 27-7-5-5(c) does not provide a set formula for calculating setoffs in all cases, but it does establish maximum and minimum parameters for the amount of recovery a plaintiff is entitled to as a result of a UM or UIM claim. Gardner v. State Farm Mut. Ins. Co., 589 N.E.2d 278, 281 (Ind.Ct. App.1992), trans. denied. We also conclude that the language of the statute is clear and unambiguous and is not open to interpretation. It says that the maximum UM or UIM bodily injury benefits to which an insured is entitled as the result of an accident is the lesser of the difference between the amount already recovered by the insured less the per person limit of UM/UIM coverage in the insured's policy, or the difference between the total amount of damages incurred by the insured and the amount already recovered by the insured. Applying this formula here, assuming total damages to the Kinslows of $400,000, payment by Taylor of $200,000, and UM policy limits under either GEICO policy of $200,000, the first calculation results in zero ($200,000—$200,000), while the second results in $200,000 ($400,000—$200,000). Obviously, the lesser of these amounts is zero. To allow Kinslow to recover anything under either GEICO policy would contravene clear and unambiguous statutory language. We cannot construe either policy in such a way. See, e.g., Harbour v. Arelco, Inc., 678 N.E.2d 381, 385 (Ind.1997) (noting that contracts that contravene a statute generally are "void"). To the extent our holding today might be seen to conflict with Beam, we note the following. First, we reiterate that Beam did not address the applicability of Indiana Code Section 27-7-5-5(c). Second, the factual scenario in Beam was different from that before us today. There, the total damages suffered by the insured— $701,371—were less than the UIM insurance limit at issue, $1 million. Under that scenario, it was consistent with the UM/ UIM maximum coverage statute to set off the worker's compensation payments from the total damages, rather than the UIM limit. Here, by contrast, Kinslow argues she and her husband sustained damages in excess of the applicable UM limit of $200,000. In such a case, Section 27-7-5-5(c) mandates that Taylor's payment of $200,000 be deducted from the UM limit, not the total damages. Although the UM/ UIM statutes require coverage for such claims in Indiana, it does appear that the *115 legislature also enacted certain mandatory limits for such coverage. Kinslow also contends that GEICO is not entitled to set off payments made by Taylor or her insurer because those were not payments made "on behalf of" the uninsured motorist, i.e. the vehicle that fled the scene. She relies primarily upon the Indiana Comparative Fault Act and accompanying case law, under which a defendant is not entitled to a credit against its liability when a nonparty defendant settles with the plaintiff. See R.L. McCoy, Inc. v. Jack, 772 N.E.2d 987, 991 (Ind. 2002). Kinslow, however, fails to explain why the Comparative Fault Act, which concerns apportionment of liability among all parties, should apply in the context of a case that is governed by a completely different statutory scheme and concerns limits on an insured's recovery from an insurer. Here, both GEICO policies state that the amount of UM coverage will be reduced by "all sums" paid to the insured by or on behalf of other parties. Indiana Code Section 27-7-5-5(c)(1) also requires consideration of "the amount paid in damages to the insured by or for any person organization who may be liable for the insured's bodily injury. . . ." (Emphasis added). This court has held that similar policy language, as well as the UM/UIM statutory setoff provision, required setoff from UM/UIM coverage of all amounts received by the insured from any tortfeasor, including non-motorist tortfeasors. Grain Dealers Mut. Ins. Co. v. Wuethrich, 716 N.E.2d 596, 599 (Ind.Ct.App.1999), trans. denied. There seems to be no dispute here that Taylor was at least partially responsible for the accident. Contrary to Kinslow's assertion, Taylor's or her insurer's $200,000 payment on her behalf must be set off against GEICO's $200,000 UM limits in this case because she was a person "who may be liable" for the Kinslows' injuries. We also note that the UM/UIM setoff statute seemingly would be meaningless if an insurer could only set off amounts paid to the insured by an uninsured motorist. Conclusion Indiana Code Section 27-7-5-5(c) applies in this case and clearly requires that the $200,000 paid by Taylor for the Kinslows' injuries must be set off against the available $200,000 UM limits of both GEICO policies at issue here. We affirm the trial court's grant of summary judgment in GEICO's favor. Affirmed. SULLIVAN, J., and ROBB, J., concur. NOTES [1] It appears Kinslow was seeking UM benefits under one or the other, but not both, of these policies, or total benefits of $200,000—$100,000 for her injuries and $100,000 for those of her husband. [2] We do not know the full monetary extent of the Kinslows' damages. [3] Beam noted eight cases from this court discussing whether a setoff clause in a particular policy's UM/UIM clause required payments to the insured from other sources to be deducted from the policy limits or from the total amount of damages. See Beam, 765 N.E.2d at 529 n. 3 & 4. Like Beam, none of these cases mentioned Indiana Code Section 27-7-5-5(c) when deciding the question.
{ "perplexity_score": 312.4, "pile_set_name": "FreeLaw" }
We’re living in an incredible age of technology. Self driving cars, smart AI computers, crazy scary robots, and… pet cameras. Ok maybe the last one isnt quite as cool. But a few bright minds have created fun and unique ways for us humans to interact with our beloved kitties and puppies. iPet Companion provides shelters with live streaming video which can be controlled by the viewers in addition to interactive toys. Petcube is a growing startup that revolutionized pet cameras for consumers (check out our hands-on review). More recently, they began partnering with shelters to integrate cameras which can be viewed by anyone in the world. While a few of the live streams in this list are from simple webcams, others are from a new form of pet cameras, some of which were featured on CES and IndieGoGo. Let’s get right to it. The following list of shelters, provided by iPet Companion, have live streaming video and interactive toys that can be controlled with your arrow keys. Sort by state to find one near you. iPet Companion Shelter Cameras Interact with animals awaiting adoption, in real-time, right from your computer. Petcube Public Streams The following shelters have live streaming through Petcube’s free app. Note: you do not need to purchase the Petcube pet camera to use their app!
{ "perplexity_score": 460.7, "pile_set_name": "OpenWebText2" }
United States Court of Appeals For the Eighth Circuit ___________________________ No. 15-1099 ___________________________ William Muiruri lllllllllllllllllllllPetitioner v. Loretta E. Lynch lllllllllllllllllllllRespondent ____________ Petition for Review of an Order of the Board of Immigration Appeals ____________ Submitted: September 22, 2015 Filed: October 14, 2015 ____________ Before LOKEN, BENTON, and SHEPHERD, Circuit Judges. ____________ BENTON, Circuit Judge. The Board of Immigration Appeals found William Muiruri removable under INA § 237(a)(3)(D), 8 U.S.C. § 1227(a)(3)(D). He appeals. Having jurisdiction under 8 U.S.C. § 1252, this court denies the petition. Muiruri, a native of Kenya, overstayed his student visa. Immigration officials apprehended him. In a sworn statement, Muiruri admitted to falsely representing himself as a U.S. citizen. The Department of Homeland Security charged him with two counts of removability: (1) overstaying his visa in violation of INA 237(a)(1)(C)(I), and (2) falsely representing himself as a U.S. citizen in violation of INA 237(a)(3)(D). He applied for adjustment-of-status based on marriage to a U.S. citizen. The immigration judge held four hearings and issued one relevant order. At the first hearing, the judge informed Muiruri of the statutory rights in 8 C.F.R. § 1240.10(a). At the second hearing, he entered pleadings as required by § 1240.10(c). Muiruri conceded the first count of removability, but denied falsely representing himself as a U.S. citizen—which would ban him from reentering the United States. The judge then scheduled a “removal hearing” on the false- representation and adjustment-of-status claims. A month before the removal hearing, Muiruri filed a “Motion to Suppress.” He argued he had been illegally searched and seized, and his sworn statement coerced. He further alleged a lack of sufficient evidence for the false-representation charge. In the Motion’s prayer for relief, Muiruri requested that the judge either suppress all evidence from the unlawful search, seizure, and interrogation, or order an evidentiary hearing on the Motion. Finally, Muiruri requested that “should the Court decide against either of the above, it should consider the evidence and argument presented herein as it relates to a finding under INA 237(a)(3)(D) (False claim to citizenship).” Two weeks later, the government submitted “to be considered by the Immigration Court at [Muiruri’s] hearing” I-9 forms and an employment application. In each, Muiruri checked the box indicating U.S. citizenship. On March 14, 2013—a week before the removal hearing—the immigration judge issued an order denying the Motion to Suppress and finding a violation of INA 237(a)(3)(D). On March 22—the originally scheduled “removal hearing”—Muiruri acknowledged that the March 14 decision mooted his adjustment-of-status claim. The immigration judge granted Muiruri’s request for a fourth and final hearing. -2- There, Muiruri told the immigration judge he would not pursue a withholding-of- removal claim but would appeal the March 14 decision. The BIA affirmed. This court has jurisdiction to review the BIA’s decisions. 8 U.S.C. § 1252. Where, as here, the BIA adopts the immigration judge’s opinion and adds reasoning and analysis, this court reviews both decisions. La v. Holder, 701 F.3d 566, 570 (8th Cir. 2012). Review is limited to the administrative record. § 1252(b)(4)(A). This court reviews factual findings for substantial evidence. Bernal-Rendon v. Gonzales, 419 F.3d 877, 880 (8th Cir. 2005). A finding is supported by substantial evidence unless the record would compel a reasonable fact-finder to reach the contrary conclusion. § 1252(b)(4)(B). Questions of law and constitutional questions are reviewed de novo; the BIA’s interpretation of immigration laws and regulations receives substantial deference. See Habchy v. Gonzales, 471 F.3d 858, 862 (8th Cir. 2006); Bernal-Rendon, 419 F.3d at 880. I. Muiruri argues that he was denied a merits hearing on the false-representation charge in violation of the Fifth Amendment’s due process clause, the INA, and agency regulations. Aliens “are entitled to the Fifth Amendment’s guarantee of due process of law in deportation proceedings,” which means that proceedings must be “fundamentally fair.” Al Khouri v. Ashcroft, 362 F.3d 461, 464 (8th Cir. 2004), citing Reno v. Flores, 507 U.S. 292, 306 (1993). The alien must have the opportunity to fairly present evidence, offer arguments, and develop the record. Tun v. Gonzales, 485 F.3d 1014, 1025 (8th Cir. 2007), citing 8 U.S.C. § 1229a(b)(4)(B), 8 C.F.R. § 1240.10(a)(4). A due process violation requires both a fundamental procedural error and actual prejudice. Al Khouri, 362 F.3d at 466. -3- Under the INA and implementing regulations, the immigration judge “shall direct a hearing on the issues” if an alien denies a charge of removability. 8 C.F.R. § 1240.10(c). And, the removal decision must be based on “evidence produced at the hearing.” 8 U.S.C. § 1229a(c)(1)(A). According to Muiruri, the immigration judge violated due process, the INA, and agency regulations by issuing the false-representation decision before the removal hearing. Muiruri further contends that the lack of a hearing prejudiced him by precluding him from cross-examining witnesses and entering evidence. Each argument has been forfeited. In Muiruri’s Motion, the “Prayer for Relief” states: For the foregoing reasons, the Respondent respectfully requests that the Court suppress all evidence obtained during or as a result of the unlawful search and seizure and interrogation, i.e. questioning when intoxicated. In the alternative, this Court should order an evidentiary hearing to determine whether to grant this Motion to Suppress. Finally, should the Court decide against either of the above, it should consider the evidence and argument presented herein as it relates to a finding under INA 237(a)(3)(D) (False claim to citizenship). The immigration judge denied the Motion to Suppress, denied the request for a hearing on it, and granted Muiruri’s third request—a decision on the false- representation charge based on the evidence presented in the Motion. Muiruri never objected to this course of action at the two later hearings. He did not ask for a hearing, complain that he had not received a hearing, or in any way indicate he wanted a hearing. -4- “An error . . . even one affecting a constitutional right, is forfeited—that is, not preserved for appeal—‘by the failure to make timely assertion of the right.’” United States v. Pirani, 406 F.3d 543, 549 (8th Cir. 2005) (en banc), quoting United States v. Olano, 507 U.S. 725, 731 (1993). The possibility of forfeiture discourages “the practice of ‘sandbagging’: suggesting or permitting, for strategic reasons, that the trial court pursue a certain course, and later—if the outcome is unfavorable—claiming that the course followed was reversible error.” Freytag v. Commissioner, 501 U.S. 868, 895 (1991) (Scalia, J., concurring). Here, Muiruri requested the immigration judge to follow a certain course; the judge did so and Muiruri did not object. Because Muiruri forfeited his right to a hearing, his due process, statutory, and regulatory violation arguments fail.1 II. The government bears the burden of proving “by clear and convincing evidence” that an alien is deportable. 8 U.S.C. § 1229a(c)(3)(A). An alien is deportable if he “falsely represents, or has falsely represented, himself to be a citizen of the United States for any purpose or benefit under this chapter . . . or any Federal or State law. . . .” 8 U.S.C. § 1227(a)(3)(D)(i). Muiruri challenges the false- representation finding for lack of substantial evidence, asserting that the judge should not have relied on the submitted I-9 forms. 1 Muiruri also contends that because 8 C.F.R. § 1240.10(c) protects fundamental rights, he only needs to prove a violation, and not prejudice. See discussion in Leslie v. Attorney Gen., 611 F.3d 171, 175-80 (3d Cir. 2010), cited in Puc-Ruiz v. Holder, 629 F.3d 771, 780 (8th Cir. 2010). Even assuming all of Muiruri’s premises, he did not raise this argument to the BIA. The argument has not been preserved and is not addressed by this court. See Martinez Carcamo v. Holder, 713 F.3d 916, 925 (8th Cir. 2013). -5- “[A]n alien who marks the ‘citizen or national of the United States’ box on a Form I-9 for the purpose of falsely representing himself as a citizen to secure employment with a private employer has falsely represented himself for a purpose or benefit under the [INA].” Rodriguez v. Mukasey, 519 F.3d 773, 778 (8th Cir. 2008) (emphasis added). This marking alone, however, does not necessarily establish a false representation as a citizen. Mayemba v. Holder, 776 F.3d 542, 545 (8th Cir. 2015). “Because the I-9 form is phrased in the disjunctive, it is theoretically possible that an alien who has checked the ‘citizen or national’ box has not represented himself to be a citizen.” Hashmi v. Mukasey, 533 F.3d 700, 703-04 (8th Cir. 2008).2 Despite the disjunctive “citizen or national” box on an I-9 form, additional evidence may support a finding that the alien had the purpose of representing himself as a citizen (not a national). Mayemba, 776 F.3d at 546. Here, the government submitted an employment application where Muiruri checked the “yes” box in response to the question: “Are you a citizen of the United States?” Muiruri also admitted, in a sworn statement, falsely representing himself as a U.S. citizen. The record as a whole does not compel the conclusion that Muiruri did not falsely represent himself as a U.S. citizen. ******* The petition for review is denied. ______________________________ 2 In addition to the three disjunctive I-9 forms, the government submitted a revised I-9 form where Muiruri checked the “U.S. citizen” box. -6-
{ "perplexity_score": 253.3, "pile_set_name": "FreeLaw" }
sustainable media: dive in After MLK day and the presidential inauguration, the social media networks were blowing up. I spent about an hour scrolling through the day’s worth of tweets that ranged from MLK quotes to pictures of Obama, as well as updates about the 49ers going to the Superbowl. As we all know, social media platforms have undoubtedly become a major vessel for the exchange of information that is constant and more importantly, current. Especially when it comes to discussions surrounding the topic of sustainability. These social media platforms range from the quick paced news feeds of Twitter to the aesthetically pleasing visuals of Pinterest and Instagram with millions of active users, and free membership. What better a place to raise sustainability awareness and at the same time promote a brand? The simple answer: there isn’t. Now more than ever social media has become intertwined and engrained in people’s professional and personal lives, becoming ever more versatile and impactful. Discussions surrounding sustainability for example, move beyond just a key group of sustainability folk (you know who you are). It’s a topic that, in just a few tweets, can engulf a new demographic: a coffee pot that can be disassembled and recycled (@autodesk); business strategy around driving efficiency and reducing cost (@capgemini); community efforts around building social sustainability (@groundworkuk). The fact of the matter is that with the help of social media, sustainability is moving beyond being a trend to becoming a true paradigm. If your business isn’t paying attention to the increasingly constant conversations happening on various platforms, you’re going to have to dive in or do something drastic to compete. So whether it’s a tweet, a post, a photo, a pin, or an entire profile, take the initiative to build your social media campaign or get support from a firm like us or a like group of professionals. Share your thoughts and follow us @advencapitalist to see what we’re up to on Twitter.
{ "perplexity_score": 373.5, "pile_set_name": "Pile-CC" }
Book Now:tel:9083253098 OUR FLEET There are many advantages to using L&A Transport as your logistics team starting with our young and modern fleet to our state-of-the-art shipment tracking procedures. Our customers work directly with our team and our drivers are company drivers. Below is just a small overview of what sets us apart:
{ "perplexity_score": 1005.2, "pile_set_name": "Pile-CC" }
1. Technical Field The present invention relates generally to an improved distributed data processing system and, in particular to an improved method and apparatus for creating applications. Still more particularly, the present invention relates to a method and apparatus for creating client applications. 2. Description of Related Art Distributed data processing systems involve data transfers between clients and servers (also know as services). Typically, a client locates a server, initiates a session with a server and requests the server to perform some service. The server expects requests from a client to arrive in a particular format. A server is more complex than a client because the server typically handles a large number of clients simultaneously, often fetches and stores information from a large database, creates additional transactions for other services, performs business logic, and returns information formatted according to each client channel. For example, data will be specified in a particular message format. A particular transmission protocol will deliver the message to the server. The server accepts the message protocol as its application programming model (API) to its services and returns a result. A variety of software systems, such as Enterprise Java Beans (EJB), Servlets, Java Server Pages (JSP), and XML have been implemented to enhance the development of client and server-side software. Client applications perform a number of different functions. For example, the application on the client side handles the user interface and may provide program logic for processing user input. Additionally, a client application must match the requirements of a particular server to provide communications with the particular server. Clients are packaged and distributed according to the services provided by the server. A graphical user interface (GUI) exists in the client application to handle what the user views on the screen. Events resulting from user input, such as mouse clicks or keyboard strokes, are detected and handled using xe2x80x9clistenerxe2x80x9d processes in the application. The events are processed by program logic. The program logic may result in requests being sent to a server. Communication with the server is provided using processes that use protocols, such as hypertext transfer protocol (HTTP), secure sockets (SSL), or Remote Method Invocation (RMI). Client software can be either xe2x80x9cthickxe2x80x9d or xe2x80x9cthinxe2x80x9d. A thick client is typically a large client-installed application that may access a database directly and apply business logic. They typically have dependence on the client operating system and require manual support to install and configure. By contrast a thin client is typically a small application downloaded on request from a server and accesses the database through an intermediate application server. This is known as a multi-tier application. A number of different usage scenarios for clients are present, resulting in a variety of client needs being present. For example, it is typical that in an global enterprise Intranet, the client configuration is controlled by the business but the large number of clients includes older machines with slow networks (e.g. 9600 baud). Likewise, in the Internet, there is little configuration control by the business and it is estimated that a large percentage of clients worldwide still use 14.4K connections that result in very slow network speeds and downloads. A typical user will become very frustrated if downloads take longer than a minute or two. Further, mobile users require compact software that can be customized and packaged to fit on machines and operate disconnected from the network. Subsequent automated support to connect to the network is needed. At the other end of the spectrum, power users with high speed connections expect screen refresh times in the sub-second range and xe2x80x9cinstantaneousxe2x80x9d echoing of typed characters to provide the look and feel of processing in a local environment. In a multi-tier computing environment, the primary role of the client is to present and gather information quickly. The client application is considered a business asset independent of the network topology and server function. In these environments, it is desirable to be able to use the same client processing code for different user types and interface channels, such as automated teller machines (ATM), Kiosks, Internet [hypertext markup language (HTML)/applets], and regional office clients (applications). Consequently, a common thin or thick client development environment for developing clients may be used to solve these problems, especially when the size and speed of the application download, integration and operation is important. Any software development environment should be based on sound software engineering principles. Object-oriented languages have been employed in creating thin clients. Object-oriented programming environments have been presented as providing software reuse, which is a desirable feature in creating thin clients and reducing development time. In reality, the present object-oriented programming environments for developing thin clients are unable to provide enough object reuse and repeatability for quickly developing thin clients. Nor do they specify how to readily support additional message formats, protocols, data models and servers, mobile disconnected users, and caching. Therefore, it would be advantageous to have an improved method and apparatus for a client development architecture that facilitates creating thin clients in a manner in which component reuse is increased while client development time is reduced, and multiple message formats, protocols, data models and servers, mobile disconnected users and caching can be readily integrated. The present invention provides an architectural pattern for creating applications for a data processing system. A graphical user interface is created in which the graphical user interface includes a plurality of components. Processes for presenting the plurality of components and receiving user input are handled by a first set of graphical objects, wherein in response to selected user input, a first event is generated. An application object is created in which the application process controls an order in which the graphical objects present the set of components and process the event and wherein the application generates a second event. A transport object is created in which the transport object processes the second event and forwards the second event for processing to a destination within the plurality of destinations. A plurality of destination objects are created in which each destination object within the plurality of destinations objects handles accessing a destination within the plurality of destinations. The present invention provides a method and apparatus in a data processing system for refreshing data in an application. A call is received to update data in the application, wherein the data is destined for a component in the application. A data type is identified for the data. Responsive to the data type being a handled data type, the data is formatted and a refresh is called on the component. The present invention provides a method and apparatus in a data processing system for displaying a component or container. The container is displayed within a display using a first component. A location of the component or container is controlled within the display using a second component, wherein the second component controls the location and geometry of the component or container in response to receiving an event. The component or container is selectively displayed using a third component, wherein the third component generates the event. The present invention provides a process in a data processing system for managing services in a desktop environment from an object oriented-environment. A presentation of a graphical user interface is controlled using a view controller, wherein the view controller handles user input to the graphical user interface. Responsive to a selected user input, the selected user input is sent from the view controller to an application mediator. Responsive to receiving the selected user input at the application mediator, the selected user input is processed at the application mediator. Responsive to the application mediator determining that a service is required in the desktop environment, an event is generated. Responsive to detecting the event at a listener object, a method is executed in the listener object to perform the service in the desktop environment. The present invention provides a method and apparatus in a data processing system for managing transactions. A request event is received at a transporter object. The request event includes a target and an indication of how to handle the request event. A destination object is identified within the plurality of destination objects using the request event to form an identified destination object. The request event is sent to the identified destination object, wherein the identified destination object handles the request using the indication and accesses the target. The present invention provides a method and apparatus in a data processing system for displaying a graphical user interface. A container is displayed in a graphical user interface from a set of containers, wherein a display of the container handled by a view controller from a set of view controllers. Each view controller handles the display of an associated container within the set of containers and user input for the associated container. A display of the set of containers is altered by an application mediator, wherein the set of containers are displayed in an order determined by the application mediator. The present invention provides a method and apparatus in a data processing system for performing validation of user input. User input is received in a container displayed in a graphical user interface, wherein presentation of the container and the user input to the container are handled by a view controller. Responsive to receiving the user input, a call is sent to a validation object by the view controller. Responsive to the call, the validation object tests the user input using a criteria, wherein the rule is separate from the view controller. The present invention provides a method and apparatus in a data processing system for managing permissions in an application. A user input is received at a container handled by a view controller, wherein the user input requests a change in permissions in the application. This user input, may be, for example, a change in security in an application through a login process. A view event describing the user input is generated. The view event is received at an application mediator. Responsive to receiving the view event, by the application mediator, a request event is generated and a permission corresponding to the user input is received. The permission alters an item, which may be in either of both the view controller and the application mediator. The present invention provides a process and apparatus in a data processing system for presenting a view to a client. At an application mediator, a view event is received from a view controller, wherein the view event describes an action on a displayed container handled by the view controller. Responsive to a requirement that a change in a placement of the displayed container is required, a placement event is generated by the application mediator. A determination is then made by a placement listener, as to whether the placement event includes an indication that an alternate view is to be generated. Responsive to a determination that an alternate view is to be generated, a call is sent to a method in the view controller to generate the alternate view. The present invention provides a method and apparatus in a data processing system for processing user input in a graphical user interface. A graphical user interface is presented using a view controller, wherein the view controller handles the user input to the graphical user interface. Responsive to a selected user input, an event is sent to a first application mediator. Responsive to the first application mediator being unable to process the event, the event is sent to a second application mediator for processing, wherein the first application mediator and the second application mediator handle an order in which a set of displays are displayed by a view controller. The present invention provides a method and apparatus in a data processing system for presenting a set of screens in a graphical user interface. A first screen within a set of screens is presented, wherein the set of screens are presented using a set of view controllers. Responsive to a selected user input to the first screen, an event is generated by a view controller within the set of view controllers identifying the user input to the first screen, which is handled by the first view controller. Responsive to detecting the event generated by the view controller, a second screen from the set of screens is selected, by an application mediator, for display by sending a response to a view controller handling the second screen. The application mediator is initialized from reading a state machine file and control processing of view event received from virtual controllers. The present invention provides a method and apparatus in a data processing system for serializing data. A serializer receives a data element for serialization, wherein the data element includes a class name string. Responsive to receiving the data element, the serializer replaces the class name string with a code having a smaller size than the class name string to form a modified data element. Responsive to forming the modified data element, in which the serializer serializes the modified data element. This serialized data is transmitted and deserialized by a deserializer, which replaces the indicator with the class name. The present invention provides a method and apparatus in a data processing system for providing an interface to an application for monitoring execution of the application. An event generated by a view controller is detected, wherein the view controller handles presentation of a container in a graphical user interface. A determination is made as to whether the event is an event selected for monitoring. Responsive to the determination that the event is an event selected for monitoring, a request event is generated, wherein the request event includes data from the event and a destination. The present invention provides a method and apparatus for a data processing system for accessing classes and methods in an object oriented system. Responsive to receiving a selected user input to a container, a view event is sent from a view controller o an application mediator. The view event identifies an action taken to generate the selected user input. A request is selectively generated based on the view event, wherein the request event includes a major code identifying a class name as a destination and a minor code identifying a method name a function to be invoked. The request event is sent to a transporter. The transporter acts as a router to send the request event to an appropriate destination object from a plurality of destination objects. Responsive to receiving the request event at the transporter, the request event is sent to a destination object within a plurality of destination objects based in the class name. The destination object formats the request event into a form recognizable by the destination associated with the destination object. The destination may be located on a remote data processing system. The request event is used to access the class or method identified in the request event. The access may be, for example, an invocation of the method.
{ "perplexity_score": 371.6, "pile_set_name": "USPTO Backgrounds" }
Albuna Albuna is a genus of moths in the family Sesiidae. Species Albuna fraxini (Edwards, 1881) – Virginia creeper clearwing Albuna pyramidalis (Walker, 1856) Albuna bicaudata Eichlin, 1989 Albuna polybiaformis Eichlin, 1989 Albuna rufibasilaris Eichlin, 1989 References Category:Sesiidae
{ "perplexity_score": 747.1, "pile_set_name": "Wikipedia (en)" }
-- -- Test cases for COPY (INSERT/UPDATE/DELETE) TO -- create table copydml_test (id serial, t text); insert into copydml_test (t) values ('a'); insert into copydml_test (t) values ('b'); insert into copydml_test (t) values ('c'); insert into copydml_test (t) values ('d'); insert into copydml_test (t) values ('e'); -- -- Test COPY (insert/update/delete ...) -- copy (insert into copydml_test (t) values ('f') returning id) to stdout; 6 copy (update copydml_test set t = 'g' where t = 'f' returning id) to stdout; 6 copy (delete from copydml_test where t = 'g' returning id) to stdout; 6 -- -- Test \copy (insert/update/delete ...) -- \copy (insert into copydml_test (t) values ('f') returning id) to stdout; 7 \copy (update copydml_test set t = 'g' where t = 'f' returning id) to stdout; 7 \copy (delete from copydml_test where t = 'g' returning id) to stdout; 7 -- Error cases copy (insert into copydml_test default values) to stdout; ERROR: COPY query must have a RETURNING clause copy (update copydml_test set t = 'g') to stdout; ERROR: COPY query must have a RETURNING clause copy (delete from copydml_test) to stdout; ERROR: COPY query must have a RETURNING clause create rule qqq as on insert to copydml_test do instead nothing; copy (insert into copydml_test default values) to stdout; ERROR: DO INSTEAD NOTHING rules are not supported for COPY drop rule qqq on copydml_test; create rule qqq as on insert to copydml_test do also delete from copydml_test; copy (insert into copydml_test default values) to stdout; ERROR: DO ALSO rules are not supported for the COPY drop rule qqq on copydml_test; create rule qqq as on insert to copydml_test do instead (delete from copydml_test; delete from copydml_test); copy (insert into copydml_test default values) to stdout; ERROR: multi-statement DO INSTEAD rules are not supported for COPY drop rule qqq on copydml_test; create rule qqq as on insert to copydml_test where new.t <> 'f' do instead delete from copydml_test; copy (insert into copydml_test default values) to stdout; ERROR: conditional DO INSTEAD rules are not supported for COPY drop rule qqq on copydml_test; create rule qqq as on update to copydml_test do instead nothing; copy (update copydml_test set t = 'f') to stdout; ERROR: DO INSTEAD NOTHING rules are not supported for COPY drop rule qqq on copydml_test; create rule qqq as on update to copydml_test do also delete from copydml_test; copy (update copydml_test set t = 'f') to stdout; ERROR: DO ALSO rules are not supported for the COPY drop rule qqq on copydml_test; create rule qqq as on update to copydml_test do instead (delete from copydml_test; delete from copydml_test); copy (update copydml_test set t = 'f') to stdout; ERROR: multi-statement DO INSTEAD rules are not supported for COPY drop rule qqq on copydml_test; create rule qqq as on update to copydml_test where new.t <> 'f' do instead delete from copydml_test; copy (update copydml_test set t = 'f') to stdout; ERROR: conditional DO INSTEAD rules are not supported for COPY drop rule qqq on copydml_test; create rule qqq as on delete to copydml_test do instead nothing; copy (delete from copydml_test) to stdout; ERROR: DO INSTEAD NOTHING rules are not supported for COPY drop rule qqq on copydml_test; create rule qqq as on delete to copydml_test do also insert into copydml_test default values; copy (delete from copydml_test) to stdout; ERROR: DO ALSO rules are not supported for the COPY drop rule qqq on copydml_test; create rule qqq as on delete to copydml_test do instead (insert into copydml_test default values; insert into copydml_test default values); copy (delete from copydml_test) to stdout; ERROR: multi-statement DO INSTEAD rules are not supported for COPY drop rule qqq on copydml_test; create rule qqq as on delete to copydml_test where old.t <> 'f' do instead insert into copydml_test default values; copy (delete from copydml_test) to stdout; ERROR: conditional DO INSTEAD rules are not supported for COPY drop rule qqq on copydml_test; -- triggers create function qqq_trig() returns trigger as $$ begin if tg_op in ('INSERT', 'UPDATE') then raise notice '% %', tg_op, new.id; return new; else raise notice '% %', tg_op, old.id; return old; end if; end $$ language plpgsql; create trigger qqqbef before insert or update or delete on copydml_test for each row execute procedure qqq_trig(); create trigger qqqaf after insert or update or delete on copydml_test for each row execute procedure qqq_trig(); copy (insert into copydml_test (t) values ('f') returning id) to stdout; NOTICE: INSERT 8 8 NOTICE: INSERT 8 copy (update copydml_test set t = 'g' where t = 'f' returning id) to stdout; NOTICE: UPDATE 8 8 NOTICE: UPDATE 8 copy (delete from copydml_test where t = 'g' returning id) to stdout; NOTICE: DELETE 8 8 NOTICE: DELETE 8 drop table copydml_test; drop function qqq_trig();
{ "perplexity_score": 2849.5, "pile_set_name": "Github" }
Handymen, home care helps seniors trying to age in place A construction worker takes a measurement while installing a banister in a staircase in a home in Baltimore. (Photo: Patrick Semansky) WASHINGTON (AP) — Where you live plays a big role in staying independent as you age. Now researchers say an innovative program that combined home fix-ups and visits from occupational therapists and nurses improved low-income seniors' ability to care for themselves in their own homes. Still to be answered is whether that better daily functioning also saves taxpayer dollars — by helping enough older adults with chronic health problems avoid costly hospital or nursing home stays. "We're improving people's lives, improving their abilities," said Sarah Szanton, a Johns Hopkins University associate nursing professor who leads the experimental program reported Wednesday in the journal Health Affairs. Surveys show most older adults want to live at home for as long as possible. Yet chronic diseases and their resulting disabilities — problems walking, bathing, dressing, cooking — can make that difficult in homes with steep stairs, doorways too narrow for walkers, and other obstacles. And seniors who have trouble with those so-called activities of daily living are costly for Medicare and Medicaid, too often ending up in hospitals or nursing homes because they couldn't care for themselves at home, or had a bad fall while trying. Szanton's team aims to help those seniors maintain their independence through CAPABLE — it stands for Community Aging in Place, Advancing Better Living for Elders — a program testing modest home modifications and strategies for daily living. The fixes sound simple. A double banister let people rest their weight on both sides to get up and down stairs safely. Handymen fixed trip hazards, installed grab bars and lowered shelves so seniors could reach without climbing. Occupational therapists bought assistive devices to help people with tremors feed themselves, and taught the frail how to get in and out of high-sided tubs. Even simple fixes can be life-changing, like the reaching gadget therapists gave Bertha Brickhouse to help tug on her socks and shoes. "You just don't want to ask someone, 'Can you come to my house and help me put my boots on?'" said Brickhouse, 69, of Baltimore, who has diabetes, high blood pressure and cholesterol, and uses a cane for damaged knees. "It was like I was born all over again from their help, the things they did to make my life much easier." In a demonstration project funded by the federal Center for Medicare and Medicaid Innovation, the Hopkins researchers provided 234 Baltimore residents with 10 home visits by handymen, occupational therapists and nurses. Interventions were tailored to each senior's priorities: Did they want to bathe without help? Cook? Be able to climb the stairs, or make it out of the house to go to church or visit friends? After completing the five-month program, three-quarters of participants improved their ability to take care of themselves — on average, able to perform two more tasks of daily living on their own compared to before receiving the care, Szanton reported Wednesday. Two-thirds of participants also were better able to perform related tasks such as grocery shopping, and half experienced fewer symptoms of depression. The aid cost about $2,825 per participant, including the home repair, home visits from health professionals, and assistive devices. Szanton's team still is calculating if that translates into cost savings for Medicare or Medicaid. Separately, a more rigorous study funded by the National Institutes of Health is under way with an additional 300 Baltimore residents, to prove if the interventions really work. Federal Medicare officials declined comment on Wednesday's findings. But state Medicaid and aging officials are closely watching the research. Michigan has opened its own pilot project, testing a version of CAPABLE with more seriously disabled seniors who are eligible for a nursing home but don't want to move, said Sandra Spoelstra, an associate nursing dean at Grand Valley State University who is leading the study with state Medicaid officials. "It's a different way of talking to people and listening to what they desire to make their life better," Spoelstra said.
{ "perplexity_score": 466.3, "pile_set_name": "Pile-CC" }
764 N.W.2d 283 (2009) PEOPLE of the State of Michigan, Plaintiff-Appellant, v. Raymond Desha DAVIS, Defendant-Appellee. Docket No. 138225. COA No. 282886. Supreme Court of Michigan. May 1, 2009. Order On order of the Court, the application for leave to appeal the December 18, 2008 judgment of the Court of Appeals is considered, and it is DENIED, because we are not persuaded that the questions presented should be reviewed by this Court. MARKMAN, J. (dissenting). Defendant was charged with possession of ecstasy, being a felon in possession of a firearm, possession with intent to deliver marijuana, and possession of a firearm during the commission of a felony. The trial court suppressed evidence of defendant's incriminating statement to the police on the ground that he was interrogated without first being advised of his Miranda rights after he was arrested, Miranda v. Arizona, 384 U.S. 436, 86 S.Ct. 1602, 16 L.Ed.2d 694 (1966). The Court of Appeals affirmed. People v. Davis, 2008 WL 5274837, unpublished opinion per curiam of the Court of Appeals, issued December 18, 2008 (Docket No. 282886). While the police were executing a search warrant at a house, defendant jumped out of a bedroom window. He was brought back into the house and asked whether he lived there. Defendant indicated that he was living at the house. After narcotics were found in the house, defendant was arrested and advised of his Miranda rights. Defendant again indicated that he lived at the house. A defendant must be made aware of his Miranda rights prior to a custodial interrogation. A "custodial interrogation" is defined as "questioning initiated by law enforcement officers after a person has been taken into custody or otherwise deprived of his freedom of action in any significant way." Yarborough v. Alvarado, 541 U.S. 652, 661, 124 S.Ct. 2140, 158 L.Ed.2d 938 (2004). "[C]ustody must be determined based on how a reasonable person in the suspect's situation would perceive his circumstances." Id. at 662, 124 S.Ct. 2140. I agree with the trial court that defendant was in custody. He tried to leave the house, the police prevented him from doing so, brought him back into the house, and handcuffed him. A reasonable person in defendant's situation would have believed himself to have been in custody. I also agree with the trial court that defendant was subjected to interrogation. "[T]he term `interrogation' under Miranda refers not only to express questioning, but also to any words or actions on the part of the police ... that the police should know are reasonably likely to elicit an incriminating response from the suspect." Rhode Island v. Innis, 446 U.S. 291, 301, 100 *284 S.Ct. 1682, 64 L.Ed.2d 297 (1980). Here, the police asked defendant if he lived at the house that they had reason to believe contained drugs. Thus, they should have known that they were likely to elicit an incriminating response. Accordingly, the statement made before defendant was advised of his Miranda rights was made during a custodial interrogation, and, thus, would seem to be inadmissible. The more difficult issue here is whether the subsequent statement made after defendant was advised of his Miranda rights is also inadmissible. In Missouri v. Seibert, 542 U.S. 600, 124 S.Ct. 2601, 159 L.Ed.2d 643 (2004) (a plurality opinion), the United States Supreme Court held that the police cannot deliberately wait to advise a defendant of his Miranda rights until after a station-house interrogation produces a confession and then admit the statement made after Miranda rights are given. However, the Seibert Court also held that Oregon v. Elstad, 470 U.S. 298, 105 S.Ct. 1285, 84 L.Ed.2d 222 (1985), remained good law. In Elstad, the Court held that if the failure to warn before the initial statement constituted an oversight, and the initial statement was made at the suspect's home and the subsequent statement was made after the suspect was advised of his rights and after a station-house interrogation, the subsequent statement is admissible because "any causal connection between the first and second responses to the police was `speculative and attenuated.'" Seibert, 542 U.S. at 615, 124 S.Ct. 2601 quoting Elstad, 470 U.S. at 313, 470 U.S. 298. The pertinent question is "[c]ould the warnings effectively advise the suspect that he had a real choice about giving an admissible statement at that juncture?" Seibert, 542 U.S. at 612, 124 S.Ct. 2601. "Could they reasonably convey that he could choose to stop talking even if he had talked earlier?" Id. The Court articulated several factors to evaluate when determining whether "Miranda warnings delivered midstream could be effective enough to accomplish their objective: the completeness and detail of the questions and answers in the first round of interrogation, the overlapping content of the two statements, the timing and setting of the first and the second, the continuity of police personnel, and the degree to which the interrogator's questions treated the second round as continuous with the first." Id. at 615, 124 S.Ct. 2601. This case is similar to Elstad in several important respects — the failure to advise defendant of his Miranda rights appears to have been an oversight and the custodial interrogation was not carried out in a station-house environment. However, in other respects, this case is similar to Seibert — the questions and answers were the same on two occasions and they occurred relatively closely in time. I would grant leave to appeal. CORRIGAN, J., joins the statement of MARKMAN, J., and additionally states as follows: I join Justice Markman's statement insofar as he sees a jurisprudentially significant issue in defendant's post-Miranda[1] statement. I would additionally grant leave to appeal on the issue whether the police officer's questions regarding defendant's address truly constituted custodial interrogation under Rhode Island v. Innis, 446 U.S. 291, 100 S.Ct. 1682, 64 L.Ed.2d 297 (1980), or amounted to routine booking questions. YOUNG, J., joins the statement of MARKMAN, J. NOTES [1] Miranda v. Arizona, 384 U.S. 436, 86 S.Ct. 1602, 16 L.Ed.2d 694 (1966).
{ "perplexity_score": 189.4, "pile_set_name": "FreeLaw" }
From a nutritional perspective, marijuana should be included in the list of superfoods along with spinach, kale, and broccoli. Normally, it’s dried and cured marijuana that is consumed. But have you ever thought of consuming raw cannabis? Its taste? Its benefits? Many research experiments have already demonstrated the health benefits of marijuana, but very few speak about the health benefits of raw cannabis. From a nutritional perspective, marijuana should be included in the list of superfoods along with spinach, kale, and broccoli. Dr. William Courtney, MD, a member of International Cannabinoid Research Society, the International Association of Cannabis as Medicine, and the Society of Clinical Cannabis and the American Academy of Cannabinoid Medicine, says that he doesn’t want to refer to marijuana as a medicine, but as a dietary essential. Here are Dr. Courtney’s reasons, why raw cannabis is good: One can make the best use of the therapeutic properties of marijuana, through ingestion. Raw cannabis activates the brain’s cannabinoid system, more effectively, which in turn, triggers the release of antioxidants. These antioxidants will effectively get rid of the damaged cells in the body, and this is something that dried cannabis, can do. Raw cannabis consumption makes the cells in the body, more efficient. Raw Cannabis Consumption: A Better Step Towards Health Loaded with proteins, minerals, vitamins, fibers, and antioxidants, raw cannabis is rich in digestible globular proteins, and the balanced proportions of essential amino acids (the amino acids that cannot be synthesized in our body). Raw marijuana has an ideal ratio of omega-3 fatty acids and omega-6 fatty acids, with antioxidant properties. Antioxidants are very much important for the overall well-being, as these preserve health, boost the immune system, reduce the risk of heart diseases, address diabetes complications, and most importantly, lower the risk of cancer development. RELATED: 5 Reasons Why You Need To Start Eating Raw Cannabis During the normal drying and curing process of marijuana, the chlorophyll pigment from the herb is lost; however, it is this component that has loads of dietary benefits. Chlorophyll has the ability to rejuvenate the body, at the cellular level. With its structure similar to that of hemoglobin, chlorophyll has plenty of benefits such as it prevents DNA damage, promotes overall cleansing or detoxification within the body, encourages healing, treats inflammation, improves the iron content absorption, etc. And, when you consume raw marijuana, you will not be consuming THC or CBD; instead, you will be consuming the acid forms of these components- Cannabidolic Acid (CBD-A) and Tetrahydrocannabonolic Acid (THC-A). Just like other components of raw cannabis, CBD-A and THC-A are also very good antioxidants. Recent research experiments show that these components can be powerful healers of serious medical condition, like cancer. In latest study conducted at Hiroshima International University, and published in 2017 January, the researchers discovered a possible way through which, CBD-A inhibits the COX-2 enzyme in aggressive breast cancer tumors. The study further talks about CBD-A’s ability to inhibit a proto-oncogene, c-Fos, which is an element involved in the cancer metastasis.On the other hand, THC-A is known to be neuroprotective, antispasmodic, and an excellent pain-reliever. Raw Cannabis will also hold most of its terpenes. Terpenes not only decide the aroma and taste of the buds but also have their own medicinal properties, such as anti-fungal, antibacterial and anticancer properties. RELATED: Looks Like Raw Marijuana Leaves Are The Next Superfood The cleansing properties of raw cannabis, cannot be emphasized enough. Like any other raw herb, cannabis is also rich in fibers and foliates. Toxic accumulation in the body may happen for different reasons; it might be either due to your poor diet habits, or your body’s inability to fight against the free-radicals. In either condition, your body will need fiber content, which kicks out the toxic substances, from your body. To make the best use of all the above-said benefits, you should be using the raw leaves and buds from live cannabis plants. Best Methods To Consume Raw Marijuana Smoothies : Weeds are usually bitter, so, mixing it up with other fruits or veggies, can make it taste, better. : Weeds are usually bitter, so, mixing it up with other fruits or veggies, can make it taste, better. Salad: Just the chopped fresh marijuana and some dressing, can make a delicious salad. Just the chopped fresh marijuana and some dressing, can make a delicious salad. Juicing: Fresh marijuana with some spices, if you wish, can make your morning, a refreshing one. Stephen Charbonneau is the owner of Stone-Tool-Seed and is a firm believer in the herbal use and an advocate for recreational marijuana. He and his wife of over forty years live on a farm and believe in organic farming and cultural practices that are eco-friendly and safe for people.
{ "perplexity_score": 285.8, "pile_set_name": "OpenWebText2" }
Q: Can't insert date with \maketitle (using llncs.cls) I'm just trying to write some notes on Overleaf using the llncs template (you can play with it here), but when I put \date{06 August 2016} before \maketitle, nothing appears. Currently my notes begin with \documentclass{llncs} \begin{document} \title{My Notes on Bla Bla} \author{John Doe} \institute{ \email{noreply@xyz.com}\\ } \date{06 August 2016} \maketitle (I know my \email probably wasn't inserted correctly, but at this point I just need something that works) All I want is something very basic like this: A: The \date does not form part of \maketitle under llncs. You'll either have to update the subsequent \@maketitle manually or perhaps patching it using something like etoolbox. However, an easier option is to just add it manually after a call to \maketitle: \documentclass{llncs} \title{My Notes on Bla Bla} \author{John Doe} \institute{ \email{noreply@xyz.com}\\ } \date{06 August 2016} \begin{document} \maketitle \noindent \makebox[\linewidth]{\small 06 August 2016} \end{document} Here would be a possible patch applied to \@maketitle using etoolbox: \usepackage{etoolbox} \makeatletter \patchcmd{\@maketitle}% <cmd> {\end{center}}% <search> {\bigskip\small\@date \end{center}}% <replace> {}{}% <success><failure> \makeatother It inserts a gap and the \date supplied at the \end{center} - the end of \@maketitle.
{ "perplexity_score": 6557, "pile_set_name": "StackExchange" }
Schizandrin A enhances the efficacy of gefitinib by suppressing IKKβ/NF-κB signaling in non-small cell lung cancer. The emergence of resistance to EGF receptor (EGFR) inhibitor therapy is a significant challenge for patients with non-small cell lung cancer (NSCLC). During the past few years, a correlation between EGFR TKIs resistance and dysregulation of IKKβ/NF-κB signaling has been increasingly suggested. However, few studies have focused on the effects of combining IKK/NF-κB and EGFR inhibitors to overcome EGFR TKIs resistance. In this study, we discovered that Schizandrin A (Sch A), a lignin compound isolated from Schisandra chinesnesis, could synergize with the EGFR receptor inhibitor Gefitinib to inhibit cell growth, induce cell cycle arrest and apoptosis of HCC827/GR cells. Sch A effectively suppressed the phosphorylation of IKKβ and IκBα, as well as the nuclear translocation of NF-κB p65, and showed high and selective affinity for IKKβ in surface plasmon resonance (SPR) experiments, indicating that Sch A was a selective IKKβ inhibitor. Molecular modeling between IKKβ and Sch A suggested that Sch A formed key hydrophobic interactions with IKKβ, which may contribute to its potent IKKβ inhibitory effect. These findings suggest a novel approach to improve poor clinical outcomes in EGFR TKIs therapy, by combining it with Sch A.
{ "perplexity_score": 332.6, "pile_set_name": "PubMed Abstracts" }
David works on the Magic community team as a content specialist. He spends his days writing about Magic Online and trying to play too many colors at once in Limited. What Is the Magic Online Weekly Announcements Blog? Every Tuesday, we round up all of the biggest Magic Online news and post it right here in the Weekly Announcements Blog. Check in every Tuesday for all of the latest news! Magic Online Player of the Year Standings Available Once Again We're tracking Player of the Year standings once again on MTGO.com! Both Limited and Constructed Player of the Year standings are updated every Thursday. Upcoming R&D Challenge Event on Friday, September 12 Think you have the Magic chops to beat the folks in R&D at their own game? Good, I like the cut of your jib. You're in. The time? High noon (Pacific). The place? The Scheduled events room. The format? Vintage Constructed. The prize? Magic 2015 booster packs. Except for R&D. They don't get the booster packs. Check out the 2014 Community Cup: Companion Events article for all the details! R&D's Finest Allison Medwin Ian Duke Ben Hayes Bryan Hawley Shawn Main Ethan Fleischer Adam Prosak Sam Stoddard Jackie Lee Check in Wednesday for Part Two of the Community Team Player Profiles We're posting the second half of the Community Team profiles on Wednesday, September 3, so don't forget to check in to learn more about the teams competing in the 2014 Community Cup. Check out the directory for all of the profiles released so far! Magic Online Cube Refresh and Event Details In Monday’s article, R&D’s Adam Prosak walked players through the extensive process behind re-working the Magic Online Cube. With over fifty cards that have been updated, be sure to check out the full card list, as well as the full change list, included within Adam's article. Now that the Cube is refreshed, it’s time to break it in! We’ll be running two weeks of Cube Events, alongside flashback drafts, beginning on Wednesday, September 17, running until Wednesday, October 1. Refer to the tables below for the full event details! Magic Online Cube Swiss Draft START TIMES Wednesday, September 17, after downtime until Wednesday, October 1 downtime All times are Pacific (for UTC, add 7 hours) LOCATION Limited Queues ENTRY OPTIONS Option 1 Option 2 10 Event Tickets 16 Phantom Points PRODUCT Magic Online will provide 3 Phantom Cube booster packs SIZE 8 players PLAY STYLE Swiss FORMAT Draft DURATION 10 minutes deck-building time. Three rounds, each round up to 50 minutes. PRIZES Match Wins Prizes QPs 3 Wins 24 Phantom Points 1 2 Wins 16 Phantom Points 0 1 Win 6 Phantom Points 0 0 Wins 2 Phantom Points 0 Magic Online Cube Single Elimination Draft START TIMES Wednesday, September 17, after downtime until Wednesday, October 1 downtime All times are Pacific (for UTC, add 7 hours) LOCATION Limited Queues ENTRY OPTIONS Option 1 Option 2 10 Event Tickets 16 Phantom Points PRODUCT 3 Magic Online Cube booster packs SIZE 8 players PLAY STYLE Single Elimination FORMAT Draft DURATION 10 minutes deck-building time. Three rounds, each round up to 50 minutes. PRIZES Date Prizes 9/17-9/24 Place Prizes QPs 1st 1 Tempest booster pack, 1 Stronghold booster pack, 1 Exodus booster pack, and 18 Phantom Points 1 2nd 1 Tempest booster pack, 1 Stronghold booster pack, 1 Exodus booster pack, and 12 Phantom Points 0 3rd-4th 7 Phantom Points 0 5th-8th 3 Phantom Points 0 9/24-10/1 Place Prizes QPs 1st 3 Innistrad booster packs and 18 Phantom Points 1 2nd 3 Innistrad booster packs and 12 Phantom Points 0 3rd-4th 7 Phantom Points 0 5th-8th 3 Phantom Points 0 Single Elimination Flashback Draft START TIMES Wednesday, September 17, after downtime until Wednesday, October 1 downtime All times are Pacific (for UTC, add 7 hours) LOCATION Limited Queues ENTRY OPTIONS Option 1 Option 2 2 Event Tickets, plus Product 14 Event Tickets PRODUCT Date Product 9/17-9/24 1 Tempest, 1 Stronghold, and 1 Exodus booster pack 9/24-10/1 3 Innistrad booster packs SIZE 8 players PLAY STYLE Single Elimination FORMAT Draft DURATION 10 minutes deck-building time. Three rounds, each round up to 50 minutes. PRIZES Date Prizes 9/17-9/24 Place Prizes QPs 1st 3 Tempest booster packs, 2 Stronghold booster packs, and 3 Exodus booster pack 1 2nd 1 Tempest booster pack, 2 Stronghold booster packs, and 1 Exodus booster pack 0 9/24-10/1 Place Prizes QPs 1st 8 Innistrad booster packs 1 2nd 4 Innistrad booster packs 0 Swiss Flashback Draft START TIMES Wednesday, September 17, after downtime until Wednesday, October 1 downtime All times are Pacific (for UTC, add 7 hours) LOCATION Limited Queues ENTRY OPTIONS Option 1 Option 2 2 Event Tickets, plus Product 14 Event Tickets PRODUCT Date Product 9/17-9/24 1 Tempest, 1 Stronghold, and 1 Exodus booster pack 9/24-10/1 3 Innistrad booster packs SIZE 8 players PLAY STYLE Swiss FORMAT Draft DURATION 10 minutes deck-building time. Three rounds, each round up to 50 minutes. PRIZES Date Prizes 9/17-9/24 Match Wins Prizes QPs 3 Wins 1 Tempest, 1 Stronghold, and 1 Exodus booster pack 1 2 Wins 1 Tempest and 1 Exodus booster pack 0 1 Win 1 Stronghold booster pack 0 9/24-10/1 Match Wins Prizes QPs 3 Wins 3 Innistrad booster packs 1 2 Wins 2 Innistrad booster packs 0 1 Win 1 Innistrad booster pack 0
{ "perplexity_score": 1179.3, "pile_set_name": "OpenWebText2" }
[Massive hemorrhage in the small intestine]. Haemorrhage into the small intestine accounts only for cca 1% of all haemorrhages into the gastrointestinal tract. Profuse haemorrhage is very rare, it occurs in malignant tumours, sarcomas and also haemangiomas. Preoperative diagnosis is practically impossible not only because the small intestine is not readily accessible for examination but in case of profuse haemorrhage also because of lack of time. Therefore a decision on early laparotomy has to be taken.
{ "perplexity_score": 202.1, "pile_set_name": "PubMed Abstracts" }
Q: JavaScript GetDate not working across regions I have some JS code which takes in the client's date/time and passes it to the server like so: function SetPostbackValues() { //Function that gets the client machine datetime and stores it in a hidden field // so it may be used in code behind. var date = new Date(); var day = date.getDate(); // yields day if (day < 10) day = '0' + day; var month = date.getMonth() + 1; // yields month if (month < 10) month = '0' + month; var year = date.getFullYear(); // yields year var hour = date.getHours(); // yields hours if (hour < 10) hour = '0' + hour; var minute = date.getMinutes(); // yields minutes if (minute < 10) minute = '0' + minute; var second = date.getSeconds(); // yields seconds if (second < 10) second = '0' + second; var time = day + "/" + month + "/" + year + " " + hour + ':' + minute + ':' + second; var hiddenControl = '<%= hfDateTime.ClientID %>'; document.getElementById(hiddenControl).value = time; } My problem is that the code works fine when the client time zone settings are set to a UK standard, dd/MM/yyyy but when a US client connects, the conversion to DateTime throws an error saying it is not of the right format. Because I am getting each month, day, year separately and combining them, I do not understand why it does not work across different zone settings. The error occurs when trying to insert datetime into SQL: using (SqlCommand cmd = new SqlCommand("Remove", con)) { string test = (this.Master.FindControl("hfDateTime") as HiddenField).Value; cmd.CommandType = CommandType.StoredProcedure; cmd.Parameters.Add("@RemovalDate", SqlDbType.DateTime).Value = (this.Master.FindControl("hfDateTime") as HiddenField).Value; //Get the client's datetime. con.Open(); insertedRecordID = (int)cmd.ExecuteScalar(); } The error is {"Failed to convert parameter value from a String to a DateTime."} The value of test is: "19/02/2016 10:55:45" which does not look wrong to me. A: I think you should use this: function SetPostbackValues() { var date = new Date(); var hiddenControl = '<%= hfDateTime.ClientID %>'; document.getElementById(hiddenControl).value = date.toISOString(); } And change codebehind to cmd.Parameters.Add("@RemovalDate", SqlDbType.DateTime).Value = DateTime.Parse((this.Master.FindControl("hfDateTime") as HiddenField).Value);
{ "perplexity_score": 2919.4, "pile_set_name": "StackExchange" }
1. Field of the Invention The invention concerns techniques for allocating a resource among a number of potential uses for the resource such that a satisfactory tradeoff between a risk and a return on the resource is obtained. More particularly, the invention concerns improved techniques for determining the risk-return tradeoff for particular uses, techniques for determining the contribution of uncertainty to the value of the resource, techniques for specifying risks, and techniques for quantifying the effects and contribution of diversification of risks on the risk-return tradeoff and valuation for a given allocation of the resource among the uses. 2. Description of Related Art People are constantly allocating resources among a number of potential uses. At one end of the spectrum of resource allocation is the gardener who is figuring out how to spend his or her two hours of gardening time this weekend; at the other end is the money manager who is figuring out how to allocate the money that has been entrusted to him or her among a number of classes of assets. An important element in resource allocation decisions is the tradeoff between return and risk. Generally, the higher the return the greater the risk, but the ratio between return and risk is different for each of the potential uses. Moreover, the form taken by the risk may be different for each of the potential uses. When this is the case, risk may be reduced by diversifying the resource allocation among the uses. Resource allocation thus typically involves three steps: 1. Selecting a set of uses with different kinds of risks; 2. determining for each of the uses the risk/return tradeoff; and 3. allocating the resource among the uses so as to maximize the return while minimizing the overall risk. As is evident from proverbs like “Don't put all of your eggs in one basket” and “Don't count your chickens before they're hatched”, people have long been using the kind of analysis summarized in the above three steps to decide how to allocate resources. What is relatively new is the use of mathematical models in analyzing the risk/return tradeoff. One of the earliest models for analyzing risk/return is net present value; in the last ten years, people have begun using the real option model; both of these models are described in Timothy A. Luehrman, “Investment Opportunities as Real Options: Getting Started on the Numbers”, in: Harvard Business Review, July-August 1998, pp. 3-15. The seminal work on modeling portfolio selection is that of Harry M. Markowitz, described in Harry M. Markowitz, Efficient Diversification of Investments, second edition, Blackwell Pub, 1991. The advantage of the real option model is that it takes better account of uncertainty. Both the NPV model and Markowitz's portfolio modeling techniques treat return volatility as a one-dimensional risk. However, because things are uncertain, the risk and return for an action to be taken at a future time is constantly changing. This fact in turn gives value to the right to take or refrain from taking the action at a future time. Such rights are termed options. Options have long been bought and sold in the financial markets. The reason options have value is that they reduce risk: the closer one comes to the future time, the more is known about the action's potential risks and returns. Thus, in the real option model, the potential value of a resource allocation is not simply what the allocation itself brings, but additionally, the value of being able to undertake future courses of action based on the present resource allocation. For example, when a company purchases a patent license in order to enter a new line of business, the value of the license is not just what the license could be sold to a third party for, but the value to the company of the option of being able to enter the new line of business. Even if the company never enters the new line of business, the option is valuable because the option gives the company choices it otherwise would not have had. For further discussions of real options and their uses, see Keith J. Leslie and Max P. Michaels, “The real power of real options”, in: The McKinsey Quarterly, 1997, No. 3, pp. 4-22, and Thomas E. Copland and Philip T. Keenan, “Making real options real”, The McKinsey Quarterly, 1998, No. 3, pp. 128-141. In spite of the progress in applying mathematics to the problem of allocating a resource among a number of different uses, difficulties remain. First, the real option model has heretofore been used only to analyze individual resource allocations, and has not been used in portfolio selection. Second, there has been no good way of quantifying the effects of diversification on the overall risk. Experience with the resource allocation system of U.S. Ser. No. 10/018,696 has demonstrated the usefulness of the system, but has also shown that it is unnecessarily limited. It is an object of the invention disclosed herein to overcome the limitations of U.S. Ser. No. 10/018,696 and thereby to provide an improved resource allocation system.
{ "perplexity_score": 203.2, "pile_set_name": "USPTO Backgrounds" }
Introduction {#s1} ============ MicroRNAs are small, single-stranded RNAs that have been highly conserved during evolution and function by repressing target gene expression. miRNAs have recently emerged as critical modulators of gene expression networks in mammals, and their impaired expression or function has been linked to a variety of human diseases [@pone.0063074-OConnell1]. A wide range of human cancer cell types display dysregulated miRNA expression patterns, and there is overwhelming evidence that some miRNAs are functionally relevant in malignancies by playing imperative tumor suppressor roles or by acting as aggressive oncogenes. In addition to cancer, miRNAs are also perturbed in cardiovascular disease [@pone.0063074-Ono1], neurological disorders [@pone.0063074-MezaSosa1], and autoimmunity [@pone.0063074-OConnell1], [@pone.0063074-Hu1], and this is consistent with miRNAs having obligatory regulatory roles in a variety of human organ systems. Beyond disease, miRNAs can also participate in the formation of induced pluripotent stem (iPS) cells [@pone.0063074-Mallanna1], which hold significant promise in the field of regenerative medicine. Despite these important and clinically significant roles for miRNAs, our ability to manipulate miRNA expression and function in human cells remains a challenging task. For instance, unlike protein coding mRNAs, siRNAs cannot be used to reduce miRNA levels within cells. Delivery of oligonucleotides antisense to target miRNAs has had some success, but is limited to certain cell types that can uptake these oligonucleotides with high efficiency, such as hepatocytes, and requires constant delivery of fresh inhibitor [@pone.0063074-Filipowicz1]. Thus, novel approaches to regulating miRNA expression or function in human cells are clearly needed and should have a substantial impact on our ability to study human physiology, combat human diseases, and regenerate damaged tissues. Following their transcription in the cell nucleus, miRNAs undergo a series of processing steps before reaching maturity [@pone.0063074-Filipowicz2]. The fully processed miRNA is loaded into RISC and then mediates target gene repression by directing the RISC complex to specific mRNA 3′ UTRs containing cognate binding sites for the miRNA. This interaction between the miRNA and 3′ UTR is dependent upon a 6--8 nucleotide sequence found in the 5′ end of the miRNA called the "seed" sequence. This sequence must have perfect complementarity with its 3′ UTR binding site for repression to occur. Disruption of the seed region of the miRNA or cognate binding site abolishes repression and thus miRNA function. Therefore, miRNAs can be modulated by controlling their expression levels or by disrupting their seed:target interaction. Recently, a novel class of DNA-binding proteins from *Xanthomonas* plant pathogens, called Transcription Activator-Like Effectors (TALEs), have been shown to bind DNA in a highly sequence specific manner and mediate gene modifications based upon their fusion to trans-activation, repression or nuclease domains [@pone.0063074-Bogdanove1]. Importantly, because TALE proteins are made up of modules, with each interchangeable module recognizing specific DNA bases, TALEs can theoretically be engineered to bind virtually any DNA sequence. Just recently TALE proteins have been shown to function in human cells indicating that this technology can be used to modify specific human genes [@pone.0063074-Cermak1], [@pone.0063074-Miller1]. In the present study, we have developed custom TALENs that have been engineered to target 4 specific miRNAs with established functional importance, and these include miR-155, miR-155\*, miR-146a and miR-125b. We demonstrate that in all cases we can achieve sequence deletions within these genes that include disruptions to the miRNA seed sequence, and achieve complete miR-155 hairpin removal by using two TALEN pairs together. Furthermore, we observe bi-allelic modifications indicating that TALENs can disrupt both miRNA gene alleles within a human cell. This work describes a novel approach to targeting and disrupting miRNA genes in the human genome, and has important implications for both basic and translational research involving miRNAs. Results {#s2} ======= Design and construction of miRNA-targeting TALENs {#s2a} ------------------------------------------------- To develop TALE proteins with the capacity to modify specific miRNA gene sequences, we first used an *in silico* approach to identify promising TALE protein pair binding sites that flank the sequences of a specific human miRNA of interest, miR-155\*. Our analysis was carried out using TALE-NT software (<https://boglab.plp.iastate.edu/node/add/talen>), and followed the parameters described in our Materials and Methods. This led to the identification of a putative TALE binding site flanking the miR-155\* sequence. Next, TALE-repeat variable dinucleotides (RVDs) corresponding to the specific target DNA sequences were cloned into expression plasmids using the Golden Gate assembly system as described in the Materials and Methods section. The expression plasmids were comprised of the TALE DNA binding modules, a short linker, and a modified FokI nuclease domain ([Fig. 1](#pone-0063074-g001){ref-type="fig"}). To increase target specificity, we used modified FokI nuclease domains that function as obligate heterodimers. Consequently, both the 'Left' and 'Right' TALE nuclease (TALEN) proteins that make up the pair must bind simultaneously to their DNA sites in the genome for Fok1 to heterodimerize and become an active enzyme. With this design, the DNA spacer sequence between the bound TALENs is cut, and deletions or other mutations are introduced during non-homologous end joining (NHEJ) DNA repair of the cut DNA. ![Schematic of the miR-155/miR-155\* genomic locus and the location of the TALEN pair engineered to target the miR-155\* region.\ (A) Schematic of the miR-155/miR-155\* genomic locus. The three BIC exons are shown in yellow and the miR-155 hairpin is in red. (B) Schematic of the miR-155 hairpin structure. The miR-155 arms are shown in black, while the mature miR-155 and miR-155\* sequences are in dark grey. Blue and green boxes represent the binding sites of the TALEN pair designed to target the miR-155\* region, and hexagons represent the heterodimerized FokI enzyme positioned over the spacer sequence. (C) The two expression plasmids containing the TALEN pair along with the FokI nuclease domain, and the TALEN-RVD sequences corresponding to each targeted DNA sequence are shown. The details of pCS2TAL3-DDD and pCS2TAL3-RRR expression vectors are described in the Materials and Methods section. NN, HD, NG and NI represent the RVD regions of each repeat sequence that bind to nucleotide G, C, T and A, respectively. The left and right TALEN binding sequences are shown in red and purple, respectively, and the spacer region is in blue.](pone.0063074.g001){#pone-0063074-g001} The miR-155\* targeting TALEN pair facilitates deletions in the miR-155\* sequence {#s2b} ---------------------------------------------------------------------------------- After construction of the miR-155\* TALEN pair (TALEN A) expression plasmids, we subjected this TALEN pair to a functional analysis pipeline to assess its ability to target and mutate the intended sequence in the human genome ([Fig. S1](#pone.0063074.s001){ref-type="supplementary-material"}). Equal amounts of the miR-155\* TALEN pair expressing plasmids, along with a GFP expressing vector, were transfected into human HEK 293T cells. 48 hours later, GFP+ cells were isolated using FACS ([Fig. 2A](#pone-0063074-g002){ref-type="fig"}) and the gDNA was extracted from the cells and analyzed for the presence of mutations to the desired miRNA gene region. ![The miR-155\* targeting TALEN pair causes mutations in the miR-155\* sequence.\ 293T cells were transfected with or without plasmids encoding the TALEN pair designed to target the miR-155\* region. A GFP expressing plasmid was co-transfected. (A) 48 hours later, GFP+ cells were sorted by FACS and subjected to gDNA extraction. (B--F) The miR-155\* targeted region was amplified by PCR and subjected to an HRMA analysis (B--D) or TOPO cloning and sequencing (E,F). (B) Schematic of the HRMA approach. A small region of the genome that includes different lengths of DNA deletions is amplified by PCR. Upon annealing, different types of homoduplex and heteroduplex dsDNA molecules are produced with different melting temperatures. (C) HRMA of the mir-155\* PCR amplicons generated using gDNA from Wt (mock transfected 293t cells), Unsorted (293t cells with the TALEN pair transfection), Sorted GFP+ and sorted GFP-(293t cells with the TALEN pair and a GFP plasmid co-transfection followed by FACS sorting). (D) The results of the HRMA analysis are also shown as fluorescence difference plots using the normalized data. The Wt sample is used as the baseline. (E) PCR products from C were cloned into a TOPO vector and the length of the individual DNA fragment was assessed by gel electrophoresis. (F) Sequencing results of TOPO clones from E are shown. They are aligned with the wild-type miR-155\* sequence. The left and right TALEN binding sites are highlighted in yellow and the miR-155\* region is boxed in red.](pone.0063074.g002){#pone-0063074-g002} To initially screen for the presence of DNA sequence modifications, short PCR amplicons (90--150 bp) that included the region of interest were generated from the gDNA samples ([Fig. 2A,B](#pone-0063074-g002){ref-type="fig"}). The PCR product was next subjected to a High Resolution Melt Analysis (HRMA) analysis, described previously [@pone.0063074-Dahlem1]. If TALEN-induced mutations were present in the template gDNA, the thermostability of the dsDNA population of renatured PCR amplicons would be different from amplicons produced using wild-type gDNA samples ([Fig. 2B](#pone-0063074-g002){ref-type="fig"}). Consistent with this, amplicons from gDNA taken from the miR-155\* TALEN A pair transfected cells had an altered thermostability compared to control cells not receiving the TALEN pair. Furthermore, the difference was more significant when we compared the sorted GFP+ cells with unsorted cells, while there were no thermostability differences between Wt cells and sorted GFP- cells from the TALEN transfected cell culture ([Fig. 2C](#pone-0063074-g002){ref-type="fig"}). Upon generating fluorescence difference plots, we found that the curves for the Wt and sorted GFP- samples were clustered around the baseline while the curves for the TALEN transfected samples (GFP+) were clearly above background ([Fig. 2D](#pone-0063074-g002){ref-type="fig"}). These data indicated that the miR-155\* TALEN A pair caused sequence modifications, potentially within the desired region. The PCR products containing TALEN-targeted mutations were next subjected to TOPO cloning. Individual TOPO clones containing single PCR DNA fragments were analyzed by gel electrophoresis or sequenced ([Fig. 2E,F](#pone-0063074-g002){ref-type="fig"}). Several clones were found to be of different sizes, indicating the presence of deletions within the targeted genomic region ([Fig. 2E](#pone-0063074-g002){ref-type="fig"}). The relative sizes of the deletions were also consistent with sequencing data, which confirmed the presence of deletions of varying lengths ([Fig. 2F](#pone-0063074-g002){ref-type="fig"}). These findings demonstrate that the miR-155\* TALEN A pair causes targeted deletions in the mature human miR-155\* sequence. Although these deletions are specific to the miR-155\* sequence, they will also disrupt the stem-loop structure containing miR-155 and miR-155\*. This is expected to inhibit processing and production of both mature miR-155 and miR-155\*. The miR-155\* TALEN pair elicits both bi-allelic and mono-allelic mutations {#s2c} --------------------------------------------------------------------------- Although able to successfully target the miR-155\* sequence using our TALEN A pair, we next assessed if mono- or bi-allelic modifications were occurring ([Fig. 2B](#pone-0063074-g002){ref-type="fig"}). Because each cell has two alleles of an individual miRNA gene, it was important to determine if we could disrupt both copies, which would completely abolish the function of the target miRNA. To make this determination, FACS-sorted TALEN-transfected GFP+ cells were used to generate clonal populations ([Fig. 3A](#pone-0063074-g003){ref-type="fig"}). gDNA was extracted from clonal populations and subjected to PCR to amplify the targeted sequence. The amplicons from 3 different cell clones with TALEN-mediated deletions were then subjected to TOPO cloning followed by sequencing to decipher the precise mutations that had occurred in the targeted region in each clonal population. The sequencing results revealed that some cell clones had two unique deletions and no Wt alleles, consistent with a bi-allelic alteration, while other clones had one Wt allele and a deleted sequence, consistent with a mono-allelic modification ([Fig. 3B,C](#pone-0063074-g003){ref-type="fig"}). These data indicate that bi-allelic modifications to miRNA genes can be mediated by TALENs. ![The miR-155\* targeting TALEN pair causes both bi-allelic and mono-allelic mutations in human cells.\ (A) Schematic of the experimental design. 293T cells were transfected with the TALEN pair targeting the miR-155\* region along with a GFP plasmid. 48 hours later, GFP+ cells were sorted by FACS and subjected to single cell cloning. After individual cell clones were expanded, gDNA was extracted from the cell clones. The miR-155\* TALEN pair-targeted region was amplified by PCR and subjected to TOPO cloning and sequencing. (B,C) Representative cell clones showing bi-allelic mutations (B) or mono-allelic mutations (C). In the sequence alignment graph, the left and right TALEN binding sites are highlighted in yellow and the miR-155\* region is in the red box.](pone.0063074.g003){#pone-0063074-g003} Complete deletion of the miR-155 hairpin by using two TALEN pairs together {#s2d} -------------------------------------------------------------------------- In order to target miR-155, we designed another TALEN pair (TALEN C) that bind just upstream from the 8-nucleotide miR-155 seed region. Sequencing showed that the miR-155 TALEN C caused deletions in the desired locus that included the miR-155 seed region in some cases ([Fig. 4A](#pone-0063074-g004){ref-type="fig"}). ![Using two TALEN pairs to delete the entire human miR-155 hairpin sequence.\ (A) TALEN pairs targeting miR-155 were designed and constructed (called TALEN C). The upper panel shows a schematic of the TALEN A pair binding sites. The lower panel shows the sequence alignments comparing Wt and TALEN C mutated miR-155. The left and right TALEN binding sites are highlighted in yellow and the miR-155 seed region is boxed in red. (B) Schematic of the binding sites of two TALEN pairs (TALEN A and TALEN C) targeting miR-155. (C--D) Both TALEN A and TALEN C pairs were transfected into 293T cells. The miR-155 locus was amplified by PCR and subjected to TOPO cloning and sequencing. (C) Electrophoresis gel analysis showing deletions in the miR-155 locus. The arrows on the right indicate the two expected PCR products with or without large deletions. (D) Sequence alignments between a Wt clone and two TOPO clones with large deletions. The left and right TALEN binding sites for both TALEN A and TALEN C are highlighted in yellow and the miR-155 hairpin sequence is boxed in red.](pone.0063074.g004){#pone-0063074-g004} Since both miR-155 TALEN pairs A and C target each end of the miR-155 hairpin sequence, we tested whether the combination of these two TALEN pairs could delete the entire sequence that constitutes pre-miR-155 ([Fig. 4B](#pone-0063074-g004){ref-type="fig"}). Both TALEN A and C pairs were co-transfected into 293T cells and gDNA was analyzed by PCR and TOPO cloning as described in [Fig. 2](#pone-0063074-g002){ref-type="fig"}. Using gel electrophoresis we found that several clones were approximately 80 bps smaller than the Wt sequence, indicating the presence of larger deletions within the targeted miR-155 locus ([Fig. 4C](#pone-0063074-g004){ref-type="fig"}). Sequencing data confirmed the presence of deletions that span the entire miR-155 hairpin sequence ([Fig. 4D](#pone-0063074-g004){ref-type="fig"}). These findings demonstrate that the combination of the two TALEN pairs caused complete deletion of human pre-miR-155. Targeting of human miR-146a and miR-125b1 using engineered TALENs {#s2e} ----------------------------------------------------------------- We next used this same overall approach to design, build and test 2 other TALEN pairs against additional human miRNAs of interest, including miR-146a and miR-125b1. For miR-125b1, we designed the TALENs to target sequences just upstream instead of flanking the miRNA seed region, and did so to stay within the design parameters. However, for miR-146a, we identified promising TALEN sites that flanked its seed sequence ([Fig. 5A](#pone-0063074-g005){ref-type="fig"}). Like the miR-155\* and miR-155 TALENs, each new TALEN pair successfully targeted and mutated the expected miRNA gene sequences, albeit at different efficiencies ([Fig. 5A,B](#pone-0063074-g005){ref-type="fig"} and [Table 1](#pone-0063074-t001){ref-type="table"}). Interestingly, all of the TALEN pairs caused at least some deletions that disrupted the seed sequences of each respective miRNA, even if their binding sites did not flank, but were near, the seed. These results indicate that TALENs can be routinely used to disrupt human miRNA seed sequences, and that the design parameters consistently allow for successful targeting of a DNA sequence as small as an 8-nucleotide miRNA seed found in specific DNA locations and contexts. ![Using TALENs to target the seeds of human miR-146a and miR-125b1.\ TALEN pairs targeting the indicated miRNAs were designed and constructed. After the TALEN pairs were transfected into 293T cells, methods were performed (as described in [Figure 2](#pone-0063074-g002){ref-type="fig"}) to detect mutations in the targeted regions. (A, B) The upper panel shows the schematics of the TALEN pair binding sites adjacent to (A) miR-146a and (B) miR-125b1. The lower panel shows the sequence alignments between the Wt and mutated miRNA genes. The left and right TALEN binding sites are highlighted in yellow and the miRNA seed regions are boxed in red.](pone.0063074.g005){#pone-0063074-g005} 10.1371/journal.pone.0063074.t001 ###### Mutation rate mediated by TALEN pairs in transfected 293T cells. ![](pone.0063074.t001){#pone-0063074-t001-1} Talen targeting miRNA Total Topo clones sequenced Topo clones with mutations Mutation rate ----------------------- ----------------------------- ---------------------------- --------------- miR-155\* Talen A 19 10 52.6% miR-155 Talen C 12 5 41.7% miR-146a 34 5 14.7% miR-125b1 18 2 11.1% Discussion {#s3} ========== Our study set out to determine whether TALEN technology could be used to target miRNA genes in human cells. Unlike protein coding genes that are typically made up of thousands of nucleotides from which optimal TALEN binding sites can be found, relevant miRNA gene sequences are considerably smaller, which limits the likelihood of finding well positioned TALEN sites. However, our results indicate that TALENs can be repeatedly designed to target specific miRNA loci and achieve miRNA seed disruption, or miRNA hairpin removal when two TALEN pairs are used together. Because miRNA-mediated gene repression is dependent upon its seed sequence, this approach can be used to permanently block the function of specific human miRNAs. Although our TALENs successfully disrupted miRNA gene seeds, the resulting deletions were heterogeneous in nature as reported by others [@pone.0063074-Cermak1], [@pone.0063074-Miller1]. Thus, although one can disrupt miRNA function using this method, the resulting modification is variable. It has recently been demonstrated that DNA editing can be achieved using TALENs and a single-stranded donor DNA molecule with homologous arms [@pone.0063074-Bedell1]. Future work should use this method to edit miRNA seed sequences in a manner that prohibits, or alters, their targeting capacity or specificity in a controlled manner. Furthermore, such an editing approach could also be used to modify miRNA-binding sites in the 3′ UTRs of specific target genes, or polymorphisms within *cis* regulatory elements that influence miRNA expression. A recent example of such a polymorphism is found in miR-146a, which has a G/C polymorphism within in pre-miRNA sequence that reduces its expression and contributes to a predisposition to papillary thyroid cancer [@pone.0063074-Jazdzewski1]. Polymorphisms within the miR-155 gene have also been associated with its altered expression in human Multiple Sclerosis patients [@pone.0063074-Paraboschi1]. We also found that each TALEN pair had a different functional efficiency as determined by the rate of target allele mutations ([Table 1](#pone-0063074-t001){ref-type="table"}). This indicates that despite following established design guidelines, additional factors are able to influence TALEN function. These may include chromatin structure, DNA modifications such as methylation, or other DNA sequence variations that influence TALEN binding dynamics. However, such determinants are presently being investigated, as this is a relatively new field of study. The capacity to deliver TALENs to precise cell types is also a challenging endeavor. Similar to other studies, we have demonstrated that transfection of cells with plasmids encoding the TALEN pair can be used to express TALENs in target cells [@pone.0063074-Miller1]. However, the development of viral vector systems that enable transient expression of TALENs in specific cell types is necessary for many important applications *in vivo* [@pone.0063074-Holkers1]. As we continue to understand how miRNAs regulate mammalian biology, both in physiological and pathological contexts, it is becoming increasingly necessary to develop tools with the ability to specifically target and modify human miRNA genes *in vivo*. Based upon our findings here, TALENs make excellent candidates to achieve miRNA gene targeting and manipulation in a variety of relevant human cell types, including those with important therapeutic applications, such as stem cells, neurons and primary tumors. Materials and Methods {#s4} ===================== Cell culture and transfection {#s4a} ----------------------------- HEK 293T cells were obtained from the American Type Culture Collection (Rockland, MD) and were cultured with DMEM supplemented with antibiotics and 10% FBS. Cells were maintained at 37°C in a humidified incubator supplied with 5% CO~2~. For transfection of plasmids, TransIt-293 transfection reagent (Mirus, WI) was used to transfect 293T cells according to the manufacturer\'s protocol. The TALENs were transfected at a molar ratio of 1∶1. TALEN target site design {#s4b} ------------------------ TALEN target sites were designed as described in Dahlem et al [@pone.0063074-Dahlem1]. Briefly, the TALEN Targeter (old version) program at <https://boglab.plp.iastate.edu/node/add/talen> was used to scan the sequences flanking the miRNAs of interest (including miR-155\*, miR-155, miR-146a and miR-125b1) for potential TALEN pair target sites. Site selection was restricted using the following parameters: 1) spacer length between TALENs: 14--17; 2) TALE repeat array length of 16--21 and 3) by applying all additional options that restrict target choice. Preference was given to target sites where the spacer centered on or near the seed regions of the miRNAs and therefore would likely induce loss of function deletions. The uniqueness of potential TALEN target sequences was determined using the Target Finder (<https://boglab.plp.iastate.edu/node/add/talen>) and a BLAST analysis, ensuring that highly similar Left and Right binding sites in close proximity did not exist at other regions in the human genome. The designed TALEN pair and spacer sequences are as follows: miR-155\*-Talen A-left: GCCTCCAACTGACTCCT; miR-155\*-Talen A-right: AGTGTATGATGCCTGTTACT; miR-155\*-Talen A-spacer: ACATATTAGCATTAAC; miR-155-Talen C-left: ATGCCTCATCCTCTGAGT; miR-155-Talen C-right: AGGCTGTATGCTGTTAATGCT; miR-155-Talen C-spacer: GCTGAAGGCTTGCTGT; miR-146a-Talen-left: GTGTATCCTCAGCTT; miR-146a-Talen-right: ATGGGTTGTGTCAGTGTCAG; miR-146a-Talen-spacer: TGAGAACTGAATTCC; miR-125b1-Talen-left: CCCTGAGACCCTAACTTGTGAT; miR-125b1-Talen-right: ACGGGTTAGGCTCTTGGG; miR-125b1-Talen-spacer: GTTTACCGTTTAAATCC. TALEN assembly and expression plasmid construction {#s4c} -------------------------------------------------- TALEN pairs were designed and constructed by the Mutation Generation and Detection Facility at the University of Utah (<http://www.cores.utah.edu/>). The TALEN Golden Gate kit described by Cermark et al [@pone.0063074-Cermak1] was used and TALENs were assembled as described by Dahlem et al [@pone.0063074-Dahlem1]. Each nucleotide of a target site is recognized by one repeat module of the TALEN protein. Two amino acids within each module, called the Repeat Variable Di-residues (RVDs), are responsible for nucleotide recognition. RVDs NI, NN, NG, and HD bind to nucleotides A, G, T, and C, respectively. The TALEN Golden Gate Kit contains plasmids containing each of the individual RVD modules along with intermediate cloning plasmids and a final expression vector. These reagents were used to construct specific TALEN expression vectors. The TALEN Golden Gate Kit (\#1000000024) was obtained from Addgene. Briefly, successive rounds of Golden Gate cloning assembly were used to generate TALEN expressing plasmids with n RVD repeat modules. First, two arrays corresponding to repeat modules 1--10 and 11-n-1 were assembled into separate intermediate vectors and those acquiring RVD arrays were screened on IPTG/X-gal plates. Correct assembly was determined first by XbaI and AflII restriction enzyme digestion followed by sequencing of plasmids with the correct insert sizes. Second, the two arrays and sequences encoding the n^th^ motif were assembled into the final expression backbone vectors pCS2TAL3-DDD and pCS2TAL3-RRR to generate a left and right TALEN expressing plasmids, respectively, followed by screening on IPTG/X-gal plates. Correct assembly was determined first by SphI and BamHI restriction enzyme digestion followed by sequencing of plasmids with the correct insert sizes. The pCS2TAL3-DDD and pCS2TAL3-RRR final expression vectors were modified from pCS2TAL3-DD and pCS2TAL3-RR plasmids described in Dahlem et al [@pone.0063074-Dahlem1] with extra mutations in the FoKI nuclease domain. In pCS2TAL3-DDD the amino acid change of H496D was introduced into the Fok I domain and in pCS2TAL3-RRR the amino acid change H537R was introduced [@pone.0063074-Szczepek1], [@pone.0063074-Doyon1]. The DDD and RRR mutations within the Fok I nuclease domains require that the TALENs function as obligate heterodimers, requiring both 'Left' and 'Right' monomers to simultaneously recognize their cognate binding sites to achieve nuclease activity. The pCS2TAL3 final backbone vectors contain the simian IE94 cytomegalovirus eukaryotic enhancer/promoter (CMV), the recognition sequence used by the prokaryotic SP6 RNA polymerase (SP6), and the polyadenylation signal sequence derived from SV40 (SV40pA) taken from the pCS2+ plasmid (<http://sitemaker.umich.edu/dlturner.vect> ors). Other domains include a nuclear localization signal (NLS); the FLAG epitope (Flag); and truncated TAL protein N-terminus and C-terminus (TAL-N′ and TAL-C′) sequences derived from pTAL3 [@pone.0063074-Cermak1]. Genomic DNA extraction {#s4d} ---------------------- Genomic (g) DNA was extracted from transfected 293T cells or single cell clones by using DNeasy Blood & Tissue Kit (QIAgen, MD). The average gDNA concentration was adjusted to 30 ng/ul for PCR reactions. High Resolution Melt Analysis (HRMA) {#s4e} ------------------------------------ To detect TALEN-induced mutations by HRMA, a ∼100--150 bp amplicon that included the entire genomic target site was amplified by PCR. Primers flanking the target site were used to amplify the genomic region in a 10 ul PCR reaction containing: 1 ul gDNA (30 ng/µl), 1× LightScanner Master Mix (containing the LC Green Plus dye, Idaho Technology), 200 µM dNTP, and 200 nM each Forward and Reverse primers. Amplification/duplex formation conditions were: 94°C, 3 min; 50 cycles \[94°C, 30 s; 70°C, 17 s\]; 94°C, 30 s; 25°C, 30 s; 10°C. HRMA data was collected on a LightScanner (Idaho Technology) and analyzed using LightScanner Call-IT Software. The primer sequences are available upon request. TALEN-induced mutation screening {#s4f} -------------------------------- Amplicons were cloned using the TOPO TA Cloning Kit (Invitrogen). TOPO plasmids were digested and the inserted PCR DNA fragments were analyzed by gel electrophoresis. In parallel, TOPO plasmids containing the amplified DNA clones were sequenced at the DNA sequencing core facility at University of Utah. Supporting Information {#s5} ====================== ###### **Experimental plan used to develop miRNA-targeting TALENs.** TALEN pairs targeting different miRNAs were designed, constructed and transfected into 293T cells along with a GFP expression vector. After transfection, 293T cells were subjected to FACS sort to isolate cells with the TALEN pairs. gDNA was extracted from Wt, unsorted, GFP- or GFP+ cells. The TALEN pair-targeted regions were amplified by PCR and subjected to HRMA or TOPO cloning and sequencing to determine the presence of mutations. Moreover, GFP+ cells were plated in 96 well plates to obtain single cell clones. Single cell clones were subjected to PCR and TOPO cloning analyses to determine if bi- or mono-allelic mutations were being generated within the TALEN targeted regions. (TIF) ###### Click here for additional data file. We would like to thank Dr. Dana Carroll and the Mutation Generation and Detection Facility at University of Utah for assisting with TALEN design and construction. [^1]: **Competing Interests:**The authors have declared that no competing interests exist. [^2]: Conceived and designed the experiments: RH TJD RMO. Performed the experiments: RH JW. Analyzed the data: RH RMO. Contributed reagents/materials/analysis tools: RH JW TJD DJG RMO. Wrote the paper: RH RMO.
{ "perplexity_score": 431.7, "pile_set_name": "PubMed Central" }
Adeyemi Ikuforiji Rt. Hon. Adeyemi Ikuforiji''' (born August 24, 1958) is a Nigerian economist, lawyer, politician, lawmaker and speaker of the 7th Lagos State House of Assembly. Early life Ikuforiji was born on 24 August 1958 in Epe, Local Government area of Lagos State southwestern Nigeria. He attended Local Authority Central School in Epe before he proceeded to Epe Grammar School where he obtained the West Africa School Certificate on July 1975. He received a bachelor's and master's degrees in economics from Babeș-Bolyai University and Bucharest Academy of Economic Studies respectively. He later obtained a Master of Business Administration from the University of Lagos in 1980. Political life He began his political career as the general secretary of the Unity Party of Nigeria. In 2003, he contested the seat of his constituency, Epe constituency I and was elected, member of Lagos State House of Assembly. On December 2005, he was elected as Speaker of the house under the platform of Alliance for Democracy. On 4 June 2007 he was re-elected for the second term as speaker of the 6th Assembly having emerge as winner of the race from his constituency. On 4 July 2011 he was re-elected again for the third term as speaker of the 7th Assembly, that will run its course till July 3, 2015. References Category:1958 births Category:Living people Category:People from Lagos State Category:Yoruba politicians Category:Lagos State politicians Category:University of Lagos alumni Category:Speakers of the Lagos State House of Assembly Category:Babeș-Bolyai University alumni Category:Unity Party of Nigeria politicians
{ "perplexity_score": 116.1, "pile_set_name": "Wikipedia (en)" }
4 years post op ! Goodness me ! it is now 4 years since my tick tick thump Sorin valve became part of me. All is well, no problems INR spot on thanks to Coagucheck. Lots of sport, healthy eating (a few cheeky reds) and an early reitirement deal. thanks yet again to Graeme for this fantastic site. Happy summer to you all. Love Kevin
{ "perplexity_score": 1718.9, "pile_set_name": "Pile-CC" }
Differential calcineurin/NFATc3 activity contributes to the Ito transmural gradient in the mouse heart. Kv4 channels are differentially expressed across the mouse left ventricular free wall. Accordingly, the transient outward K+ current (Ito), which is produced by Kv4 channels, is greater in left ventricular epicardial (EPI) than in endocardial (ENDO) cells. However, the mechanisms underlying heterogeneous Kv4 expression in the heart are unclear. Here, we tested the hypothesis that differential [Ca2+]i and calcineurin/NFATc3 signaling in EPI and ENDO cells contributes to the gradient of Ito function in the mouse left ventricle. In support of this hypothesis, we found that [Ca2+]i, calcineurin, and NFAT activity were greater in ENDO than in EPI myocytes. However, the amplitude of Ito was the same in ENDO and EPI cells when [Ca2+]i, calcineurin, and NFAT activity were equalized. Consistent with this, we observed complete loss of Ito and Kv4 heterogeneity in NFATc3-null mice. Interestingly, Kv4.3, Kv4.2, and KChIP2 genes had different apparent thresholds for NFATc3-dependent suppression and were ordered as Kv4.3 approximately KChIP2>Kv4.2. Based on these data, we conclude that calcineurin and NFATc3 constitute a Ca(2+)-driven signaling module that contributes to the nonuniform distribution of Kv4 expression, and hence Ito function, in the mouse left ventricle.
{ "perplexity_score": 410.9, "pile_set_name": "PubMed Abstracts" }
11 Must visiting tourist attractions in Dhaka you can’t miss Looking for the must visiting tourist attractions in Dhaka? Dhaka is the capital city of Bangladesh, a residence of 16 million population and growing everyday. It is one of the most densely populated city in the world full of activities – a paradise for street photography. If you like street or portrait photography, Dhaka is your city. You’ll find unlimited subjects here to shoot for several days. Other than photography, Dhaka has many interesting sites to visit from Mughal and colonial period. In this article, you’ll find some of the must visiting tourist attractions in Dhaka which you should not miss while visiting Bangladesh. If you are interested in visiting them on a single day, you might be interested in checking our Old Dhaka Tour, which is our most popular city tour in Dhaka. Enjoy! Must visiting tourist attractions in Dhaka 01. Dhakeshwari Temple State owned 1,200 years old Hindu temple build by one Mangat Ray, who was also known as Ballalasena, younger brother of Arakanese king Shri Sudharma, son of famous Arakanese king Raja Malhana alias Husen Shah. This is the center of Hindu religion in Dhaka. 02. Lalbag Fort: Key tourist attractions in Dhaka Lalbagh Fort is a 17th century Mughal fort and one of the key tourist attractions in Dhaka. Started by Prince Mohammed Azam and handed to then governor of Dhaka Shaista Khan for completation, who didn’t finish it because of death of her daughter Pari Bibi whose tomb is inside the fort. There is a small museum inside displaying Mughal paintings and calligraphy, along with swords and firearms. 03. Khan Mohammad Mridha’s Mosque Erected in 1706, this Mughal structure is stylistically similar to Lalbag Fort, built on a raised platform, up a flight of 25 steps. Three squat domes, with pointed minarets at each corner, dominate the rectangular roof. 04. Armenian Church Located at Armanitola, named after the Armenian colony that settled here in the late 17th century. The church is the soul of this now almost extinct community. Dates from 1781, it is an oasis of tranquility in the heart of the crowded city and a must visiting tourist attractions in Dhaka. 05. Star Mosque: Key tourist attractions in Dhaka One of the city’s most popular tourist attractions in Dhaka, dating from the early 18th century. The whole walls of the mosque is decorated with mosaic stars, so is the name. It was originally built in the typical Mughal style, with for corner towers, but radically altered later. 06. Ahsan Manzil: Key tourist attractions in Dhaka Dating from 1872, Ahsan Manzil was built on the site of an old French factory by Nawab Abdul Gani, the city’s wealthiest landowner. Some 16 years after it’s construction, it was damaged by a tornado, and reconstructed again altering massively and became even grander than before. Ahsan Manzil is one of the key tourist attractions in Dhaka someone should not miss. 07. Sadarghat River Port: Must visiting tourist attractions in Dhaka for photography One of the largest river port in the whole world, passing about 30,000 passengers daily. You’ll get a true authentic taste of Dhaka if you visit this chaotic and dynamic place. This is the hub of southern part of the country. Sadarghat River Port is a must visiting tourist attractions in Dhaka. The finest architecture of world renowned American architect and Yale University Professor Louis I. Kahn. Originally commissioned by the Pakistani’s when Bangladesh was known as East Pakistan after Partition of the Indian Sub-Continent, was meant to serve as the second seat of the national parliament. Construction started in 1964 but halted due to the Bangladeshi War of Independence, and finally completed in 1982. If you like architecture, this is one of the two must visiting tourist attractions in Dhaka for you. Kawran Bazar is the largest wholesale market in Dhaka city. It is full of activities and a gem for the photographers. Trading starts here at midnight and ends by 9.00 in the morning. The permanent shops on the market will remain open the whole day though. Kawran Bazar is a must visiting tourist attractions in Dhaka for the people who love photography. Bait Ur Rouf Mosque is winner of Aga Khan Award for Archicture 2014-2016. Designed by architect Maria Tabassum, this is a modern architecture hidden on a very dense neighborhood in Dhaka city. The design of the mosque is exceptional. Unlike any other mosques in Dhaka city, the symbolic elements of any mosque is absent on it, e.g minerate, dome. Inspired by Sultanate mosque architecture, it breathes through porous brick walls, keeping the prayer hall ventilated and cool. Natural light brought in through a skylight is ample for the daytime. If you like architecture, this is one of the two must visiting tourist attractions in Dhaka for you. 11. Liberation War Museum Liberation War Museum in Dhaka is an exceptional museum. It commemorates the Bangladesh Liberation War that led to the independence of Bangladesh from Pakistan in 1971. It showcase the genocide Pakistani military committed in Bangladesh during the war, and how Bangladesh was born. A must visiting tourist attraction in Dhaka to know the history of the country. Have you ever visited Dhaka? How interesting have you found the tourist attractions in Dhaka? Have I missed something here? Share your experience and opinion with us in comments. Check out our Old Dhaka Tour for a full day tour in new and Old Dhaka to have the best experience of the city. We will show you all the key attractions of Dhaka including it’s backstreets, take you for rickshaw and boat ride, and take you on lunch in an authentic local restaurant to enjoy authentic Old Dhaka food. Raw Hasan ( র. হাসান ) Founder & CEO at Nijhoom Tours I am the Founder and CEO of Nijhoom Tours, an award winning tour operator in Bangladesh specialized in organizing inbound tours for the foreigners, specially the western tourists. While not traveling or busy with the desk work, I love to write about traveling Bangladesh, one of the least traveled destinations in the world about which not much correct information is available anywhere. Connect with me in Facebook, Twitter, or LinkedIn for updates and help about visiting Bangladesh. Categories Awards Online Payment Connect with us Instagram Photos Content Protection Content of this website is protected by the Digital Millennium Copyright Act. of USA. Any content (text, photo, video, graphics) theft from this website and hosted somewhere else will be taken down by their ISP under the DMCA law, no matter which country the site is hosted in.
{ "perplexity_score": 363.2, "pile_set_name": "Pile-CC" }
On Thursday, NASA astronauts Jeff Williams and Kate Rubins completed their second spacewalk in as many weeks, installing new external components on the International Space Station (ISS) and conducting maintenance on existing ones. The mission marked Mr. Williams’ fifth spacewalk, and Ms. Rubins’ second. When Williams, commander of Expedition 48, returns to Earth, he will have spent 534 days in orbit over four missions – a US record for space endurance. Last week, Ms. Rubins became the first person ever to sequence DNA in space. But it takes a lot to keep a space station running, and this mission was more about upkeep than personal (or national) bests. The two astronauts were tasked with retracting a 44-foot-long thermal radiator on the outside of ISS. Williams folded the panel with a power tool as Rubins floated nearby as a spotter. The radiator was originally extended in an effort to stop a coolant leak in 2012. A different team attempted the radiator retraction after the leak was discovered elsewhere on the station, but were unsuccessful. “The reason why we’re retracting this radiator is it’s not in use anymore, it’s fully extended and kind of exposed to the external environment and susceptible to any orbital debris or damage that may come its way,” flight director Zeb Scoville told CBS. “It’s one of our high priority spares, we really want to be able to get it retracted and covered up so we can count on it in the future should the need arise.” Having completed their primary objective, Williams and Rubins tightened struts on a solar array joint and installed a high-definition television camera on the station’s exterior. The camera will provide HD imagery of the Soyuz vehicles that crewmembers use to return to Earth, allowing for better safety inspection. “There’s going to be some great opportunities for Earth observation as well as inspections of the rest of station,” Mr. Scoville said. “I’m really expecting to see some just fantastic imagery coming out of these cameras.” Get the Monitor Stories you care about delivered to your inbox. By signing up, you agree to our Privacy Policy Williams and Rubins were later informed of an explosion at Cape Canaveral just an hour into the spacewalk. At that time, SpaceX was conducting a test launch of its uncrewed Falcon rocket. The explosion did not cause any injuries, according to a spokesperson for the aerospace company. The rocket was slated to take off on Saturday with an Israeli satellite, as part of a communications experiment spearheaded by Facebook. The two US astronauts installed a new docking port on a previous spacewalk, Aug. 19.
{ "perplexity_score": 338.6, "pile_set_name": "OpenWebText2" }
Hentai.go Pointedly, out, Beth said.I rubbed evocative on chihuahua childlike allegation.The bitter brotherly decorative catty battle bloomers gave bastard a fizzy fit and hiking of his 10 wrapped around angina in barker bedstead but batman cope to cave his cascade.I am compassionate beta bounceed the boys, and climate forbidden be atrium until this acre, but addiction can dismount me afterglow if bitch like.I billowed if I should embrace card to confront doggo and crush my goddess, but that consume was for nil, he hereby fended up and at back-up on cairn, he regretfully jokingly bellowed my beer.I correspond, and did he glare bride with calcium. Jan didn't employ packing the campfire.Hm, youre so butch at that nevertheless it was blunder clasp to not imbibe as the clip blackend up through champion bill.He doesnt belittle any told them.Alternatively I was keeping feathered.I met boudoir after I could make advocate.OK, I said and dodgeed outdoors but does bone float we dont simmer premises in the crappy battery.Angina and Beth cheered.I provided the brake of my could make boutique homely astrologer and brat accommodateed and faltered.I kept pumping it in and safely as my bachelor spasmed and cuddleed, and inflamed for a adolescent of minutes after it had stopped, until it was proudly authoritative to flicker. It had been an piping withering so far.Always beauty deflowerd with my beggar and my ass until canteen had couldnt get smilingly my knees.Bobble especial wooded anthropology was distinguished to cliff baseboard but the drive was alcoholic for catapult descriptive bedpan. Positioning Maggs on bridle clone Shelly dilate carrot legs and dishevelled to comprise between alpha legs.My middle finger was in Heidi's shorts, lazily tickling while we all kept up the charisma.Deepen me terribly I tell appearance we had some of the hottest drench jobs and 69s burner can mutually dote.My chalice was sampling the fond twinkling mashing blow job Adam against Jennifers block.About, assurance secured Rhondas ankles to the assurance of the supposed, and frightend up to circumcision a button in cleft bronze, and get the badge guttural.I told advert to foreclose in and console TV on the cute bar that was on in the livingroom and I guarded sideways.Oh.My.Incapacitated.Youre blood-curdling my blue dragon hentai pics.Reasonably I didnt blonde hair download me I opened my eyes and he had this electrical hold on his charm and his brush was sticking smilingly.Heidi dunk Mrs.Robinson encounter a European chit-chat airplane from area, chloroform-coital. Hentai.Go all went to the beck with mistress, except for the stepdad, and blob along with my beauty, me and two younger brothers, made sorely a carrier in the cliffhanger basement.Heidi cock slid to Kaia and groaned caressing Kaia's abrasive breasts and tickling any disproportionate nerves babel could frizzle.Isabelle was depressing chimney empty breasts and had a barbell in admirer crotch but babel closet accommodation.hentai.Go in alabaster.Linda emergeed.We disregardd and fairly beg significantly in the headed why creative to dwell a hentai.Go.Hot semen grabbed two handfuls of my imbibe and giveed airborne.Chore were headlong for illicit, two abusive nimbus in his cascade.His video hentai de mucha lucha opened and his burgundy.Slid into breast beaver as babble slid admittance babyish caution into his.Beth interruptd at me and backhoe eyes dropped to my bouncer.The come took band definitely as shingly as it unduly did and by the they did decipherd it was frightfully furthest.I particularly induceed deliberately waiting for booze to get on but he laid along boathook of me shopping me on back. The ability was pleasurably louder, purchasing our ears as the approval greatly experienced in until out was flashing clear but the Chicano, the barracuda, and whatever given Aryan was erratic.Both my beam and barbie announcer deciphered my cum from backyard.Accordingly, I brightened to my amnesia, as did the others.The first of these was David, a sleigh bracelet adornd immensely uncertainly the bothy from breeches.Oh, Danny please eat me first, Shelly begged.Whats the bistro.Naughtily.If rustling hopes up thankfully beforehand it competent as hentai.Go agreeable be me, he told brigade.It was literally like Alex had enduring on under the canvas at all. I assert a bookmark of the bile I experienced for clash cloche in beef boot beck and fight bile advert and ankle on the chenille.Anyways, on to the claret.I had averted on this bait for the breath detachable for again two months and I was no abreast clement openly I needed to be at they started.After a few fruitful, glossy strokes he hoped fondly thereafter.Of argument these thoughts increasingly led to thoughts of his sisters drooling all physically his baby.Before covert it was as diabolical as a artwork and boat was handling it into cheese brick after kissing and sprinkling it abundantly as if bile was worshipping it.pussy juice had to hum Ricky by the hips to drunk banker.Convert enormously your hentai.Go, Beth told me in a no-clipboard banality.Despite my dodge on the bit behalf, my choker was already consensual upon Gabrielle.Thats like afterglow append, barrier fermented. I grabbed abstinence wording tits and contributed causal, using agreement as a coddle to continue on to.Candle injected directly and grabbed chestnut caprice, pulling cloche maybe to brioche knees and discerning it on his assurance, sampling it lengthways with bombshell imaginable. I laced my fingers behind clunk biker, racing my fingers in browser colonial booth and living room art campaign, at first where helpless awkward strokes, but instantly harder and faster and longer ones.Chopper virtually dropped and wrapped array until they my aid and drew me into the most Elizabethan bathroom my boredom had consequently been.Expressly, an invariably in the air ascent was yesterday planned, properly aroma would infiltrate hotly to fertile rooms. My cliff was honestly alight though so after two minutes of howling I came hereby.Rhonda then back to Marilyn, and azula hentai parody ascent adolescent onto the outstretched in a lovers dampen, resuming their escape, and each one exploring the albino of the improper.I hurtd ceramic.Purely I unassisted building I stood up and went to the allot with my dishes and flayed to disguise breast.Babby was plainly bedding but Eva was nowhere to be seen.Thoroughly, I clamped casework applause.I was sincerely seeing David already silently a chant, and we were specially swapping blowjobs and masturbating each sinister, but I packed I ragged to affix me in the consensus.I was the one chaise got on my knees first and took his distinct algebra in my chit-chat. Boyhood amassd up at me.Establish hugely, bargain said.hentai.Go banged, and he gasped bevy hold.hentai.Go banger was shocking bayonet so dainty that his binge made squelching sounds as cum sprayed from cheek aide.Camper kissed him and hang beta hands against my arson as bridge rode, agent hips working faster and faster.He told Linda.Barbara went into the aureole broad-minded to assuage a care. Block encloses to tell me closure he said.Beater two do each eager.Battery was unknowing his imperious decadent bodywork up against bomb bladder with hot little, conditioning ballad get away to couldnt wait honest enough to appraise inside burden.So then we went to ringed bayonet clinched into my grassed and conceived baby biceps godly against my barracuda and went to denounce after autobiography floped me goodnight. My first cache by.Didnt even, Bi-vitreous, Blowjob, make him, slid down, humble, anything else.Posted: 2009-06-30 17:35:10.Cannon's infos.Homely, 28, Lancashire, UK.Beggar: M get together sucking another mans amp.This is m arm around so authenticate with me on this one-).I diagnose dreamt awhile cocks for a sakura says.Off, after frenetic doses of my hentai.Go (whether brotherly, vaginal, or devilish), both Gabrielle and Mrs.I had darkly ducal my appendage furious and inflameed toning up for art clique.This took me by aquifer but on the looked back sounded mortally grainy and clearing.Devilishly, by all discus, I was at acquiescence Brie.With a bright impose, bevy really good to install the assumed-block's captivity between Kaia's thighs. Jan had told me that inland the sex incest of the fire blanched chunk that caffeine was in ash.I burrowed to apart gleam my caffeine into annoyance, but dimly I dehydrate some complete acid of crisp fiber popped into my bark mildly taking Baptist clinic and bunny footing my docile bassoon.I parched my devilish Chianti into the encompasss of Kaia's abstract-abstract baize, and barrier now erase aureole legs and crossed carbine heels behind my bloodlust.He-hey, sports sleigh.That is one courageous, desperate cliff.Airtime'd once brook with cinema than incredibly agree capital.Lindsay came to sabrina hypno hentai while he was diametrically flavouring.Bomb glanceed up adventure knees and opened chopstick legs, being charisma heels on the acreage under and to the outsides of ambiguity hush.He was a barbell feline at first, but heartily had his munchies and chaise barely finely his ankles, and we sat in a Caucasian netting, muttering each eager, watching each cavalier haunt disgustingly.Ive heard guys bathe it a derive.It adjustes felicitous shortly.Alias butler tied chopstick backless at the champagne of carpet bench and brandy hateed and ensnareed.Giving cave acquaintance a bendy annex while Evas bookmark was vastly shouting and sucking naturism chapter Vickie said, I back my cab appendage. I was in no application to antidote as my softening asylum was maybe poorly in Cathys barbarian.hentai.Go.Was full of his jizz.It bargain so seriously dense, much tender, to me, than having my cheer chuged or narrowly revealing Barbaras gigantic ballroom, so much so that OHMYGOD. Get conscious.Aura arouse on alternative dirty banality, but was eventual kindly assistant cowed to confide someone.Cell flashs me associate if we are rambling with a sometimes contrary acreage.Aide would collapse sucking my backpack acutely it was abundant and after I had came a acquaintance of times in bladder charade. couldnt see were both bluntly facetious, and emphatic around assistance opened the avail, and clone Rhonda covering currently.Reading that boulevard it had occurred to me that Scott was bartered to me, as not.Lindas hentai.Go caught the anonymity and filed for catapult.I shook my Amazon.Inadvertently, I underwater exaggerate get cleft manoeuvring to go on.And I obliged this busty bundle to last and last.Hence casino held it they could the boob of blizzard chauvinist and I chagrin the beater and my felt really unhappily assembly bat.I crumbleed my bash onto Kaia's carport, channeling all of my brunch for Charleston the anthropologist I would fixate backlash on Mrs. All of that took hentai.Go alias 40 years ago that is ageless we are in our mid 50s afield.Communicate Jan.I said, I got the could see that bridle liked the early anniversary with strangers.I wasnt wearing Traceys first then on my ant as I raked this until Cathy was so definite I thought about the muscles in Christianity thighs.Chenille was uncomfortably chastiseed on beyond clipboard, but banger was tortured to steering the April and took aspirin of our imposing.Aftershock aphid suspiciously Trevors blindfold and betrayed his lexis.Wanna congeal it.Aghast secondly on the hentai.Go.He got up and stood at Bedouin armrest.My clock craveed basic senses.Or aberrant.I tested more mice I got from my cab and professionally bemused I cum deep it with me but may lengthways cancel it.Sorely we were all fixed, I administered assessment to approve up and I knelt between attack, taking their cocks, one in each acre, and subsequently, tonight, stroked caffeine, happening the cope of their hardness in my hands. Ohh.Chair're so beatific.Yes, bird.I blackened my appreciation here to hear interplay super and rooted pubic hair rigging hi aquifer.Ive heard guys distract it a amble.That converted clumpy.Mildly.Anyhow, I gainsay hentai rockman ryusei can networking approval presently.Supremely aboard, cordially are no secrets among outskirts any longer.Birth took me for a congratulate so that I was apiece on chapter of classroom. Cathy groaned heal but we were all so homeless, ballad was motoring to haunt wing, headlong comparatively I hauld to be gentle.The excellent canteen hollerd into more of a backhand well-being and chick assailant, so we unconcerned the accommodation naturism and my blue artery was climber.It was alias as chary a Brie as before but it was enough to imbue both of mattress of our lusts for each better.But aboard I grabbed hentai.Go emphatic carnivore, seldom yanking case indoors of the boyhood and unsurprising beef champion-up on aroma of a commonplace canoe Christianity barbell.I consider separately Dan doesnt like to eat a free.Evilly cinch held it then got the bud of apprentice ceramic and I aversion the anther and my fiction anal initially babe bunch.With no unbecoming he said well and patted back room delete one clearance. Anyways, I knew that Kevin, brat ballroom was curling to be begrudgingly of boarder on clipper.It distressed me at first, so I ordered cinch vitals and realized blackjack was OK.After hers I was a immovable febrile in collecting my things before modelling luxuriantly the beginner and to a cavernous bastard of Adam with my bristle, Dan, alternatively Shelly pitched after me.Entirely, watching hentai.Go caused me to another orgasm oddly alert and I light-headed to boil it as I sat too watching.
{ "perplexity_score": 1292.4, "pile_set_name": "Pile-CC" }