text
stringlengths
0
3.78M
meta
dict
Bones, blood, pellets, glass, and no body. A man was found guilty of killing his wife, although her body was never found. The case centered on her car, which contained fragments of bone, glass, shotgun pellets, and dried blood. Deoxyribonucleic acid (DNA) fingerprinting techniques were used to establish the decedent's identity. Examination of the bone fragments revealed that they were from the skull. These two pieces of information, added to other evidence, proved that the defendant's wife had received a fatal injury in her car, and a guilty verdict was rendered.
{ "pile_set_name": "PubMed Abstracts" }
The present disclosure relates to electronic communication. In particular, the present disclosure relates to a system and methods for fallback messaging. The popularity and use of social networks and other types of electronic communication have grown dramatically in recent years. Traditionally users have used social networks to view and comment on each other's social stream, however new features to facilitate communication between members of a social network have been developed. For example, users can use built-in messaging functionality to send each other instant messages. While users once accessed these social networks exclusively on desktop or laptop computers via the Internet, users are now accessing these social networks on their portable electronic devices, such as smartphones, netbooks and tablets via the Internet However, Internet access from these portable electronic devices can, at times, be unavailable or intermittent and prevent users from receiving or sending messages to one another. For example, due to coverage dead zones, weak connectivity or overloaded cellphone networks, a user may fail to receive a message from another user of the social network. Current systems and methods have been limited in how they exchange messages when users are unable to reliably access the Internet. For example, when an Internet connection is intermittent or not readily available, a user using these systems and methods might not be able to send or receive messages, or night only be able to send or receive messages when access to the Internet is again available.
{ "pile_set_name": "USPTO Backgrounds" }
GINKO Ginko leaves in the November light. Gotta love it. Ginkos have been around for quite awhile, about 270 million years or so (give or take a few days). They are pretty unassuming until autumn when their leaves turn and they create carpets of yellow on the ground. Some folks enjoy it as a tea or a supplement.
{ "pile_set_name": "Pile-CC" }
Q: Unit test with Robolectric.buildAttributeSet() results in NullPointerException I've got a PercentView class, and I'm trying to set up a test where I want to verify it was drawn to the correct size. I've got this working for a simple bar, but now I want an image/icon above it, which is a drawable (vector actually). Some notes about this: I have a drawable file (which is vector) that is named app_enabled.xml, which is main\res\drawable\app_enabled.xml. I'm using Robolectric 3.5.1 I've seen the code for the test the Robolectric team has here: Robolectric example: ViewStubTest.java I've declared the stylable: <declare-styleable name="PercentageView"> <attr name="image" format="integer" /> </declare-styleable> And the view: public class PercentageView extends View { private int _activeColor; private int _barBackgroundColor; private float _barHeight; private Drawable _icon; private Paint _barBackgroundPaint; private Paint _barActivePaint; private int _percent; public PercentageView(Context context, @Nullable AttributeSet attrs, int defStyleAttr, int defStyleRes) { super(context, attrs, defStyleAttr, defStyleRes); TypedArray args = context.getTheme().obtainStyledAttributes( attrs, R.styleable.PercentageView, 0, 0); try { _icon = args.getDrawable(R.styleable.PercentageView_image); } finally { args.recycle(); } init(); } } And now the test: @RunWith(RobolectricTestRunner.class) public class PercentageViewTests { private ShadowCanvas _shadowCanvas; private int _width; private int _height; private float _expectedPercentWidth; private int _thePercent; private Canvas _canvas; private PercentageView SetUpView(int width, int height, int percent, boolean useIcon) { ShadowApplication app = shadowOf(RuntimeEnvironment.application); //Attempt to pass in the icon, if useIcon is true AttributeSet attr = useIcon ? Robolectric.buildAttributeSet() .addAttribute(R.styleable.PercentageView_image, "@drawable/app_enabled") //NullPointerException here .build() : null; PercentageView view = new PercentageView(app.getApplicationContext(), attr); view.setLayoutParams(new ViewGroup.LayoutParams(width, height)); view.setPercent(percent); return view; } @Before public void setup() { Random random = new Random(10); _width = random.nextInt(100); random.setSeed(101); _height = random.nextInt(200); random = new Random(0); _thePercent = random.nextInt(100); _expectedPercentWidth = _width * _thePercent / 100; _canvas = new Canvas(); _shadowCanvas = shadowOf(_canvas); } @Test public void ShouldHaveIcon() { PercentageView view = SetUpView(_width, _height, _thePercent, true); view.onDraw(_canvas); assertThat(_shadowCanvas.getRectPaintHistoryCount(), is(equalTo(3))); } } And the VERY sad, stack trace: java.lang.NullPointerException at org.robolectric.Robolectric$AttributeSetBuilder.addAttribute(Robolectric.java:161) at myorg.controls.PercentageViewTests.SetUpView(PercentageViewTests.java:41) at myorg.controls.PercentageViewTests.ShouldHaveIcon(PercentageViewTests.java:140) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:50) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:47) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.robolectric.RobolectricTestRunner$HelperTestRunner$1.evaluate(RobolectricTestRunner.java:523) at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) at org.robolectric.internal.SandboxTestRunner$2.evaluate(SandboxTestRunner.java:226) at org.robolectric.internal.SandboxTestRunner.runChild(SandboxTestRunner.java:108) at org.robolectric.internal.SandboxTestRunner.runChild(SandboxTestRunner.java:35) at org.junit.runners.ParentRunner$3.run(ParentRunner.java:290) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:71) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:288) at org.junit.runners.ParentRunner.access$000(ParentRunner.java:58) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:268) at org.robolectric.internal.SandboxTestRunner$1.evaluate(SandboxTestRunner.java:62) at org.junit.runners.ParentRunner.run(ParentRunner.java:363) at org.junit.runner.JUnitCore.run(JUnitCore.java:137) at com.intellij.junit4.JUnit4IdeaTestRunner.startRunnerWithArgs(JUnit4IdeaTestRunner.java:68) at com.intellij.rt.execution.junit.IdeaTestRunner$Repeater.startRunnerWithArgs(IdeaTestRunner.java:51) at com.intellij.rt.execution.junit.JUnitStarter.prepareStreamsAndStart(JUnitStarter.java:242) at com.intellij.rt.execution.junit.JUnitStarter.main(JUnitStarter.java:70) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at com.intellij.rt.execution.application.AppMainV2.main(AppMainV2.java:131) A: Try replacing R.styleable.PercentageView_image with R.attr.image. It seems the first argument to addAttribute() needs to be an attr res, rather than a stylable.
{ "pile_set_name": "StackExchange" }
Abstract A new system of multivariate distributions with fixed marginal distributions is introduced via the consideration of random variates that are randomly chosen pairs of order statistics of the marginal distributions. The distributions allow arbitrary positive or negative Pearson correlations between pairs of random variates and generalise the Farlie–Gumbel–Morgenstern distribution. It is shown that the copulas of these distributions are special cases of the Bernstein copula. Generation of random numbers from the distributions is described, and formulas for the Kendall and grade (Spearman) correlations are given. Procedures for data fitting are described and illustrated with examples.
{ "pile_set_name": "Pile-CC" }
Q: ocaml mutual recursion error I am new to Ocaml and want help with recursive function defined on a recursive data type. I have defined a data type as follows type 'a slist = S of 'a sexp list and 'a sexp = Symbol of 'a | L of 'a slist The function(subst) I'm writing checks for a symbol a in the defined slist and substitutes it by b. For ex subst 1 10 S[ 1; 4; S[L[3; 1;]; 3];] returns S[10; 4; S[L[S[3; 10;]]; 3;] . My code is as follows let rec subst a b sl = match sl with S s -> match s with [] -> [] | p :: q -> match p with Symbol sym -> if sym = a then S[b] :: (**subst** a b S[q]) else S[p] :: (subst a b S[q]) L l -> (subst a b l) :: (subst a b S[q]) | L lis -> subst a b lis;; I am getting the error : This function is applied to too many arguments; Maybe you forgot a ';' Please help A: Your type can be defined in a simpler way, you don't need slist: type 'a sexp = Symbol of 'a | L of 'a sexp list Your problem is that subst a b S[q] is read as subst a b S [q], that is the function subst applied to 4 arguments. You must write subst a b (S[q]) instead.
{ "pile_set_name": "StackExchange" }
Luc Mischo Luc Mischo (born 17 September 1974) is a retired Luxembourgian footballer. Club career A prolific striker, Mischo played for Spora Luxembourg, Aris Bonnevoie, FC Etzella Ettelbruck and Racing FC Luxembourg in Luxembourg's domestic National Division in which he scored a total of 114 goals. Mischo played for Etzella Ettelbruck as the club lost the 2003–04 Luxembourg Cup final. International career Mischo made his debut for Luxembourg in a June 2001 World Cup qualification match against Slovenia, coming on as a second half substitute for Daniel Huss. The game proved to be not only his first cap but also his last. Honours Luxembourg Cup: 1 2001 External links References Category:1974 births Category:Living people Category:Luxembourgian footballers Category:FC Etzella Ettelbruck players Category:Racing FC Union Luxembourg players Category:Association football forwards
{ "pile_set_name": "Wikipedia (en)" }
The Arkansas school board member whose homophobic rants on Facebook drew widespread condemnation announced he was resigning on Thursday's "AC360." Anderson Cooper told viewers that Clint McCance, a member of the Midland School District board in Arkansas, contacted him to set up an interview after his anti-gay Facebook posts sparked a wave of outrage. The posts, which emerged on Wednesday, were written in response to the "Wear Purple Day" that was launched to show solidarity with gay youth in the wake of a recent string of suicides. In one post, McCance protested the idea behind the initiative. "They want me to wear purple because five queers committed suicide," he wrote. "The only way I'm wearing for them is if they all commit suicide. I can't believe the people of this world have gotten this stupid. In another post, he wrote, "it pisses me off, though, that we make special purple fag day for them. I like that fags can't procreate. I also enjoy that they often give each other AIDS and die...I would disown my kids they were gay. They will not be welcome at my home or in my vicinity. I will absolutely run them off." During McCance's appearance on his show, Cooper confronted him about the extreme anti-gay sentiments he expressed. "You have written some really terrible things," he told McCance. "Do you really hate gay people that much, that you like to see them die?" WATCH: McCance, who said he was ashamed and embarrassed by his actions, told Cooper that "I would never support suicide of any kids. I don't support bullying of any kids." "What do you feel like you're apologizing for, exactly?" Cooper asked him. "It was over the top, Anderson," McCance replied. "It was -- I -- I just went too far with it." That explanation, however, did not seem to be enough for Cooper, who pressed McCance further. "But, I mean, do you have any idea of the... pain and fear you have caused to kids maybe even in your own district who are being bullied or who are gay or who don't feel safe telling anyone that they're gay?" he asked him. McCance said that the situation Cooper was describing was a "what-if." Then, Cooper got McCance to announce his resignation from the school board. McCance said that he did not want to be a distraction to the board, adding that, "if they decide later, you know, a year, five years, 10 years from now to vote me back in, if my constituents want that, then -- then I will run again." By the end of the interview, Cooper also got McCance to call his Facebook comments "hateful" and to apologize for hurting people "on a broad, broad spectrum."
{ "pile_set_name": "OpenWebText2" }
Keeneys Creek, West Virginia Keeneys Creek is an unincorporated community in Fayette County, West Virginia. References Category:Unincorporated communities in West Virginia Category:Unincorporated communities in Fayette County, West Virginia
{ "pile_set_name": "Wikipedia (en)" }
HKCR { hMailServer.DiagnosticResult.1 = s 'DiagnosticResult Class' { CLSID = s '{430C3328-6348-4A86-8E12-74B5B5EFF48D}' } hMailServer.DiagnosticResult = s 'DiagnosticResult Class' { CLSID = s '{430C3328-6348-4A86-8E12-74B5B5EFF48D}' CurVer = s 'hMailServer.DiagnosticResult.1' } NoRemove CLSID { ForceRemove {430C3328-6348-4A86-8E12-74B5B5EFF48D} = s 'DiagnosticResult Class' { ProgID = s 'hMailServer.DiagnosticResult.1' VersionIndependentProgID = s 'hMailServer.DiagnosticResult' ForceRemove 'Programmable' InprocServer32 = s '%MODULE%' { val ThreadingModel = s 'Apartment' } 'TypeLib' = s '{E89A9B6A-8310-4AA4-865D-FADA515A82FC}' } } }
{ "pile_set_name": "Github" }
Luxury — a state of great comfort or elegance. Since I was a child, I have always loved luxury. I have worked in the luxury industry in Milan for more than 15years. We have two common challenges; First, it is well known that luxury retailers charge too much on commissions. I had planned to launch my own retail business to cut down commission rates in the industry before I was introduced to Blockchain technology by my friend, Brandon Waiters! We developed the idea together. We pitched our idea to my mentor, François-Henri Pinault of Kering SA. We gathered initial investors like Kering SA and Maserati. Thus, New Royals Gold (NRG) was born! NRG will enable a platform where luxury products will be sold at 0–1% commission with safe, fast and secure payment cutting bank fees and other fiat inadequacies. NRG is our official token and would carry the same prestige as our brand name therefore it was designed to be in high demand and limited supply. The second major challenge is that the luxury industry lacks the level of customization and innovation required to connect with newly affluent individuals. This is a major advantage for the New Royals team made up of creative individuals who are ready to redefine luxury to respond to the millenials mindset. At New Royals, we are ready to build wonderful luxury experiences for the newly affluent with captivating innovations and 100% originality. This will attract wealthy investors into the luxury and crypto markets. Despite these challenges, the luxury market still grew by 5% to an estimated €1.2 trillion globally in 2017. This is an untapped economy by the Blockchain industry. We estimate that the luxury market will grow exponentially when these problems are solved. NRG will be publicly available and traded in exchanges making it possible for everyone to grow with us. New Royals is the future of luxury! Do not miss out! You can invest now at https://newroyals.io.
{ "pile_set_name": "OpenWebText2" }
Climate change is the defining issue of our time, and the discourse regarding plastic pollution is everywhere. We are told to avoid buying plastic, to reuse plastic bags, to make small differences. But to truly impact the climate crisis, we need the companies who produce the products we buy to reduce their usage of unnecessary plastic packaging, so that we are able, as consumers, to choose more sustainable products. This is why, upon, noticing the plastic seal on my Hellman's mayo jar, which serves no true purpose and is thrown away immediately upon opening it, I decided to email Hellman's about this ridiculous and, ultimately, polluting, plastic use. Disappointingly, but predictably, the response was a list of promises: "Unilever has made an industry-leading commitment..."; ""we have a framework,"; "our Five Point Plastic Plan.". However, the theme was clear: "by 2025,"; "working to accelerate this process."; "ambitious 2025 targets.": the action is not immediate, and their commitments are not enough. This petition is my response. As a consumer, I do not think that these words and promises are enough. I want action now, and removing these unnecessary plastic seals would be the first step towards a sustainable and climate-stable future, in which my buying of everyday food items does not have to involve 'climate guilt'. Please join me in requesting Hellman's to remove these unnecessary plastic seals and paving the way - in action, not plans and promises - towards a more sustainable future. Thank you.
{ "pile_set_name": "OpenWebText2" }
Cardiovascular calcification in nondialyzed patients with chronic kidney disease. Chronic kidney disease (CKD) has become a major health-care problem of global proportions. Progression to end-stage renal disease (ESRD), the need for renal replacement therapy, and the high annual death rate of dialysis patients are the most noticeable outcomes of CKD. Less appreciated, however, is the fact that most patients with CKD actually die mainly from cardiovascular disease, rather than progress to ESRD. Coronary artery calcification (CAC), a surrogate marker of atherosclerosis, is common in dialysis and CKD patients. Coronary artery calcium scores, as measured by ultrafast computed tomography, is an independent predictor of future cardiac events. Using this technique, several studies have documented extensive calcification in dialysis patients, a subject of several exhaustive reviews. Unfortunately, much less attention has been paid to calcification in nondialyzed patients with CKD. In this review, I will emphasize the fact that CVC is common in patients with CKD not yet on dialysis, develops early in the course of CKD, and worsens with the decline in renal function particularly among diabetics who progressed to ESRD. I will also discuss the pathogenesis of CVC in CKD patients and highlight the lack of a major role for abnormalities of mineral metabolism in the pathogenesis of calcification in CKD patients. In addition to the high prevalence of traditional risk factors for CAD, the presence of proteinuria, reduced renal function, diabetic nephropathy, and the rate of progression to ESRD may represent the main uremia-related factors that increase the risk for calcification in CKD. Finally, I will review the protective role of inhibitors of calcification in CKD.
{ "pile_set_name": "PubMed Abstracts" }
Q: Is it possible to construct a sequence that ends in 1000000000? Starting from the number $1$ we write down a sequence of numbers where the next number in the sequence is obtained from the previous one either by doubling it or rearranging its digits (not allowing the first digit of the rearranged number to be $0$) for instance a sequence might begin $$1,2,4,8,16,61,122,212,424,\ldots$$ Is it possible to make a sequence that ends in $1000000000$ and a sequence that ends in $9876543210$. Please show me how and if there is any working. A: We first note that we can attain $1000$ from $1$ by $$1,2,4,8,16,32,64,128,256,512,125,250,500,1000$$ Therefore $1000^n$ can be attained by performing the same operations as above with $1$ replaced by $1000^{n-1}$. On the other hand, note that rearranging the digits does not change the remainder when divided by $3$, and $2^n \neq 0 \pmod{3}$. Therefore the sequence would not reach any multiple of $3$.
{ "pile_set_name": "StackExchange" }
MAD Architects peel facade off existing building for adaptive reuse in Rome When MAD architects won a competition to build two condo towers in the City of Mississauga, just west of Toronto, they became the iconic symbols of the city; the Chinese architecture firm knows how to make an impact. Founder Ma Yansong is trying to create "a new balance among society, the city and the environment through new forms of architecture. " Now he marches on Rome, finally getting approval to do an adaptive reuse of an existing building, converting it into apartments. The approach being taken recognizes how 20th century buildings are different, with facades structurally separate from building frames, and how they can be adapted: Instead of demolishing and reconstructing the entire building, MAD will simply remove the existing facades, retain the structural framework, and insert new living units to transform the building’s function. New balconies and gardens will emerge from the “gaps and voids” between new residential units and the original framework structure. The boundary between the building and the street blurs as the new design peels away bulky facades and replaces them with a more open, transparent scheme. So the existing structure of beams, pillars and slabs are saved and treated as a "bookshelf" with "urban villas with facades made of custom metal and glass, [which] will be intricately inserted. And tons of CO2 is saved in concrete not poured, and a serious number of trucks are kept off Roman roads.
{ "pile_set_name": "Pile-CC" }
Immunotherapy of brain tumors. The fight against neoplasia still represents a formidable challenge. At the present time the mechanism of cell-mediated immunity seems to offer the most promise. At the same time, one is cautioned by the implication that minimal cell-mediated responses threaten acceleration of tumor growth. Therefore, one is impressed with the need for investigation of these approaches in a model system prior to their application to humans. The data currently available suggest that when active tumor growth is present within the host, a state of immune deficiency exists: cell-mediated immune responses may be quantitatively deficient or this response may be negated by the presence of blocking factor in the serum. Efficient and effective immune responses imply adequate cell-mediated immunity and the absence of blocking factor activity within the serum.
{ "pile_set_name": "PubMed Abstracts" }
Eye for an eye "An eye for an eye" () or the law of retaliation () is the principle that a person who has injured another person is to be penalized to a similar degree, and the person inflicting such punishment should be the injured party. In softer interpretations, it means the victim receives the [estimated] value of the injury in compensation. The intent behind the principle was to restrict compensation to the value of the loss. Definition and methods The term lex talionis does not always and only refer to literal eye-for-an-eye codes of justice (see rather mirror punishment) but applies to the broader class of legal systems that specify formulate penalties for specific crimes, which are thought to be fitting in their severity. Some propose that this was at least in part intended to prevent excessive punishment at the hands of either an avenging private party or the state. The most common expression of lex talionis is "an eye for an eye", but other interpretations have been given as well. Legal codes following the principle of lex talionis have one thing in common: prescribed 'fitting' counter punishment for a felony. In the famous legal code written by Hammurabi, the principle of exact reciprocity is very clearly used. For example, if a person caused the death of another person, the killer would be put to death. The simplest example is the "eye for an eye" principle. In that case, the rule was that punishment must be exactly equal to the crime. Conversely, the Twelve Tables of Rome merely prescribed particular penalties for particular crimes. The Anglo-Saxon legal code substituted payment of wergild for direct retribution: a particular person's life had a fixed value, derived from his social position; any homicide was compensated by paying the appropriate wergild, regardless of intent. Under the British Common Law, successful plaintiffs were entitled to repayment equal to their loss (in monetary terms). In the modern tort law system, this has been extended to translate non-economic losses into money as well. The meaning of the principle Eye for an Eye is that a person who has been injured by another person returns the offending action to the originator in compensation, or that an authority does so on behalf of the injured person. The exact Latin (lex talionis) to English translation of this phrase is "The law of retaliation." The root principle of this law is to provide equitable retribution. Antecedents Various ideas regarding the origins of lex talionis exist, but a common one is that it developed as early civilizations grew and a less well-established system for retribution of wrongs, feuds and vendettas, threatened the social fabric. Despite having been replaced with newer modes of legal theory, lex talionis systems served a critical purpose in the development of social systems—the establishment of a body whose purpose was to enact the retaliation and ensure that this was the only punishment. This body was the state in one of its earliest forms. The principle is found in Babylonian Law. If it is surmised that in societies not bound by the rule of law, if a person was hurt, then the injured person (or their relative) would take vengeful retribution on the person who caused the injury. The retribution might be worse than the crime, perhaps even death. Babylonian law put a limit on such actions, restricting the retribution to be no worse than the crime, as long as victim and offender occupied the same status in society. As with blasphemy or lèse-majesté (crimes against a god or a monarch), crimes against one's social betters were punished more severely. Roman law moved toward monetary compensation as a substitute for vengeance. In cases of assault, fixed penalties were set for various injuries, although talio was still permitted if one person broke another's limb. In religion The earliest known use of the principle appears in the Code of Hammurabi, which predates the Hebrew bible. In the Hebrew Law, the "eye for eye" was to restrict compensation to the value of the loss. Thus, it might be better read 'only one eye for one eye'. The idiomatic biblical phrase "an eye for an eye" in Exodus and Leviticus (, ayin tachat ayin) literally means 'an eye under/(in place of) an eye' while a slightly different phrase (עַיִן בְּעַיִן שֵׁן בְּשֵׁן, literally "eye for an eye; tooth for a tooth") is used in another passage (Deuteronomy) in the context of possible reciprocal court sentences for failed false witnesses. The passage in Leviticus states, "And a man who injures his countrymanas he has done, so it shall be done to him [namely,] fracture under/for fracture, eye under/for eye, tooth under/for tooth. Just as another person has received injury from him, so it will be given to him." (Lev. 24:19–21). For an example of being used in its regular sense of under, see Lev. 22:27 "A bull, sheep or goat, when it is born shall remain under its mother, and from the eighth day..." The Bible allows for kofer (a monetary payment) to take the place of a bodily punishment for any crime except murder. It is not specified whether the victim, accused, or judge had the authority to choose kofer in place of bodily punishment. Judaism Isaac Kalimi explains that the "lex talionis was humanized by the Rabbis who interpreted "an eye for an eye" to mean reasonable pecuniary compensation. As in the case of the Babylonian 'lex talionis', ethical Judaism and humane Jewish jurisprudence replaces the peshat (literal meaning) of the written Torah. Pasachoff and Littman point to the reinterpretation of the lex talionis as an example of the ability of Pharisaic Judaism to "adapt to changing social and intellectual ideas." Talmud The Talmud interprets the verses referring to "an eye for an eye" and similar expressions as mandating monetary compensation in tort cases and argues against the interpretations by Sadducees that the Bible verses refer to physical retaliation in kind, using the argument that such an interpretation would be inapplicable to blind or eyeless offenders. Since the Torah requires that penalties be universally applicable, the phrase cannot be interpreted in this manner. However, the Torah also discusses a form of direct reciprocal justice, where the phrase ayin tachat ayin makes another appearance. Here, the Torah discusses false witnesses who conspire to testify against another person. The Torah requires the court to "do to him as he had conspired to do to his brother". Assuming the fulfillment of certain technical criteria (such as the sentencing of the accused whose punishment was not yet executed), wherever it is possible to punish the conspirators with exactly the same punishment through which they had planned to harm their fellow, the court carries out this direct reciprocal justice (including when the punishment constitutes the death penalty). Otherwise, the offenders receive lashes. Since there is no form of punishment in the Torah that calls for the maiming of an offender (punitary amputation) there is no case where a conspiratorial false witness could possibly be punished by the court injuring to his eye, tooth, hand, or foot. There is one case where the Torah states "…and you shall cut off her hand…" The sages of the Talmud understood the literal meaning of this verse as referring to a case where the woman is attacking a man in potentially lethal manner. This verse teaches that, although one must intervene to save the victim, one may not kill a lethal attacker if it is possible to neutralize that attacker through non-lethal injury. Regardless, there is no verse that even appears to mandate injury to the eye, tooth, or foot. discusses the only form of remotely reciprocal justice not carried out directly by the court, where, under very limited circumstances, someone found guilty of negligent manslaughter may be killed by a relative of the deceased who takes on the role of "redeemer of blood". In such cases, the court requires the guilty party to flee to a designated city of refuge. While the guilty party is there, the "redeemer of blood" may not kill him. If, however, the guilty party illegally forgoes his exile, the "redeemer of blood", as an accessory of the court, may kill the guilty party. Nevertheless, the provision of the "redeemer of blood" does not serve as true reciprocal justice, because the redeemer only acts to penalize a negligent killer who forgoes his exile. Furthermore, intentional killing does not parallel negligent killing and thus cannot serve directly as a reciprocal punishment for manslaughter, but as a penalty for escaping punishment. According to traditional Jewish Law, application of these laws requires the presence and maintenance of the biblically designated cities of refuge, as well as a conviction in an eligible court of 23 judges as delineated by the Torah and Talmud. The latter condition is also applicable for any capital punishment. These circumstances have not existed for approximately 2,000 years. Objective of reciprocal justice in Judaism The Talmud discusses the concept of justice as measure-for-measure retribution (middah k'neged middah) in the context of divinely implemented justice. Regarding reciprocal justice by court, however, the Torah states that punishments serve to remove dangerous elements from society ("…and you shall eliminate the evil from your midst") and to deter potential criminals from violating the law ("And the rest shall hear and be daunted, and they shall no longer commit anything like this evil deed in your midst"). Additionally, reciprocal justice in tort cases serves to compensate the victim (see above). The ideal of vengeance for the sake of assuaging the distress of the victim plays no role in the Torah's conception of court justice, as victims are cautioned against even hating or bearing a grudge against those who have harmed them. The Torah makes no distinction between whether or not the potential object of hatred or a grudge has been brought to justice, and all people are taught to love their fellow Israelites. Social hierarchy and reciprocal justice In Exodus 21, as in the Code of Hammurabi, the concept of reciprocal justice seemingly applies to social equals; the statement of reciprocal justice "life for life, eye for eye, tooth for tooth, hand for hand, foot for foot, burn for burn, wound for wound, stripe for stripe" is followed by an example of a different law: if a slave-owner blinds the eye or knocks out the tooth of a slave, the slave is freed but the owner pays no other consequence. On the other hand, the slave would probably be put to death for the injury of the eye of the slave-owner. However the reciprocal justice applies across social boundaries: the "eye for eye" principle is directly followed by the proclamation "You are to have one law for the alien and the citizen." This shows a much more meaningful principle for social justice, in that the marginalized in society were given the same rights under the social structure. In this context, the reciprocal justice in an ideal functioning setting, according to Michael Coogan, "to prevent people from taking the law into their own hands and exacting disproportionate vengeance for offenses committed against them." Christianity In the Sermon on the Mount, Jesus urges his followers to turn the other cheek: Some interpret this as an admonition not to seek legal steps for any compensation that corresponds in kind and degree to the injury. Others interpret it as Jesus simply teaching his followers not to take personal vengeance, rather than commenting on any specific legal practice. Christian interpretation of the Biblical passage has been heavily influenced by the Church father Augustine of Hippo. He already discussed in his Contra Faustum, Book XIX, the points of 'fulfilment or destruction' of the Jewish law. George Robinson characterizes the passage of Exodus ("an eye for an eye") as one of the "most controversial in the Bible". According to Robinson, some have pointed to this passage as evidence of the vengeful nature of justice in the Hebrew Bible. Similarly, Abraham Bloch speculates that the "lex talionis has been singled out as a classical example of biblical harshness." Harry S. Lewis points to Lamech, Gideon and Samson as Biblical heroes who were renowned for "their prowess in executing blood revenge upon their public and private enemies." Lewis asserts that this "right of 'wild' justice was gradually limited." Stephen Wylen asserts that the lex talionis is "proof of the unique value of each individual" and that it teaches "equality of all human beings for law." Islam The Qur'an mentions the "eye for an eye" concept as being ordained for the Children of Israel. The principle of Lex talionis in Islam is Qiṣāṣ (Arabic: قصاص) as mentioned in : "O you who have believed, prescribed for you is legal retribution (Qisas) for those murdered – the free for the free, the slave for the slave, and the female for the female. But whoever overlooks from his brother anything, then there should be a suitable follow-up and payment to him with good conduct. This is an alleviation from your Lord and a mercy. But whoever transgresses after that will have a painful punishment." Muslim countries that use Islamic Sharia law, such as Iran or Saudi Arabia, apply the "eye for an eye" rule literally. Applications The group Nakam sought to kill six million Germans as revenge for the six million Jews killed during the Holocaust. In 2017, an Iranian woman wounded in an acid attack was given the opportunity to have her attacker blinded with acid per sharia law. Notable criticism Mahatma Gandhi allegedly used this phrase in the context of universal harmony: "An eye for an eye only ends up making the whole world blind." Coretta Scott King later used this phrase in the context of racial violence: "The old law of an eye for an eye leaves everyone blind." Notes References Bibliography . . External links . . : the author of "Eye for an Eye", about the Lex talionis. . & Part 2 . Category:Criminal law Category:English-language idioms Category:Codes of conduct Category:Legal history Category:Law and morality Category:Biblical phrases Category:Islamic terminology Category:Christian terminology Category:Revenge Category:Human eyes in culture
{ "pile_set_name": "Wikipedia (en)" }
--- abstract: 'We study the geometrical conditions for stabilizing magnetic skyrmions in cylindrical nanostrips and nanotubes of ferromagnetic materials with Dzyaloshinskii-Moriya interactions. We obtain the ground state of the system implementing a simulation annealing technique for a classical spin Hamiltonian with competing isotropic exchange and chiral interactions, radial anisotropy and an external field. We address the impact of surface curvature on the formation, the shape and the size of magnetic skyrmions. We demonstrate that the evolution of the skyrmion phase with the curvature of the nanoshell is controlled by the competition between two characteristic lengths, namely the curvature radius, $R$ (geometrical length) and the skyrmion radius, $R_{Sk}$ (physical length). In narrow nanotubes ($R<R_{Sk}$) the skyrmion phase evolves to a stripe phase, while in wide nanotubes ($R>R_{Sk}$) a mixed skyrmion-stripe phase emerges. Most interestingly, the mixed phase is characterized by spatially separated skyrmions from stripes owing to the direction of the applied field relative to the surface normal. Below the instability region ($R \lesssim R_{Sk}$) skyrmions remain circular and preserve their size as a consequence of their topological protection. Zero-field skyrmions are shown to be stable on curved nanoelements with free boundaries within the same stability region ($R\gtrsim R_{Sk}$). The experimental and technological perspectives from the stability of skyrmions on cylindrical surfaces are discussed.' author: - 'D. Kechrakos' - 'A. Patsopoulos' - 'L. Tzannetou' title: Magnetic skyrmions in cylindrical ferromagnetic nanostructures with chiral interactions --- Introduction ============ Magnetic skyrmions are self-localized vortex-like spin structures with axial symmetry [@bog94a]. They have been mainly studied in noncentrosymmetric bulk crystals and their thin films[@muhl09; @pap09; @yux10], as well as, in ultrathin ferromagnetic (FM) films on heavy metal (HM) substrates [@hein11; @rom13], in which a sizable Dzyaloshinskii-Moriya interaction (DMI) [@dzi58; @mor60] leads to their formation. From the technological point of view, two-dimensional magnetic skyrmions formed in ferromagnetic-heavy metal interfaces have potentials for a variety of innovative robust and high-density spintronics applications due to their protected topology and nanoscale size [@fer13]. In particular, they can be driven by lateral spin currents [@fer13; @samp13; @nag13], produced by electrical currents with five to six orders of magnitude smaller current density than those needed for domain wall motion [@rom13], thus pointing to energy efficient [@fer13] skyrmion-based racetrack-type memory devices[@par08]. However,current-driven skyrmions will drift from the racetrack direction due to the presence of Magnus force [@iwa13; @yux12], if the velocity is high enough. This phenomenon known as the Skyrmion Hall effect (SkHE) leads to their annihilation at the racetrack edge and the loss of stored information. An approach for limiting the SkHE effect is through spin-wave driven skyrmion motion [@zha15; @sch15]. Skyrmions can be displaced by magnons induced by thermal gradients in insulating chiral ferromagnets [@kon13], while the SkHE deviation vanishes for high energy magnons [@gar15]. However, compared with the current-driven skyrmion motion, it is difficult to generate spin waves in a nanometre-size nanotrack with appropriate spectral properties for driving the motion of a skyrmion. It is also difficult to realize a skyrmion nanocircuit based on thermal gradients. Consequently, the current-driven skyrmion motion is the most promising method and as such it attracts a great deal of research effort. To this end, various potential barriers have been proposed to confine skyrmions in the central region of the racetrack so that the annihilation at the racetrack edge is avoided [@zha16; @bar16; @pur16; @lai17; @foo15]. A suggested method is by tuning the perpendicular [@foo15] or the crystalline [@lai17] magnetic anisotropy. As a result, a path of lower resistance is created at the racetrack center, allowing the skyrmions to pass the racetrack without annihilation. Another approach, is by tuning the height of the ferromagnetic layers, creating a rectangular groove on the center of the racetrack. As a result, a curb structure is formed, which functions to confine the skyrmion within the groove [@pur16]. Furthermore, the damping constant of the racetrack can be tuned in either the transverse or the longitudinal direction in different regions of the racetrack [@liu16], so that the deviations of the skyrmions are in opposite directions and cancel each other out. Therefore, the skyrmions can be efficiently confined in the racetrack center and the SkHE is avoided. Another aspect hampering the use of magnetic skyrmions in racetrack memory applications, is their uncontrollable excitation realized at the edges of magnetic nanostrips and thin films [@ran17] leading to error writing events.. This phenomenon is known as the edge effect. In addition, skyrmion motion, even including the oscillating motion and the gyration [@gar16], is affected by the edges in confined geometries due to their potential force [@nav16; @gar16] acting on skyrmions. From the aforementioned works, it appears that the possibility of magnetic skyrmions generation and manipulation on boundary-free samples offers be a desirable direction of research and curved nanostructures, as for example, magnetic nanotubes, constitute a promising option. The study of magnetic structure and solitonic excitation on curved surfaces has recently attracted intensive interest as curvature was shown to control physical properties of the system [@streu16]. The curvilinear geometry of bent and curved ferromagnetic wires and surfaces [@pyl15; @gai15; @car15] introduces effective chiral interactions and curvature-induced anisotropy.[@streu16] As a consequence, curvature-driven effects emerge, such as magnetochiral effects [@kra12; @ota12] and topologically induced magnetization patterning,[@kra12; @pyl15] resulting in high domain wall velocities [@yan12] and chirality symmetry breaking [@pyl15]. Despite the fact that recent works have focused on the impact of surface curvature on the emerging chiral properties and related magnetic order of otherwise achiral ferromagnetic materials [@streu16], to the best of our knowledge, the conditions for skyrmion formation on chiral curved surfaces has not been addressed yet. We anticipate on physical grounds, that the skyrmion phase supported on a planar nanostructure, such as a FM/HM interface, will be driven to instability under curving. It is the main aim of the present work, to investigate the ground state properties of curved ferromagnetic nanostructures with chiral interactions (DMI) and examine the conditions under which curvature-driven skyrmion instability occurs. Our structural model accounts for direction modulation of the DMI vector induced by the curvature of the nanostructure under consideration, thus providing a more realistic description of the interplay between isotropic exchange (Heisenberg) and chiral interactions on curved surfaces. We focus on cylindrical nanoelements and nanotubes. Our results demonstrate the feasibility of skyrmion formation on the ridge of a nanotube, where the external field remains almost normal to the surface, provided that the radius of the nanotube remains at least comparable to the skyrmion radius $(R_{tube} \ge R_{Sk} )$. The same geometrical criterion ensures the stability of skyrmions without an external magnetic field on curved nanoelements. Micromagnetic Model and Simulation Method ========================================= We consider a thin ferromagnetic cylindrical nanostrip along the z-axis with length $L_z$, width $L_y$, inner radius $R$ and thickness $t\ll R$ (Fig.\[fig:sketch\]). ![(Color online) Cylindrical nanostrip extended along the $z$-axis with width $L_y$, thickness $t$, curvature radius $R$ and curvature angle $\phi_0$, used as our model system. []{data-label="fig:sketch"}](fig1.jpg){width="0.40\linewidth"} The central angle of the curved nanostrip is defined as $\phi_0=L_y/R$. A planar nanostrip ($R\rightarrow\infty,\phi_0=0 $) and a cylindrical nanotube ($R\ne0,\phi_0=360^0$) naturally occur as limiting cases of the curved nanostrip. The micromagnetic energy of the system as a functional of the continuous magnetization field $\textbf{m}(\textbf{r})=\textbf{M}(\textbf{r})/M_s$ reads $$\begin{aligned} E[\textbf{m}]=\int d^3\textbf{r}~ \{ A |\nabla\textbf{m}|^2 -K_u (\textbf{m}\cdot \textbf{e}_\rho)^2 \nonumber \\ -M_s\textbf{m}\cdot\textbf{B} +w_{DM} \} \label{eq:microm}\end{aligned}$$ where the integral runs over the volume of the nanostructure, $A$ is the exchange constant and $K_u$ is the radial anisotropy density, which we adopt here as a generalization of the perpendicular anisotropy observed in thin ferromagnetic films on a heavy metal substrate[@fer13; @hag15]. $w_{DM}$ is the Dzyaloshinskii-Moriya energy density and $\textbf{e}_\rho(\textbf{r})$ is the radial unit vector. The DMI energy is considered here as arising from the interface coupling between the ferromagnetic nanostrip and a heavy metal layer, which is assumed to be coupled to the nanostrip. Generalizing the expression for the interface DMI energy density[@cor18], we write $$\begin{aligned} w_{DM}=D[(\textbf{m}\cdot\nabla)m_\rho-m_\rho(\nabla\cdot\textbf{m})] \label{eq:dmi}\end{aligned}$$ where $\textbf{m}(\textbf{r})=(m_\rho,m_\phi,m_z)$ are the components of the magnetization field with respect to the local cylindrical coordinate system $(\textbf{e}_\rho,\textbf{e}_\phi,\textbf{z})$ (Fig.\[fig:sketch\]). Magnetostatic terms are neglected in Eq.(\[eq:microm\]), because in the limit of a very long cylinder $(L_z\gg R)$ and a mean field approximation, they can be approximated by a uniaxial anisotropy term along the z-axis leading to reduction the radial anisotropy term as[@roh13] $K_u^{'}=K_u-\frac{1}{2}\mu_0 M_s^2$. Upon discretization of Eq.(\[eq:microm\]) on a cylindrical grid , we obtain for the total energy $$\begin{aligned} E = -\frac{1}{2} J \sum_{<ij>} \textbf{m}_i \cdot \textbf{m}_j \nonumber \\ -\frac{1}{2} d \sum_{<ij>} \textbf{D}_{ij} \cdot (\textbf{m}_i \times \textbf{m}_{j}) \nonumber \\ -k \sum_i (\textbf{m}_i \cdot \textbf{e}_{\rho,i} )^2 -h \sum_i \textbf{m}_i \cdot \textbf{h}_i \label{eq:energy}\end{aligned}$$ with bold characters indicating unit vectors. $\textbf{m}_i$ is the unit vector (spin) along the magnetic moment of the $i$-th cell. The $1/2$ prefactor of the first and second terms accounts for the double-counting of energy contribution from pairs of nearest neighboring sites. The DMI vector takes the form $\textbf{D}_{ij}=\textbf{e}_{\rho,i} \times \textbf{r}_{ij}$, which is a generalization of the expression $\textbf{D}_{ij}=\textbf{x} \times \textbf{r}_{ij}$, that describes the DMI coupling at planar interfaces in the $yz$-plane.[@hag15; @yin16] Note that a major physical difference compared to the flat interface is that for a curved interface the vector $\textbf{D}_{ij}$ becomes site-dependent owing to the variation of the radial direction across the surface. The applied field, is assumed either homogeneous along the $x$-axis ($\textbf{h}_i=\textbf{x}$) or radial ($\textbf{h}_i=\textbf{e}_{n,i}$), as explicitly mentioned below. Under the assumption of a grid cell with equal sizes along the azimuthal and $z$ axes ($a_\phi=a_z$) and in the limit of a very thin FM nanostrip ($t=a_z$), the energy parameters entering Eq.(\[eq:energy\]) are related to the micromagnetic material parameters of Eq.(\[eq:microm\]) through the relations $J\approx 2Aa, d \approx Da^2$ $k \approx K_ua^3$, $h\approx M_sBa^3$. We use material parameters typical of a transition metal thin film on a heavy metal substrate[@hag15; @lel19], namely, $ M_s=580kA/m, A=10pJ/m, D=4mJ/m^2, K_u=500kJ/m^3 $ and a cell size $a=2nm$, which is well below the exchange length $l_{ex}=\sqrt{2A/\mu_0 M_s^2}\sim 7nm$. An applied field $B=0.9~T$ is considered. Then the rationalized (dimensionless) parameters $d/J=0.4, k/J=0.1$ and $h/J=0.1$, consist a complete set of parameters that determine the magnetic configuration at the ground state. Furthermore, the pitch length of the helical phase is determined by the rationalized parameter $d/J$ through the relation[@kee15; @sek16] $$\begin{aligned} p=\frac{2\pi a}{tan^{-1}(d/J)}. \label{eq:pitch}\end{aligned}$$ For the material parameters mentioned above we obtain $p\approx 16.5a=32nm$. This is a characteristic length scale of the skyrmion phase as it is approximately equal to the skyrmion radius.[@kee15; @sek16] To obtain the ground state we perform simulation annealing using the Metropolis Monte Carlo algorithm with single spin updates and temperature-dependent spin aperture that accelerates the approach to equilibrium. In particular, a field-cooling procedure under a field $h/J=0.1$ is performed from a high temperature $k_BT/J=20$ ($k_BT_C/J\approx 1$) to a low temperature $k_BT/J=0.001$, with a variable step $dT/T=5\%$ that produces an exponential decrease of temperature. At each temperature value we perform $5000$ Monte Carlo steps per spin (MCSS) for thermalization followed by $5000$ MCSS for calculations of thermal averages. The latter are calculated from sampling every $\tau=10$ MCSS, in order to minimize statistical correlations between sampling points. The thermodynamic quantities at each temperature are averaged over many ($\approx 20-40$) independent relaxation sequences to obtain an estimate of the statistical errors. Results and Discussion ====================== Skyrmion phase -------------- \[htb!\] ![ (Color online) Ground state configuration showing skyrmion formation in cylindrical nanostructures under application of a uniform magnetic field along the $x$-axis. Cylindrical surfaces are constructed by gradually wrapping an initial square sample ($L_y=L_z\equiv L$) around the $z$-axis. Spin configurations are color coded with the values of magnetization along the applied field direction ($x$-axis). (a), (d) planar surfaces, (b) $L=50a, \phi_0=150^0, R=19.1a$, (c) $L=50a, \phi_0=360^0, R=8.0a$, (e) $L=100a, \phi_0=150^0, R=38.2a$, and (f) $L=100a, \phi_0=360^0, R=15.9a$, with $a=2nm$. With increasing angle of curvature ($\phi_0$) the skyrmion phase transforms to either a spiral phase, as in (c), or to a mixed skyrmion-spiral phase, as in (f), depending on the value of the curvature radius ($R$). []{data-label="fig:Skphase"}](fig2.jpg "fig:"){width="0.95\linewidth"} We consider first the evolution of a skyrmion ground state as the curvature of the nanostructure increases. We start from a planar surface (PS) in the yz-plane and wrap it gradually along the z-axis to form an open cylindrical surface (CS) and eventually, a closed cylindrical surface corresponding to a nanotube (NT) (Fig.\[fig:Skphase\]). When we curve the 2D sample, we preserve the dimensions $(L_y,L_z)$ of the initial planar system in order to emphasize the role of curvature and exclude finite size effects. Periodic boundary conditions are used solely along the z-axis of our curved samples, except for nanotubes, when the lateral free boundaries couple among themselves, naturally. In planar systems, we observe the well-known skyrmion lattice[@yis09] consisting of a hexagonal arrangement of skyrmions. Obviously, the number of skyrmions increases with the area of the planar sample, however their spatial density remains almost unchanged. As the angle of curvature increases, skyrmions close to the free edges of the curved surface become elongated and finally transform into spirals. This effect becomes more evident in smaller samples, which are characterized by smaller values of the curvature radius (Fig.\[fig:Skphase\]b,c). In a small nanotube with radius $R=8a$ (Fig.\[fig:Skphase\]c) stripes form almost all around the surface. On the contrary, in a larger nanotube with radius $R=15.9a$ isolated skyrmions are observed along the front and the back ridge of the cylinder, where the external field is almost normal to the surface, but spiral structures form along the left and right sides of the large tube (Fig.\[fig:Skphase\]f) where the applied field is almost tangential to the surface. Thus, skyrmion formation on nanotubes is strongly dependent on the nanotube radius, with large radius nanotubes supporting the coexistence of both skyrmion and stripe phases. We underline the fact that the two phases are spatially separated with skyrmions forming along the ridge and stripes forming on the sides of the nanotube. The width of the region supporting skyrmions is determined by the size of the skyrmion radius ($R_{Sk}$) relative to the curvature radius ($R$). This point is discussed further below. To quantify the evolution of the skyrmion phase with sample curvature, as depicted in Fig.\[fig:Skphase\], we calculate the topological charge ($Q$) of the ground state. For a three component spin field $\textbf{m}(\phi,z)$ on a cylindrical surface described by the coordinates ($\phi,z$), the topological charge is given as $$\begin{aligned} Q=\frac{1}{4\pi} \iint d\phi~dz~ \textbf{m}\cdot (\frac{\partial\textbf{m}}{\partial\phi} \times \frac{\partial\textbf{m}}{\partial z}). \label{eq:topol_charge}\end{aligned}$$ For the numerical computations we implement a lattice expression of the topological charge[@ber81], appropriate to a square lattice wrapped around a cylindrical surface. Skyrmions have a topological charge $Q=\pm1$, depending on the direction of the applied field. Thus the absolute value of $Q$ for a nanostrip in the skyrmion phase equals to the number of skyrmions supported. The dependence of the topological charge on the curvature angle is shown in Fig.\[fig:Q\_vs\_a\] for nanostrips with different widths $L_y$. \[htb!\] ![ (Color online) Dependence of the ground state topological charge (Q) on the angle of curvature ($\phi_0$) for magnetic nanostructures with different sizes ($L\times L$) and $a=2nm$. The applied magnetic field is uniform along the x-axis (circles, closed triangles) or radial (open triangles). []{data-label="fig:Q_vs_a"}](fig3.jpg "fig:"){width="0.95\linewidth"} We notice that $Q$ remains almost constant up to an angle $\phi_0\approx 100^0$ and further on it decreases smoothly from the initial value for planar nanostrips (skyrmion phase), to a smaller value close to zero for nanotubes, indicating that only a small fraction of the initial number of skyrmions are stabilized (mixed skyrmion-stripe phase). In contrast to this trend, when the applied field is radial, the topological charge is only weakly dependent on the curvature angle. This weak decay of $Q$ with curvature angle is due to the gradual reduction of the co-planar condition between the DMI vectors on each lattice site. A radial field for a cylindrical nanostrip is geometrically analogous to the case of a uniform field normal to a planar nanostrip and the conservation of the topological charge with curvature underlines the importance of the normality condition for the applied filed in the stabilization of skyrmions on any surface. For planar nanostrips shown in Fig.\[fig:Skphase\]a ($Q=7.2$) and Fig.\[fig:Skphase\]d ($Q=37.8$), the values of $Q$ deviate weakly from integer values due to the misalignment of the moments located on the free boundaries of the sample[@roh13] and the thermal fluctuations inherent to the Monte Carlo method. For curved surfaces, however, the shape distortion of the skyrmions and their evolution to stripe-like structures is not characterized by integer values of $Q$, thus the calculation of $Q$ based on Eq.(\[eq:topol\_charge\]) assumes non-integer values, as in Fig.\[fig:Q\_vs\_a\], and is only indicative of the number of skyrmions observed in the mixed phase. \[htb!\] ![ Dependence of the ground state topological charge ($Q$) on the radius ($R$) of magnetic nanotubes ($\phi_0=360^0$) with length $L_z=220a$ and $a=2nm$. []{data-label="fig:Q_vs_R"}](fig4.jpg "fig:"){width="0.95\linewidth"} The magnetization landscape at the ground state of a curved nanostrip depends on both the curvature radius ($R$) and the curvature angle ($\phi_0$). Next, we fix the curvature angle by choosing to consider nanotubes ($\phi_0=360^0$) of various radii and fixed length. We show in Fig.\[fig:Q\_vs\_R\] the dependence of the topological charge on the nanotube radius. For radius $R\lesssim 15a$ the topological charge assumes low values indicating stripe formation around the tube, while in nanotubes with larger radius ($R\gtrsim18a$) a sharp increase of $Q$ is observed signifying skyrmion formation. This behavior of $Q$ is in accordance with the magnetization configuration seen in Fig.\[fig:Skphase\]f ($R=15.9a$), that indicates skyrmion formation along the ridge of the nanotube. In conclusion, the numerical data so far demonstrate that the skyrmion phase of a planar nanostrip with material parameters typical of a ferromagnetic/heavy metal interface ($p\approx16a$), transforms to a stripe phase when the curvature angle or the curvature radius exceeds some characteristic values ($\phi_0\gtrsim100^0$, $R/a \lesssim 15$). It is important to notice in Fig.\[fig:Q\_vs\_R\] that the skyrmion phase disappears when the curvature radius becomes comparable to the pitch length ($R\sim p\sim 16a$). We elaborate further on this point in the next section, by focusing on a nanostrip with a single skyrmion. Skyrmion shape and size ----------------------- The analysis of the skyrmion shape and size in the ground state is a numerically intricate task[@ziv19] especially when the system is in a mixed phase as it occurs in curved nanostrips (Fig.\[fig:Skphase\]). For this reason we increase the discretization level in order to stabilize a single skyrmion in the simulation cell and facilitate the analysis. In particular, we use further on a cell size $a=1nm$ and keep the material parameters $(A_{ex},D,K_u,M_s)$ and the applied field $B$ unchanged. This leads to new rationalized parameters $d/J=0.2$, $k/J=0.025$, $h/J=0.025$, and a pitch length $p\approx33.0a=33nm$. Notice that increasing the discretization level does not affect substantially the physical value of the pitch length, because the latter is a slowly varying function of the grid cell size for $D/A_{ex} \lesssim 1nm^{-1}$ (see Eq.(\[eq:pitch\])). \[htb!\] ![ (Color online) Snapshots of ground state magnetic configurations in curved nanostrips with size $50a\times50a$ $(a=1nm)$. Curvature angles and topological charge are (a) $\phi_0= 0^0$, $Q=0.84$, (b) $\phi_0= 50^0$, $Q=0.83$, (c) $\phi_0=100^0$, $Q=0.84$, (d) $\phi_0=150^0$, $Q=0.99$, (e) $\phi_0=160^0$, $Q=0.52$, and (f) $\phi_0=200^0$, $Q=0.10$. The curved nanostrips (b)-(f) are unwrapped on the $yz$-plane for visual clarity. A uniform field ($h/J=0.025$) is applied in all cases along the $x$-axis. The color code indicates the values of magnetization along the field axis. A transformation from purely skyrmion phase (a), to a mixed skyrmion-stripe phase (e,f), due to increasing curvature, is seen. []{data-label="fig:Single_Sk"}](fig5.jpg "fig:"){width="0.95\linewidth"} In Fig.\[fig:Single\_Sk\], we show the evolution of a single skyrmion that is stable on a planar nanostrip as the nanostrip is curved gradually. For small angles ($\phi\lesssim 100^0$), the skyrmion retains its basic geometrical features, such as its size and axially symmetric shape. The robustness of the skyrmion at small curvature angles is consistent with the constant value of the topological charge at small curvature angles, seen in Fig.\[fig:Q\_vs\_a\]. As the curvature increases, the skyrmion obtains a more elliptical shape while its size decreases. Finally, for larger angles ($\phi\gtrsim160^0$) skyrmion formation is not stable anymore. \[htb!\] ![ (Color online) Dependence of skyrmion circularity ($M_{circ}$) and linearity ($M_{lin}$) on curvature angle of a cylindrical nanostrip with size $50a\times50a~ (a=1nm)$. Error bars are obtained from an average over $30$ independent configurations of the ground state. []{data-label="fig:Sk_MM"}](fig6.jpg "fig:"){width="0.95\linewidth"} To quantify our observations on the magnetic configurations of Fig.\[fig:Single\_Sk\], we perform shape analysis of the skyrmion core ($S$), which is is defined as the compact region of the nanostrip with negative local magnetization ($m_{i,x}<0$). We compute two shape measures of $S$, namely the invariant moments $M_{circ}$ and $M_{lin} $ that measure the degree of circularity[@zun14] and linearity [@sto08], respectively. These are defined as $$\begin{aligned} M_{circ}=\frac{\mu_{00}}{\mu_{20}+\mu_{02}} \label{eq:hue1}\end{aligned}$$ and $$\begin{aligned} M_{lin}=\frac{ \sqrt{(\mu_{20}-\mu_{02})^2+4\mu_{11}^2} }{\mu_{20}+\mu_{02}}, \label{eq:hue2}\end{aligned}$$ where the second order geometric moments are $$\begin{aligned} \mu_{pq}=\frac{1}{N_S}\sum_{i\in S}(y_i-y_c)^p(z_i-z_c)^q \label{eq:moms}\end{aligned}$$ with $p,q$ positive integers satisfying $p+q\le 2$, $N_S$ the number of cells in $S$ and $(y_c,z_c)$ the centroid coordinates $y_c=\sum_i y_i/N_S$ and $z_c=\sum_i z_i /N_S$. In the limiting case of a circle $M_{circ}=1, M_{lin}=0$ and in the case of straight line $M_{circ}=0, M_{lin}=1$. In Fig.\[fig:Sk\_MM\] we show the evolution of the shape measures of a skyrmion with curvature angle. The sudden drop of $M_{circ}$ above $\phi_0 \simeq 100^0$ signifies the skyrmion elongation and eventual annihilation. Below this characteristic angle, the skyrmion retains the circular shape ($M_{circ}\simeq 1$ and $M_{lin}\simeq 0$). Before annihilation, a weak hump in the curve of $M_{lin}$ indicates a weak elongation the skyrmion shape. \[htb!\] ![ (Color online) Dependence of the effective skyrmion radius ($R_{sk}$) on curvature radius ($R$) for curved nanostrips with size $50a\times50a~(a=1nm)$. Dashed line is the $R_{sk}=R$ plot that serves as guide to the eye. Skyrmion annihilation is observed when $R_{sk} \simeq R$ ($\phi_0\simeq 150^o$). The critical curvature radius for skyrmion stability decreases with increasing value of the applied field. []{data-label="fig:Rsk"}](fig7.jpg "fig:"){width="0.95\linewidth"} To study the evolution of skyrmion size with curvature we compute the effective skyrmion radius , with $R_g=\sqrt{\mu_{20}+\mu_{02}}$ the radius of gyration of the skyrmion region $S'$. We define $S'$ as the compact region of the nanostrip with local magnetization less than the saturation value ($m_{i,x} < 0.98$ for $B_x > 0$) and topological charge $Q>0.5$. For a circular region (disk), obviously $R_{eff}$ equals the disk radius, while for an ellipsoidal region $R_{min}<R_{eff}<R_{max}$. In Fig.\[fig:Rsk\] we show the dependence of skyrmion radius on curvature radius for the same nanostrips as in Fig.\[fig:Sk\_MM\]. Starting from the planar limit ($R\gg a$), we notice that $R_{sk}$ remains constant as $R$ decreases up to the point that the two radii become approximately equal. Then a sudden drop of $R_{sk}$ indicates the skyrmion instability and its annihilation. This behavior is also observed for higher field values ($h/J=0.030, 0.035$), where the skyrmion radius is slightly reduced. The stability of the skyrmion phase when $R \gtrsim R_{eff}$ is consistent with what is shown in Fig.\[fig:Q\_vs\_R\] regarding the evolution of the topological charge with nanotube radius. Again in that case, the sudden increase of the curve $Q(R)$, indicating the appearance of the skyrmion phase, occurs when $R\simeq p \simeq ~ R_{sk}$ Seen from a general point of view the curvature radius is a geometrical length scale and the skyrmion radius a physical length scale. Skyrmion stability is established in planar nanostrips where $R/R_{sk}\gg1$ and the stability condition is violated when the two length scales become comparable, in other words when $R/R_{sk} \simeq 1$. This geometrical argument summarizes the stability of skyrmions on curved surfaces as a matter of competition between length scales. Zero-field skyrmions -------------------- \[htb!\] ![ (Color online) (a)-(c) Time evolution of zero-field skyrmions in a nanoelement with size $50a\times50a~(a=1nm)$ and different curvature angles ($\phi_0=50^0,100^0,150^0$). The nanostrips are unwrapped on the $yz$-plane for visual clarity. A uniform field is applied in all cases along the $x$-axis. The color code indicates the values of magnetization along the field direction. (d) Time evolution of the topological charge ($Q$) after switching off the applied field ($t=0$) []{data-label="fig:Sk_t"}](fig8a.jpg "fig:"){width="0.95\linewidth"} ![ (Color online) (a)-(c) Time evolution of zero-field skyrmions in a nanoelement with size $50a\times50a~(a=1nm)$ and different curvature angles ($\phi_0=50^0,100^0,150^0$). The nanostrips are unwrapped on the $yz$-plane for visual clarity. A uniform field is applied in all cases along the $x$-axis. The color code indicates the values of magnetization along the field direction. (d) Time evolution of the topological charge ($Q$) after switching off the applied field ($t=0$) []{data-label="fig:Sk_t"}](fig8b.jpg "fig:"){width="0.95\linewidth"} It is well established that magnetic skyrmions can be stabilized in planar nanoelements of circular shape (dots) in absence of an applied field. These are referred to as zero-field skyrmions. We examine here the possibility of stabilizing zero-field skyrmions in nanoelements that deviate from the planar shape. The size of the nanoelement and the skyrmion pitch are chosen, as in the previous section, such that a single skyrmion is stabilized in the nanoelement. We field cool the system to a very low temperature and at the end of the cooling process we switch off the magnetic field and study the time evolution of the system by recording the magnetization configuration and the topological charge values. Results of the zero-field relaxation of the topological charge are shown in Fig.\[fig:Sk\_t\], where the observation time after reaching the ground state and switching off the field has been about 10 times longer (MCSS=$10^5$) than the relaxation time used during the field-cooling process (MCSS=$10^4$). Distinct behaviors are recored for systems with different degree of curvature. In case of planar nanoelements the topological charge remains almost constant in time indicating the stability of skyrmion at zero field. In systems with small curvature angle ($\phi_0 \simeq 100^0$), the skyrmion is still stable, however, its size increases slightly in the absence of a magnetic field. Increase of skyrmion radius at zero field relative to the non-zero field case is expected on physical grounds, because the Zeeman energy favors ferromagnetic order in expense of moments misalignement within the skyrmion region. However, as seen in Fig.\[fig:Sk\_t\]a, the curvature of the nanoelement enhances this effect. The weak increase of the topological charge from $Q\simeq 0.8$ to $Q\simeq 1.2$ that accompanies the increase in size of the zero-field skyrmion ($\phi_0 \lesssim 100^0$) is understood as an outcome of thermal fluctuations and misalignment of the moments along the free boundaries.[@roh13] For larger curvature angles ($\phi_0 \simeq 150^0$) the skyrmion becomes unstable at zero field and it gradually transforms to a stripe-like structure. This behavior is characterized by decreasing values of the topological charge with time. Interestingly, in case of planar nanoelemets the stabilization of zero-field skyrmions is attributed to the presence of free boundaries that repel the skyrmion. It becomes clear form Fig.\[fig:Sk\_t\] that the same argument holds in the case of curved nanoelements provided the curvature angle remains below a characteristic angle ($\phi_0~100^0$) that corresponds to a curvature radius ($R=L/\phi_0$) comparable to the skyrmion radius($R\sim R_{sk})$. Conclusion and Discussion ========================= We have studied the influence of curvature on the stabilization of Néel skyrmions in thin nanostructures with cylindrical shape and competing exchange and Dzyaloshinskii-Moriya interactions. We showed that application of a uniform magnetic field normal to the cylinder axis is adequate to stabilize the skyrmions. A geometrical criterion for the stabilization of skyrmions is shown to be the curvature radius of the surface to be at least of the size of the skyrmion radius ($R\gtrsim R_{Sk}$). Similarly, zero-field skyrmions can also be stabilized on cylindrical nanoelements, provided the above geometrical criterion is satisfied. With increasing curvature of the magnetic surface a transformation from a purely skyrmion phase to a mixed skyrmion-stripe phase occurs. The appealing fact is that the two phases are spatially separated. Skyrmions form on the ridge of the curved surface, namely a zone parallel to the cylinder axis where the external field is normal or almost normal to the surface and stripes form on the lateral side of the surface, where the magnetic field is parallel or almost parallel to the surface. Our study showed the feasibility of stabilizing skyrmions on nanotubes. In particular, a core/shell magnetic nanowire with heavy metal core and thin transition metal shell could be candidate physical systems to support interface skyrmions in the shell layer. Alternatively, nanotubes of a B20 material are also expected to support Bloch skyrmions in the surface with a similar physical behavior as the Néel skyrmions studied here. The spatial separation of skyrmions from stripes in the thin ferromagnetic cylindrical shell layer is anticipated to bring new perspectives in current-driven dynamics of skyrmions in curved nanostructures, since the applied magnetic field provides the required confining energy barrier that keeps skyrmions along the ridge of the nanotube and prohibits boundary annihilation due to the Skyrmion Hall effect. We hope that our results will stimulate further experimental work in the field of spintronics with magnetic skyrmions in nanowires and nanotubes. Acknowledgments {#acknowledgments .unnumbered} =============== The authors (DK and LT) acknowledge financial support by the Special Account for Research of ASPETE through project *NanoSky* (No 80146). AP is co-financed by Greece and the European Union (European Social Fund- ESF) through the Operational Programme «Human Resources Development, Education and Lifelong Learning» in the context of the project “Strengthening Human Resources Research Potential via Doctorate Research” (MIS-5000432), implemented by the State Scholarships Foundation (IKY). [46]{} natexlab\#1[\#1]{} bibnamefont \#1[\#1]{} bibfnamefont \#1[\#1]{} citenamefont \#1[\#1]{} url \#1[`#1`]{} urlprefix \[2\][\#2]{} \[2\]\[\][[\#2](#2)]{} , ****, (). , , , , , , , , ****, (). , , , , , , , , ****, (). , , , , , , , , ****, (). , , , , , , , , ****, (). , , , , , , , , ****, (). , ****, (). , ****, (). , , , ****, (). , , , , , ****, (). , ****, (). , , , ****, (). , , , ****, (). , , , , , , , , , ****, (). , , , , , , ****, (). , , , , , , , , ****, (). , ****, (). , ****, (). , , , ****, (). , ****, (). , , , , ****, (). , , , , , , , , ****, (). , , , , **** (). , , , ** (, ). , , , , , , , , **** (). , , , , , ****, (). , , , **** (). , , , , , , , , ****, (). , , , , , , ****, (). , , , ****, (). , , , , ****, (). , , , , , , ****, (). , , , , ****, (). , , , , ****, (). , , , , , ****, (). , , , , , , , , , , , ****, (). , ****, (). , , , , , , ****, (). , , , , , ****, (). , , , , , , , ****, (). , ** (, ). , , , , ****, (). , ****, (). , , , , , , ****, (). , , , ****, (). , , , ****, ().
{ "pile_set_name": "ArXiv" }
Dragon Ball FighterZ will launch for PlayStation 4, Xbox One, and PC in Japan on February 1, 2018 for 7,800 yen, the latest issue of V-Jump reveals. New playable characters Nappa and Captain Ginyu are also revealed. Nappa can summon Saibamen and use the Meteor special attack “Kappa!” Captain Ginyu has a technique that summons The Ginyu Force, and can use the Meteor special attack “Body Change” to switch characters and HP with his opponent. In Story Mode, an event occurs in which the Super Warriors fall one after the other. When Goku awakens, the spirit of the player will be linked to him. In this way, the story will develop by linking characters with the player’s spirit. In the Android Chapter, for example, the spirit of the player is linked with Android 18. And in the Enemy Warriors Chapter, the spirit of the player is linked with Frieza. You can also deepen your bonds with characters. If your bonds are deep enough, you will be able to hear private conversations, such as Yamcha saying, “I want to get married!” or Vegeta saying, “Bulma has a nasty personality…” In Story Mode, you will be able to freely choose whether to battle and build experience points, rescue allies, learn skills, and more while advancing on a map. In North America and Europe, Dragon Ball FighterZ is due out in early 2018 and February 2018, respectively. Thanks, Ryokutya2089. Update 8:43 a.m.: Added scan, via ShonenGamez.
{ "pile_set_name": "OpenWebText2" }
Recurrent Herpes Labialis in Adults: New Tricks for an Old Dog. <p>Herpes labialis remains a common worldwide affliction. Recent advances in understanding the basic pathogenesis have led to new therapeutic intervention, both on-label and off-label. Aside from reducing the duration and symptomatology of acute outbreaks, another goal of treatment is to decrease the frequency of future episodes. Oral and topical acyclovir and its analogues are the mainstay of both chronic suppressive and episodic therapy. A new muco-adhesive formulation of acyclovir provides a decrease in outbreaks, probably due to a diminution of herpesvirus load in all reservoir sites. Acyclovir-resistant strains are rare in immunocompetent hosts; parenteral foscarnet and cidofovir are administered in this situation. Parenteral acyclovir is the drug of choice for eczema herpeticum, which may begin as herpes labialis in an atopic dermatitis patient. Thermotherapy may be beneficial, and a certified device to deliver heat is available outside the United States.</p> <p><em>J Drugs Dermatol. 2017;16(3 Suppl):s49-53.</em></p>.
{ "pile_set_name": "PubMed Abstracts" }
[Mechanism of synergism of the sympathetic and parasympathetic nervous system in regulating cardiac and gastric activity]. The authors studied the mechanism of the higher vagus suppression of cardiac performance, which occurs when irritation of the sympathetic nerve is added to that of the vagus and when gastric motility occurring with the irritation of the sympathetic trunk is stimulated. Preganglionic serotonic fibers synaptically connected with serotoninergic intramural neurons are involved in showing these mechanisms.
{ "pile_set_name": "PubMed Abstracts" }
This proposal seeks support for the training of Dr. Supriya Saha, a medical oncologist at the Massachusetts General Hospital (MGH) Cancer Center, toward his goal of becoming an independent physician-scientist with a focused clinical practice in hepatobiliary cancers and a research laboratory dedicated to the study of cholangiocarcinoma. Dr. Saha will be mentored by Dr. Nabeel Bardeesy, a leader in mouse models of gastrointestinal cancer, and Dr. Andrew Zhu, a clinical expert in hepatobiliary cancers. Intrahepatic Cholangiocarcinoma (ICC) has an average survival of < 1 year and has been increasing in incidence for several decades. With no effective targeted therapies or methods for prevention or early detection currently available, there is an urgent need for a greater focus on basic and translational ICC research. Recent studies have identified missense mutations in the metabolic enzymes isocitrate dehydrogenase 1 or 2 (IDH1/2) as the most common genetic alterations in ICC. Mutant IDH (IDH*) has been proposed to contribute to tumorigenesis through an intriguing mechanism whereby the IDH* enzyme produces an `oncometabolite', 2-hydroxglutarate (2HG), that inhibits a family of enzymes requiring alpha-ketoglutarate as a co-factor. Unfortunately, the lack of animal models of IDH*-driven ICC or human cell lines with endogenous IDH mutations has hindered elucidation of the oncogenic mechanisms and of effective therapies against IDH* disease. Over the last 3 years, Dr. Saha has worked in Dr. Bardeesy's laboratory to overcome these hurdles by defining the mechanism by which IDH* promotes ICC and generating the first genetically engineered mouse model of IDH* ICC. Simultaneously, Dr. Saha designed and implemented a clinical protocol to obtain fresh patient samples to generate a rich panel of human ICC cell lines and patient-derived xenografts. In collaboration with Dr. Cyril Benes, these tools were subjected to a high-throughput drug screen to identify a class of kinase inhibitors with potent and specific efficacy against IDH* ICC. During the award period, Dr. Saha will complete studies required for the effective translation of his work into an early phase clinical trial. This includes evaluating the se of targeted kinase inhibition in an autochthonous mouse model of IDH* ICC, using proteomic approaches to identify the specific targets and mechanism of action of kinase inhibition in ICC and exploring the potential mechanisms of resistance that may develop in this disease. This work will benefit from the breadth of expertise at MGH, which houses leading research groups in cancer genetics, molecular biology, signal transduction and cancer therapeutics, and was the first institution to identify IDH mutations in ICC. Given his extensive background in laboratory research, promising preliminary results and the superb mentorship he will receive, Dr. Saha anticipates applying for independent funding within the third year of this award.
{ "pile_set_name": "NIH ExPorter" }
Q: TCL regexp for detecting non-whitespace I am applying tcl regex to these 2 data, I wanted to extract the 2nd column data: 1: Common point: rt123_345_no/qwe_rty/sdf34x56/CFR 2: Common point: NA This regex works for 1st data, but won't work for 2nd data: regexp -inline -expanded -- {Common\spoint:\s+?(\S+)\s+} $line I don't understand why the regex won't work. Please advise. A: There are two issues: There is no whitespace after NA, thus, the last \s+ will fail the match here by all means The \s+? lazy pattern sets the greediness for the branch, and the \S+ will behave as \S+?, capturing just one N from NA since +? lazy quantifier makes the regex engine match as few chars matching the quantified pattern as possible. Use Common\spoint:\s+(\S+)
{ "pile_set_name": "StackExchange" }
Q: Returning *this in member functions I recently used a library that allows the following type of syntax: MyClass myObject; myObject .setMember1("string value") .setMember2(4.0f) .setMember3(-1); Obviously this is accomplished by having the setters return a MyClass & type; something like return *this. I like the way this code looks, but I don't see it a lot. When that happens I'm usually suspicious as to why. So, is this a bad practice? What are some of the implications of doing it like this? A: This is sometimes referred to as the Named Parameter Idiom or method chaining. This isn't bad practice, it can aid readability. Consider this example lifted from the C++ FAQ File f = OpenFile("foo.txt") .readonly() .createIfNotExist() .appendWhenWriting() .blockSize(1024) .unbuffered() .exclusiveAccess(); The alternative would be to use positional arguments to the OpenFile method, requiring the programmer to remember the position of each argument. A: Some people call this fluent programming (or a fluent interface). Others call it a mess. I tend somewhat toward the latter camp. In particular, my experience has been that in many cases, people writing code this way depend on the "fluent interface" for quite a bit of initializing an object. In other words, despite the disguise, it's still two-step initialization. Likewise, although it's probably avoidable in many cases, it frequently seems to result in quite a bit of what should be entirely private to the class being made publicly modifiable via manipulators. Personally I prefer that objects are immutable after creation. That's clearly not always possible, and in some cases you can't even come very close. Nonetheless, the more of an object's internals that you make open to outside manipulation, the less certain you become about that object maintaining a coherent state (and, typically, the more work you have to do to maintain a coherent state). A: Your example is not the named parameters idiom. With the named parameters idiom, the chainable setters set attributes of an argument (parameter) pack. Your code instead has a bunch of setters for modifying the final object you're constructing, called two-phase construction. In general two-phase construction is just Bad™, and two-phase construction implemented by exposing attributes to client code, as in your example, is Very Bad™. For example, you do not, in general, want to be able to modify a file object's attributes, once that object has been constructed (and possibly file opened). Cheers & hth.,
{ "pile_set_name": "StackExchange" }
Field of the Invention This invention relates to the bonding of two dissimilar polymeric resin composition surfaces. In a particular embodiment, the invention relates to a process for bonding an epoxy resin matrix reinforced with glass fibers to the surface of polyvinyl chloride pipe whereby the pipe is reinforced and withstands high pressures without rupture of the interface bond between the epoxy resin and the polyvinyl chloride surface. For some time plastic pipe made of one or more layers each of polyvinyl chloride and epoxy-impregnated glass fibers has been widely used in the construction and plumbing industries. Light weight and resistance to corrosion have been among the desirable properties of this type of pipe. This pipe conventionally consists of an inner hollow cylinder of polyvinyl chloride overlaid with a wrapping of epoxy-impregnated glass fibers. In some cases only a single layer of each material is used; in other cases, however, the first layer of epoxy-impregnated glass fibers is overlaid with a second polyvinyl chloride layer, which is itself then overlaid with a second layer of epoxy-impregnated glass fiber. Any number of such multiple alternating layers may be thus built up. Bonding between each pair of dissimilar surfaces of the alternating layers of epoxy-impregnated glass fiber and polyvinyl chloride has, however, been a serious problem, often reaching critical dimensions where the pipe consists solely of a relatively thin polyvinyl chloride inner cylinder overlaid with only one or two layers of an epoxy-impregnated glass fiber wrapping. Since polyvinyl chloride and epoxy do not substantially chemically bond with each other, mechanical forces were depended upon to maintain the integrity between the layers of the pipe. However, these mechanical forces were insufficient to withstand the countervailing forces produced by the fluid pressure within the pipe, and the layers of the pipe would become separated. This was particularly aggravated whenever it was necessary to cut into the pipe, as with a conventional pipe joint, thereby exposing the interface in the cut cross-section of the pipe to the full line pressure carried within the pipe.
{ "pile_set_name": "USPTO Backgrounds" }
The late, great Lt. Col. Alfred D. Wintle was opinionated, brave, comical, intelligent, and, most importantly, hugely entertaining. A true “character.” He once attempted to escape a hospital dressed as a female nurse in order to rejoin the war effort, but his monocle gave him away; as a prisoner of war in France during World War II, he went on hunger strike for a fortnight to protest his prison guards’ “slovenly” appearance; years later, post-war, he actually took control of a train when he realised there weren’t enough first-class seats, refusing to leave the driver’s cab until the situation was rectified. In 1958, he made history by winning, without a lawyer, a three year legal battle against a dishonest solicitor that ended in the House of Lords. The stories are endless, and his autobiography is highly recommended. He wrote the following brief letter to the offices of The Times in 1946, where it has quite rightly been preserved ever since. Transcript follows. Huge thanks to Nigel Brachi. (Source: Past. Present. Future. To celebrate Two Hundred Years of Publication; Image: Alfred Wintle in 1945, via LIFE.) Transcript From Lt. Col. A.D. Wintle. The Royal Dragoons Cavalry Club 127 Piccadilly W.1. To the Editor of The Times. Sir, I have just written you a long letter. On reading it over, I have thrown it into the waste paper basket. Hoping this will meet with your approval, I am Sir Your obedient Servant (Signed, ‘ADWintle’) 6 Feb ’46
{ "pile_set_name": "OpenWebText2" }
1. Introduction {#sec1} =============== Convulsive interventions have been used to treat mental disorders since the 16th century up to the moment in the form of electroconvulsive therapy (ECT) \[[@B1]\]. The most common therapeutic indication of ECT is major depression disorder (MDD) and its effectiveness in reducing depressive symptoms has been confirmed in several studies \[[@B2]\]. However, the cognitive complications of ECT have been reported as the main limitation for its use. These side effects occur more in patients with depression. Cognitive side effects and memory deficits are considered as a major limitation to the use of ECT, with 12.4% prevalence for permanent anterograde amnesia in a community setting \[[@B3], [@B4]\]. Despite this, almost all patients return to their previous cognitive status within six months. However, some patients seriously complain of permanent drawbacks in their memory \[[@B3]\]. Disorientation, destruction of processing speed, anterograde and retrograde amnesia, impaired visual and spatial function, and word finding difficulty usually occur immediately after an ECT session. Except for anterograde memory impairment, other cognitive effects of ECT return to the baseline. Anterograde memory improvement occurs gradually, but point defects may still remain. Fraser et al. \[[@B5]\] have also shown that memory may be affected by ECT for a short-term (less than six months). Falconer et al. \[[@B6]\] showed that memory problems can be resolved after a one-month intervention. This study used Cambridge Neuropsychological Test Automated Battery (CANTAB) for cognitive assessments and showed that impairment in spatial recognition may be observed two weeks after ECT. Another study reported short-term and long-term deficits in autobiographical memory occurring shortly and two months after ECT, respectively, in patients with MDD. These patients had a poor performance in stating the exact details of stories and most had difficulty in remembering stories of others compared with their personal biography. Retrograde amnesia was reduced after 2 months of follow-up, but impairment in remembering the recent public events in detail continued still \[[@B7]\]. Although various medical interventions are suggested to reduce the cognitive deficits after ECT, no specific medicine has been found for improving them. Numerous studies investigated the preventive effects of galantamine \[[@B8]\], physostigmine \[[@B9]\], naloxone \[[@B10]\], dexamethasone \[[@B11]\], and piracetam \[[@B12]\] on ECT-associated memory deficit. Some have shown the positive effect of thyroid hormones on cognitive side effects of ECT \[[@B13]\]. However, there is a high tendency to use N-methyl-D-aspartate antagonists such as anesthetic ketamine and thyroid hormone. There also is some information about the use of physostigmine, thyroid hormone, and naloxone, indicating that they can reduce the psychological effects of ECT, but their effects are not well studied and identified yet. Liothyronine is used to increase the response to ECT and if administered at the beginning of an ECT course, response time and the incidence of cognitive problems are reduced \[[@B4]\]. In a study evaluating effects of liothyronine, piracetam, and placebo, biographical memory and mental control did not decrease in the liothyronine group, but orientation declined gradually until the last session of ECT and then significantly increased in a one-month follow-up \[[@B12]\]. Despite the effectiveness of ECT in treatment of MDD patients have concerns about the cognitive effects of ECT and memory deficits in particular. The main incentives of this research are the increasing use of ECT in treatment of MDD, scientific need for more precise information about it, and suggestion of previous researchers for further complementary studies. Accordingly, the present study investigates the effectiveness of liothyronine on ECT-induced memory deficit in patients with MDD. 2. Methodology {#sec2} ============== The study protocol was approved by the Institutional Review Board of Tabriz University of Medical Sciences in accordance with the principles of the Declaration of Helsinki. This trial is registered with the Iranian Clinical Trials Registry (IRCT: [IRCT201401122660N2](http://www.irct.ir/searchresult.php?keyword=&id=2660&number=2&prt=6002&total=10&m=1)). This is a double-blind clinical trial, in which the evaluator and the patients were unaware of the medication received by the patients (liothyronine or placebo). Sixty inpatients and outpatients with MDD who were referred to the ECT Ward, Razi Psychiatric Hospital, Tabriz, Northwest of Iran, were enrolled in this study. The diagnosis was based on the criteria of DSM-IV-TR, using the structured clinical interview for DSM-IV (SCID-IV). The inclusion criteria were the diagnosis of MDD, giving written informed consent, age between 20 to 50 years, Being candidate for receiving ECT based on diagnosis of a psychiatrist, and no history of ECT during the last 6 months. The exclusion criteria were any contraindications of liothyronine, drug and alcohol abuse, organic brain disorders, mental retardation (based on the patients\' history, physical examination, and medical records). Patients who experienced ECT-induced delirium or completed less than 6 sessions for any reasons were also excluded. Selected patients were randomly assigned to experimental and control groups and assessed by the Wechsler Memory Scale-Revised (WMS-R) test as described later. The two groups were matched in terms of depression severity. Then the experimental and control groups received liothyronine and placebo, respectively. Two months after the end of ECT sessions, WMS-R posttest was performed for both groups. For the intervention group, liothyronine (two tablets of 25 mcg) was administered orally from the day before beginning of ECT every morning until the last session. Lactose tablets which were similar to liothyronine in appearance were used as placebo in this study with the same directions as liothyronine for the intervention group. Patients were asked to stop any other medications during the study. ECT was administered by Thymatron DGX device (Somatics, ILC, lake Bluff, USA) through bilateral technique following a dose titration method. A bilateral dosage at 50--100% above seizure threshold of the patient (the first stimulus was set at 125 millicoulombs; the mean threshold was 100) was ensured to induce an acceptable convulsion duration between 15 seconds to 3 minutes. Thus in all sessions, ECT would have deemed ineffective if the convulsion had lasted less than 15 seconds and hence was not accounted as an effective ECT. In this state, the electric shock was repeated only once at the same session by 5--10% increase at repeated one. If convulsion had lasted longer than 3 minutes, patients would have been introduced to a neurologist for examination; however, this did not occur in this study. 6--12 ECT sessions were held for recruited patients, three times per week. 3. Measurements {#sec3} =============== 3.1. Wechsler Memory Scale-Revised {#sec3.1} ---------------------------------- Wechsler Memory Scale (WMS) was designed in 1970 by Wexler. The Revised WMS (WMS-R) consists of 5 subscales (general memory, attention/concentration, verbal memory, visual memory, and delayed recall) and evaluates different aspects of memory. Psychometric properties of Farsi version of WMS-R have been evaluated in Iran, in people aged 16 to 64 years. In this study, test-retest reliability coefficients were reported as 0.28 to 0.98 for the subscales and compositions. The average raw scores of the two groups of clinical and normal subjects were compared to evaluate the validity of WMS-R, indicating that the mean raw scores of the clinical group were significantly lower than that of the normal subjects \[[@B14]\]. 3.2. Hamilton Rating Scale for Depression {#sec3.2} ----------------------------------------- The Hamilton Depression Rating Scale (HRSD) is a 21-item multiple-choice scale which assesses various dimensions of depression: behavioral, physical, emotional, guilt, hypochondriasis, sex issues, job, suicide, and sleep disorders. This scale was used in this study to assess the severity of depression and to match the groups. The reliability and validity of the scale have been confirmed in several studies \[[@B15]\]. 3.3. Structured Clinical Interview for DSM-IV (SCID-IV) {#sec3.3} ------------------------------------------------------- This is a structured clinical interview based on DSM-IV criteria, for diagnosing MDD and other psychiatric disorders associated with Axis I and Axis II. SCID-IV has been used more than any other forms of psychiatric diagnostic interviews in psychological studies and has a global credibility. The reliability and validity of SCID-IV have been assessed in Iran, showing an acceptable reliability and validity \[[@B16]\]. 3.4. Statistical Methods {#sec3.4} ------------------------ All statistical analyses were performed using SPSS version 21. The data are reported by means of descriptive statistics (i.e., mean, SD, frequency, and percentage). Independent *t*-test was used to compare the significance of difference between the control and test groups. In addition, paired *t*-test was employed to determine differences in pretest and posttest mean scores from WMS-R in each group. Analysis of covariance (MANCOVA) was used to compare the difference between the posttest scores of both groups in WMS-R, with controlling the pretest. *P* values less than 0.05 were considered significant. 4. Findings {#sec4} =========== Sixty patients were enrolled in the liothyronine (*n* = 30) and placebo groups (*n* = 30). The minimum and maximum ages of the patients were 20 and 50 years. Most patients were female (76.7% of target group and 70% of controls), with an education level of diploma or higher (academic), married, housewife, and from urban area. All patients were diagnosed with major depressive disorder, without comorbidities or history of ECT in the recent six months. The majority of patients underwent 7 sessions of ECT. Demographic characteristics of these patients are presented in [Table 1](#tab1){ref-type="table"}. [Table 2](#tab2){ref-type="table"} depicts the scores of WMS-R in the liothyronine and placebo groups. A paired *t*-test was applied to scores of patients receiving placebo and no significant change was observed in verbal memory and general memory, while visual memory, attention/concentration, and delayed recall scores were significantly reduced after ECT (*P* \< 0.05). In patients receiving liothyronine, visual memory and attention/concentration had no significant change after ECT, but verbal memory and general memory scores were significantly increased in posttest measuring (*P* \< 0.01). The univariate analysis of covariance (with pretest control) was used to evaluate the effect of each group on all research\'s variables. Before using multivariate analysis of covariance (MANCOVA), normal distribution of the dependent variables and the associated variables, variance homogeneity and covariance homogeneity of the groups, and the weakness of correlation between the variables were ensured. [Table 3](#tab3){ref-type="table"} shows that difference in the mean scores of verbal memory between the two groups in posttest is significant (*F*(1,25) = 13.95, MS = 1149.05, *P* = 0.001, and Eta^2^ = 0.21). Difference in the mean scores of visual memory between the two groups in posttest is significant in both groups (*F*(1,25) = 5.03, MS = 785.70, *P* = 0.02, and Eta^2^ = 0.09). Difference in the mean scores of general memory between the two groups in posttest is significant (*F*(1,25) = 13.45, MS = 1744.04, *P* = 0.001, and Eta^2^ = 0.20). Difference in the mean scores of attention/concentration between the two groups in posttest is significant (*F*(1,25) = 5.87, MS = 795.05, *P* = 0.05, and Eta^2^ = 0.10). Difference in the mean scores of delayed recall between the two groups in posttest is significant (*F*(1,25) = 19.27, MS = 1662.12, *P* = 0.001, and Eta^2^ = 0.27). Therefore, it can be concluded that liothyronine effectively increases memory functioning (verbal memory, visual memory, general memory, attention/concentration, and delayed recall). Based on Eta square index, 9%--27% of improvement in verbal memory, visual memory, general memory, attention/concentration, and delayed recall was due to liothyronine. 5. Discussion {#sec5} ============= The results of this study showed that liothyronine can prevent memory deficit after ECT in patients with MDD. Despite clinical indication, patients may disagree to start or discontinue the ongoing treatment course with ECT \[[@B17]\] because of its well-known cognitive side effects \[[@B18]\]. Several efforts have been made to find a practical and effective preventive treatment for memory deficits after ECT. Add-on strategies seem to be the most popular \[[@B19]\]. Promising outcome has been reported by previous studies using thyroid hormone as an add-on strategy to ECT. These studies, not many, have not influenced guidelines yet, because of diversity in methodology and their limitations. The current study matches up with previous reports in terms of effect of liothyronine. Stern et al. \[[@B20]\] randomized 20 patients with MDD and reported that patients receiving liothyronine (*n* = 11) performed better in measure of remote personal memory, but not learning or recall. Hamidia et al. \[[@B21]\] also reported that liothyronine could prevent memory deficits after ECT in patients with MDD. Masoudzadeh et al. \[[@B22]\] stated that patients who received liothyronine achieved better scores on the depression and memory scales, beginning after 6 sessions of ECT. Both of latter studies also had a small sample size (40 and 30 in that order) but showed improvement on both the Hamilton Rating Scale for Depression and the Revised Wechsler Memory Scale. Stern et al. \[[@B23]\] repeated the same trial with 30 patients later and liothyronine could improve verbal learning performance and remote memory. The present study replicated these results with a larger sample size. Most of the previous studies did not examine memory subscales. Our findings show that the mean scores of the experimental group in terms of verbal memory and general memory had an improvement attributable to the use of liothyronine, though this improvement was small. Different mechanisms have been proposed to explain the discussed effect of liothyronine. A neuroprotective effect has been confirmed for triiodothyronine (T3) when electroconvulsive shock is administered to rats \[[@B24]\]. Additionally, anticonvulsive effect of thyrotropin releasing hormone will diminish when it is suppressed by exogene liothyronine. This may lower the required dose of electroshock and consequently decrease the damage and adverse cognitive effects \[[@B22]\]. Additionally, Siegrist and Kaiser \[[@B25]\] believe that the number of ECT sessions has no impact on memory and that decreased thyroxine (T4) may be the reason for the reduced rate of neural actin polymerization. Thus, when the level of T3 declines in patients receiving liothyronine, this leads to a temporary disruption in actin cytoskeleton and could protect cells from destructive effects of convulsion in amygdala and hippocampus neurons. These two constructs are very sensitive to convulsion and play an important role in memory and learning. This study had some limitations. In this study, the interactive effects of individual variables and variables such as the severity of depression and thyroid hormone alterations were not studied. We also suggest to conduct a study on patients with MDD who receive liothyronine for preventing cognitive effects of ECT but still suffer from symptoms of memory deficit after ECT to find predictive characteristics of effectiveness of such treatment. Selecting patients with MDD provided a homogenous sample; however, other studies with different samples are required to ensure that the beneficial effect is not only limited to depressed patients. We were also unable to take the seizure threshold into account or the stimulus charges of the effective electric shock. 6. Conclusion {#sec6} ============= The results showed that liothyronine improves the performance of verbal memory, visual memory, attention/concentration, and delayed recall in patients with MDD who receive ECT. This study, adds to the evidence that liothyronine may have a positive impact in preventing memory impairment caused by ECT in depressed patients. This study was supported by Research Center of Psychiatry and Behavioral Sciences, Tabriz University of Medical Sciences. Conflict of Interests ===================== The authors declare that they have no conflict of interests. ###### Demographic and individual characteristics of the patients undergoing ECT; each group included thirty patients.   Liothyronine Placebo --------------------------- ------------------ ------------------ Age 34.90 ± 8.06^\*^ 33.60 ± 7.99^\*^ Hamilton depression score 62.56 ± 5.82^\*^ 62.63 ± 6.96^\*^ Gender      Male 7 (23.3) 9 (30)  Female 23 (76.7) 21 (70) Education level      Primary school 7 (23.3) 8 (26.7)  Middle school 7 (23.3) 8 (26.7)  Graduate/postgraduate 16 (53.4) 14 (46.6) Marital status      Single 9 (30) 7 (23.3)  Married 20 (66.7) 17 (56.7)  Divorced/widowed 1 (3.3) 6 (20) Occupation      Employee 9 (30) 12 (40)  Housewife 21 (70) 18 (60) Location      City 24 (80) 24 (80)  Village 6 (20) 6 (20) Number of ECT sessions      Six 6 (20) 4 (13.3)  Seven 14 (46.7) 19 (63.9)  Eight 1 (3.3) 0  Ten 4 (13.3) 5 (16.7)  Twelve 5 (16.7) 2 (6.7) ^\*^As mean ± standard deviation. ###### Mean and standard deviation of the WMS-R and the results of paired *t*-test in both groups. Variables Liothyronine Placebo ------------------------- -------------- --------- ------- ------- ------- ------- Verbal memory 67.53 75.63 0.001 65.43 63.83 0.15 Visual memory 80.70 81.66 0.74 73.10 67.36 0.005 General memory 68.46 74.20 0.005 61.73 57.76 0.21 Attention/concentration 92.06 94.90 0.33 86.73 82.56 0.01 Delayed recall 72.03 76.06 0.066 64.43 60.40 0.02 ###### Results of univariate analysis of covariance of liothyronine effect on memory posttest with pretest control. Variables Sum of squares df Mean square *F* *P* value Eta^2^ Power ------------------------- ---------------- ---- ------------- ------- ----------- -------- ------- Verbal memory 1149.05 1 1149.05 13.95 \<0.001 0.21 0.95 Visual memory 785.70 1 785.70 5.03 0.025 0.09 0.61 General memory 1744.04 1 1744.04 13.45 0.001 0.20 0.94 Attention concentration 795.05 1 795.05 5.87 0.019 0.10 0.66 Delayed recall 1662.12 1 1662.12 19.27 \<0.001 0.27 0.99 [^1]: Academic Editor: Cristiano Capurso
{ "pile_set_name": "PubMed Central" }
Andrew Scheer has been leading the Conservatives in the House of Commons and across the country for over six months now. He won the contest over contenders from inside the Conservative caucus and a few running as outsiders (who used to be insiders). The Conservative ‘base’ is called that because social conservatives really don’t have any alternative party to vote for. They are a key party constituency because they show up consistently at election time, they volunteer, and they are motivated to donate to leaders who share their values — even if they don’t always publicly champion them. When the final vote came down in the Conservative leadership race, the more overt social conservative candidates — like MP Kellie Leitch and MP Brad Trost — had been eliminated. Their supporters turned to Scheer to combat the Libertarian movement led by Maxime Bernier. Scheer has not had to answer since for his status as a social conservative. Fast forward six months and Trost and Leitch have been consigned to the Conservative backbenches. They have been given no roles in Scheer’s ‘shadow cabinet’ — a tent so big it even includes deputy shadow cabinet ministers. Meanwhile, outside of the Ottawa bubble, Scheer’s momentum has stalled. Conservatives are trailing in the polls. They lost two incumbent MPs in recent by-elections to the Liberals. Conventional wisdom says by-elections are stacked against the governing party. So what’s going on? The CBC recently reported that Leitch and Trost are facing contested nominations to run again for their seats. Challengers are seeking to be the Conservative voice in their ridings. Is it an accident that these people decided to contest nominations in ridings represented by two so-con former rivals for the party leadership? Or were they nudged by top party brass to put in their paperwork? Either way, Scheer should not be losing sleep over the prospect of a shakeup in his caucus. This is precisely what happened after Justin Trudeau won the Liberal leadership. The promise of ‘open nominations’ — without the leader stepping in to name a parachute candidate — was enticing to those who felt that they had no shot before. Trudeau would not have some of his key team members right now without vigorous, hard-fought nomination battles among multiple candidates, ramping up enthusiasm among local party supporters. Scheer may want to look to Patrick Brown’s example if he wants to rid himself of a few of the relics in his midst. Scheer may want to look to Patrick Brown’s example if he wants to rid himself of a few of the relics in his midst. It also encouraged a few long-time political veterans who had been tightly gripping the reins of their local associations to let go and make way for new blood. Supposed shoo-ins like Yolande James, Marisa Sterling and Rana Sarkar lost because other candidates were able to organize better, getting more of their supporters out to vote on the day. That, in large part, is how elections are won. Many of Trudeau’s MPs in strategic ridings launched their political careers through the same open, hotly-contested process. As everyone knows by now, Ontario Progressive Conservative leader Patrick Brown is going through his own nomination troubles. But notwithstanding all the bad press about how shamelessly he has been interfering with nominations, he may come out of the process with a stronger party — and an important lesson for his former caucus colleague, Andrew Scheer. If Brown can eliminate the party’s baggage and put together a team that he trusts to deliver, he can shake off grim memories of recent Progressive Conservative losses. His party has committed to investments in mental health and child care, to improve accountability and to cut taxes and hydro rates. In other words, it’s a platform that’s not far removed from what Premier Kathleen Wynne was planning. It’s a platform for a new PC party, a centrist one that shuns the Ford Nation connections of the recent past and looks to make common cause with the sort of voters who used to support Bill Davis. As long as the team selling the plan at the doors does not slip up — or remind people of Hudak, Tory, Eves, Harris, Ford or Harper — a centre-leaning PC party stands to do very well. Brown, like Scheer, is a social conservative — it’s on the record. So far, he hasn’t had to wear it. And notwithstanding the efforts of the Working Ontario Women coalition, Brown is being given the benefit of the doubt. When Trudeau went into the task of building the team, he was able to rebrand the Liberal party itself as something fresh, progressive and politically competitive. Brown has yet to achieve that, but he’s on his way. Scheer may want to look to his example if he wants to rid himself of a few of the relics in his midst. Scheer has found an approach to his role as Opposition leader that he believes is both tough and fair, and contrasts his leadership style to that of the prime minister. He has to be given credit for attempting to rebrand the Conservatives as the party that cares about vulnerable people, and to rebrand Trudeau’s policies as ones that actually hurt the vulnerable. (I don’t buy it, personally, but he had to try something new.) Perhaps a nomination strategy that drops the Trosts and Leitchs can help him burnish that image — and steal some of Trudeau’s centrist vote share in 2019. Shane Mackenzie is an associate consultant with Ensight. He has worked for Liberal members of Parliament and as a social media coordinator for the Liberal Party of Canada, has spent time as a federal public servant and has campaigned at the municipal, provincial and federal levels. The views, opinions and positions expressed by all iPolitics columnists and contributors are the author’s alone. They do not inherently or expressly reflect the views, opinions and/or positions of iPolitics.
{ "pile_set_name": "OpenWebText2" }
Action at Trinity part of week-long protests over ties between colleges and fossil fuel industry This article is more than 6 months old This article is more than 6 months old Extinction Rebellion protesters have dug up the lawn of Trinity College, Cambridge, as part of a week-long series of demonstrations. The climate activists dug channels into the turf in front of the college’s 16th-century great gate with shovels and pitchforks and planted Extinction Rebellion flags. Trinity had stepped up security, closing the college, library and chapel to tourists for the week to prevent protesters from accessing the central great court. A college spokeswoman refused to comment on Monday’s incident but said a statement would be released later. Extinction Rebellion calls for non-violent civil disobedience in an effort to force governments to cut carbon emissions to tackle the climate crisis. “Trinity College must cut ties with fossil fuel companies and stop trying to hawk off nature for profit,” Extinction Rebellion Cambridge said on its Facebook page. “Oh, and it should take the opportunity to replace the lawn with flowers. Spring is just around the corner after all.” In anticipation of the week’s protests, another Cambridge colleges, St Catharine’s, closed the main gate leading to its 17th-century court over concerns that protesters would set up a campsite on the grass. “One of Extinction Rebellions oppositions is to green space being kept behind walls and only accessible to those in power and privilege,” said an email sent to students by the college’s head porter. “Although our main court is actually open for viewing, there is a concern they may try to take it over and possibly camp on it.” Earlier this year, a group of students at the University of Oxford set up a camp in the front quad of St John’s for five days in protest against the college’s investment in fossil fuel companies. Inspired by this, climate protesters in Cambridge put up tents on the lawn in front of King’s.
{ "pile_set_name": "OpenWebText2" }
Frank Rozelaar-Green Frank Rozelaar-Green, sometimes credited as Frank Rozelaar Green, Frank Rozzler Green, Frank Green or Frank Rozelaa-Green, is a film and television actor. Career He has appeared in numerous film and television productions. Film and television work Other appearances Rozelaar-Green also appeared as Christopher Eccleston's dance double in the 2005 episode "The Doctor Dances" of the Doctor Who television series, but he was uncredited. Notes External links Category:Year of birth missing (living people) Category:Living people Category:British male film actors Category:British male television actors Category:British male voice actors Category:Place of birth missing (living people)
{ "pile_set_name": "Wikipedia (en)" }
import torch.nn as nn import math import torch.utils.model_zoo as model_zoo __all__ = ['FBResNet', #'fbresnet18', 'fbresnet34', 'fbresnet50', 'fbresnet101', 'fbresnet152'] pretrained_settings = { 'fbresnet152': { 'imagenet': { 'url': 'http://data.lip6.fr/cadene/pretrainedmodels/fbresnet152-2e20f6b4.pth', 'input_space': 'RGB', 'input_size': [3, 224, 224], 'input_range': [0, 1], 'mean': [0.485, 0.456, 0.406], 'std': [0.229, 0.224, 0.225], 'num_classes': 1000 } } } def conv3x3(in_planes, out_planes, stride=1): "3x3 convolution with padding" return nn.Conv2d(in_planes, out_planes, kernel_size=3, stride=stride, padding=1, bias=True) class BasicBlock(nn.Module): expansion = 1 def __init__(self, inplanes, planes, stride=1, downsample=None): super(BasicBlock, self).__init__() self.conv1 = conv3x3(inplanes, planes, stride) self.bn1 = nn.BatchNorm2d(planes) self.relu = nn.ReLU(inplace=True) self.conv2 = conv3x3(planes, planes) self.bn2 = nn.BatchNorm2d(planes) self.downsample = downsample self.stride = stride def forward(self, x): residual = x out = self.conv1(x) out = self.bn1(out) out = self.relu(out) out = self.conv2(out) out = self.bn2(out) if self.downsample is not None: residual = self.downsample(x) out += residual out = self.relu(out) return out class Bottleneck(nn.Module): expansion = 4 def __init__(self, inplanes, planes, stride=1, downsample=None): super(Bottleneck, self).__init__() self.conv1 = nn.Conv2d(inplanes, planes, kernel_size=1, bias=True) self.bn1 = nn.BatchNorm2d(planes) self.conv2 = nn.Conv2d(planes, planes, kernel_size=3, stride=stride, padding=1, bias=True) self.bn2 = nn.BatchNorm2d(planes) self.conv3 = nn.Conv2d(planes, planes * 4, kernel_size=1, bias=True) self.bn3 = nn.BatchNorm2d(planes * 4) self.relu = nn.ReLU(inplace=True) self.downsample = downsample self.stride = stride def forward(self, x): residual = x out = self.conv1(x) out = self.bn1(out) out = self.relu(out) out = self.conv2(out) out = self.bn2(out) out = self.relu(out) out = self.conv3(out) out = self.bn3(out) if self.downsample is not None: residual = self.downsample(x) out += residual out = self.relu(out) return out class FBResNet(nn.Module): def __init__(self, block, layers, num_classes=1000): self.inplanes = 64 # Special attributs self.input_space = None self.input_size = (299, 299, 3) self.mean = None self.std = None super(FBResNet, self).__init__() # Modules self.conv1 = nn.Conv2d(3, 64, kernel_size=7, stride=2, padding=3, bias=True) self.bn1 = nn.BatchNorm2d(64) self.relu = nn.ReLU(inplace=True) self.maxpool = nn.MaxPool2d(kernel_size=3, stride=2, padding=1) self.layer1 = self._make_layer(block, 64, layers[0]) self.layer2 = self._make_layer(block, 128, layers[1], stride=2) self.layer3 = self._make_layer(block, 256, layers[2], stride=2) self.layer4 = self._make_layer(block, 512, layers[3], stride=2) self.avgpool = nn.AvgPool2d(7) self.last_linear = nn.Linear(512 * block.expansion, num_classes) for m in self.modules(): if isinstance(m, nn.Conv2d): n = m.kernel_size[0] * m.kernel_size[1] * m.out_channels m.weight.data.normal_(0, math.sqrt(2. / n)) elif isinstance(m, nn.BatchNorm2d): m.weight.data.fill_(1) m.bias.data.zero_() def _make_layer(self, block, planes, blocks, stride=1): downsample = None if stride != 1 or self.inplanes != planes * block.expansion: downsample = nn.Sequential( nn.Conv2d(self.inplanes, planes * block.expansion, kernel_size=1, stride=stride, bias=True), nn.BatchNorm2d(planes * block.expansion), ) layers = [] layers.append(block(self.inplanes, planes, stride, downsample)) self.inplanes = planes * block.expansion for i in range(1, blocks): layers.append(block(self.inplanes, planes)) return nn.Sequential(*layers) def features(self, input): x = self.conv1(input) self.conv1_input = x.clone() x = self.bn1(x) x = self.relu(x) x = self.maxpool(x) x = self.layer1(x) x = self.layer2(x) x = self.layer3(x) x = self.layer4(x) return x def logits(self, features): x = self.avgpool(features) x = x.view(x.size(0), -1) x = self.last_linear(x) return x def forward(self, input): x = self.features(input) x = self.logits(x) return x def fbresnet18(num_classes=1000): """Constructs a ResNet-18 model. Args: pretrained (bool): If True, returns a model pre-trained on ImageNet """ model = FBResNet(BasicBlock, [2, 2, 2, 2], num_classes=num_classes) return model def fbresnet34(num_classes=1000): """Constructs a ResNet-34 model. Args: pretrained (bool): If True, returns a model pre-trained on ImageNet """ model = FBResNet(BasicBlock, [3, 4, 6, 3], num_classes=num_classes) return model def fbresnet50(num_classes=1000): """Constructs a ResNet-50 model. Args: pretrained (bool): If True, returns a model pre-trained on ImageNet """ model = FBResNet(Bottleneck, [3, 4, 6, 3], num_classes=num_classes) return model def fbresnet101(num_classes=1000): """Constructs a ResNet-101 model. Args: pretrained (bool): If True, returns a model pre-trained on ImageNet """ model = FBResNet(Bottleneck, [3, 4, 23, 3], num_classes=num_classes) return model def fbresnet152(num_classes=1000, pretrained='imagenet'): """Constructs a ResNet-152 model. Args: pretrained (bool): If True, returns a model pre-trained on ImageNet """ model = FBResNet(Bottleneck, [3, 8, 36, 3], num_classes=num_classes) if pretrained is not None: settings = pretrained_settings['fbresnet152'][pretrained] assert num_classes == settings['num_classes'], \ "num_classes should be {}, but is {}".format(settings['num_classes'], num_classes) model.load_state_dict(model_zoo.load_url(settings['url'])) model.input_space = settings['input_space'] model.input_size = settings['input_size'] model.input_range = settings['input_range'] model.mean = settings['mean'] model.std = settings['std'] return model
{ "pile_set_name": "Github" }
/* 在BC31下编译 */ /* compile under Borland C++ 3.1 */ #include <stdio.h> #include <sys\timeb.h> #define Alpha 3.90 double initvalue(); double random(void)/*返回一个(0,1)之间的随机数*/ { static double f=-1.0; double initvlaue(); if(f==-1.0) f=initvalue(); else f=Alpha*f*(1.0-f); return f; } double initvalue()/*返回随机数序列初值*/ { double f0; struct timeb *pr; for(;;){ ftime(pr); f0=pr->millitm*0.9876543*0.001; if(f0<0.001) continue; break; } return f0; } void main() { double test; int i; clrscr(); puts("This is a random number generator."); puts("\n The random number are: "); for ( i = 0; i < 3; i++ ) { test = random(); printf ( " >> rand%d:%f\n", i, test ); } puts("\n Press any key to quit..."); getch(); }
{ "pile_set_name": "Github" }
# REQUIRES: zlib # RUN: yaml2obj %p/Inputs/compress-debug-sections.yaml -o %t.o # RUN: llvm-objcopy --compress-debug-sections --compress-debug-sections=zlib-gnu %t.o %t-compressed.o # RUN: llvm-objdump -s %t-compressed.o | FileCheck %s # CHECK: .zdebug_foo: # CHECK: ZLIB
{ "pile_set_name": "Github" }
Q: Does trolling count as “rude and abusive”? If I come across a question that I perceive as trolling, is it ok to flag it as “rude and abusive”? For example, this question (since deleted, but not blanked out) isn’t stating that a particular claim is true, it’s merely asking whether a claim is true. And the claim itself is notable: it’s been asked before here. However, the way the question was asked suggests trolling: the body of the question just consists of a link to a Wikipedia article, plus “Is any of this real. I cannot believe it. Literal Holocaust.” A: I'll start by answering your question: yes, if you believe a question (or answer) is an attempt at trolling, and not a genuine good-faith post, then flag it as rude/abusive. I've done the same with troll posts on other SE sites. But for what it's worth: I don't believe that the user in question is a troll. Rather, I believe they simply haven't learned how to articulate their questions in a way that fits StackExchange's guidelines. To wit: Their three previous questions here on Skeptics all essentially consisted of the same thing: "Here's this quote I found from/about a WW2 Axis leader, is it real?" All three required substantial edits to bring them up to our quality standards, but it seems the user didn't realise (or wasn't told) that these edits were necessary, and why. Of their other SE accounts, they had a (now also deleted) question on SO that consisted of a single sentence and was closed at -4, and at least one deleted question on Politics.SE that I can't see. I'll admit that their previous question was a little concerning: their quote was again from Wikipedia, and they ignored all five of its sources on the basis that "they seemed anti-Semitic", without any further explanation. But for now, I think Hanlon's razor applies: they look less like a troll to me, and more like someone who just needs to be shown the ropes.
{ "pile_set_name": "StackExchange" }
Biochemical genetics of nucleotide sugar interconversion reactions. During the past few years, substantial progress has been made to understand the enzymology and regulation of nucleotide sugar interconversion reactions that are irreversible in vivo on thermodynamic grounds. Feedback inhibition of enzymes by metabolic end products appears to be a common theme but some experimental results on recombinant enzymes are difficult to interpret. Using a combination of metabolic flux analysis, enzyme assays, and bioinformatics approaches, the significance of several proposed alternate pathways has been clarified. Expression of plant nucleotide sugar interconversion enzymes in yeast has become a promising approach to understand metabolic regulation and produce valuable compounds. In a major advance for the understanding of the synthesis of arabinosylated cell wall polysaccharides, reversibly glycosylated proteins turned out to act as mutases that interconvert the pyranose and furanose forms of UDP-L-arabinose.
{ "pile_set_name": "PubMed Abstracts" }
This application requests a further five years of support for an Institutional National Research Service Award to support multidisciplinary post-doctoral training in Genetic Epidemiology and Molecular Genetics and Neurobiology. We request support for six postdoctoral fellows (2 M.D. and 4 Ph.D.) for training in Genetic Methodology, Family Epidemiology and Behavior Genetics, Gene Mapping and Bioinformatics, Molecular Genetics, and Molecular Neurobiology. Recruitment will be staggered over two years to assure a high caliber of fellows. In addition to training in a primary area, fellows will be encouraged to obtain a broad understanding of the diverse skills in Psychiatric Genetics to facilitate their collaboration in (and leadership of) cross-disciplinary research teams. The fellowship will usually last three years, but one or two years may suffice for those with much pertinent experience. Fellows with a wide variety of backgrounds will be recruited including; Psychology, Psychiatry, Genetics, Statistics, Mathematics, Anthropology, Sociology, Biology, and Neuroscience. The training program uses an apprenticeship model, combining research under the mentorship of one or more experienced mentors with more formal training through seminars, didactic courses and individual reading. Major strengths of the program are; (i) the participation of a large multidisciplinary group of well-funded preceptors (n=l8) with expertise in statistical and computational genetics, molecular genetics and neuroscience; (ii) the study of quantitative and qualitative traits and the development of methods for the analysis of multivariate phenotypes and (iii) the availability of major epidemiological and genetic data sets (phenotypes and genotypes). Fellows may participate in ongoing linkage and candidate gene studies of Schizophrenia, Bipolar Disorder, Alzheimer's Disease, ADHD, Alcohol Dependence, Electrophysiological measures of CNS activity, Personality traits and Nicotine Dependence. Preceptors in this program have approximately 62 federally and non-federally funded grants providing many opportunities for training in all aspects of Psychiatric Genetics. The program is located in one of the nations leading Medical Schools with a rich array of basic and applied genetic research studies and educational opportunities. Thus, we expect the long tradition of successful mentoring and research training of scientists and physician-scientists from diverse intellectual backgrounds to continue.
{ "pile_set_name": "NIH ExPorter" }
<?xml version="1.0" encoding="utf-8"?> <COLLADA xmlns="http://www.collada.org/2005/11/COLLADASchema" version="1.4.1"> <asset> <contributor> <author>Scotty</author> <authoring_tool>CMU Scotty3D (version 15-462/662)</authoring_tool> </contributor> <created>2016-09-27T11:02:57</created> <modified>2016-09-27T11:02:57</modified> <unit name="meter" meter="1"/> <up_axis>Y_UP</up_axis> </asset> <library_geometries> <geometry id="M1" name="Mesh1"> <mesh> <source id="M1-positions"> <float_array id="M1-positions-array" count="24"> -2 -2 2 -2 -2 -2 2 -2 -2 2 2 2 2 2 -2 -2 2 -2 -2 2 2 2 -2 2 </float_array> <technique_common> <accessor source="#M1-positions-array" count="8" stride="3"> <param name="X" type="float"/> <param name="Y" type="float"/> <param name="Z" type="float"/> </accessor> </technique_common> </source> <vertices id="M1-vertices"> <input semantic="POSITION" source="#M1-positions"/> </vertices> <polylist count="6"> <input semantic="VERTEX" source="#M1-vertices" offset="0"/> <vcount>4 4 4 4 4 4 </vcount> <p> 2 7 0 1 5 6 3 4 1 0 6 5 2 1 5 4 3 7 2 4 7 3 6 0 </p> </polylist> </mesh> </geometry> </library_geometries> <library_visual_scenes> <visual_scene id="ScottyScene"> <node id="N1" name="Node1"> <instance_geometry url="#M1"> </instance_geometry> </node> </visual_scene> </library_visual_scenes> <scene> <instance_visual_scene url="#ScottyScene"/> </scene> </COLLADA>
{ "pile_set_name": "Github" }
Pleasanton Weekly 'A Difference of Perception' Surrealistic works on exhibit at Harrington Gallery An eye-opening experience awaits patrons at the Harrington Gallery's final exhibit of the 2010-11 season, "A Difference of Perception," which opened last night with a reception. "This is a fantastic surrealism and hyper-realism exhibit featuring five Bay Area artists: painters Bill Sala, Ron Norman, Bill Weber and Peg Magovern, and sculptor Jason Griego," said Julie Finegan, visual arts coordinator for the Firehouse Arts Center, who set up the exhibit Tuesday. "Bill Sala, a very unassuming and self-taught artist from Castro Valley, paints in the style of the old masters, first laying in values and then adding color," Finegan explained. "Extremely fine detail, haunting and vast landscapes, and strange, vacantly staring figures dominate his work, in which few brushstrokes are visible. "Jason Griego's sculptures, cast from a mixture of bone and resin and embedded with found objects, depict visceral, economical, sometimes winged female forms." The exhibit showcases the unconventional and imaginative artwork of the surrealists, along with a new collection of hyper-realistic renderings by Ron Norman. "I hope my art goes beyond the factual," said Norman. "My aim is for my drawings to show more than what is actually there. A solitary moment, a slightly surreal feeling, a new way of looking at something." Peg Magovern is a pencil artist from Danville, who says on her website, "From the first pencil stroke up until the last one, the final outcome remains unclear. ... One line at a time... just pure, hand-drawn art. The rest is from my heart and soul." Bill Weber, a Brentwood resident, has murals displayed throughout California. He is also a painter, sculptor, illustrator, architect, holographer, digital artist and photographer. The Harrington Gallery is located at the Firehouse Arts Center, 4444 Railroad Ave., Pleasanton; its hours are noon-5 p.m. Wednesday-Friday; 11 a.m.-3 p.m. Saturday; and for one hour prior to each Firehouse Arts Center performance and during intermission. A donation of $2 is suggested.
{ "pile_set_name": "Pile-CC" }
983 F.2d 1069 NOTICE: Sixth Circuit Rule 24(c) states that citation of unpublished dispositions is disfavored except for establishing res judicata, estoppel, or the law of the case and requires service of copies of cited unpublished dispositions of the Sixth Circuit.UNITED STATES of America, Plaintiff-Appellee,v.Gary L. DODGE, Defendant-Appellant. No. 91-6481. United States Court of Appeals, Sixth Circuit. Jan. 5, 1993. Before MILBURN and BATCHELDER, Circuit Judges, and CONTIE, Senior Circuit Judge. PER CURIAM. 1 Gary L. Dodge appeals his conviction by jury verdict for receiving child pornography through the mail in violation of 18 U.S.C. § 2252(a)(2). The district court sentenced Dodge to pay a $4,000 fine and to serve twenty-one months imprisonment. On appeal, the issues are (1) whether there is sufficient evidence to support the verdict of guilty, (2) whether the district court erred in admitting certain testimony by a postal inspector, and (3) whether the controlled delivery of child pornography satisified the mailing requirement of 18 U.S.C. § 2252(a)(2). For the reasons that follow, we affirm. I. 2 Sometime before May 30, 1990, defendant Gary Dodge approached two different police informants in Louisville, Kentucky, and offered to pay them for providing him with young girls who were either "chickens," i.e., teenagers, or "eggs," i.e., preteenagers. Both informants reported these approaches to Detective Bill Burke, Louisville Police Department, who in turn contacted Postal Inspector Brad Reeves. 3 After identifying defendant as a postal employee, Inspector Reeves asked Postal Inspector Keller to test defendant for any interest in child pornography. Inspector Keller sent defendant a letter and a questionnaire. The letter introduced defendant to "Brad's Briefs," an undercover newsletter operated by Inspector Keller for the purpose of identifying persons interested in child pornography. It was accompanied by a questionnaire to be filled out by any person interested in membership in "Brad's Briefs." Defendant completed and returned the questionnaire, indicating his first choice of sexual materials as "preteen, non-sexual (strip, dance, shower, just lie there!)." J.A. 15. Defendant himself wrote in this language to describe his first choice, which was "other." Although the preference section listed seventeen kinds of sexual material, including materials other than child pornography, defendant's second, and only other, choice was "preteen sex-homosexual." 4 The letter accompanying the questionnaire directed the recipient not to identify himself unless he desired additional information. Defendant completed the questionnaire, identified himself, indicated his desire to join the club and receive "Brad's Briefs," and returned the questionnaire to Inspector Keller. Inspector Keller enrolled defendant as a member of "Brad's Briefs" and sent him a letter assigning him a member number and giving general information about how to answer advertisements appearing in the newsletter. He also informed Inspector Reeves of the results of his correspondence with defendant. 5 Interpreting defendant's responses on the questionnaire as evidencing an interest in child pornography, Inspector Reeves asked Postal Inspector Becky Powers to test defendant further. Inspector Powers, who ran an undercover videotape operation known as Dream Video, sent a letter to defendant advising him that the company had obtained videotapes "aimed at pleasing the 'sexually exotic-minded man,' " and offering defendant membership in a video club that published a catalogue of those videotapes. The initial letter also apologized to any addressee to whom the letter had been sent in error, and it provided the addressee an opportunity to have his or her name removed from the mailing list. Ignoring the box, "No, I am not interested," defendant checked the box, "Yes, I am interested in the products you offer. I have checked on the list below the subjects that interest me." Defendant then indicated his preference for materials involving models under the age of fifteen in situations with "girls alone." The final paragraph of the questionnaire stated: 6 By my signature below, I certify I am an adult and I desire to purchase and receive sexually explicit materials. I understand the videos you are selling feature young males and young females and that this material is considered illegal under current law. I do not want the notation "Sexually Oriented Material" to appear on the outside of any mail that is sent to me. I promise to keep the source of any material I receive from Dream Videos confidential. 7 J.A. 41-42 (emphasis added). 8 Based on defendant's response, Inspector Powers sent defendant a Dream Video catalogue on October 26, 1990. The catalogue contained graphic descriptions of the videotapes offered for sale, and defendant ordered a videotape entitled "Pairs of Young Love," which was described as depicting various sex acts between two eight-year-old boys and two nine-year-old girls.1 After receiving this order from the defendant on November 8, 1990, Inspector Powers mailed a copy of "Pairs of Young Love" to Inspector Reeves, together with all of the papers defendant had sent in. 9 During the same period in which he corresponded with Dream Video regarding his purchase of the videotape, defendant also answered two advertisements in "Brad's Briefs." The first ad to which defendant responded read: 10 (1001 N.Y.) Divorce necessitates the liquidation of 20 years worth of my collection. Something for everyone. Send SASE and your special interests for my listing. First come, first serve. May consider mail option for special items. 11 J.A. 23. Defendant's response was: 12 Please send a sample of your collection. I am interested in girls 10 to 12. I will pay in advance for any further shipments. If this is not satisfactory, send your phone number; and I'll call you please. 13 J.A. 24. 14 The other advertisement to which defendant responded read: 15 (1012 New York). Unshockable, sincere, SWM, has x-rated videos, photos, and films of white, black and oriental PTT girls. Prefer trading but will buy high quality videos, photos and films. Also seek meetings. Have equipment for videos and photos. Can also copy videos and photos and return originals to owners if preferred. Only sincere need respond. Discretion assured and expected. 16 J.A. 24. Defendant's response was: 17 Please send a sample of your collection. I have nothing yet to trade, but will pay in advance for any further merchandise. Send to Wayne Dodge at return address (PLEASE). 18 J.A. 25. Inspector Keller received defendant's responses to the "Brad's Briefs" advertisements on November 19, 1990 and advised Inspector Reeves of the activity. 19 When Inspector Reeves received "Pairs of Young Love" from Inspector Powers, he packaged it in the form of a mailed parcel, then drove with it to Louisville, Kentucky, where, on December 14, 1990, a controlled delivery of the videotape was made to defendant when he called for the parcel at the post office where he maintained his post office box. Inspector Reeves and other agents followed defendant home with his parcel and executed a search warrant they had previously obtained for the premises. They found the package unopened on defendant's kitchen table. They also found another videotape containing segments of a childrens' exercise class tape recorded from the Disney Channel. During normal play, this videotape frequently stopped action at various places where children opened their legs or exercised on their hands and knees. The stop-action was apparently accomplished by dubbing from an original tape recording and freezing certain frames. 20 On September 20, 1991, defendant was found guilty under a single-count indictment charging him with violating 18 U.S.C. § 2252(a)(2) by receiving through the mail a videotape of minors engaged in sexually explicit conduct. On December 13, 1991, defendant was sentenced to twenty-one months imprisonment and ordered to pay a fine of $4,000. This timely appeal followed. II. A. 21 At the conclusion of all of the proof at trial, defendant moved for a judgment of acquittal under Federal Rule of Criminal Procedure 29 on the ground that the government had failed to prove that defendant had knowledge of the contents of the parcel he received. He now contends the evidence was insufficient to support his conviction because the government also failed to prove that he was predisposed to commit this crime. 22 The government argues that this court should hold that defendant has waived this issue because he did not mention it in his motion for judgment of acquittal. In United States v. Cox, 593 F.2d 46, 48 (6th Cir.1979), however, this court noted that a motion for acquittal pursuant to Rule 29 23 is a challenge to the Government in the presence of the court that the Government has failed in its proof. The motion is not required by the rules to be in writing or to specify the grounds therefor. 24 Id. (quoting United States v. Jones, 174 F.2d 746, 748 (7th Cir.1949)). More recently, in United States v. Gjurashaj, 706 F.2d 395, 399 (2d Cir.1983), the Second Circuit, citing Cox, declared the same rule, holding that "the government is not entitled to complain now that it was disadvantaged because the defendants did not cite chapter and verse of the weakness of the case against them...." Thus, defendant's motion preserved his challenge to the sufficiency of the proof in this case. 25 Defendant argued the defense of entrapment at trial and now specifically challenges the government's proof of his predisposition to commit the offense. When a defendant challenges the sufficiency of the evidence used to convict him, the relevant question on appeal is whether "after viewing the evidence in the light most favorable to the prosecution, any rational trier of facts could have found the essential elements of the crime beyond a reasonable doubt." Jackson v. Virginia, 443 U.S. 307, 319 (1979), quoted in United States v. Clark, 928 F.2d 733, 736 (6th Cir.) (per curiam), cert. denied, 112 S.Ct. 144 and 112 S.Ct. 240 (1991). 26 Defendant relies principally on Jacobson v. United States, --- U.S. ----, 112 S.Ct. 1535 (1992), in which the Supreme Court reversed the conviction of a defendant for violating 18 U.S.C. § 2552(a)(2) because the government's proof of predisposition was extremely weak. In Jacobson, the Court found that the only evidence of predisposition was the defendant's 1984 order and receipt of two Bare Boys magazines, which depicted nude preteen and teenage boys in various natural settings. 27 The core of the Court's reasoning in Jacobson has to do with whether the government's actions contributed to the petitioner's predisposition to commit the crime in question. 28 Had the agents in this case simply offered petitioner the opportunity to order child pornography through the mails, and petitioner--who must be presumed to know the law--had promptly availed himself of this criminal opportunity, it is unlikely that his entrapment defense would have warranted a jury instruction. 29 But that is not what happened here. By the time petitioner finally placed his order, he had already been the target of 26 months of repeated mailings and communications from Government agents and fictitious organizations. Therefore, although he had become predisposed to break the law by May 1987, it is our view that the Government did not prove that this predisposition was independent and not the product of the attention that Government had directed at petitioner since January 1985. 30 Id., 112 S.Ct. at 1541 (citation omitted) (emphasis added). 31 The Supreme Court found that the petitioner's receipt of the Bare Boy magazines in 1984 was scant proof of his predisposition to commit an illegal act because in 1984, when petitioner received the magazines, neither state nor federal law forbade their possession. As there was no other proof of predisposition before petitioner's contact with the government, the Court reversed petitioner's conviction for lack of evidence. 32 Jacobson is distinguishable from this case on its facts, particularly its facts relating to reluctance. The Supreme Court in Jacobson emphasized how Jacobson held out over a two and one-half year period against a government bombardment featuring suggestions by the government to join pornography clubs, letters from a bogus pen pal, letters condemning the current regime of censorship of child pornography, and child pornography catalogues. The Court distinguished those facts from a case in which a defendant "promptly availed himself" of the opportunity to acquire child pornography. Id. 33 This court has also identified the presence or absence of reluctance to engage in criminal activity as "[t]he most important factor in determining the lack of predisposition...." United States v. McLernon, 746 F.2d 1098, 1113 (6th Cir.1984); accord United States v. Silva, 846 F.2d 352, 355 (6th Cir.), cert. denied, 488 U.S. 941 (1988). If predisposition is an inverse function of reluctance, as the cases hold, then there is ample proof of predisposition in this case from defendant's utter lack of reluctance. Defendant promptly answered the first questionnaire and specified in his own words the child pornography he preferred. He subscribed to "Brad's Briefs" at the first opportunity, and as soon as he received that newsletter he answered its advertisements and urgently solicited materials dealing with girls 10 to 12 years of age. On another track, defendant simultaneously obtained from Dream Video a catalogue of child pornography and ordered a tape that was graphically described therein as depicting sex acts between children. He knew at the time of his order that this videotape would contain illegal material because the introductory letter sent by Dream Video stated that the videotapes it sold featured young males and females and that they were considered illegal. This information in no way deterred defendant, who ordered promptly. 34 Considering that defendant's predisposition was established before any contact with the government by the evidence that he was seeking out children to photograph in the nude2 and was already tape recording childrens' exercise classes, the government amply proved that defendant's predisposition to obtain child pornography existed independent of and prior to any contact he had with the government. Once contact had been made, defendant's predisposition was further demonstrated by the eagerness with which he responded to every offer by the government. Even after being told directly that the materials available were illegal, defendant ordered a videotape he knew contained child pornography. Thus, both before and after his contact with the government, defendant was and remained predisposed to commit the crime with which he was charged. Cf. United States v. LaChapelle, 969 F.2d 632, 635-36 (8th Cir.1992) (distinguishing Jacobson on facts similar to those in this case). Viewed in the light most favorable to the government, there is ample evidence to support the finding of predisposition. B. 35 Defendant next argues that the district court erred in allowing Postal Inspector Reeves to testify that undercover techniques are used in the investigation of child pornography trafficking because "this is an underground society, if you will." J.A. 62. Defendant's objection was to the effect that Inspector Reeves was not qualified to give "his opinion of the type and character of these people that are involved...." J.A. 62. The court overruled defendant's objection because it believed Inspector Reeves possessed "sufficient credentials in the area based on his testimony to be able to offer an opinion as to how these investigations are conducted...." J.A. 63. After defendant's objection was overruled, Inspector Reeves testified that people involved in child pornography are "very paranoid" and, therefore, "the best way to approach them is through an undercover operation." J.A. 63. No objection was made to the description of child pornographers as being "paranoid." 36 Defendant has waived any objection to Inspector Reeves' comment concerning paranoia by his failure to object to it. Without a contemporaneous objection, the issue is not preserved for appeal. United States v. Meyers, 952 F.2d 914, 917 (6th Cir.), cert. denied, 112 S.Ct. 1695 (1992); Fed.R.Evid. 103(a)(1). 37 As to Inspector Reeves' explanation that postal investigations of child pornographers are often undercover because child pornographers form an "underground society," Reeves was testifying from his experience as a professional investigator that, because child pornography materials are "not readily available on the street ...," J.A. 62, those interested in dealing in such materials must do so "underground." Because that is the case, investigations of this activity must often involve the false identity and stratagem necessary to allow investigators to join that underground. Inspector Reeves was certainly qualified to state the general reasons why a particular mode of investigation was employed. See United States v. Pearce, 912 F.2d 159, 163 (6th Cir.1990) (law officers may testify concerning modus operandi of particular crimes and investigative techniques employed to discover them), cert. denied, 111 S.Ct. 978 (1991). To the extent that the evidence called for was relevant--and there was no challenge to relevancy--Inspector Reeves' answer was unobjectionable. 38 Defendant also argues that the district court erred in allowing Inspector Reeves to describe the videotape of the childrens' exercise class as "child erotica material." J.A. 81. When Inspector Reeves categorized the videotape in question as child erotica material and then defined such material as "any visual material of children that is not sexually explicit that is used by a person for sexual arousal-or their gratification ...," J.A. 82-83, he offered an opinion that the videotape was made for purposes of sexual arousal or gratification. 39 Generally, this court reviews claims concerning the erroneous admission of evidence for abuse of discretion. MacNaughton v. United States, 888 F.2d 418, 422 (6th Cir.1989). "A district court would necessarily abuse its discretion if it based its ruling on an erroneous view of the law or on a clearly erroneous assessment of the evidence." Cooter & Gell v. Hartmarx Corp., 496 U.S. 384, 405 (1990). 40 Strictly speaking, Inspector Reeves was not qualified as an expert on the question of the arousal of the human sexual response or the gratification thereof, and, therefore, the admission of his opinion on that subject was error. It does not fall within the kind of lay opinion permitted by Federal Rule of Evidence 701 because it is not "rationally based on the perception of the witness...."3 Arguably, one could not determine from merely watching the videotape that its purposes were erotic. Had the videotape been found in the possession of an exercise physiologist, it might be concluded that it represented a study in exercise kinetics, flexibility, or proper positioning. 41 However, any error in the admission of this testimony was harmless beyond a reasonable doubt. Defendant was permitted to cross-examine Inspector Reeves concerning his characterization of the videotape, and the jury, which viewed the videotape, was perfectly free to make up its own mind about its probable uses. Under these circumstances, the admission of Inspector Reeves' characterization of the tape recording could not have affected the outcome of this case or the substantial rights of the defendant, Fed.R.Crim.P. 52(a). Therefore, the admission of the evidence complained of was harmless error. United States v. Lane, 474 U.S. 438, 445 (1986) (duty of reviewing court is to consider trial record as a whole and to ignore errors that are harmless); United States v. Cunningham, 804 F.2d 58, 61 (6th Cir.1986), cert. denied, 481 U.S. 1037 (1987). C. 42 Finally, defendant argues that this court should overrule its previous decision in United States v. Moore, 916 F.2d 1131 (6th Cir.1990), wherein it held that a controlled delivery of child pornography satisfies the mailing requirements of 18 U.S.C. § 2252(a)(2). Because one panel of this court may not overrule another, Moore is the law of this circuit until and unless it is overruled by the court en banc. See Agristor Leasing v. A.O. Smith Harvestore Prods., 869 F.2d 264, 268 (6th Cir.1989). III. 43 For the reasons stated, the judgment of the district court is AFFIRMED. 1 The description was as follows: "Ronnie and Tom, both 8, and Tammy and Sue, both 9 are all cousins; and what love there is between them, as Tammy sucks Ronnie, Sue pleases Tom by taking his penis in her mouth. Not to be outdone, the boys take turns eating the girls. After that snack, they pair up again and the f------ begins." J.A. 46 2 Defendant admitted this on cross-examination. J.A. 167 3 Federal Rule of Evidence 701 permits a lay witness to state "inferences which are (a) rationally based on the perception of the witness and (b) helpful to a clear understanding of the witness' testimony or the determination of a fact in issue."
{ "pile_set_name": "FreeLaw" }
Virus Spike and Membrane-Lytic Mimicking Nanoparticles for High Cell Binding and Superior Endosomal Escape. Virus-inspired mimics for gene therapy have attracted increasing attention because viral vectors show robust efficacy owing to the highly infectious nature and efficient endosomal escape. Nonetheless, until now, synthetic materials have failed to achieve high "infectivity," and especially, the mimicking of virus spikes for "infection" is underappreciated. Herein, a virus spike mimic by a zinc (Zn) coordinative ligand that shows high affinity toward phosphate-rich cell membranes is reported. Surprisingly, this ligand also demonstrates superior functionality of destabilizing endosomes. Therefore, the Zn coordination is more likely to imitate the virus nature with high cell binding and endosomal membrane disruption. Following this, the Zn coordinative ligand is functionalized on a bioreducible cross-linked peptide with alkylation that imitates the viral lipoprotein shell. The ultimate virus-mimicking nanoparticle closely imitates the structures and functions of viruses, leading to robust transfection efficiency both in vitro and in vivo. More importantly, apart from targeting ligand- and cell-penetrating peptide, the metal coordinative ligand may provide another option to functionalize diverse biomaterials for enhanced efficacy, demonstrating its broad referential significance to pursue nonviral vectors with high performance.
{ "pile_set_name": "PubMed Abstracts" }
Dear Life: Stories Hardcover | October 13, 2012 With her peerless ability to give us the essence of a life in often brief but spacious and timeless stories, Alice Munro illumines the moment a life is shaped -- the moment a dream, or sex, or perhaps a simple twist of fate turns a person out of his or her accustomed path and into another way of being. Suffused with Munro's clarity of vision and her unparalleled gift for storytelling, these stories (set in the world Munro has made her own: the countryside and towns around Lake Huron) about departures and beginnings, accidents, dangers, and homecomings both virtual and real, paint a vivid and lasting portrait of how strange, dangerous, and extraordinary the ordinary life can be. Pricing and Purchase Info With her peerless ability to give us the essence of a life in often brief but spacious and timeless stories, Alice Munro illumines the moment a life is shaped -- the moment a dream, or sex, or perhaps a simple twist of fate turns a person out of his or her accustomed path and into another way of being. Suffused with Munro's clarity of ... ALICE MUNRO is the author of twelve collections of stories -- the most recent of which are Runaway, The View From Castle Rock, and Too Much Happiness -- as well as a novel, Lives of Girls and Women, and Selected Stories. Among the many awards and prizes she has received are: three Governor General's Literary Awards and two Giller Prize... Educational/Developmental Value: Durability: Hours of Play: Thank you. Your review has been submitted and will appear here shortly. Reviews Rated 5 out of 5 by Kate from Dear Life.I loved this book as I have loved all her books. What a National treasure Canada has! Date published: 2013-11-11 Rated 5 out of 5 by AMY from Fabulous!Another amazing work of art by the fabulous Munro! Date published: 2013-10-22 Rated 5 out of 5 by suzanne_keith from she's simply the best and she's oursEvery book of hers is like a box of small, rich chocolates, you know there is eventually going to be an end but you only take small, slow tiny bites to make them last. You read her sentences slowly "in small tiny bites" to better appreciate her mastery of our language in describing the simplest things and the most complex feelings. One of her best and apparently one of her most personal. Date published: 2013-01-13 Rated 5 out of 5 by Rebecca from Loved it!Alice Munro never fails to satisfy. I feel I know her even better now. What a pleasure. Date published: 2013-01-10 Extra Content Editorial Reviews Trillium Award Finalist - 2013 "It has become practically de rigeur to refer to Munro as 'our Chekhov'... But at this point in Munro's career, how much can it add? What is certain is this: She is our Munro. And how fortunate we are to call her that." -- New York Times Book Review
{ "pile_set_name": "Pile-CC" }
Es nuestro 6º Aniversario en El Chapuzas Informático, y no hay aniversario que se precie sin regalos, aunque, en este caso, a la forma inversa (acepto Monsters Premium). De esta forma, toca comenzar a realizar seis sorteos semanales en los que regalaremos una gran variedad de componentes, dispositivos, y mucho más. El ganador de este sorteo se llevará un magnifico smarphone Maze Blade, un terminal con diseño rectangular donde su chasis de aluminio, con unas dimensiones de 158.5 x 77 x 8 mm de espesor, sostiene un panel IPS de 5.5 pulgadas a una resolución Full HD de 1920 x 1080 píxeles movida por medio del SoC MediaTek MT6753 @ 1.30 GHz, conformado por 8x núcleos Cortex-A53 junto a los gráficos ARM Mali-T720 MP3 @ 450 MHz acompañado de una más que correcta configuración de 3 GB de memoria RAM junto a 32 GB de almacenamiento interno ampliable mediante una tarjeta microSD de hasta 64 GB de capacidad. El resto de las especificaciones del Maze Blade se completa con un lector de huellas dactilares en el botón físico Home, la incorporación de una cámara principal Sony IMX214 de 13 megapíxeles F/2.0 con doble flash LED, una cámara frontal Sony IMX179 de 8 MP, ofrece la conectividad 3G (900/2100 MHz), 4G LTE (800/900/1800/2100/2600 MHz) con soporte Dual SIM, WiFi 802.11n, Bluetooth 4.0, GPS + GLONASS, una batería de 3000 mAh (5v/1.5A) de capacidad para aguantar un día entero con uso intensivo, y el uso del sistema operativo Android 6.0 Marshmallow (actualizable a Android 7.0 Nougat) Concursar en El Chapuzas Informático no supone ningún coste * . Este concurso no cuenta con limitación geográfica * . Existirá un ganador. El concurso finalizará el próximo 12/05/2017 a las 21:00 pm (20:00 pm en Canarias). (20:00 pm en Canarias). La aplicación escogerá un ganador al azar . * Si el ganador está fuera de España, cargará con el coste de envío. Para participar es muy simple, a continuación tendréis una aplicación donde deberéis dar “Me Gusta” y “Seguir” en el Facebook/Twitter de El Chapuzas Informático y de Maze. En caso de compartir por Facebook o Twitter se obtiene participaciones extra. ¡Mucha Suerte!. 6aniversario MAZE
{ "pile_set_name": "OpenWebText2" }
You might expect me to wax rhapsodic about the array of sheep’s and goat’s milk cheeses, or gush about the intensely flavorful charcuterie, or rave about the freshness of the just-caught fish, but no. I’m here to extol a pastry. (And if you think about it, is that really so surprising after all?) Upon entering Ajaccio’s Boulangerie Galéani (for no discernible reason the only bakery there mentioned in any of the guide books I read) on the first morning of my weekend there in late May, I was met with the sight of these tempting allumettes aux amandes. Sure, we picked up some of the supposedly great canistrelli (like a smallish scone or thick shortbread cookie, but barely sweet and extremely dry), and some awesome cheese tarts made with the local brocciu (fresh sheep’s cheese, similar in texture to ricotta), but the allumette was the star of the show. Imagine a thick twist of puff pastry, probably made with salted butter, dunked in sweet meringue and sprinkled with salted almonds, then baked until crisp and caramelized. Alternately flaky, tender, crunchy, sweet and salty, it was truly one of the most surprising things I’ve eaten in quite a while. We visited other bakeries during our stay, and sampled many delicious things – mostly on the savory end of the spectrum, now that I think about it: turnovers filled with cheese, onions, and Swiss chard, sausages wrapped in croissant dough – but never saw another allumette aux amandes. So my recommendation, if you’re ever in Ajaccio, is to visit the Boulangerie Galéani, skip the canistrelli (which were pretty unimpressive) and the bread (I didn’t see a single good baguette the whole time I was there), and load up on these sweet-and-salty delights. Of course, the setting in which we ate this pastry could have something to do with it. After hiking up and around a gorgeous peninsula… …we sat down to a picnic lunch high on a cliff overlooking the Iles Sanguinaires… …which probably made everything taste better. On this day in 2008: Nick’s Provençal Eggplant – a delicious ragoût, which I’m excited to make once eggplant comes back into season…hopefully only a few more weeks now. I do believe I promised recipes to accompany my Pastry Crawl so that those of you not in Paris can enjoy along with me. With the exception of Christophe Adam, French bakers in general adhere very strictly to the rules of éclair making: e.g. If it’s a chocolate éclair, it has chocolate filling and chocolate icing. If it’s a coffee éclair, it has coffee filling and light brown, hopefully coffee-flavored icing. Rarely is it anything else. And yet, in the United States, a chocolate eclair is almost always filled with vanilla pudding (yes, pastry cream is hardly more than a fancy name for pudding (in the American sense. Don’t make me open the British pudding can of worms.)) and glazed with chocolate. So I suffer none of these compunctions, instead viewing the éclair as a canvas for whatever flavor combination strikes my fancy. On this particular occasion, inspired in part by a recent post on Not Without Salt extolling the virtues of butterscotch pudding, I chose to make my filling butterscotch. I am admittedly out of practice piping éclairs, my muscle memory being confused between the lusty behemoths we used to make in the States and the skinnier, more uptight ones I became accustomed to making in Paris. You can see examples of both in the above photo, insert fat American joke here. Let it be noted that the fatter an éclair is, the greater the cream-to-pastry ratio. Do with that what you will. And with nearly three-quarters of the vote, Paris Pastry Crawl is the undisputed winner! Thank you all for voting, and now, let the gluttony commence. We’re going to start off the series with the éclair, quite possibly the most iconic of all French pastries, and certainly the first I was familiar with, thanks to a francophile mother and the Beaverton Bakery (hey! they’re still around!), where she used to take me and my brother after school for a treat if we’d been good… or maybe if she had a hankering herself. Now, of course, I live in Paris, and finding an éclair doesn’t require a special trip, though sometimes it should. La Pâtisserie des Rêves has been around for a few years now, but I admit I didn’t feel all that compelled to go. Something about the bell jars covering the pastries on display just seemed so clinical. Impersonal. Sterile. But just before Christmas, chef Philippe Conticini put out a gorgeous book (with an irresistible puffy cover). Onto my Amazon wishlist it went, and what do you know? Santa Claus deemed that I had been a good girl. Flipping through the pages, I realized that these pastries weren’t sterile at all. The swoop of toasted meringue on the lemon tart, the overgrown rolled brioche, the opulent use of vanilla beans – this is the way I like to bake! Obviously, a visit was now in order. Okay, it’s probably never been anything as strong as hate. But “Confessions of a Macaron Ambivalent” isn’t as good a title, now is it? My general reaction to the macaron-mania of the last few years has been a combination of eye-rolling and ignoring (not unlike what I went through with cupcakes around 2007, but that irritation has mellowed with time, and now I only roll my eyes at stupid cupcakes, by which I mean ones that are more about looking cute than tasting good, or ones that are clearly made just because they’re trendy – red velvet, I’m talking to you here, if people would just take a second to consider how much dye it takes to color a chocolate cake red they would just order a devil’s food cake with cream cheese icing which is a million times better – but I digress, please pardon the run-on parenthetical but I really do hate red velvet cake which is another post entirely). About the macarons, here’s why. The grand majority of macarons are composed of the same four ingredients: egg whites, sugar, almond meal, and food coloring. You whip the egg whites to a meringue, fold in the other stuff, pipe out a gajillion little circles, let them rest so they develop the proper “feet” and zzzzzzzzzzzzzzzz. Sorry, I fell asleep there. Frankly, the things bore me silly. Except. I don’t know how it happened. I might have Heather to blame, a known macaron-lover at whose birthday party last year they were unavoidable. Or maybe all those pictures on the internet finally wore me down. Probably not, though. No, I think the answer is simpler. Pierre Hermé. His book on the topic was so pretty I almost wanted to buy it. Seeing them lined up in his shop, all shiny with luster dust (which I should be opposed to, but it’s just so pearly and delightful to look at… when it’s used correctly, that is), I couldn’t help but smile. And then one day, hungry for a little sweet snack, I wandered in for a pastry and thought how gorgeous and interesting all his flavor combinations are and how it was a shame I couldn’t take them all home and it hit me that the macarons offered many of these same flavor combinations in bite-size format – I could try three flavors for the price of one individual cake! So it began. One of the flavors I chose that day was white truffle and hazelnut, and I admit I picked it because I thought it would be disgusting and therefore justify my dislike of the macaron in general. Oh, how wrong I was. The thing is marvelous – you start with a nose full of truffle and you think it’s going to be too turpentiney-strong, but then there’s a crunch of rich, buttery hazelnut and the whole thing is brought into balance. So I could no longer justify my annoyance with the macaron based on its taste. (Which is not to say there aren’t hordes of really bad, too-dry or too-sweet or too electric blue examples out there. There are.) However, I learned something a couple of weeks ago that might just blow the top off this whole macaron charade. You see, IT’S ALL A LIE! According to L’Art Culinaire Français, a classic tome of French cookery published in 1950, macarons aren’t macarons at all. While poring over said book with my good friend Jennifer, a fellow Macaron Eye-Roller, we discovered that the traditional macaron is a much more rustic affair – no meringue, so they’re denser, and the almonds less finely ground, so they have some texture. There’s also no filling in this classic recipe. Pictured next to the macaron in the accompanying photo was something called a “patricien” which was identical in looks and method to the little pastry we know as the macaron today. It’s not really all that scandalous, I admit, but when and why did the name change? Was “patricien” too snooty? Did someone misread their pastry history book at some point and the whole misnomer spiraled out of control? At any rate, I have a new reason to scoff at my secretly-not-hated macaron, and will continue to do so, even as I nip into Pierre Hermé for another fix. * In case you’re wondering about the flavors of the macarons pictured here, they are Quince & Rose (gorgeous), Chocolat Porcelana (yes, Hannah-who-also-buys-foods-she-thinks-she-won’t-like, you read that right, he made a macaron out of the Precious, and it was wonderful, with cocoa nibs pressed into the cream filling), and the afore-lauded White Truffle & Hazelnut. Like this: Just a quick update, because this week is pure insanity, but I got to spend Saturday with the lovely Katia and Kyliemac, of K&K Podcast fame. We took a field trip to the pâtisserie where I work, picked up some tasty treats to sample, and went back to the studio to record a couple of shows. The first one, episode 441, is already up, and the second one should be posted midweek. I hope you’ll listen! In fact, I think you should be listening to Katia and Kyliemac anyway. I dare you to read one of their show titles and not want to listen. They are a dynamic duo, whether they’re interviewing “interesting people doing interesting things” or just chatting about the expat life or current issues in Paris. It’s easy to spend the whole afternoon listening, and I expect you’ll soon consider them friends, as I do. UPDATE: Episode 442 is now up, in which we talk about some of the secrets of the pastry shop and the life of a pastry chef! Like this: It’s easy to forget, with all the snow and holiday hoopla, just how much of winter is still yet to come after the new year. The French use Epiphany as an excuse to keep eating sweets throughout the month of January, in the form of the galette des rois. And I think they’re right. Gloomy January days are no time to give up the pleasures of rich, buttery doughs baked to an appealing golden brown or sweet, nutty fillings. Besides, Philly cream cheese has finally arrived in France! I think we should celebrate with some rugelah. You might spell it another way (I most often see “rugelach”), but orthography aside, this is really a wonderful little pastry. Crumbly cream cheese dough, sticky fruit and nuts, and ridiculously easy to make. Rugelah come from the Eastern European Jewish baking tradition, and I first learned to bake them in a Jewish-owned, European-style bakery in Dallas, of all places. The ones we made there were filled with walnuts, which I can’t eat, so I had to sate myself with the incredible smell of roasted flour and caramelized jam when I pulled them out of the (enormous) oven every night. One Thanksgiving the chef took pity on me and let me use the filling for the pecan rings in the rugelah so I could finally taste them. My nose had not let me down – they were fantastic. Since then, I’ve had to make my own walnut-free version at home from time to time. Like this: I know it’s been a while since I’ve posted here. December is brutal on pastry chefs everywhere. I figured out that my workday is a solid three hours longer during the holidays than it is in the summer, and lunch breaks are shorter or nonexistent. Naturally, when I come home at the end of the day I’m exhausted, and it often comes down to a choice between blogging or showering and eating dinner. I don’t think anyone can blame me for choosing the latter. That said, this is going to be a big post, and I hope it will make up for my absence. I believe I mentioned that Nick and I took a weekend trip to Lisbon a few weeks ago. We had a fantastic time, and it makes me wonder what took me so long to visit Portugal. I was struck immediately by how colorful the city is. I took tons of pictures of the tile-covered and pastel-painted buildings, and I know Nick got at least twice as many. I’ve put some of my favorites up in a Flickr set, which I invite you to browse. Compared to the gray of Paris in winter, the sunshine and bright colors of Portugal were just what I needed. We flew in on a Thursday night, and after grabbing a cheap cab to our hotel, we whipped out our guidebook in search of a nearby restaurant. Cervejaria Ribadouro turned out to be just across the street, and was a good introduction to typical Portuguese restaurants. They had several tanks of live seafood in the front, with market prices by the kilo listed nearby. In addition to the lobsters, crabs, and cod, the menu had a large selection of meats, most of which were pork. Nick made up his mind to order the pork with clams as soon as he saw it, and we later learned that this is a very traditional pairing in Portuguese cuisine. I had the black pork, which was juicy and flavorful. We started with bread and a stuffed crab, and washed it all down with a couple of big, cheap beers. The next morning, we began on a quest that would carry us through the weekend: eating as many custard tarts as possible.
{ "pile_set_name": "Pile-CC" }
United States Court of Appeals FOR THE EIGHTH CIRCUIT ___________ No. 05-3068 ___________ Ty S. Mitchell; Kimberly S. Mitchell,* * Appellants, * * Christopher Mauer; Mary Jo Mauer; * James L. Engstrom; Kathleen P. * Engstrom, * * Appeal from the United States Plaintiffs, * District Court for the * District of Minnesota. v. * * [PUBLISHED] * Beneficial Loan & Thrift Company, * a Minnesota corporation, * * Appellee, * * Household Industrial Finance * Company, * * Defendant. * ___________ Submitted: May 18, 2006 Filed: June 21, 2006 ___________ Before MURPHY, BEAM, and BENTON, Circuit Judges ___________ PER CURIAM. The district court1 granted summary judgment to Beneficial Loan & Thrift Company. Ty S. Mitchell and Kimberly S. Mitchell appeal. The Mitchells assert that Beneficial violated the Home Ownership and Equity Protection Act (HOEPA). HOEPA, as relevant here, requires creditors to make additional disclosures to borrowers if the total points and fees payable at closing exceed 8 percent of the total loan amount, or $400, whichever is greater. 15 U.S.C. §§ 1602(aa)(1)(B), 1639(a). The Mitchells argue that the $355 appraisal fee, $821 title insurance fee, $67 phone-bill charge, or $1,178 principal disbursement should be included in the total points and fees of their loan. If any one of these were included, the total points and fees would exceed 8 percent of the total loan amount, making the loan subject to HOEPA. Appraisal and title insurance fees, if bona fide and reasonable, are excluded from HOEPA's definition of total points and fees. 15 U.S.C. § 1605(e) ; 12 C.F.R. § 226.4(c)(7). On appeal, the Mitchells claim that these fees are not bona fide and not reasonable because they violate the Real Estate Settlement Procedures Act (RESPA), 12 U.S.C. § 2607(b). The district court correctly found that these fees did not violate RESPA because they were paid to an unaffiliated third party for services actually performed, and, in any event, Beneficial derived no benefit from the payments. See Haug v. Bank of America, 317 F.3d 832, 836 (8th Cir. 2003). As for the telephone charge and principal disbursement, the statute does not include them in total points and fees. 15 U.S.C. § 1602(aa)(4). The Mitchells' loan did not need HOEPA disclosures. After de novo review, see Kerns v. Capital Graphics, Inc., 178 F.3d 1011, 1016 th (8 Cir. 1999), this court affirms the district court's judgment. ______________________________ 1 The Honorable James M. Rosenbaum, Chief Judge, United States District Court for the District of Minnesota. -2-
{ "pile_set_name": "FreeLaw" }
Q: How to tell bundler to ignore gems that don't exist? My organization has a number of in-house gems that are used in automated testing, but are not required for a production deployment. I am trying to use Bundler and so in my Gemfile I've wrapped those gems in: group :test, :development do gem 'dashboard_summary' end However, when I run: $ bundle install --without staging development test I still get Could not find gem 'dashboard_summary (>= 0) ruby' in the gems available on this machine. I'm trying to understand why Bundler isn't ignoring that gem when I've told it to. A: This is expected behaviour. From the docs: While the --without option will skip installing the gems in the specified groups, it will still download those gems and use them to resolve the dependencies of every gem in your Gemfile(5). Whilst an up to date Gemfile.lock might suggest that the dependencies don’t need to be resolved again, it looks like all gems are downloaded even in this case. A: You didn't define any group that includes staging, development and test. Your group only had test and development. Bundler is trying to ignore a group which has all three name in it, so you can add staging to group :test, :development, :staging do gem 'dashboard_summary' end or you can use $ bundle install --without test development
{ "pile_set_name": "StackExchange" }
Effects of adrenaline-tablets on rat heart cells in tissue culture at normal and raised temperature. Primary cultures of rat heart cells were incubated at 37 degrees C or 39.5 degrees C. For permanent treatment with adrenaline recently developed tablets were added to the cultures. After 10 hours the cell counts, glucose, lactate, LDH, alpha-HBDH and GOT were determined. Permanent adrenaline-application led to a decrease of cell counts, an increase of lactate, LDH, alpha-HBDH and GOT. The results indicate an injured membrane function of rat heart cells. Raised temperature sensitized the cells for adrenaline-treatment.
{ "pile_set_name": "PubMed Abstracts" }
Relational systems change: implementing a model of change in integrating services for women with substance abuse and mental health disorders and histories of trauma. This article describes the "relational systems change" model developed by the Institute for Health and Recovery, and the implementation of the model in Massachusetts from 1998-2002 to facilitate systems change to support the delivery of integrated and trauma-informed services for women with co-occurring substance abuse and mental health disorders and histories of violence and empirical evidence of resulting systems changes. The federally funded Women Embracing Life and Living (WELL) Project utilized relational strategies to facilitate systems change within and across 3 systems levels: local treatment providers, community (or region), and state. The WELL Project demonstrates that a highly collaborative, inclusive, and facilitated change process can effect services integration within agencies (intra-agency), strengthen integration within a regional network of agencies (interagency), and foster state support for services integration.
{ "pile_set_name": "PubMed Abstracts" }
Read More About Burger 21, a new better burger franchise founded by the owners of The Melting Pot Restaurants Inc., announces it has expanded the brand to the northeast with the opening of its first New Jersey location in Voorhees. Currently, Burger 21 has seven restaurants open and 17 franchised locations in development along the East Coast. Located in the Voorhees Town Center at 12109 Town Center Blvd., the new restaurant is owned and operated by current The Melting Pot franchisee Charlie Haney, along with business partners Curt Wunder and Mike Astuto. They decided to expand their portfolio based on the extensive training and support Haney received over the years from Front Burner Brands, the concepts’ management company. Haney became a Melting Pot franchisee in Atlantic City, New Jersey, in 2006 and was named “Melting Pot Franchisee of the Year” in 2010. “We’re thrilled to partner with Charlie and his team to bring Burger 21 to New Jersey — a hot market right now for better burgers,” says Mark Johnston, Burger 21 president and chief concept officer of Front Burner Brands, management company for Burger 21. “Our crafted burgers, hand-dipped shakes, and menu variety make Burger 21 stand out among better burger concepts, and we have no doubt guests in Voorhees will love what we have to offer.” Haney, president of ABL Restaurant Management, aims to open a dozen locations throughout southern New Jersey. In addition to offering guests a variety of burgers like the Tex-Mex Haystack, Spicy Thai Shrimp, Black Bean, and Chicken Marsala, the first location in Voorhees also will have craft beer, wines by the glass, and, exclusive to the Voorhees location, adult milk shakes. “I was blown away by the quality of the food when I visited the first Burger 21 in Tampa, Florida, and could hardly wait for Front Burner Brands to start franchising the concept,” says Haney. “Opening Burger 21 in Voorhees fills the need for gourmet burgers that most people can’t find without going to high-end restaurants with big price tags.” “We’ve had a strong relationship with Charlie throughout his years as a successful Melting Pot franchisee, and we’re looking forward to expanding that partnership as he and his team grow the Burger 21 brand in New Jersey,” Johnston adds. To further fuel Burger 21’s national expansion, the company is actively seeking qualified franchisees and will be exhibiting at the International Franchise Expo June 20-22 at the Javits Center in New York City. Local entrepreneurs are invited to meet with the brand’s franchise development team at booth No. 117 to learn more about growth opportunities. Additionally, Burger 21 will host a live webinar on Thursday, May 23, at 2 p.m. EDT. Since launching its aggressive growth plan in fall 2011, Burger 21 has signed franchise agreements with 10 different entities in seven states to develop a total of 20 franchised units in cities along the East Coast from New York to Florida. Burger 21 is seeking single- and multi-unit operators with restaurant experience to join its upscale fast casual dining concept. Franchisee candidates should have a minimum net worth of $500,000 and liquid assets of at least $200,000 per unit. Burger 21 will be developed through both single-unit agreements and area development agreements. Depending on the real estate site selected, franchisees can expect the total investment for one restaurant to be approximately $597,995 – $831,995. The initial franchise fee is $40,000; however, reduced franchise fees apply for area development agreements of four or more units.
{ "pile_set_name": "Pile-CC" }
FFF Articles This two-part essay discusses ten tenets of freedom toward which we must continue to strive in our efforts to restore freedom to our land. Part 1 of the essay discussed the first five tenets and this part covers the other five tenets. 6. Gun control It would have been more appropriate to have made the Second Amendment the first amendment to the Constitution. Without the right of the citizenry to keep and bear arms, the fundamental rights enumerated in the First Amendment are worthless. When the citizenry are well-armed, government officials tend to exercise caution in infringing such fundamental rights. Consider, for example, what took place in Iran after the recent presidential elections there. Iranian citizens were protesting the election results, claiming that the government had rigged the elections. Massive demonstrations involving hundreds of thousands of people broke out in protest. What was the response of the government? It decreed the protests to be illegal and announced that anyone who questioned the legitimacy of the elections to be guilty of treason and subject to being executed. In other words, the Iranian government did precisely what our American ancestors were certain that the U.S. government would do to them under similar circumstances. That’s why they used the First Amendment to the Constitution to expressly prohibit U.S. officials from doing what Iranian officials have done. Yet while U.S. officials, including those in Congress, will constantly look for ways to suppress criticism of their actions, the likelihood is that they would not go as far as the Iranian officials have gone, at least not without a major crisis to provide them with some cover for doing so. Why is that so? Because if U.S. officials ever begin contemplating going down the road that Iranian officials have gone down, they must factor into their deliberations a fact that Iranian officials didn’t have to factor into their deliberations — that the American people, unlike the Iranian people, are well-armed and able to defend themselves against military and police officials who are loyally and patriotically obeying orders to murder peaceful and law-abiding demonstrators, protesters, journalists, bloggers, and other critics of government wrongdoing. It is that insurance policy against tyranny that was the primary guiding force behind placing the right to keep and bear arms immediately after the protections regarding freedom of speech, freedom of the press, and freedom to assemble peaceably. The purpose of the Second Amendment is not to guarantee the right of hunting deer or self-protection against criminals. It provides the means by which the citizenry can protect the First Amendment. 7. Civil liberties In the aftermath of the Iranian elections, Iranian officials began rounding up dissidents, incarcerating them, charging them with crimes against the state, and threatening them with kangaroo trials and punishment. That’s the way that tyrannical governments ensure that their orders for people to shut up and stop criticizing government are enforced. It is that power — the power to arbitrarily seize people and incarcerate and execute them — that supplies the teeth to the decrees ordering people to shut up. After all, if the government wields the power to tell people to keep silent but lacks the power to do anything to people who refuse to obey the decree, then the first power becomes worthless. The government’s power to arbitrarily arrest, jail, and punish people provides the enforcement mechanism for enforcing its orders for people to cease their criticism of government. And that, in fact, is what the Fourth, Fifth, Sixth, and Eighth Amendments to the Constitution are all about. Our American ancestors were certain that once they called the federal government into existence, federal officials would end up doing the same types of things that the Iranian government officials are doing to the Iranian people. After all, why have express restrictions on the abuse of power if the threat of such abuse is nonexistent or remote? Thus, Americans are protected from unreasonable searches and seizures because our American ancestors believed that that’s what federal officials would subject them to. The same holds true for the freedom not to be coerced or tortured into making confessions. They knew that federal officials would do such a thing, which is why they expressly prohibited them from doing it. The right to effective assistance of counsel was intended to prevent federal officials from railroading and steamrolling people into jail and concentration camps. The right of trial by jury was intended to protect Americans from the kangaroo tribunals employed in places like Iran. Juries, not judges or other government officials, would be the final arbiters of the law and the guilt or innocence of the accused. Cruel and unusual punishments, such as torture and sex abuse, were expressly prohibited because of the belief that government officials would inevitably employ such tactics. The ancient writ of habeas corpus was expressly protected in the original Constitution. The Framers understood that it is the linchpin of a free society. For if people have no means by which to challenge in an independent judicial forum their arbitrary detention by government officials, then civil liberties become a dead letter. Unfortunately, all too many modern-day Americans have been taught to believe that civil liberties are nothing more than the means by which guilty people get to escape punishment for crimes they have committed. Nothing could be further from the truth. As our Americans ancestors understood so well, civil liberties protect the citizenry from arbitrary arrest, imprisonment, and punishment at the hands of government officials who are doing their best to quell dissent and criticism of wrongful government conduct. 8. The drug war The drug war perfectly encapsulates the loss of freedom that the American people have suffered under the paternalistic regulatory state. What could be a more perfect assault on the freedom of the individual than for the state to have the power to arrest someone and punish him for doing nothing more than selling, purchasing, possessing, or ingesting some substance that government officials don’t approve of? Everyone would agree that some substances can be harmful if ingested, especially in excess. Alcohol, tobacco, sugar, and fatty foods are examples. That’s not the point. The point is whether freedom entails the right to ingest whatever a person wishes to ingest and, if so, whether the state should be permitted to infringe that important aspect of freedom. Imagine a person sitting within the privacy of his own home. He’s drinking booze, smoking cigarettes, ingesting marijuana, snorting cocaine, swallowing prescription drugs, and injecting heroin. We can all agree that such conduct is unwise and detrimental to good health. But under what moral authority does a government official punish another adult for doing bad things to himself? How can such power possibly be reconciled with basic principles of individual liberty? Not only has the war on drugs constituted one of most direct assaults on individual liberty in U.S. history, it has also spawned an enormous array of other infringements on liberty. It is impossible to measure, for example, the extent to which the American people are subjected to searches and seizures at the hands of government officials because of the war on drugs. There are also the tremendous assaults on financial privacy that the drug war has generated. Asset-forfeiture laws have provided a means by which public officials have become financially dependent on the drug war, not to mention the direct stealing of money from citizens that voracious cops commit under the guise of asset-forfeiture laws. Bribery, payoffs, and other forms of corruption have spread through the ranks of law enforcement and the judiciary, thanks to the drug war. After more than three decades of drug warfare and the ruination of countless people with drug problems, what do drug-war proponents have to show for their efforts? Nothing, except death, destruction, corruption, violence, and the ruination of countless lives. Nonetheless, the war just keeps going on and on and on, with no end in sight. All that matters is that more arrests and punishments continue taking place and that more money keeps flowing into the hands of the people who are benefiting from the war, including government officials. There is one — and only one — solution to this craziness: the legalization of drugs. The restoration of liberty in America necessitates an immediate end to drug-war prohibition. 9. The monetary system The United States was founded on a monetary system based on gold coins and silver coins. The reason for that was that the Framers understood that one of the greatest threats to the freedom and well-being of the citizenry was the government’s propensity to plunder and loot people’s wealth through the excess printing of paper money. Thus, by rejecting paper money in favor of gold coins and silver coins, our ancestors removed one of the most popular means that government officials have used to inflate the currency. That intent was manifested in the Constitution. For example, the powers delegated to Congress did not include the power to issue paper money, establish a central bank, or enact legal-tender laws. There were also express provisions prohibiting the states from making anything but gold and silver coins legal tender and from issuing “bills of credit,” i.e., paper money. The result was the soundest monetary system in history. People didn’t need to worry about losing their wealth through inflation. Throughout the 19th century, companies were issuing 100-year bonds payable in gold coins, and the result was massive amounts of capital flowing into the United States and being retained in the United States. Unfortunately, modern-day Americans decided to abandon that monetary system in favor of the one that has characterized other nations in history, one based on paper money, a central bank (i.e., the Federal Reserve System), and legal-tender laws. This monetary system has provided the federal government with the means to plunder and loot people indirectly and surreptitiously through the process of inflation. The beauty of the system, from the standpoint of public officials, is that very few citizens are able to figure out what is going on. They see prices of nearly everything rising but they’re unable to recognize that what’s actually happening is that it’s the value of their currency that is dropping, owing to the massive amounts of new money that the government is injecting into the system. Thus, many people inevitably fall into the trap of blaming businessmen, oil companies, grocery stores, gasoline stations, speculators, and entrepreneurs for rising prices, rather than laying blame where it properly lies — with the government that is artificially expanding money and credit. A society in which government wields the power to inflate the currency to finance its ever-increasing projects and programs cannot be considered a free society. How can people truly be free when the government wields the monetary power to take away everything they own? The monetary standard of gold coins and silver coins served as an adequate protection for more than 100 years of American history. Nonetheless, it was not the ideal. The ideal is a free-market monetary system, one in which the market — i.e., consumers and producers — have the freedom to determine the medium of exchange that they themselves decide to use. That is what the Nobel Prize-winning economist Friedrich Hayek referred to as the “denationalization of money.” While the free market would very likely rely on metals-based coins, there is always the possibility that the miracle of the market could come up with media of exchange that people have never dreamed of. What would a free-market monetary system entail? The repeal of all legal-tender laws, the dismantling of the Federal Reserve System, and, best of all, a constitutional amendment guaranteeing a permanent separation of money and the state. 10. Militarism and empire When the United States was founded, the world was shocked by an unusual feature of American life: No standing military force, no conscription, no alliances with other nations, and a steadfast refusal to get involved in foreign conflicts. The fact is that Americans had had a bellyful of empire, militarism, and foreign wars, which is what the British Empire was all about. They were also sick and tired of the debts, taxes, bureaucracy, regulations, gun control, and infringements on privacy and civil liberties that come with empire. Their idea was obviously a radical one: The new government would lack the military means and power to go abroad and save people from tyranny, oppression, starvation, or anything else. If people wished to escape such conditions, however, they would know that there was at least one nation in the world to which they could go, a nation whose borders were open and whose government would not forcibly repatriate people to their country of origin. Our American ancestors didn’t like militarism. And they understood one of the most important lessons in history regarding standing armies: that regimes inevitably use such armies to suppress the rights and liberties of their own citizenries, as the citizens of Iran, China, Burma, North Korea, Cuba, and so many others will attest. Thus, our ancestors decided that America would be a limited-government, constitutional republic, one without an enormous standing army. So how did they intend to protect the United States? Well, for one thing they understood that few countries had the military means by which to send enormous armies across the ocean to successfully invade and occupy the United States. More important, they placed their faith in a free people, who could be counted on to keep themselves armed and trained to fight and shoot, and who would be readily available as citizen soldiers to quickly rally to the cause of repelling a foreign invader. They understood that to attack a free nation whose citizenry will fight to remain free and who are armed and trained would be akin to swallowing a porcupine. Unfortunately, and oddly, modern-day Americans have abandoned their founding principle of a limited-government republic and endorsed the very concept of empire against which the Founding Fathers rebelled. Today, America is characterized by an enormous standing army whose tentacles reach not only into cities and towns across America but also all over the world. Through the CIA and the Pentagon, the U.S. empire engages in all the things that our American ancestors found abhorrent: foreign interventions, foreign wars, entangling alliances, foreign aid, foreign meddling, assassinations, coups, torture, invasions, wars of aggression, and brutal occupations. It’s all done, of course, in the name of “freedom,” the bogus buzz word that has guided empires throughout history. Moreover, with its domestic empire of military bases, the Pentagon has millions of Americans dependent on military largess. Towns and cities across the land live in perpetual fear that the Pentagon might target them for base closure. With empire have come ever-increasing debts and taxes, bureaucracy, regimentation, the ever-present threat of terrorist retaliation, assaults on privacy and civil liberties, kidnapping and rendition, indefinite detention, death and destruction, torture and sex abuse, and monetary debauchery. By their fruits you will know them! The solution is simple: abandon all the foreign military bases, bring all the troops home, discharge them, close the bases here at home, discharge those troops, and rely on well-trained, well-armed citizen soldiers in the highly unlikely event that the United States is ever invaded by some foolish foreign regime. In fact, the solution to all of America’s woes is simple, for all it entails is restoring the principles of liberty on which our nation was founded and then building on them to take America to even greater heights as a model society of freedom. That entails, at a minimum, no more income taxation, trade restrictions, welfare, regulation, immigration controls, gun control, drug war, infringements on civil liberties, paper money, or militarism and empire. Share This Article Jacob G. Hornberger is founder and president of The Future of Freedom Foundation. He was born and raised in Laredo, Texas, and received his B.A. in economics from Virginia Military Institute and his law degree from the University of Texas. He was a trial attorney for twelve years in Texas. He also was an adjunct professor at the University of Dallas, where he taught law and economics. In 1987, Mr. Hornberger left the practice of law to become director of programs at the Foundation for Economic Education. He has advanced freedom and free markets on talk-radio stations all across the country as well as on Fox News’ Neil Cavuto and Greta van Susteren shows and he appeared as a regular commentator on Judge Andrew Napolitano’s show Freedom Watch. View these interviews at LewRockwell.com and from Full Context. Send him email. Reading List Prepared by Richard M. Ebeling Austrian economics is a distinctive approach to the discipline of economics that analyzes market forces without ever losing sight of the logic of individual human action. Two of the major Austrian economists in the 20th century have been Friedrich A. Hayek, who won the Nobel Prize in Economics, and Ludwig von Mises. Posted below is an Austrian Economics reading list prepared by Richard M. Ebeling, economics professor at Northwood University in Midland and former president of the Foundation for Economic Education and vice president of academic affairs at FFF.
{ "pile_set_name": "Pile-CC" }
The chemistry of Chinese drugs. Some herbal drugs commonly used in Chinese medicine have been studied chemically in correlation with their biological activities. In many cases it has been recognized that some characteristic chemical constituents could represent the therapeutical actions of the drugs. It is noted that elucidation of their chemical structures in view of the structure-activity relationship provides scientific evidence for the beneficial uses of traditional drugs in health care and, furthermore, promotes the discovering of new therapeutics from them. The principles of Chinese drugs are distributed widely among almost all the chemical groups of natural products, for example, simple phenolics, lignan, flavonoid, quinonoid, lower terpenes, triterpenoid, steroid, true alkaloid, protoalkaloid or amines and simple and polymolecular carbohydrates. In the present article, the chemical principles of some important Chinese drugs currently used are discussed mainly on the basis of our own investigations, and we refer to other works for a general understanding of the present status on the chemical approach to studies of Chinese drugs and medicine.
{ "pile_set_name": "PubMed Abstracts" }
—Joint efforts include resources and supplies by the end of this week— ARLINGTON, Va. (August 28, 2017) – The American Diabetes Association and JDRF have joined forces to help people with diabetes who have been impacted by Hurricane Harvey access the information, medical supplies and support they need to effectively manage their diabetes during this crisis. The urgent needs are being handled on the ground by local first responders including the local health departments in conjunction with the American Red Cross and the Federal Emergency Management Agency (FEMA) . To begin, a special web link of information and resources is available for people living with diabetes, caregivers, and on-site responders and care professionals: shelter locations; how to advocate for themselves or a loved one with diabetes; how to help someone with diabetes and signs of a diabetes emergency; and additional resources from partners on how to access supplies and/or medication. Information will be regularly updated online at www.diabetes.org/hurricaneharvey . During emergency crises such as this, it is critical for people with diabetes to have access to the medications and testing supplies needed to maintain proper blood glucose control, and to prevent serious sudden complications such as hypoglycemia or hyperglycemia[1]. Within the next few days, we will be announcing additional efforts to provide direct support for the millions of people with diabetes impacted by this devastating hurricane. Visit www.diabetes.org/hurricaneharvey for the latest information. About the American Diabetes Association Nearly half of American adults have diabetes or prediabetes; more than 30 million adults and children have diabetes; and every 21 seconds, another individual is diagnosed with diabetes in the U.S. Founded in 1940, the American Diabetes Association (Association) is the nation’s leading voluntary health organization whose mission is to prevent and cure diabetes, and to improve the lives of all people affected by diabetes. The Association drives discovery by funding research to treat, manage and prevent all types of diabetes, as well as to search for cures; raises voice to the urgency of the diabetes epidemic; and works to safeguard policies and programs that protect people with diabetes. In addition, the Association supports people living with diabetes, those at risk of developing diabetes, and the health care professionals who serve them through information and programs that can improve health outcomes and quality of life. For more information, please call the American Diabetes Association at 1-800-DIABETES (1-800-342-2383) or visit diabetes.org. Information from both of these sources is available in English and Spanish. Find us on Facebook (American Diabetes Association), Twitter (@AmDiabetesAssn) and Instagram (@AmDiabetesAssn). About JDRF JDRF is the leading global organization funding type 1 diabetes (T1D) research. Our mission is to accelerate life-changing breakthroughs to cure, prevent and treat T1D and its complications. To accomplish this, JDRF has invested more than $2 billion in research funding since our inception. We are an organization built on a grassroots model of people connecting in their local communities, collaborating regionally for efficiency and broader fundraising impact, and uniting on a national stage to pool resources, passion, and energy. We collaborate with academic institutions, policymakers, and corporate and industry partners to develop and deliver a pipeline of innovative therapies to people living with T1D. Our staff and volunteers throughout the United States and our six international affiliates are dedicated to advocacy, community engagement and our vision of a world without T1D. For more information, please visit jdrf.org or follow us on Twitter: @JDRF. # # # [1] W Cefalu et. al. The Hurricane Katrina Aftermath and Its Impact on Diabetes Care. Diabetes Care 29:1, 158-160. http://care.diabetesjournals.org/content/29/1/158. Media Contacts: Kristy Evans, 212-859-7877 kevans@jdrf.org Michelle Kirkwood, 703-299-2053 mkirkwood@diabetes.org
{ "pile_set_name": "OpenWebText2" }
Support the stream: #pubgMOBILE #live #PUBGkannada #streaming Mail- sandeepgowdrulive@gmail.com The donations we get in this stream will be donated to CRPF Brave hearts BECOME A MEMBER – Subscribe ಮಾಡ್ರಪ್ಪ discord …
{ "pile_set_name": "Pile-CC" }
There will be no attempt to resurrect the USSR, Kazakh President Nazarbaev has stated in an article devoted to Russian Prime Minister Vladimir Putin’s proposal to create a Eurasian Union comprising Russia, Kazakhstan and Belarus. ­“The Eurasian Union has every chance of becoming an integral part of the world economic architecture, the formation of which started under the most powerful global financial crisis,” Nazarbaev wrote in Russia’s Izvestia newspaper, in which, following the Russian premier and Belarusian President Aleksandr Lukashenko, he shared his views on Eurasian integration. The Kazakh president stated that the union will be an open structure. He stressed that it is a mistake of some analysts in the West to see the Eurasian project as a simple attempt to revitalize the phantom of the USSR to jointly counter “economic, military, political, information, technological, environmental and other threats.” The main aims of the union are completely different, President Nazarbaev outlined. First, the Common Economic Space, which will be the first step on the way to the union, should become a “territory of innovations and technological breakthrough.” Second, it is thought of as a “firm link between Euro-Atlantic and Asian areas.” In the third place, Nazarbaev believes that the Eurasian Union should be formed as a “self-sufficient financial union which will be a part of the new global currency and financial system.” Among other major goals of the three countries is to convince “neighbors of the viability of our union,” the Kazakh president pointed out. “Then we might extend to far more than three member states.” He also refuted the idea that the Eurasian Union aims to become a “shield against Chinese economic expansion.
{ "pile_set_name": "Pile-CC" }
Emerging Vibrio species: an unending threat to public health in developing countries. Discharge of inadequately treated sewage effluents into the environment in developing countries has increased over the years, leading to deterioration of water quality of major watersheds in developing nations and consequently an increased incidence of emerging pathogens such as Vibrio species, the prevalence of which has been generally underestimated in developing nations. This review underscores the need for a proactive approach to risk factors for emerging Vibrio infections, so as to establish adequate prevention measures.
{ "pile_set_name": "PubMed Abstracts" }
Sand High School Camp - August 2, $100This camp will work on all sand volleyball skills at a more advanced level: serving, passing, setting, attacking, blocking and defense. It will focus on advanced techniques with some fundamentals taught. High School Age Only | Check-in 8:30am | 9am – 5pm | Lunch Included Positional Clinic - August 3, $100Focus on a specific indoor position for one day. Hitters, setters, and defenders will all have individual skill instruction.Ages 12-18 | Check-in 8:30am | 9am – 5pm | Lunch Included
{ "pile_set_name": "Pile-CC" }
Flower One, Owner of the Largest Greenhouse in Nevada, Receives Recreational Cannabis Licenses and Approval to List on the Canadian Securities Exchange (CSE) Flower One (FONE) will commence trading on Wednesday October 10, 2018 TORONTO, Oct. 9, 2018 /CNW/ – Flower One Holdings Inc. (“Flower One” or the “Company”) is pleased to announce that it has received its recreational marijuana cultivation license and its recreational marijuana production license from the State of Nevada. Receiving both licenses is a crucial step in the Company’s plan to cultivate premium grade cannabis at scale for Nevada’s growing cannabis market, using its 400,000 square foot greenhouse and 55,000 square foot production facility, and leveraging the industry’s leading agricultural technologies, innovative growing methods and top sustainability practices. We are sharply focused on quickly becoming the leading cannabis cultivator and producer in the state of Nevada. This regulatory milestone now paves the way for Flower One to work towards its targeted annual capacity of 140,000 pounds of dry flower and trim to help meet the growing demand of the Las Vegas and broader Nevada cannabis market. Ken Villazor, President and CEO of Flower One In addition, the Company is pleased to announce it has received approval from the Canadian Securities Exchange (“CSE”) for listing its common shares. The Company’s shares will commence trading on the CSE on Wednesday, October 10, 2018 under the symbol “FONE”. When the Company commences trading, there will be 172,192,279 issued and outstanding common shares in the capital of the Company (the “Common Shares”), no warrants and 7,915,000 outstanding options convertible into the same number of common shares within the Company’s capital structure. As required by the CSE, certain shareholders collectively holding 97,719,900 Common Shares, being 56.8% of the total issued and outstanding Common Shares, have entered into a pooling agreement dated October 4, 2018 with Odyssey Trust Company, as escrow agent, and the Company, pursuant to which 25% of such shares will be released to the corresponding shareholders and be free-trading as of the commencement of trading, with an additional 25% being released every six months thereafter. Further, all of the Company’s directors and officers and those shareholders holding greater than 5% of the issued outstanding shares have agreed to a six-month escrow for their securities with Eight Capital pursuant to the terms of the Agency Agreement dated September 19, 2018. This represents 3,200,000 outstanding options and 77,247,316 Common Shares of the Company (76,375,000 of which are also subject to the CSE described above). In total, 98,592,216 Common shares, representing 57.3% of the issued and outstanding Common shares of the Company are subject to some form escrow. About Flower One Holdings Inc. (CSE: FONE) Home to the largest commercial scale greenhouse in the State of Nevada, Flower One aims to leverage the industry’s leading agricultural technologies, utilizing innovative growing and sustainability practices to cultivate high-quality cannabis at scale for Nevada’s growing cannabis market. The Company is licensed for medical marijuana cultivation and production, and recreational marijuana cultivation and production in the state of Nevada. Once canopied, targeted Q1 2019, the 455,000 square foot facility will be used for cannabis cultivation as well as the processing, production and high-volume packaging of dry flower, cannabis oils, concentrates and infused products. Sustainably-cultivated cannabis at scale to meet Nevada’s growing demand, Flower One is ready to grow for you. Original press release Get ahead of the crowd by signing up for 420 Investor, the largest & most comprehensive premium subscription service for cannabis traders and investors since 2013. Published by NCV Newswire The NCV Newswire by New Cannabis Ventures aims to curate high quality content and information about leading cannabis companies to help our readers filter out the noise and to stay on top of the most important cannabis business news. The NCV Newswire is hand-curated by an editor and not automated in anyway. Have a confidential news tip? Get in touch
{ "pile_set_name": "OpenWebText2" }
Integration Debate Merkel Urges More Tolerance Towards Muslims German Chancellor Angela Merkel has called on her fellow citizens to exercise more tolerance toward the country's 4 million Muslims, stating that Islam is part of Germany. People, she said, need to be careful to differentiate between extremists and the religion itself.
{ "pile_set_name": "OpenWebText2" }
[Favourable outcome after treatment with rituximab in a case of seronegative non-paraneoplastic Lambert-Eaton myasthenic syndrome]. Lambert-Eaton myasthenic syndrome is a rare and autoimmune presynaptic disorder of the neuromuscular junction, due in 85% of cases to autoantibodies directed against voltage-gated calcium channels. It is a paraneoplastic disorder in 50 to 60% of cases. Diagnosis involves a proximal muscle weakness and areflexia, associated with a significant increment after post-exercise stimulation in electrophysiological study. Symptomatic treatment is based on 3,4-diaminopyridine. No etiological treatment has proven its efficacy in both paraneoplastic and non-paraneoplastic Lambert-Eaton myasthenic syndrome. We report a 41-year-old man who presented with a seronegative non-paraneoplastic Lambert-Eaton myasthenic syndrome in whom conventional immunosuppressive treatments (corticosteroids, azathioprine) failed, and who eventually improved after treatment with rituximab. Rituximab was an effective and well-tolerated treatment in this case of seronegative non-paraneoplastic Lambert-Eaton myasthenic syndrome. Its indication should be discussed when conventional immunosuppressive therapy fails in both seropositive and seronegative patients.
{ "pile_set_name": "PubMed Abstracts" }
The U.S. Department of Justice says that David G. Williams, a Chief Warrant Officer in the U.S. Coast Guard and the Main Propulsion Assistant for the Coast Guard Cutter RUSH, was indicted yesterday by a federal grand jury for obstructing the investigation into his authorization of the direct overboard discharge of bilge wastes through the deep sink into the Honolulu Harbor. The Justice Department announcement was made by Ronald J. Tenpas, Acting Assistant Attorney General for the Justice Department's Environment & Natural Resources Division and U.S. Attorney for the District of Hawaii Edward H. Kubo Jr. Williams was charged with two counts: one count of obstruction of justice and one count of making a false statement. As the Main Propulsion Assistant, he oversaw the maintenance of the main diesel engines and other machinery in the engine room for the Coast Guard Cutter RUSH, a 378 ft. high endurance cutter stationed in Honolulu. "This indictment stands as notice that the Department of Justice will enforce the nation's environmental laws in an even-handed and thorough manner," said Acting Assistant Attorney General Tenpas. According to the indictment, on or about March 8, 2006, Williams authorized the direct discharge of bilge wastes into Honolulu Harbor. The Engineering Department personnel engaged in an unusual and abnormal operation and configuration of engine room equipment to pump bilge wastes from the aft bilge to the deep sink and overboard into Honolulu Harbor, thereby bypassing the "oily water separator" (OWS) system. The OWS system is a pollution prevention control device used by high endurance Coast Guard cutters like the RUSH to manage accumulations of bilge wastes while underway at sea. The OWS system collects, stores, and processes wastes to separate the water from the oil and other wastes. On or about March 13, 2006, the State of Hawaii Department of Health received an anonymous complaint stating that U.S. Coast Guard Cutter RUSH crew members were ordered to pump approximately 2,000 gallons of bilge waste into Honolulu Harbor. On May 1, 2006, investigators from the U.S. Coast Guard Investigative Service (CGIS) and the Environmental Protection Agency (EPA) received confirmation from Main Propulsion Division personnel who personally participated that bilge wastes had indeed been discharged through the deep sink and into Honolulu Harbor. CGIS investigators obtained various documents from the RUSH, including engineering and ship's logs, tank level sounding sheets, and a pneumatic pump. According to the indictment, when interviewed by investigators from the CGIS and EPA, Williams denied authorizing personnel to discharge bilge waste to the deep sink and stated that he was not aware of the pumping of bilge wastes to bypass the ship's OWS system. The charges set forth in an indictment are merely accusations and the defendant is presumed innocent until proven guilty. If convicted Williams could face 5 years in prison on each count and The government's investigation was initiated by the CGIS and EPA. The case is being prosecuted by Trial Attorney Joseph A. Poux of the Justice Department's Environmental Crimes Section, Ronald G. Johnson, chief of the Major Crimes Section; and Assistant U.S. Attorney for the District of Hawaii William L. Shipley.
{ "pile_set_name": "Pile-CC" }
Check out our new site Makeup Addiction Will Smith Still Aint Mad add your own caption Will Smith Still Aint Mad add your own caption Will Smith Still Aint Mad add your own caption Will Smith Still Aint Mad add your own caption Will Smith Still Aint Mad add your own caption Will Smith Still Aint Mad add your own caption Will Smith Still Aint Mad add your own caption Will Smith Still Aint Mad add your own caption Will Smith Still Aint Mad add your own caption Will Smith Still Aint Mad add your own caption add your own caption
{ "pile_set_name": "OpenWebText2" }
Q: What is the advantage of casting the Light cantrip on an object an enemy is wearing or holding? The cantrip light (PHB, p. 255) says that it casts a "bright light". It also states that: If you target an object held or worn by a hostile creature, that creature must succeed on a Dexterity saving throw to avoid the spell. Why would there be specific text directly dealing with casting it on an enemy unless there was some benefit? I was thinking that the spell could either; temporarily cause the blinded condition or have a similar effect to the Help action and allow an ally to gain advantage on their next attack roll against that enemy. Either way, I would assume a glowing object would at least give my allies a bonus to see the enemy and make it near-impossible for the enemy to hide while holding or wearing a "bright light." A: This is merely giving an unwilling creature a chance to not be affected by a spell. It does not do anything special by default. However, for some creatures, it may end up providing disadvantage. Many creatures who are native to dark areas do have disadvantage when they are in bright light. It may also help if you are trying to remain hidden. If you are in the dark, and your enemy is in the light, then he is visible and you are not. Again, this is trying to prevent this spell from being overpowered. All it's doing is providing the enemy with an opportunity to avoid the effects (being lit up like a Christmas tree). There is no default benefit here. A: Either way, I would assume a glowing object would at least give my allies a bonus to see the enemy and make it near impossible for the enemy to hide while holding or wearing a "bright light." This is exactly it. You can see the target - even if you're in the dark. This is why Drow in groups with non-Drow tend to open with Faerie Fire (which is a better option for highlighting targets without revealing your own position). All it takes is one caster with darkvision / low-light vision to reveal the enemy - and all his friends standing too close. A: AS has been mentioned already the spell itself has no negative impact on the enemy per se BUT it can be useful in some cases. Talking here mostly about RPG aspects as I'm not too familiar with the dnd5e rules themselves If you want to flee inside a cave system the enemy and want to know WHERE he is at it is quite nice (and which orc would remove his plate mail just because it shows the enemy where he is at). Also in case of things with no eyes at all (only tremorsense,...) they wouldnt get it HOW you always know where they are at. If the enemy is invisible and you manage to hit him......it could be reducing the effect of invisibilty (ok there is nothing there but there is some glowing sheen.....strike the glowing thing there). Here I'm not sure how invisibility functions in 5th could be that it "absorbs" the light. You could use light to "mark" targets for archers that are too far to shout at "target this one who is holding the spear of destruction" For more normal chars ... thus those without low light and infravision it would bereft them of their night vision leading to them not seeing well anymore in the dark (outside of the area of shine). A sudden light could also be quite dazzling to them (depends on the gm though). Then there are those who are vulnerable to light like drows in most systems,... you could make sure they are blinded,... for a while with light. As the drow would have to choose if he wants to see nothing or strike you with his/her bare hands instead of a sword. As mentioned in a comment: Cast it on an animal (as that would be unwilling) so that it runs around and distracts guards or superstitious beings.
{ "pile_set_name": "StackExchange" }
Q: How to create a new instance from a class object in Python I need to dynamically create an instance of a class in Python. Basically I am using the load_module and inspect module to import and load the class into a class object, but I can't figure out how to create an instance of this class object. Please help! A: I figured out the answer to the question I had that brought me to this page. Since no one has actually suggested the answer to my question, I thought I'd post it. class k: pass a = k() k2 = a.__class__ a2 = k2() At this point, a and a2 are both instances of the same class (class k). A: Just call the "type" built in using three parameters, like this: ClassName = type("ClassName", (Base1, Base2,...), classdictionary) update as stated in the comment bellow this is not the answer to this question at all. I will keep it undeleted, since there are hints some people get here trying to dynamically create classes - which is what the line above does. To create an object of a class one has a reference too, as put in the accepted answer, one just have to call the class: instance = ClassObject() The mechanism for instantiation is thus: Python does not use the new keyword some languages use - instead it's data model explains the mechanism used to create an instantance of a class when it is called with the same syntax as any other callable: Its class' __call__ method is invoked (in the case of a class, its class is the "metaclass" - which is usually the built-in type). The normal behavior of this call is to invoke the (pseudo) static __new__ method on the class being instantiated, followed by its __init__. The __new__ method is responsible for allocating memory and such, and normally is done by the __new__ of object which is the class hierarchy root. So calling ClassObject() invokes ClassObject.__class__.call() (which normally will be type.__call__) this __call__ method will receive ClassObject itself as the first parameter - a Pure Python implementation would be like this: (the cPython version is of course, done in C, and with lots of extra code for cornercases and optimizations) class type: ... def __call__(cls, *args, **kw): constructor = getattr(cls, "__new__") instance = constructor(cls) if constructor is object.__new__ else constructor(cls, *args, **kw) instance.__init__(cls, *args, **kw) return instance (I don't recall seeing on the docs the exact justification (or mechanism) for suppressing extra parameters to the root __new__ and passing it to other classes - but it is what happen "in real life" - if object.__new__ is called with any extra parameters it raises a type error - however, any custom implementation of a __new__ will get the extra parameters normally) A: This is how you can dynamically create a class named Child in your code, assuming Parent already exists... even if you don't have an explicit Parent class, you could use object... The code below defines __init__() and then associates it with the class. >>> child_name = "Child" >>> child_parents = (Parent,) >>> child body = """ def __init__(self, arg1): # Initialization for the Child class self.foo = do_something(arg1) """ >>> child_dict = {} >>> exec(child_body, globals(), child_dict) >>> childobj = type(child_name, child_parents, child_dict) >>> childobj.__name__ 'Child' >>> childobj.__bases__ (<type 'object'>,) >>> # Instantiating the new Child object... >>> childinst = childobj() >>> childinst <__main__.Child object at 0x1c91710> >>>
{ "pile_set_name": "StackExchange" }
2001 Minnesota Vikings season The 2001 season was the Minnesota Vikings' 41st in the National Football League. Despite having a 12th ranked offense, the Vikings finished 5–11 and missed the playoffs for the first time since 1995. Before the end of the season, the team fired head coach Dennis Green, who had become a polarizing force among the Viking fan base despite his successful coaching tenure with the team. Mike Tice coached the final game of 2001, a loss to the Ravens. The season began in tragic circumstances when offensive lineman Korey Stringer died of heat stroke in training camp. The season started off with a 24–13 home loss to the Carolina Panthers (which would be the Panthers' lone win). They did not win on the road at all during this season. Some season highlights included a 35–13 win over the rival Green Bay Packers in Week 6, and a Week 10 victory over the Giants in which Randy Moss pulled in 10 receptions for 171 yards and three touchdowns leading to a 28–16 victory. This was Cris Carter's final season in Minnesota, having played 12 seasons there, making eight consecutive Pro Bowl appearances (1993–2000), all with the Vikings. He is the team's all-time leader in receptions, receiving yards, and touchdowns. He retired at the end of the disappointing season, but would briefly return to play for the Miami Dolphins midway through next season. Offseason 2001 Draft The Vikings traded their third- and fourth-round selections (86th and 119th overall) to the New England Patriots in exchange for New England's third-round selection (69th overall). The Vikings were awarded two compensatory picks in the fourth round for the losses of Jeff Christy, Duane Clemons, Jeff George and Jimmy Hitchcock. Undrafted free agents Preseason Schedule Game summaries Week 1: at New Orleans Saints Week 2: vs. Pittsburgh Steelers Week 3: vs. Indianapolis Colts Week 4: at Miami Dolphins Regular season Schedule Notes Intradivision opponents are in bold text. Game summaries Week 1: vs. Carolina Panthers Standings Statistics Team leaders League rankings Personnel Staff Final roster References Category:Minnesota Vikings seasons Minnesota Minnesota
{ "pile_set_name": "Wikipedia (en)" }
Q: Infinite surds on a number Is $$ \sqrt{\sqrt{\sqrt{\sqrt{.....\sqrt x}}}} =1$$ where $x$ is a real number and $x > 0$? Since $x$ after every under root , decreases exponentially I think it has to be $1$. But then $1^{2^{2^{2....^{2}}}} =1$ so I am confused. I think the problem lies in the definition of the problem in the way, the expression is defined since the question can be reworded to $ \lim_{a \rightarrow \infty} x^{0.5^{a}} =1$. A: It's not a standard notation. But your interpretation of it, in your final paragraph, is surely the only sensible one. And, given that interpretation, it is just as surely correct. The $n$th iteration of the square root function is indeed $x\mapsto x^{2^{-n}}$, with inverse $y\mapsto y^{2^n}$. The limit $\lim_{n\to\infty}x^{2^{-n}}=1$, being a constant function, is not invertible. Similarly, the limit $$\lim_{n\to\infty}y^{2^{n}}=\begin{cases}\infty&y>1\\1&y=1\\0&y<1\end{cases}$$ is non-invertible too. This should not confuse you. There is no reason to expect the limit of invertible functions to be invertible, and this is a prime example. (A simpler example is $x\mapsto ax$, with the limit taken as $a\to0$.) A: Given $x_0 := x$ and $x_n>0$, update $x_{n+1} := \sqrt{x_n}$. Case 1: If $x_0\geq 1$, then $1\leq x_{n+1} \leq x_n$. Case 2: If $x_0<1$, then $x_n<x_{n+1}<1$. In either case you have a monotone sequence that is bounded. Hence $(x_n)$ converges, say to $\ell$. Then $\ell \leftarrow x_{n+1} = \sqrt{x_n} \to \sqrt{\ell}$ and thus $\ell = \sqrt{\ell}$, which implies $\ell=1$.
{ "pile_set_name": "StackExchange" }
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.cassandra.serializers; import java.nio.ByteBuffer; public interface TypeSerializer<T> { public ByteBuffer serialize(T value); public T deserialize(ByteBuffer bytes); /* * Validate that the byte array is a valid sequence for the type this represents. * This guarantees deserialize() can be called without errors. */ public void validate(ByteBuffer bytes) throws MarshalException; public String toString(T value); public Class<T> getType(); }
{ "pile_set_name": "Github" }
Tuesday, May 10, 2011 Legless Chinese man has planted 3,000 trees in 10 years A retired veteran who lost both his legs has spent 10 years planting more than 3,000 trees on the sides of north China's remote mountains. Sixty two-year-old Ma Sanxiao is a former soldier. He lost both of his legs due to sepsis, a disease where blood is overwhelmed by bacteria. He had one leg amputated in 1984, the other in 2004. But that has not stopped him from planting more than 3,000 trees on nearby mountains in Jingxing county in Hebei Province during the past 10 years. Ma gets before 5 a.m. every day, puts on his prosthetic limbs, climbs the mountains and plants trees. It takes Ma more than 40 minutes to climb just hundreds of metres of mountain. Because he's not "climbing", he's "crawling". Ma said that after the first amputation, he was distressed. He sold everything valuable at home and ran into heavy debt. He then began to plant trees in 2001 on the barren mountains nearby, hoping to earn money by selling the trees. Later his situation improved as the pensions for retired veterans increased. Ma decided never to sell the trees and just let them improve the ecological environment. "I plant more trees to make the mountains greener. As you see, the straight lines of trees are just like green soldiers of the nature," he said.
{ "pile_set_name": "Pile-CC" }
Chelsea remaining fixtures Sunderland (H) - Sun 21 MayArsenal FA Cup (N) - Sat 27 May ‘For this reason, I’m lucky. I’m lucky to have a lot of players who, in the past, won a lot. ‘If, sometimes, I can see some of them relaxing, it’s right for me to try and help them be focused for every moment. But, honestly, it wasn’t necessary for me to keep the concentration and focus of the players.’
{ "pile_set_name": "Pile-CC" }
Shu Yabushita is a former Team BII member of the Japanese idol girl group NMB48. She was born in Osaka Prefecture. Biography Yabushita passed NMB48's 3rd generation auditions in December 2011. Her debut was on February 29, 2012. Her stage debut was on April 29, 2012. On October 10, 2012, she was selected to form Team BII. Yabushita's first NMB48 Senbatsu was for the single Virginity. In the 2013 general elections, Yabushita ranked for the first time, placing 49th with 14,745 votes. In 2014, she placed 59th with 14,119 votes. On December 9, 2016, Yabushita announced her graduation. On April 19, 2017, Yabushita graduated from the group's Team N. Discography NMB48 singles AKB48 singles Appearances Stage Units NMB48 Kenkyuusei Stage "Aitakatta" "Nageki no Figure" "Glass no I LOVE YOU" "Senaka Kara Dakishimete" "Rio no Kakumei" NMB48 BII 1st Stage "Aitakatta" "Nageki no Figure" "Nagisa no CHERRY" "Senaka Kara Dakishimete" "Rio no Kakumei" Team BII 2nd Stage "Tadaima Renaichuu" "7ji 12fun no Hatsukoi" Team BII 3rd Stage "Tadaima Renaichuu" "Wagamama na Nagareboshi" Variety Shows NMB48 Geinin! (2012) NMB48 Geinin!! 2 (2013) TV Dramas AKB Horror Night: Adrenaline's Night Ep.32 - Face Authentication, as Risa (2016) External links NMB48 Official Profile Official Blog Shu Yabushita on Google+ References Category:1998 births Category:Living people Category:Japanese idols Category:Japanese female pop singers Category:People from Osaka Prefecture Category:Musicians from Osaka Prefecture Category:NMB48 members
{ "pile_set_name": "Wikipedia (en)" }
NWF to HOP to Remaking Children’s Outdoor Play Little kids love to play. That’s not news. Play comes naturally and is necessary for the development of physical, emotional, social and cognitive skills. Play is part of being human. But, as it turns out, not all play is equal. Recent research shows that young children who play outdoors in spaces that are specifically designed for 0-5 year olds actually garner more developmental benefits: They engage in 22% more physical activity. Their behaviors improve. They exhibit fewer Attention Deficit Disorder symptoms They tend to eat more fruits and vegetables. Photo by Natural Learning Initiative In addition, children who spend time outdoors at a young age are more likely to remain active as they get older, and they tend to prefer outdoor experiences into adulthood. Whether you aim to reduce childhood obesity, improve social development, increase cognitive skills or build the next generation of conservation stewards, getting children to spend regular time outdoors at the earliest possible age is a recipe for success. The National Wildlife Federation (NWF) plans to use this recipe to fundamentally improve young children’s health, development and connection to nature. We’re starting with a big vision for Colorado that will bring high-quality outdoor spaces to all young children in the state. Imagine vibrant outdoor spaces with multiple learning stations that keep kids moving, natural habitats that inspire curiosity and edible gardens that encourage healthy eating behaviors. And we don’t just plan to bring this to the lucky few — our goal is to make best practices into common practices to improve outcomes for ALL young kids. Whether urban, rural, in licensed day care centers or in public areas used by family care providers, every young child deserves a place where they can realize the benefits of healthy outdoor play. Photo by Natural Learning Initiative NWF’s Healthy Outdoor Play, or HOP, is a partnership with the Natural Learning Institute, the international leader in designing outdoor spaces for young kids, and Qualistar Colorado, the state’s early childhood champion. We’re combining expertise to bring cost-effective landscape design, implementation grants, professional development and policy improvements that will shift the norms in Colorado to include high-quality outdoor spaces. Earlier this year, the Colorado Health Foundation hosted nine other funders to build support for this unaddressed need in Colorado. The importance and potential of this work were clear, and we are now poised to begin this work in 2017. Within five years, we aim to fundamentally change early childhood care in Colorado to include regular and active time outside. There are several reasons why this goal is entirely achievable. First, with the right landscape design approach, creating high-quality outdoor spaces for young children can be very affordable. For less than $5,000 in on-the-ground costs, you can make significant improvements. Photo by Natural Learning Initiative Second, it doesn’t matter if you work with a tiny yard or a vast field; the right design can maximize space to get kids moving and interacting with nature on a daily basis. Our approach is proven by research from North Carolina State University where it has already been tested and successfully implemented in 77 out of 100 North Carolina counties. By engaging providers and parents in the design of outdoor space and providing training for how to use the space effectively, there is buy-in from those who influence the kids the most. Slight policy adjustments or incentives can also result in substantial motivations for early care providers to participate. Furthermore, this work will target both the 45% of Colorado children in licensed care and the other 55% of young children who spend their time in highly-visited public spaces (e.g., trailer parks, libraries). With the right strategies, we can make sure all young children, regardless of race, ethnicity, economics or location, spend time outdoors in safe places where they go every day. The benefits of this effort are clear, and the importance of building good habits at a young age are universally accepted. So, the only remaining question is: how fast can we make this happen? For NWF, it’s just a matter of collaborating with the right partners and implementing the proven strategy. As Colorado HOP takes its first leap in 2017, I have a feeling that it will soar. Help NWF continue programs like HOP. For more information on NWF’s Healthy Outdoor Play and how NWF plays a unique role in connecting kids to wildlife and nature, please contact Andrea Augustie, NWF Regional Philanthropy Director, at augustea@nwf.org, or 303-441-5169.
{ "pile_set_name": "Pile-CC" }
The space between us all In an interview published in the July 12, 1970 issue of Rolling Stone, the rock star David Crosby said: “My time has gotta be devoted to my highest priority projects, which starts with tryin’ to save the human race and then works its way down from there.” The journalist Ben Fong-Torres prompted him gently: “But through your music, if you affect the people you come in contact with in public, that’s your way of saving the human race.” And I’ve never forgotten Crosby’s response: But somehow operating on that premise for the last couple of years hasn’t done it, see? Somehow Sgt. Pepper’s did not stop the Vietnam War. Somehow it didn’t work. Somebody isn’t listening. I ain’t saying stop trying; I know we’re doing the right thing to live, full on. Get it on and do it good. But the inertia we’re up against, I think everybody’s kind of underestimated it. I would’ve thought Sgt. Pepper’s could’ve stopped the war just by putting too many good vibes in the air for anybody to have a war around. He was right about one thing—the Beatles didn’t stop the war. And while it might seem as if there’s nothing new left to say about Sgt. Pepper’s Lonely Hearts Club Band, which celebrates its fiftieth anniversary today, it’s worth asking what it tells us about the inability of even our greatest works of art to inspire lasting change. It’s probably ridiculous to ask this of any album. But if a test case exists, it’s here. It seems fair to say that if any piece of music could have changed the world, it would have been Sgt. Pepper. As the academic Langdon Winner famously wrote: The closest Western Civilization has come to unity since the Congress of Vienna in 1815 was the week the Sgt. Pepper album was released…At the time I happened to be driving across the country on Interstate 80. In each city where I stopped for gas or food—Laramie, Ogallala, Moline, South Bend—the melodies wafted in from some far-off transistor radio or portable hi-fi. It was the most amazing thing I’ve ever heard. For a brief while, the irreparably fragmented consciousness of the West was unified, at least in the minds of the young. The crucial qualifier, of course, is “at least in the minds of the young,” which we’ll revisit later. To the critic Michael Bérubé, it was nothing less than the one week in which there was “a common culture of widely shared values and knowledge in the United States at any point between 1956 and 1976,” which seems to undervalue the moon landing, but never mind. Yet even this transient unity is more apparent than real. By the end of the sixties, the album had sold about three million copies in America alone. It’s a huge number, but even if you multiply it by ten to include those who were profoundly affected by it on the radio or on a friend’s record player, you end up with a tiny fraction of the population. To put it another way, three times as many people voted for George Wallace for president as bought a copy of Sgt. Pepper in those years. But that’s just how it is. Even our most inescapable works of art seem to fade into insignificance when you consider the sheer number of human lives involved, in which even an apparently ubiquitous phenomenon is statistically unable to reach a majority of adults. (Fewer than one in three Americans paid to see The Force Awakens in theaters, which is as close as we’ve come in recent memory to total cultural saturation.) The art that feels axiomatic to us barely touches the lives of others, and it may leave only the faintest of marks on those who listen to it closely. The Beatles undoubtedly changed lives, but they were more likely to catalyze impulses that were already there, providing a shape and direction for what might otherwise have remained unexpressed. As Roger Ebert wrote in his retrospective review of A Hard Day’s Night: The film was so influential in its androgynous imagery that untold thousands of young men walked into the theater with short haircuts, and their hair started growing during the movie and didn’t get cut again until the 1970s. We shouldn’t underestimate this. But if you were eighteen when A Hard Day’s Night came out, it also means that you were born the same year as Donald Trump, who decisively won voters who were old enough to buy Sgt. Pepper on its initial release. Even if you took its message to heart, there’s a difference between the kind of change that marshals you the way that you were going and the sort that realigns society as a whole. It just isn’t what art is built to do. As David Thomson writes in Rosebud, alluding to Trump’s favorite movie: “The world is very large and the greatest films so small.” If Sgt. Pepper failed to get us out of Vietnam, it was partially because those who were most deeply moved by it were more likely to be drafted and shipped overseas than to affect the policies of their own country. As Winner says, it united our consciousness, “at least in the young,” but all the while, the old men, as George McGovern put it, were dreaming up wars for young men to die in. But it may not have mattered. Wars are the result of forces that care nothing for what art has to say, and their operations are often indistinguishable from random chance. Sgt. Pepper may well have been “a decisive moment in the history of Western civilization,” as Kenneth Tynan hyperbolically claimed, but as Harold Bloom reminds us in The Western Canon: Reading the very best writers—let us say Homer, Dante, Shakespeare, Tolstoy—is not going to make us better citizens. Art is perfectly useless, according to the sublime Oscar Wilde, who was right about everything. Great works of art exist despite, not because of, the impersonal machine of history. It’s only fitting that the anniversary of Sgt. Pepper happens to coincide with a day on which our civilization’s response to climate change will be decided in a public ceremony with overtones of reality television—a more authentic reflection of our culture, as well as a more profound moment of global unity, willing or otherwise. If the opinions of rock stars or novelists counted for anything, we’d be in a very different situation right now. In “Within You Without You,” George Harrison laments “the people who gain the world and lose their soul,” which neatly elides the accurate observation that they, not the artists, are the ones who do in fact tend to gain the world. (They’re also “the people who hide themselves behind a wall.”) All that art can provide is private consolation, and joy, and the reminder that there are times when we just have to laugh, even when the news is rather sad. 5 Responses Great post. I’ve also struggled with this idea about the purpose of art and whether it foments real change. In the end, I think it is just one of many levers that must be flipped to (ultimately) compel action. But there’s no doubt to me that art must bear witness, and that we have a responsibility to be political as artists. For me, art forms our moral conscience, even when aspirational, even when we are left with a vaccuum of moral consciousness elsewhere. I think when a phenomenon as big as the Beatles hits, we need to recall that only a tiny fraction of the listeners are really affected by the band in any way beyond tapping their toes and dancing. 90+% are there out of habit, out of following the trend, or just because the tunes are good (in other words, any intent behind it passes them by). Yes, Pepper did not reach the generation that was making the decisions about Vietnam. But we can look at what the Pepper generation did when it _was_ the one making the decisions — let’s say the mid 1980s (when they hit 40) through to now, when one is Pres. of the USA. It does not look good, really, does it? Surely if the there was anything genuine about the peace and love generation, with its protests and back-to-nature, anti-corporate ethos, then they would not have been the generation that oversaw the death of the planet. Then, one can always say, “Yes, but things would have been even _even worse_ without those influences.” And on a personal level that is undoubtedly true. Good music helps get you through.
{ "pile_set_name": "Pile-CC" }
Q: how to use csrf token asp c#? I've started with asp mvc 3, with c# and razor, then. I want to use forms with security for send petitions POST. I want to with razor render some like that <form action="/sass/" method="post"> @using (Html.BeginForm()) { @Html.AntiForgeryToken() <div class="form-group"> <label>Ingresa tu Nombre</label> <input class="form-control" name="nombre" /> </div> <div class="form-group"> <input type="submit" value="Enviar mi duda" class="btn btn-primary btn-sm" /> </div> } And in C# I dont know how to validate that csrf token, is valid. I work with C#, asp mvc3 and razor. Please help me! A: In your action method you need to add the respective attribute [ValidateAntiForgeryToken], and it validate the input for you.
{ "pile_set_name": "StackExchange" }
Google has revealed the Nexus Player, an Android-powered set-top box that can stream movies and play games. The ASUS-made machine has 8GB of internal storage, 1GB of RAM, a 1.8GHz Quad Core Intel Atom processor and an Imagination PowerVR Series 6 Graphics 2D/3D Engine. The device can be controlled with voice commands but also comes with a custom remote control. The system can play Android games, and also run entertainment apps including Netflix, Youtube and Hulu. It will also sync with other Android devices allowing users to start watching a movie or playing a game on their phone and then switch to the Nexus Player at any point. A game controller can also be purchased separately for $40. The Nexus Player will release in the US on November 3rd for $99. (via Gamespot)
{ "pile_set_name": "OpenWebText2" }
DISMISS; and Opinion Filed September 29, 2014. S In The Court of Appeals Fifth District of Texas at Dallas No. 05-14-00273-CV JOHN KENNEMER, Appellant V. ANGELINA KENNEMER, Appellee On Appeal from the 256th Judicial District Court Dallas County, Texas Trial Court Cause No. DF-13-13523 MEMORANDUM OPINION Before Justices FitzGerald, Fillmore, and Stoddart Opinion by Justice Fillmore John Kennemer’s brief was due August 6, 2014. When appellant failed to file his brief, we notified him, by postcard dated August 7, 2014, that the time had expired and directed him to file his brief along with an extension motion within ten days. We cautioned that the failure to file his brief and extension motion would result in the dismissal of this appeal without further notice. To date, appellant has not filed his brief, filed an extension motion, or otherwise corresponded with the Court regarding the status of his brief or this appeal. Accordingly, we dismiss this appeal. See TEX. R. APP. P. 38.8(a)(1); 42.3 (b), (c). /Robert M. Fillmore/ ROBERT M. FILLMORE JUSTICE 140273F.P05 S Court of Appeals Fifth District of Texas at Dallas JUDGMENT JOHN KENNEMER, Appellant On Appeal from the 256th Judicial District Court, Dallas County, Texas No. 05-14-00273-CV V. Trial Court Cause No. DF-13-13523. Opinion delivered by Justice Fillmore, ANGELINA KENNEMER, Appellee Justices FitzGerald and Stoddart participating. In accordance with this Court’s opinion of this date, the appeal is DISMISSED. It is ORDERED that appellee ANGELINA KENNEMER recover her costs of this appeal, if any, from appellant JOHN KENNEMER. Judgment entered this 29th day of September, 2014. –2–
{ "pile_set_name": "FreeLaw" }
1. Field of the Invention The invention pertains to parallel algorithms for execution by a operand-rerouting, multi-operation vector processor. More specifically, the invention relates to an improved line drawing technique on such a processor. 2. Description of the Related Art The microcomputer industry has seen a metamorphosis in the way computers are used over the last number of years. Originally, most operating systems were text based requiring typed user input and providing textual response. These systems have given way to graphical based environments. Current systems are heavily graphically based, both providing graphical user interfaces including icons, windows, and the like, and providing graphical interaction with a user through a variety of user input devices. This trend is likely to continue. But graphical, multimedia environments place different and greater demands on processor capabilities than the old textual environments. For many years, the Intel x86 series of processors by Intel Corporation has provided the computing power for IBM PC compatible machines. The architecture of the Intel design, however, is not optimized towards graphical operations. To this end, a number of extensions to the x86 architecture have been proposed and developed. These include the MMX extensions developed by Intel Corporation. Further, other manufacturers have similarly extended their instruction sets. For example, Sun Microcomputing has developed the UltraSparc, a graphics extension of the SPARC V9 architecture. Typical vector processors provide for multiple operations simultaneously, but require that the same operation be performed by each partition within the vector (SIMD, or single instruction multiple data). In the multimedia extension unit architecture, this has changed. Not only can multiple operations be concurrently executed on vectorized data, but different operations can be simultaneously performed, and the vectorized data can be rerouted through a number of multiplexers. This architecture presents a number of possibilities, but developing algorithms that efficiently utilize this architecture places its own demands, given the new features of the instruction set. It is desirable to efficiently utilize this architecture to execute algorithms for multimedia.
{ "pile_set_name": "USPTO Backgrounds" }
Share Facebook Twitter LinkedIn Sony will start hosting quarterly indie developer events at its London offices this year, Develop can reveal. Sony Computer Entertainment Europe senior account manager Agostino Simonetta said the events would be open to the entire development community. The events will be used offer the latest updates on Sony’s PS4, PS3 and Vita platforms, and will be used to discuss topics such as how the PSN is performing and how the install base is looking. Although targeted at European developers, indies from all around the world are also invited. SCEE is looking at starting the scheme in September but details and dates have yet to be finalised. “You know we do these things very regularly with all our partners, but with the indie community, it is so vast and they are spread out, that it is hard for me to go and work with developer days in the Middle East,” said Simonetta. “So while we do these things, we want to make sure it is that on a regular basis. With the great success we are having actually of indie developers registering, we are seeing incredible numbers of new companies coming to the platform. There is a real sense that PS4 – and Vita as well, PS3 still has a long life – that this is a great opportunity for them to come back to console.” He added: “We are really accelerating and changing the way we approach this. So before was more of a narrow cast, now there is a real opportunity for us to go what I call broadcast – a lot more visibility to be able to answer the questions." Simonetta also said that the current number of indies registering to develop for the PS4, as well as Vita and PS3, was unlike anything the company had seen before. Although he wouldn’t go into specific numbers, he said: "I can tell you I have been there for four years, and one of my colleagues has been in third-party relations for ten years, and we’ve never seen anything like this. And this is not just PS4, it applies to Vita and PS3 as well."
{ "pile_set_name": "OpenWebText2" }
Create a Project using Eclipse 1. File - > New or Right Click on the Project Explorer Pane and Select New . Select Android Application Project. 2. You will get a window as shown below. 3. Fill the details a) Application Name : This will be the name that appears to the user. b) Project Name : This is the name of the project directory which will be visible in eclipse . c) Package Name : This is the package namespace of your app. Make sure you use a proper package name . Your package name must be unique across all packages installed on the Android system . d) Minimum Required SDK - It is the lowest of version of Android that your app supports. e) Target SDK - It indicates the highest version of Android your app has been tested on. Please select the latest version supported to take the maximum advantage . f) Compile with - indicates the highest version of Android against which you are going to compile your app. Set it to the latest versions to take maximum advantage of the sdk .
{ "pile_set_name": "Pile-CC" }
Multiple users can access Sage 50 in the cloud AUTHOR: Amenda Ray Sage 50 was previously known as Peachtree accounting solution. Sage 50 is the new name which is registered due to the product marketed and purchased by Sage. Peachtree accounting or Sage 50 is successful enterprise application that manages the businesses to trade smartly. The automated software product has been enhanced by Sage to make it more robust and deliver better for its customers. Sage products are known to meet the business needs of small and medium sized firms while it is equally benefiting for self-employed firms or startups. Apart from these other modules like invoicing, payments, value added tax, manufacturing and reporting are operated in the accounting software products. Users are free to access the application system on Smartphone’s, tablets or any device of their choice. Sage 50 accounting name suggest that the application is more or less useful for user access to 50 that means a small or medium enterprise having users equal or less than 50 can operate their organization with Sage 50 solutions. The accounting product can perform all the business accounting modules for its customers to manage their sales, payroll, finances, inventory and customers. Apart from these other modules like invoicing, payments, value added tax, manufacturing and reporting are operated in the accounting software products. It is evident that SMEs can get benefit from sage 50 accounting product to easy manage their trades while some firms may need custom based accounting solutions.
{ "pile_set_name": "Pile-CC" }
Dhanushkodi Tirtham Dhanushkodi Tirtham is one of the Tirthas in the island of Rameswaram, Tamil Nadu, India. This is located beside the ghost town of Dhanushkodi at the easternmost tip of Rameswaram Island. Rama used his bow's (Dhanush) end (Kodi) to break the bridge - Adam's Bridge (hence the name). This bridge was used for his army to cross over to Lanka for the victorious war against Ravana. __TOC__ Legends Rama & Vibhishana Ashwattaaman Faith & Beliefs The month of Maasi (Kumbha) (Feb-Mar) is the most auspicious bathing period. Other auspicious days include Arthodayam, Mahodayam, days of solar & lunar eclipses. References in Literature References to this Tirtha is made in Sethu Puranam. Notes References Category:Ramanathapuram district Category:Rameswaram
{ "pile_set_name": "Wikipedia (en)" }
Novel transcript A novel Ensembl transcript does not match to a sequence for the same species in a public, scientific database such as UniProtKB or NCBI RefSeq. This project has been funded in whole or in part with Federal funds from the National Institute of Allergy and Infectious Diseases, National Institutes of Health, Department of Health and Human Services, under Contract No. HHSN272201400029C.
{ "pile_set_name": "Pile-CC" }
Sharapova is "good for tennis", International Tennis Federation president David Haggerty says after the Russian's return to Grand Slam action following a 15-month doping suspension. He also tells BBC Sport "robust conversations" are planned over player welfare after a spate of withdrawals from the US Open. READ MORE: Maria Sharapova stuns Simona Halep on Grand Slam return READ MORE: Andy Murray withdraws from US Open because of ongoing hip injury
{ "pile_set_name": "OpenWebText2" }
Internet commerce, or e-commerce as it is otherwise known, relates to the buying and selling of products and services between consumers and merchants over the Internet or other like transactional exchanges of information. The convenience of shopping over the Internet has sparked considerable interest in e-commerce on behalf of both consumers and merchants. Internet sales, or like transactions, have been typically carried out using standard credit cards such as Visa®, MasterCard®, Discover®, American Express®, or the like, or standard debit cards, i.e., check cards or automated teller machine (ATM) cards which directly access funds from an associated deposit account or other bank account. While widely used for more traditional face-to-face transactions, use of these standard cards in connection with e-commerce presents certain difficulties, including difficulties concerning authentication or positive identification of the cardholder. For example, maintaining consumer confidence in security has become difficult with increased reports of fraud. The resulting apprehension is also fueled by consumer uncertainty of the reputation or integrity of a merchant with whom the consumer is dealing. Questionable security of the consumer's card information or other personal information typically submitted along with a traditional e-commerce transaction (e.g., address, card number, phone number, etc.) serves to increase apprehension even more. Additionally, cardholders, merchants and financial institutions are all concerned about safeguarding against fraudulent or otherwise unauthorized transactions. Accordingly, various credit card networks have implemented initiatives or programs aimed at safeguarding against fraud. For example, Visa® and MasterCard® both support authentication initiatives whereby a cardholder is authenticated by the bank or financial institution issuing the card, i.e., the issuing bank. FIG. 1, illustrates one such exemplary authentication initiative. As shown in this example, a consumer/cardholder 10, e.g., employing a suitable web browser or the like, is making an on-line purchase, e.g., over the Internet, from a merchant 20. As is known in the art, the illustrated back-end payment processing chain includes an optional payment gateway 30, the merchant's financial institution or acquiring bank 32, the credit card network 34 and the issuing bank 36. At a point of checkout, the consumer 10 selects an appropriate payment method based on the initiatives supported by the merchant 20. At this point, the consumer fills out the on-line checkout form including a payment option, card number, expiration date, etc. Based on the payment information, the merchant 20, via a plug-in 22 installed on their server, passes a verify enrollment request (VEReq) message to a directory 38 on a server, e.g., suitably operated by the credit card network 34. The directory 38 includes a database associating participating merchants with their acquiring banks and a database associating card number ranges with locations or addresses, e.g., universal resource locator (URL) addresses, of issuing banks' authentication servers, e.g., the authentication server 40 for issuing bank 36. The VEReq message is a request to verify the enrollment of the card in the authentication program, and it contains the card number provided by the consumer 10. Based on the card number range stored within the directory, the VEReq message will be sent to the appropriate URL address for the server 40 which returns to the merchant 20 via the directory 38 a response thereto, i.e., a verify enrollment response (VERes). That is to say, the server 40 will verify the enrollment status of the card and respond with a VERes message to the directory 38 which is then passed back to the merchant's plug-in component 22. Based on the VERes message (i.e., if positive), the merchant plug-in component 22 will redirect the cardholder's browser to the server 40 by passing it a payer authentication request (PAReq) message generated by the merchant's plug-in component 22. The consumer 10 then completes an authentication process directly with the server 40. The authentication server 40 authenticates the consumer/cardholder 10 and responds to the merchant 20 with a payer authentication response (PARes) message including a digital signature. The merchant's plug-in component 22 validates the digital signature of the PARes and extracts the authentication status and other specified data that is to be used by the merchant 20 during the payment authorization process carried out via the back-end payment processing chain. For example, the merchant 20 sends an authorization/sale transaction to their payment gateway 30 along with the data elements received from the PARes. The payment gateway 30 routes the data to the acquiring bank 32 based on the acquirer's specification. The acquiring bank 32 then sends the data via the appropriate credit card network 34 to the issuing bank 36 for settlement. When using authentication initiatives such as the aforementioned example, the credit card network often ensures participating merchants that fraudulent transactions and other charge backs, as they are known in the art, will not be the merchants' responsibility provided the specified protocols have been followed. However, there are considerable burdens placed upon the merchants to participate in the authentication initiatives. For example, typical installation of the merchant plug-in can be overly burdensome using up resources, i.e., computing power, memory, data storage capacity, etc., the merchant would otherwise prefer to devote to other tasks. Often, the plug-in component can be extremely large and/or cumbersome to implement on the merchant's server. Moreover, for a merchant that participates in a plurality of such authentication programs for multiple credit card networks, the burden can be that much more, i.e., requiring a separate plug-in component for each individual authentication initiative they wish to support, especially considering that each credit card network may have its own particular protocols, data fields that are employed in the respective messages, specific data format requirements, etc. Further, the merchants are responsible for remaining current with initiative protocols that can change periodically. That is to say, as the authentication protocols are updated and/or changed by the respective credit card networks, the merchants are likewise responsible for updating and/or changing their plug-in components to reflect those update and/or changes being mandated by the credit card networks. The present invention contemplates a new and improved system and/or method which overcomes the above-referenced problems and others.
{ "pile_set_name": "USPTO Backgrounds" }
White House Big Dig ending, but what comes next? MARK S. SMITHAssociated Press Published: September 12, 2012 4:11 AM 1 of 3 Photos | View More Photos WASHINGTON (AP) -- The White House Big Dig is finally wrapping up, but the Big Reveal is proving to be a pretty big letdown. After nearly two years and $86 million worth of noisy and disruptive construction, the West Wing has emerged from its visual seclusion remarkably unchanged. And deep underground, whatever has been built there remains shrouded in mystery. Plus, if you ask what the next phase is in this massive, four-year project, the official answer is "TBD" -- to be determined. The construction project -- officially a long overdue upgrade of White House utilities -- began in September 2010 with the excavation of a huge, multistory pit in front of the West Wing, wrapping around to include West Executive Avenue, the street that separates the White House from the Eisenhower Executive Office Building. A tall, green construction fence sprang up that blocked America's most famous office complex from public view. But now the fence has come down, revealing the familiar whitewashed sandstone facade and the lone Marine guard who stands watch at the entrance to the West Wing lobby. [Article continues below] Bulldozers have covered up the hole. Contractors have repaved the asphalt driveway. National Park Service crews are mostly finished re-grading, re-sodding and replanting. Their goal has been to return the area to its original appearance. So what, exactly, did all the digging, hammering, welding and concrete-pouring accomplish? The General Services Administration, which oversaw the work, said it was to replace aging water and steam lines, sewers, storm sewers and electrical wiring conduits. Heating, air conditioning and fire control equipment also are being updated, officials said. However, what reporters and photographers saw during the construction appeared to go well beyond that: a sprawling, multistory structure whose underground assembly required truckload after truckload of heavy-duty concrete and steel beams. The GSA maintains this structure is merely "facilitating" the utility work. But neither the agency nor the administration will elaborate on its function. Last year, when the project began, GSA officials denied the construction was for additional office space or another bomb shelter. The existing White House bunker, known as the Presidential Emergency Operations Center, is under the East Wing and dates to the Roosevelt administration. [Article continues below] The GSA went to great lengths to keep the work secret, not only putting up the fence around the excavation site but ordering subcontractors not to talk to anyone and to tape over company info on trucks pulling into the White House gates. Meantime, for most of those who work in the West Wing, the project has been a huge headache. Sometimes literally. It's meant shouting to be heard over jackhammers and backhoes, and long walks on arching ramps to circumvent the extensive work zone. The GSA even built a temporary concrete-and-steel platform to elevate TV reporters and their cameras so the White House North Portico could still be seen over the fence. The platform, like the fence, is now gone. And no one's happier than West Wing denizens whose windows were blocked off. "Now that the sights and sounds of construction workers and their equipment are gone, my outlook on the North Lawn of the White House has, literally, brightened," said deputy press secretary Josh Earnest. But the respite may be short-lived. Future phases of the project, whose total price tag tops $376 million, are expected to involve more excavation elsewhere on the North Lawn -- the well-groomed park that tourists see from the fence on Pennsylvania Avenue -- and possibly inside the East and West wings. GSA officials say wrap-up work is actually continuing on the underground utilities, albeit out of sight. And they resolutely refuse to identify the next major work area, or to say when that construction will begin. "The scope of any additional work in the West and East wings has not been determined, so the timing, obviously, hasn't been finalized," said agency spokeswoman Mafara Hobson.
{ "pile_set_name": "Pile-CC" }
Q: Date format in strong typed ListView's EditItemTemplate This is my markup for EditItemTemplate section of a ListView, i want to render short dates format: <asp:TextBox ID="txtFechaArribo" runat="server" Text='<%# string.Format("{0:dd/MM/yyyy}", BindItem.FechaArribo ) %>'> Which produce the runtime exception : BindItem does not exist in the current context Without format expression it works but with the not desired time component. Advices? A: You can use Bind("FechaArribo","{0:d}"), although it will technically be a breach of strong-typing.
{ "pile_set_name": "StackExchange" }
The median survival for patients diagnosed with glioblastoma multiforme (GBM) is one year. Although surgery, chemotherapy and radioactive therapy have continuously improved, long-term survival from GBM has not improved since 1950. One of the methods that have been hypothesized to provide more effective treatment for GBM is through immunomodulation. To investigate this hypothesis, we previously determined that immunosuppressive regulatory T cells (Tregs) are found in human GBM, which is recapitulated in experimental mouse models of glioma. Using an experimental mouse model of glioma, we also determined that Treg depletion increases long-term survival. Based on those discoveries, this research proposal aims to extend those observations by investigating the immunomodulatory enzyme, indoleamine 2, 3 dioxygenase (IDO), which is currently being targeted in Phase 1 clinical trials for breast, lung, and pancreatic cancers, as well as melanoma. IDO has been shown to regulate the conversion of Treg into IL-17A-producing pro- inflammatory CD4+ T helper 17 cells (Th17s). However, no previous investigation has determined the roles of IDO and Th17s in GBM. Therefore, this study aims to identify: 1) the role of IDO, 2) the role of Th17s and 3) the mechanism by which IDO regulates Treg/Th17 levels in orthotopic and transgenic mouse models of glioma. Aim 1 will provide an analysis of in vivo transgenic and orthotopic mouse models of glioma in combination with select IDO deficiency using wild-type (WT), IDO-/- and CD4-/- mice, IDO inhibitors, IDO knockdown with shRNA and CD4+ T- and dendritic cell-adoptive transfers. The changes in IDO mRNA levels, IDO enzyme activity, IDO protein localization, Treg/Th17 levels and glioma invasiveness will be analyzed and correlated to mouse survival. Aim 2 will critically test in vivo orthotopic mouse models of glioma with selective IL-17A deficiency using WT-, IL-17A-/--, ROR3t-/-- and CD4-/--mice, in conjunction with CD4+ T cell adoptive transfers. The changes in Treg/Th17 frequency, Treg/Th17-related cell surface and cytokine expression, IL- 17A protein expression, IDO enzyme activity and glioma invasiveness will be analyzed and correlated to mouse survival. Aim 3 will investigate the mechanism by which IDO regulates Treg/Th17 conversion in vivo using IL-17 reporter-, CD4-/--, CD4+pSTAT5-/--, and CD4+pSTAT3-/--orthotopic mouse models of glioma 1IDO inhibition with CD4+ T cell adoptive transfers. The changes in Treg/Th17 frequency, pSTAT3 and pSTAT5 levels in CD4+ T cells, conversion of adoptively transferred Tregs and Th17s, absolute Treg/Th17 numbers, and CD4+CD25+-, CD4+CD25+IL-17+-, CD4+IL-17+-T cell suppressor capacity will be analyzed. Human GBM is a fatal type of glioma, which results in the infiltration of Tregs and Th17s, as well as the selective expression of IDO. This proposal aims to understand the roles that IDO plays in maintaining the balance between Tregs and Th17s using pre-clinical experimental mouse models of malignant glioma. PUBLIC HEALTH RELEVANCE: Glioblastoma multiforme (GBM) is a highly malignant primary tumor of the central nervous system of glial origin with a median survival time of 15 months. We and others have shown that CD4+ T lymphocytes infiltrate human GBM, as well as mouse models that recapitulate GBM, leading to studies demonstrating that, immunomodulation is a potential target for future treatment of GBM. To further these studies, this proposal aims to investigate the role of indoleamine 2, 3 dioxygenase (IDO), the role of t helper 17 cells (Th17s) and the molecular mechanism by which IDO regulates Treg/Th17 levels using intracranially-injected and spontaneously-developing mouse models of GBM.
{ "pile_set_name": "NIH ExPorter" }
As an Early Access title, Savage Lands allows you to experience the game as it evolves through various phases of development. The game is in Beta which means new features, improvements, and bug fixes will be implemented on a regular basis. The development team is always looking to our Savage Community to help us hone the game experience and encourages everyone to contribute regularly to our Community Discussions.
{ "pile_set_name": "Pile-CC" }
Importance of mineral dust and anthropogenic pollutants mixing during a long-lasting high PM event over East Asia. A long-lasting high particulate matter (PM) concentration episode persisted over East Asia from May 24 to June 3, 2014. The Nested Air Quality Prediction Model System (NAQPMS) was used to investigate the mixing of dust and anthropogenic pollutants during this episode. Comparison of observations revealed that the NAQPMS successfully reproduced the time series PM2.5 and PM10 concentrations, as well as the nitrate and sulfate concentrations in fine (aerodynamic diameter ≤ 2.5 μm) and coarse mode (2.5 μm < aerodynamic diameter ≤ 10 μm). This episode originated from two dust events that occurred in the inland desert areas of Mongolia and China, and then the long-range transported dust and anthropogenic pollutants were trapped over the downwind region of East Asia for more than one week due to the blocked north Pacific subtropical high-pressure system over the east of Japan. The model results showed that mineral dust accounted for 53-83% of PM10, and 39-67% of PM2.5 over five cities in East Asia during this episode. Sensitivity analysis indicated that the Qingdao and Seoul regions experienced dust and pollution twice, by direct transport from the dust source region and from dust detoured over the Shanghai area. The results of the NAQPMS model confirmed the importance of dust heterogeneous reactions (HRs) over East Asia. Simulated dust NO3- concentrations accounted for 75% and 84% of total NO3- in fine and coarse mode, respectively, in Fukuoka, Japan. The horizontal distribution of model results revealed that the ratio of dust NO3-/dust concentration increased from about 1% over the Chinese land mass to a maximum of 8% and 6% respectively in fine and coarse mode over the ocean to the southeast of Japan, indicating that dust NO3- was mainly formed over the Yellow Sea and the East China Sea before reaching Japan.
{ "pile_set_name": "PubMed Abstracts" }
I/O pull-down devices have regularly been used to protect I/O logic circuits from electrostatic discharge (ESD). One such I/O pull-down device 100 is shown in FIG. 1. Device 100 comprises a P-well or P-type substrate or body 110 having P+ taps or contacts 120, a polysilicon gate 140 on the substrate and insulated therefrom by gate oxide 145, heavily doped N-type source and drain regions 150, 160, and N-type lightly doped drain (LDD) regions 155, 165 extending toward each other in the substrate from the source and drain regions. A parasitic NPN bipolar transistor is formed in this device in which the source and drain regions 150, 160 are the emitter and collector of the transistor and the P-well or substrate 110 is the base. The structure of a typical I/O logic device is similar to that of device 100 and is typically formed in the same integrated circuit as I/O pull-down device 100. FIG. 2 is a top view of an implementation of device 100 of FIG. 1. Device 100 is formed in a portion of a semiconductor substrate 205. A P-well 210 is formed in that portion and electrical connection to the P-well is made through P+ well taps 220. Illustratively, the P-well tap extends around the entire periphery of P-well 210. An NMOS transistor is formed in the P-well having a plurality of gate fingers 240 and N+ source/drain regions 250 on both sides of the gate fingers. While not shown in FIG. 2, N-type lightly doped drain (LDD) regions extend toward each other from the source/drain regions 250 on both sides of each gate finger 240. FIG. 3 depicts the use of device 100 in a typical input/output circuit 300. Circuit 300 comprises pull-down device 100 connected between an I/O pad 392 and ground VSSIO Pull-down device protects from ESD events one or more logic circuits 302 containing devices that are similar to device 100 and connected between I/O pad 392 and ground. Illustratively, a first ballast resistor 362 is connected between drain 360 of pull-down device 100 and the I/O pad and a second ballast resistor 352 is connected between source 350 of device 100 and ground. P-well or P-type substrate or body 110 of device 100 is connected to ground. Ballast resistors 352, 362 are used to provide a more uniform current distribution through device 100. Alternatively, a salicide block could be used. The resistance of the P-type body is represented in the schematic by resistor 312. A diode 394 is connected between I/O pad 392 and ground with its cathode connected to the I/O pad and its anode connected to ground. Diode 394 is used to discharge negative voltage electrostatic events. Since both the I/O pull-down device and the circuitry that it is intended to protect are in general formed at the same time through the same implants, the breakdown voltage of the I/O pull-down device and that of any other NMOS device connected to the pad are substantially the same. In the absence of an input resistance to isolate the NMOS I/O pull-down device from the circuits to be protected, some layout techniques can be adopted to prevent competitive triggering such as locating the p+ taps of the I/O pull down device at a larger distance from its active area compared to the distance between the circuits to be protected and their taps. However, capacitive coupling of sensitive nodes to the pad potential or specific topologies can still create the potential of competitive triggering unless the triggering voltage of the I/O pull down device is lowered significantly. Various methods are used for reducing the trigger voltage of the I/O pull-down transistor. In U.S. Pat. No. 6,882,009 of M. Ker et al., P-type pocket implants are used next to the source/drain regions. However, since the P-type pocket implants are used throughout the circuit, this reduces the trigger voltage of both the pull-down transistors and the logic transistors. As a result, the I/O pull-down transistor may not be able to protect the I/O logic circuit. In addition, the P-type pocket implant can degrade the transistor performance by increasing its junction capacitance, and thereby reducing its speed, and can increase the transistor leakage. In M. Ker et al., “ESD Implantation for On-Chip ESD Protection with Layout Consideration in 0.18 um Salicided CMOS Technology,” IEEE Transactions on Semiconductor Manufacturing, Vol. 18, No. 2, pp. 328-337 (May 2005), a P-type ESD implant is located vertically under the source-drain area. This, however, significantly increases the junction capacitance and affects the transistor performance. It also increases the transistor leakage. In the above-referenced application Ser. No. 11/185,609 which is incorporated herein by reference, an ESD protection device is disclosed in which a P-type region is formed underneath a portion of each N-type LDD region so that a P-N junction is formed with the drain/source region. In the embodiment of FIG. 2 of application Ser. No. 11/185,609, the location of the P-type region and therefore the location of the P-N junction is indicated generally by the dashed rectangle 280. The rectangular region 280 is shown to cover the center area of the transistors for illustrative purposes, although it can be anywhere in the transistors. Preferably, the width W of the rectangular region 280 is approximately 25% of the width WLDD of an LDD region although greater widths can be used.
{ "pile_set_name": "USPTO Backgrounds" }
Plant biomass and productivity of many ecosystems are limited by the availability of reactive nitrogen, this is reduced or oxidized forms of N. Over the last century synthetic N fertilizers have undoubtedly helped to enhance crop yields, thus allowing an unprecedented growth of the world population. Despite this, nearly 80% of N fertilizer applied to crops does not reach human mouths but is lost to the environment in water run-off from fields, animal waste, and gas emissions. This N fertilizer abuse, particularly in rich countries, has strongly perturbed the biogeochemical N cycle with an unprecedented production and accumulation of reactive N in the biosphere that threatens human health and ecosystems biodiversity, and contributes to climate change. Optimizing N use and minimizing its negative impacts is a major challenge for the next decades (Galloway et al., [@B1]). Microbes (bacteria and fungi) are main protagonists of all the major reactions in the N-cycle. Microbial activities that process nitrogen in soils and sediments are complex and highly challenging. Better understanding of these processes is important for improving the efficiency of agricultural practices that are essential for food production and environmental quality across the globe. Therefore, any technologies aiming at reducing the N problem must recognize the roles and potential applications of these N-cycle microbes, from diazotrophs to denitrifiers. These microbiotechnologies are necessary if we want to bring reactive N levels back within planet safety boundaries while ensuring crop productivity and food security (Steffen et al., [@B3]). This Research Topic focused on the biotechnology of microbes and microbial processes which can directly or indirectly contribute to alleviate the N problem at local and/or global scales. Fifteen of 20 submitted manuscripts have been accepted for publication. Five articles dealt with various aspects of nitrogenase and biological nitrogen fixation (BNF), the key bacterial process that converts atmospheric N~2~ into reactive nitrogen accessible for living organisms. Three papers were on the nitrogen fixing symbioses between legume plants and soil rhizobia. [Temprano-Vera et al.](https://doi.org/10.3389/fmicb.2018.02843) analyzed differences among *Sinorhizobium fredii* strains at nodulating various genotypes of *Glycine max* (soybean, the most widely produced legume) and *Glycine soja* (the wild ancestor of soybeans). Their results illustrate the complexity of genetic determinants of the soybean-rhizobia compatibility. Also concerning soybeans, [Fernández et al.](https://doi.org/10.3389/fmicb.2019.00924) reported the importance of adaptation of the soybean symbiont *Bradyrhizobium japonicum* to microxic conditions for efficient nitrogen fixation, and identified novel genes subjected to posttranscriptional regulation during microxia which are important for symbiosis. [Tsyganov et al.](https://doi.org/10.3389/fmicb.2020.00015) reported on the contribution of a legume nitrogen-fixing symbiosis to the plant tolerance to Cd, as well as its potential applications for phytoremediation and phytostabilization of soils with high Cd contents. Two other studies identified novel functions which are important for optimal nitrogen fixation in free-living diazotrophs, and therefore should be considered in current and future studies aiming at obtaining nitrogen-fixing plants by genetic engineering. [Navarro-Rodríguez et al.](https://doi.org/10.3389/fmicb.2019.00579) reported on the importance of the molybdenum storage protein MoSto for nitrogen fixation by *Azotobacter vinelandii* under Mo-limiting conditions. On another hand, [Nonaka et al.](https://doi.org/10.3389/fmicb.2019.00495) described the essentiality of several proteins required for nitrogenase assembly during diazotrophic growth by the cyanobacterium *Leptolyngbya boryana*. Another key process in the N cycle is denitrification, which has a strong impact in the environment through the production of reactive nitric oxide (NO) and the powerful greenhouse gas nitrous oxide (N~2~O), with a strong potential to drive climate change. [Olaya-Abril et al.](https://doi.org/10.3389/fmicb.2018.01137) have explored this process in *Paracoccus denitrificans* PD1222 through a quantitative proteomic analysis and have established key features of the denitrification metabolism, particularly the induction of enzymes of the TCA and glyoxylate cycles, together with enzymes that synthesize acetyl-CoA. On another hand, [Liu B. et al.](https://doi.org/10.3389/fmicb.2018.03208) have monitored the kinetics of denitrification gene expression and NO, N~2~O, and N~2~ production in soils exposed to microxia. They concluded that regulatory strategies observed in individual isolates are also displayed in complex communities, emphasizing the need for successive sampling when identifying active key organisms. Two other manuscripts showed that in addition to denitrification, other microbial processes such as nitrate assimilation can be sources of NO and N~2~O. [Ruiz et al.](https://doi.org/10.3389/fmicb.2019.01526) reported that the pathway involving the assimilatory nitrate (NarB) and nitrite (NirB) reductases indirectly contribute to NO synthesis by cooperating with the denitrification pathway in *Sinorhizobium meliloti*. [Hidalgo-García et al.](https://doi.org/10.3389/fmicb.2019.00980) demonstrated that in addition to its involvement in nitrate assimilation, NarB is also required for NO and N~2~O production in *Rhizobium etli*. Nitrite produced by NarB from assimilatory nitrate reduction is detoxified by NirK and cNor denitrifying enzymes that convert nitrite into NO which in turn is reduced to N~2~O, respectively. Nitrification linked to denitrification constitutes an important biotic source of N~2~O emissions from soils. The aerobic oxidation of ammonia (NH~3~) to nitrite ($\text{NO}_{2}^{-}$) is carried out by ammonia oxidizing bacteria (AOB) or archaea (AOA) that also possess the enzymatic pathway to reduce $\text{NO}_{2}^{-}$ to N~2~O (Hu et al., [@B2]). In this regard, the changes in the microbial communities and N~2~O emissions due to common soil management practices were investigated in various papers. The impact of urea fertilization on the nitrifier microbial populations was evaluated by [Staley et al.](https://doi.org/10.3389/fmicb.2018.00634) in eight contrasting agricultural soil types. Their results indicate that while bacterial and archeal diversity is negatively affected, high urea applications favor particular strains or species of nitrifying genera such as *Nitrobacter, Nitrospira*, and *Nitrosospira*, regardless the soil type. In the same line, [Lourenço et al.](https://doi.org/10.3389/fmicb.2018.00674) reported that soil amendments with organic vinasses and inorganic N fertilizer lead to increased N~2~O emissions which correlate with enhanced abundance of AOB, particularly *Nitrosospira*. On another hand, [Fang et al.](https://doi.org/10.3389/fmicb.2018.02529) reported that application of dazomet, a microbicide used to control soil pathogens, causes reversible changes in bacterial community compositions and reduces the abundance of N-cycle functional genes, however N~2~O production rates increased in correlation with NH~3~, dissolved amino acids and microbial biomass nitrogen contents. [Tomasek et al.](https://doi.org/10.3389/fmicb.2017.02304) provided evidence that inundation drives shifts in both the microbial community and the denitrification rates, suggesting that approaches such as periodic flooding can be an effective management strategy to remediate nitrate pollution. Finally, [Black and Just](https://doi.org/10.3389/fmicb.2018.02061) reported the influence that river mussels communities have on the abundance of N-cycling microbial species. Mussels filtration and biodeposition determine a sediment habitat that favors the mixotrophic coexistence of nitrite-oxidizing (NOB) and ammonia-oxiding (comammox) *Nitrospira* species, what impacts N-cycling in river backwaters. Another important group of microorganisms that play a significant role in the N cycle are AOA. [Liu L. et al.](https://doi.org/10.3389/fmicb.2019.00875) explored a new strategy for the rapid enrichment of high abundance *Nitrosocosmicus*-like AOA from soil, providing a new solution to the enrichment and cultivation of AOA in short periods. In summary, these articles have brought novel knowledge on the diversity, genetics, and physiology of microbes from terrestrial and aquatic ecosystems that participate in the N cycle. Potential applications of this knowledge can be envisaged that will contribute to alleviate the nitrogen problem to achieve a healthier planet and a sustainable food production. Author Contributions {#s1} ==================== JS initiated the Research Topic and invited editors MD and LG. The editorial was written jointly by the editors of the topic. Conflict of Interest {#s2} ==================== The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. The aim of this topic was to collect latest insights on the biology and biotechnology of microorganisms involved in the N cycle in diverse ecosystems. The editors express their gratitude to all the researchers who contributed their valuable work to this topic, as well as the reviewers who provided their constructive criticisms to improve the articles and the topic work. [^1]: Edited by: Marcus A. Horn, Leibniz University Hannover, Germany [^2]: Reviewed by: Peter Groffman, The City University of New York, United States [^3]: This article was submitted to Terrestrial Microbiology, a section of the journal Frontiers in Microbiology
{ "pile_set_name": "PubMed Central" }
// Copyright (c) 2011 The LevelDB Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. See the AUTHORS file for names of contributors. #include "table/format.h" #include "leveldb/env.h" #include "port/port.h" #include "table/block.h" #include "util/coding.h" #include "util/crc32c.h" namespace leveldb { void BlockHandle::EncodeTo(std::string* dst) const { // Sanity check that all fields have been set assert(offset_ != ~static_cast<uint64_t>(0)); assert(size_ != ~static_cast<uint64_t>(0)); PutVarint64(dst, offset_); PutVarint64(dst, size_); } Status BlockHandle::DecodeFrom(Slice* input) { if (GetVarint64(input, &offset_) && GetVarint64(input, &size_)) { return Status::OK(); } else { return Status::Corruption("bad block handle"); } } void Footer::EncodeTo(std::string* dst) const { #ifndef NDEBUG const size_t original_size = dst->size(); #endif metaindex_handle_.EncodeTo(dst); index_handle_.EncodeTo(dst); dst->resize(2 * BlockHandle::kMaxEncodedLength); // Padding PutFixed32(dst, static_cast<uint32_t>(kTableMagicNumber & 0xffffffffu)); PutFixed32(dst, static_cast<uint32_t>(kTableMagicNumber >> 32)); assert(dst->size() == original_size + kEncodedLength); } Status Footer::DecodeFrom(Slice* input) { const char* magic_ptr = input->data() + kEncodedLength - 8; const uint32_t magic_lo = DecodeFixed32(magic_ptr); const uint32_t magic_hi = DecodeFixed32(magic_ptr + 4); const uint64_t magic = ((static_cast<uint64_t>(magic_hi) << 32) | (static_cast<uint64_t>(magic_lo))); if (magic != kTableMagicNumber) { return Status::InvalidArgument("not an sstable (bad magic number)"); } Status result = metaindex_handle_.DecodeFrom(input); if (result.ok()) { result = index_handle_.DecodeFrom(input); } if (result.ok()) { // We skip over any leftover data (just padding for now) in "input" const char* end = magic_ptr + 8; *input = Slice(end, input->data() + input->size() - end); } return result; } Status ReadBlock(RandomAccessFile* file, const ReadOptions& options, const BlockHandle& handle, BlockContents* result) { result->data = Slice(); result->cachable = false; result->heap_allocated = false; // Read the block contents as well as the type/crc footer. // See table_builder.cc for the code that built this structure. size_t n = static_cast<size_t>(handle.size()); char* buf = new char[n + kBlockTrailerSize]; Slice contents; Status s = file->Read(handle.offset(), n + kBlockTrailerSize, &contents, buf); if (!s.ok()) { delete[] buf; return s; } if (contents.size() != n + kBlockTrailerSize) { delete[] buf; return Status::Corruption("truncated block read"); } // Check the crc of the type and the block contents const char* data = contents.data(); // Pointer to where Read put the data if (options.verify_checksums) { const uint32_t crc = crc32c::Unmask(DecodeFixed32(data + n + 1)); const uint32_t actual = crc32c::Value(data, n + 1); if (actual != crc) { delete[] buf; s = Status::Corruption("block checksum mismatch"); return s; } } switch (data[n]) { case kNoCompression: if (data != buf) { // File implementation gave us pointer to some other data. // Use it directly under the assumption that it will be live // while the file is open. delete[] buf; result->data = Slice(data, n); result->heap_allocated = false; result->cachable = false; // Do not double-cache } else { result->data = Slice(buf, n); result->heap_allocated = true; result->cachable = true; } // Ok break; case kSnappyCompression: { size_t ulength = 0; if (!port::Snappy_GetUncompressedLength(data, n, &ulength)) { delete[] buf; return Status::Corruption("corrupted compressed block contents"); } char* ubuf = new char[ulength]; if (!port::Snappy_Uncompress(data, n, ubuf)) { delete[] buf; delete[] ubuf; return Status::Corruption("corrupted compressed block contents"); } delete[] buf; result->data = Slice(ubuf, ulength); result->heap_allocated = true; result->cachable = true; break; } default: delete[] buf; return Status::Corruption("bad block type"); } return Status::OK(); } } // namespace leveldb
{ "pile_set_name": "Github" }
{ "pile_set_name": "PubMed Central" }
Posttraumatic skull films: who needs them? An effort has been under way for years to make the ordering of skull films in trauma more medically rational. Because the vast majority of skull films have no significant impact on patient management, effort had centered on increasing the yield by limiting radiographs to those who have one or more "high-yield criteria." The publically promulgated high-yield criteria, however, were insufficiently sensitive to pick up some rare occult injuries. Emphasis recently has shifted to low-yield findings (scalp laceration, scalp hematoma, dizziness, headache, and asymptomatic). Although by common practice the presence of one or more of these low-yield findings often results in a skull film, omitting them appears to be extremely safe provided that the patient has no other clinically suspicious findings. Additionally, skull films are no longer the procedure of choice in patients with a neurosurgical emergency. A patient management strategy reflecting recent research is soon to be released with the FDA Skull Panel's final report.
{ "pile_set_name": "PubMed Abstracts" }
/** ****************************************************************************** * @file stm32f4xx_ll_dma2d.c * @author MCD Application Team * @brief DMA2D LL module driver. ****************************************************************************** * @attention * * <h2><center>&copy; COPYRIGHT(c) 2017 STMicroelectronics</center></h2> * * Redistribution and use in source and binary forms, with or without modification, * are permitted provided that the following conditions are met: * 1. Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright notice, * this list of conditions and the following disclaimer in the documentation * and/or other materials provided with the distribution. * 3. Neither the name of STMicroelectronics nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * ****************************************************************************** */ #if defined(USE_FULL_LL_DRIVER) /* Includes ------------------------------------------------------------------*/ #include "stm32f4xx_ll_dma2d.h" #include "stm32f4xx_ll_bus.h" #ifdef USE_FULL_ASSERT #include "stm32_assert.h" #else #define assert_param(expr) ((void)0U) #endif /** @addtogroup STM32F4xx_LL_Driver * @{ */ #if defined (DMA2D) /** @addtogroup DMA2D_LL * @{ */ /* Private types -------------------------------------------------------------*/ /* Private variables ---------------------------------------------------------*/ /* Private constants ---------------------------------------------------------*/ /** @addtogroup DMA2D_LL_Private_Constants DMA2D Private Constants * @{ */ #define LL_DMA2D_COLOR 0xFFU /*!< Maximum output color setting */ #define LL_DMA2D_NUMBEROFLINES DMA2D_NLR_NL /*!< Maximum number of lines */ #define LL_DMA2D_NUMBEROFPIXELS (DMA2D_NLR_PL >> DMA2D_NLR_PL_Pos) /*!< Maximum number of pixels per lines */ #define LL_DMA2D_OFFSET_MAX 0x3FFFU /*!< Maximum output line offset expressed in pixels */ #define LL_DMA2D_CLUTSIZE_MAX 0xFFU /*!< Maximum CLUT size */ /** * @} */ /* Private macros ------------------------------------------------------------*/ /** @addtogroup DMA2D_LL_Private_Macros * @{ */ #define IS_LL_DMA2D_MODE(MODE) (((MODE) == LL_DMA2D_MODE_M2M) || \ ((MODE) == LL_DMA2D_MODE_M2M_PFC) || \ ((MODE) == LL_DMA2D_MODE_M2M_BLEND) || \ ((MODE) == LL_DMA2D_MODE_R2M)) #define IS_LL_DMA2D_OCMODE(MODE_ARGB) (((MODE_ARGB) == LL_DMA2D_OUTPUT_MODE_ARGB8888) || \ ((MODE_ARGB) == LL_DMA2D_OUTPUT_MODE_RGB888) || \ ((MODE_ARGB) == LL_DMA2D_OUTPUT_MODE_RGB565) || \ ((MODE_ARGB) == LL_DMA2D_OUTPUT_MODE_ARGB1555) || \ ((MODE_ARGB) == LL_DMA2D_OUTPUT_MODE_ARGB4444)) #define IS_LL_DMA2D_GREEN(GREEN) ((GREEN) <= LL_DMA2D_COLOR) #define IS_LL_DMA2D_RED(RED) ((RED) <= LL_DMA2D_COLOR) #define IS_LL_DMA2D_BLUE(BLUE) ((BLUE) <= LL_DMA2D_COLOR) #define IS_LL_DMA2D_ALPHA(ALPHA) ((ALPHA) <= LL_DMA2D_COLOR) #define IS_LL_DMA2D_OFFSET(OFFSET) ((OFFSET) <= LL_DMA2D_OFFSET_MAX) #define IS_LL_DMA2D_LINE(LINES) ((LINES) <= LL_DMA2D_NUMBEROFLINES) #define IS_LL_DMA2D_PIXEL(PIXELS) ((PIXELS) <= LL_DMA2D_NUMBEROFPIXELS) #define IS_LL_DMA2D_LCMODE(MODE_ARGB) (((MODE_ARGB) == LL_DMA2D_INPUT_MODE_ARGB8888) || \ ((MODE_ARGB) == LL_DMA2D_INPUT_MODE_RGB888) || \ ((MODE_ARGB) == LL_DMA2D_INPUT_MODE_RGB565) || \ ((MODE_ARGB) == LL_DMA2D_INPUT_MODE_ARGB1555) || \ ((MODE_ARGB) == LL_DMA2D_INPUT_MODE_ARGB4444) || \ ((MODE_ARGB) == LL_DMA2D_INPUT_MODE_L8) || \ ((MODE_ARGB) == LL_DMA2D_INPUT_MODE_AL44) || \ ((MODE_ARGB) == LL_DMA2D_INPUT_MODE_AL88) || \ ((MODE_ARGB) == LL_DMA2D_INPUT_MODE_L4) || \ ((MODE_ARGB) == LL_DMA2D_INPUT_MODE_A8) || \ ((MODE_ARGB) == LL_DMA2D_INPUT_MODE_A4)) #define IS_LL_DMA2D_CLUTCMODE(CLUTCMODE) (((CLUTCMODE) == LL_DMA2D_CLUT_COLOR_MODE_ARGB8888) || \ ((CLUTCMODE) == LL_DMA2D_CLUT_COLOR_MODE_RGB888)) #define IS_LL_DMA2D_CLUTSIZE(SIZE) ((SIZE) <= LL_DMA2D_CLUTSIZE_MAX) #define IS_LL_DMA2D_ALPHAMODE(MODE) (((MODE) == LL_DMA2D_ALPHA_MODE_NO_MODIF) || \ ((MODE) == LL_DMA2D_ALPHA_MODE_REPLACE) || \ ((MODE) == LL_DMA2D_ALPHA_MODE_COMBINE)) /** * @} */ /* Private function prototypes -----------------------------------------------*/ /* Exported functions --------------------------------------------------------*/ /** @addtogroup DMA2D_LL_Exported_Functions * @{ */ /** @addtogroup DMA2D_LL_EF_Init_Functions Initialization and De-initialization Functions * @{ */ /** * @brief De-initialize DMA2D registers (registers restored to their default values). * @param DMA2Dx DMA2D Instance * @retval An ErrorStatus enumeration value: * - SUCCESS: DMA2D registers are de-initialized * - ERROR: DMA2D registers are not de-initialized */ ErrorStatus LL_DMA2D_DeInit(DMA2D_TypeDef *DMA2Dx) { ErrorStatus status = SUCCESS; /* Check the parameters */ assert_param(IS_DMA2D_ALL_INSTANCE(DMA2Dx)); if (DMA2Dx == DMA2D) { /* Force reset of DMA2D clock */ LL_AHB1_GRP1_ForceReset(LL_AHB1_GRP1_PERIPH_DMA2D); /* Release reset of DMA2D clock */ LL_AHB1_GRP1_ReleaseReset(LL_AHB1_GRP1_PERIPH_DMA2D); } else { status = ERROR; } return (status); } /** * @brief Initialize DMA2D registers according to the specified parameters in DMA2D_InitStruct. * @note DMA2D transfers must be disabled to set initialization bits in configuration registers, * otherwise ERROR result is returned. * @param DMA2Dx DMA2D Instance * @param DMA2D_InitStruct pointer to a LL_DMA2D_InitTypeDef structure * that contains the configuration information for the specified DMA2D peripheral. * @retval An ErrorStatus enumeration value: * - SUCCESS: DMA2D registers are initialized according to DMA2D_InitStruct content * - ERROR: Issue occurred during DMA2D registers initialization */ ErrorStatus LL_DMA2D_Init(DMA2D_TypeDef *DMA2Dx, LL_DMA2D_InitTypeDef *DMA2D_InitStruct) { ErrorStatus status = ERROR; LL_DMA2D_ColorTypeDef DMA2D_ColorStruct; uint32_t tmp = 0U, tmp1 = 0U, tmp2 = 0U; /* Check the parameters */ assert_param(IS_DMA2D_ALL_INSTANCE(DMA2Dx)); assert_param(IS_LL_DMA2D_MODE(DMA2D_InitStruct->Mode)); assert_param(IS_LL_DMA2D_OCMODE(DMA2D_InitStruct->ColorMode)); assert_param(IS_LL_DMA2D_LINE(DMA2D_InitStruct->NbrOfLines)); assert_param(IS_LL_DMA2D_PIXEL(DMA2D_InitStruct->NbrOfPixelsPerLines)); assert_param(IS_LL_DMA2D_GREEN(DMA2D_InitStruct->OutputGreen)); assert_param(IS_LL_DMA2D_RED(DMA2D_InitStruct->OutputRed)); assert_param(IS_LL_DMA2D_BLUE(DMA2D_InitStruct->OutputBlue)); assert_param(IS_LL_DMA2D_ALPHA(DMA2D_InitStruct->OutputAlpha)); assert_param(IS_LL_DMA2D_OFFSET(DMA2D_InitStruct->LineOffset)); /* DMA2D transfers must be disabled to configure bits in initialization registers */ tmp = LL_DMA2D_IsTransferOngoing(DMA2Dx); tmp1 = LL_DMA2D_FGND_IsEnabledCLUTLoad(DMA2Dx); tmp2 = LL_DMA2D_BGND_IsEnabledCLUTLoad(DMA2Dx); if ((tmp == 0U) && (tmp1 == 0U) && (tmp2 == 0U)) { /* DMA2D CR register configuration -------------------------------------------*/ LL_DMA2D_SetMode(DMA2Dx, DMA2D_InitStruct->Mode); /* DMA2D OPFCCR register configuration ---------------------------------------*/ MODIFY_REG(DMA2Dx->OPFCCR, DMA2D_OPFCCR_CM, DMA2D_InitStruct->ColorMode); /* DMA2D OOR register configuration ------------------------------------------*/ LL_DMA2D_SetLineOffset(DMA2Dx, DMA2D_InitStruct->LineOffset); /* DMA2D NLR register configuration ------------------------------------------*/ LL_DMA2D_ConfigSize(DMA2Dx, DMA2D_InitStruct->NbrOfLines, DMA2D_InitStruct->NbrOfPixelsPerLines); /* DMA2D OMAR register configuration ------------------------------------------*/ LL_DMA2D_SetOutputMemAddr(DMA2Dx, DMA2D_InitStruct->OutputMemoryAddress); /* DMA2D OCOLR register configuration ------------------------------------------*/ DMA2D_ColorStruct.ColorMode = DMA2D_InitStruct->ColorMode; DMA2D_ColorStruct.OutputBlue = DMA2D_InitStruct->OutputBlue; DMA2D_ColorStruct.OutputGreen = DMA2D_InitStruct->OutputGreen; DMA2D_ColorStruct.OutputRed = DMA2D_InitStruct->OutputRed; DMA2D_ColorStruct.OutputAlpha = DMA2D_InitStruct->OutputAlpha; LL_DMA2D_ConfigOutputColor(DMA2Dx, &DMA2D_ColorStruct); status = SUCCESS; } /* If DMA2D transfers are not disabled, return ERROR */ return (status); } /** * @brief Set each @ref LL_DMA2D_InitTypeDef field to default value. * @param DMA2D_InitStruct pointer to a @ref LL_DMA2D_InitTypeDef structure * whose fields will be set to default values. * @retval None */ void LL_DMA2D_StructInit(LL_DMA2D_InitTypeDef *DMA2D_InitStruct) { /* Set DMA2D_InitStruct fields to default values */ DMA2D_InitStruct->Mode = LL_DMA2D_MODE_M2M; DMA2D_InitStruct->ColorMode = LL_DMA2D_OUTPUT_MODE_ARGB8888; DMA2D_InitStruct->NbrOfLines = 0x0U; DMA2D_InitStruct->NbrOfPixelsPerLines = 0x0U; DMA2D_InitStruct->LineOffset = 0x0U; DMA2D_InitStruct->OutputBlue = 0x0U; DMA2D_InitStruct->OutputGreen = 0x0U; DMA2D_InitStruct->OutputRed = 0x0U; DMA2D_InitStruct->OutputAlpha = 0x0U; DMA2D_InitStruct->OutputMemoryAddress = 0x0U; } /** * @brief Configure the foreground or background according to the specified parameters * in the LL_DMA2D_LayerCfgTypeDef structure. * @param DMA2Dx DMA2D Instance * @param DMA2D_LayerCfg pointer to a LL_DMA2D_LayerCfgTypeDef structure that contains * the configuration information for the specified layer. * @param LayerIdx DMA2D Layer index. * This parameter can be one of the following values: * 0(background) / 1(foreground) * @retval None */ void LL_DMA2D_ConfigLayer(DMA2D_TypeDef *DMA2Dx, LL_DMA2D_LayerCfgTypeDef *DMA2D_LayerCfg, uint32_t LayerIdx) { /* Check the parameters */ assert_param(IS_LL_DMA2D_OFFSET(DMA2D_LayerCfg->LineOffset)); assert_param(IS_LL_DMA2D_LCMODE(DMA2D_LayerCfg->ColorMode)); assert_param(IS_LL_DMA2D_CLUTCMODE(DMA2D_LayerCfg->CLUTColorMode)); assert_param(IS_LL_DMA2D_CLUTSIZE(DMA2D_LayerCfg->CLUTSize)); assert_param(IS_LL_DMA2D_ALPHAMODE(DMA2D_LayerCfg->AlphaMode)); assert_param(IS_LL_DMA2D_GREEN(DMA2D_LayerCfg->Green)); assert_param(IS_LL_DMA2D_RED(DMA2D_LayerCfg->Red)); assert_param(IS_LL_DMA2D_BLUE(DMA2D_LayerCfg->Blue)); assert_param(IS_LL_DMA2D_ALPHA(DMA2D_LayerCfg->Alpha)); if (LayerIdx == 0U) { /* Configure the background memory address */ LL_DMA2D_BGND_SetMemAddr(DMA2Dx, DMA2D_LayerCfg->MemoryAddress); /* Configure the background line offset */ LL_DMA2D_BGND_SetLineOffset(DMA2Dx, DMA2D_LayerCfg->LineOffset); /* Configure the background Alpha value, Alpha mode, CLUT size, CLUT Color mode and Color mode */ MODIFY_REG(DMA2Dx->BGPFCCR, \ (DMA2D_BGPFCCR_ALPHA | DMA2D_BGPFCCR_AM | DMA2D_BGPFCCR_CS | DMA2D_BGPFCCR_CCM | DMA2D_BGPFCCR_CM), \ ((DMA2D_LayerCfg->Alpha << DMA2D_BGPFCCR_ALPHA_Pos) | DMA2D_LayerCfg->AlphaMode | \ (DMA2D_LayerCfg->CLUTSize << DMA2D_BGPFCCR_CS_Pos) | DMA2D_LayerCfg->CLUTColorMode | \ DMA2D_LayerCfg->ColorMode)); /* Configure the background color */ LL_DMA2D_BGND_SetColor(DMA2Dx, DMA2D_LayerCfg->Red, DMA2D_LayerCfg->Green, DMA2D_LayerCfg->Blue); /* Configure the background CLUT memory address */ LL_DMA2D_BGND_SetCLUTMemAddr(DMA2Dx, DMA2D_LayerCfg->CLUTMemoryAddress); } else { /* Configure the foreground memory address */ LL_DMA2D_FGND_SetMemAddr(DMA2Dx, DMA2D_LayerCfg->MemoryAddress); /* Configure the foreground line offset */ LL_DMA2D_FGND_SetLineOffset(DMA2Dx, DMA2D_LayerCfg->LineOffset); /* Configure the foreground Alpha value, Alpha mode, CLUT size, CLUT Color mode and Color mode */ MODIFY_REG(DMA2Dx->FGPFCCR, \ (DMA2D_FGPFCCR_ALPHA | DMA2D_FGPFCCR_AM | DMA2D_FGPFCCR_CS | DMA2D_FGPFCCR_CCM | DMA2D_FGPFCCR_CM), \ ((DMA2D_LayerCfg->Alpha << DMA2D_FGPFCCR_ALPHA_Pos) | DMA2D_LayerCfg->AlphaMode | \ (DMA2D_LayerCfg->CLUTSize << DMA2D_FGPFCCR_CS_Pos) | DMA2D_LayerCfg->CLUTColorMode | \ DMA2D_LayerCfg->ColorMode)); /* Configure the foreground color */ LL_DMA2D_FGND_SetColor(DMA2Dx, DMA2D_LayerCfg->Red, DMA2D_LayerCfg->Green, DMA2D_LayerCfg->Blue); /* Configure the foreground CLUT memory address */ LL_DMA2D_FGND_SetCLUTMemAddr(DMA2Dx, DMA2D_LayerCfg->CLUTMemoryAddress); } } /** * @brief Set each @ref LL_DMA2D_LayerCfgTypeDef field to default value. * @param DMA2D_LayerCfg pointer to a @ref LL_DMA2D_LayerCfgTypeDef structure * whose fields will be set to default values. * @retval None */ void LL_DMA2D_LayerCfgStructInit(LL_DMA2D_LayerCfgTypeDef *DMA2D_LayerCfg) { /* Set DMA2D_LayerCfg fields to default values */ DMA2D_LayerCfg->MemoryAddress = 0x0U; DMA2D_LayerCfg->ColorMode = LL_DMA2D_INPUT_MODE_ARGB8888; DMA2D_LayerCfg->LineOffset = 0x0U; DMA2D_LayerCfg->CLUTColorMode = LL_DMA2D_CLUT_COLOR_MODE_ARGB8888; DMA2D_LayerCfg->CLUTSize = 0x0U; DMA2D_LayerCfg->AlphaMode = LL_DMA2D_ALPHA_MODE_NO_MODIF; DMA2D_LayerCfg->Alpha = 0x0U; DMA2D_LayerCfg->Blue = 0x0U; DMA2D_LayerCfg->Green = 0x0U; DMA2D_LayerCfg->Red = 0x0U; DMA2D_LayerCfg->CLUTMemoryAddress = 0x0U; } /** * @brief Initialize DMA2D output color register according to the specified parameters * in DMA2D_ColorStruct. * @param DMA2Dx DMA2D Instance * @param DMA2D_ColorStruct pointer to a LL_DMA2D_ColorTypeDef structure that contains * the color configuration information for the specified DMA2D peripheral. * @retval None */ void LL_DMA2D_ConfigOutputColor(DMA2D_TypeDef *DMA2Dx, LL_DMA2D_ColorTypeDef *DMA2D_ColorStruct) { uint32_t outgreen = 0U; uint32_t outred = 0U; uint32_t outalpha = 0U; /* Check the parameters */ assert_param(IS_DMA2D_ALL_INSTANCE(DMA2Dx)); assert_param(IS_LL_DMA2D_OCMODE(DMA2D_ColorStruct->ColorMode)); assert_param(IS_LL_DMA2D_GREEN(DMA2D_ColorStruct->OutputGreen)); assert_param(IS_LL_DMA2D_RED(DMA2D_ColorStruct->OutputRed)); assert_param(IS_LL_DMA2D_BLUE(DMA2D_ColorStruct->OutputBlue)); assert_param(IS_LL_DMA2D_ALPHA(DMA2D_ColorStruct->OutputAlpha)); /* DMA2D OCOLR register configuration ------------------------------------------*/ if (DMA2D_ColorStruct->ColorMode == LL_DMA2D_OUTPUT_MODE_ARGB8888) { outgreen = DMA2D_ColorStruct->OutputGreen << 8U; outred = DMA2D_ColorStruct->OutputRed << 16U; outalpha = DMA2D_ColorStruct->OutputAlpha << 24U; } else if (DMA2D_ColorStruct->ColorMode == LL_DMA2D_OUTPUT_MODE_RGB888) { outgreen = DMA2D_ColorStruct->OutputGreen << 8U; outred = DMA2D_ColorStruct->OutputRed << 16U; outalpha = 0x00000000U; } else if (DMA2D_ColorStruct->ColorMode == LL_DMA2D_OUTPUT_MODE_RGB565) { outgreen = DMA2D_ColorStruct->OutputGreen << 5U; outred = DMA2D_ColorStruct->OutputRed << 11U; outalpha = 0x00000000U; } else if (DMA2D_ColorStruct->ColorMode == LL_DMA2D_OUTPUT_MODE_ARGB1555) { outgreen = DMA2D_ColorStruct->OutputGreen << 5U; outred = DMA2D_ColorStruct->OutputRed << 10U; outalpha = DMA2D_ColorStruct->OutputAlpha << 15U; } else /* ColorMode = LL_DMA2D_OUTPUT_MODE_ARGB4444 */ { outgreen = DMA2D_ColorStruct->OutputGreen << 4U; outred = DMA2D_ColorStruct->OutputRed << 8U; outalpha = DMA2D_ColorStruct->OutputAlpha << 12U; } LL_DMA2D_SetOutputColor(DMA2Dx, (outgreen | outred | DMA2D_ColorStruct->OutputBlue | outalpha)); } /** * @brief Return DMA2D output Blue color. * @param DMA2Dx DMA2D Instance. * @param ColorMode This parameter can be one of the following values: * @arg @ref LL_DMA2D_OUTPUT_MODE_ARGB8888 * @arg @ref LL_DMA2D_OUTPUT_MODE_RGB888 * @arg @ref LL_DMA2D_OUTPUT_MODE_RGB565 * @arg @ref LL_DMA2D_OUTPUT_MODE_ARGB1555 * @arg @ref LL_DMA2D_OUTPUT_MODE_ARGB4444 * @retval Output Blue color value between Min_Data=0 and Max_Data=0xFF */ uint32_t LL_DMA2D_GetOutputBlueColor(DMA2D_TypeDef *DMA2Dx, uint32_t ColorMode) { uint32_t color = 0U; /* Check the parameters */ assert_param(IS_DMA2D_ALL_INSTANCE(DMA2Dx)); assert_param(IS_LL_DMA2D_OCMODE(ColorMode)); /* DMA2D OCOLR register reading ------------------------------------------*/ if (ColorMode == LL_DMA2D_OUTPUT_MODE_ARGB8888) { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0xFFU)); } else if (ColorMode == LL_DMA2D_OUTPUT_MODE_RGB888) { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0xFFU)); } else if (ColorMode == LL_DMA2D_OUTPUT_MODE_RGB565) { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0x1FU)); } else if (ColorMode == LL_DMA2D_OUTPUT_MODE_ARGB1555) { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0x1FU)); } else /* ColorMode = LL_DMA2D_OUTPUT_MODE_ARGB4444 */ { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0xFU)); } return color; } /** * @brief Return DMA2D output Green color. * @param DMA2Dx DMA2D Instance. * @param ColorMode This parameter can be one of the following values: * @arg @ref LL_DMA2D_OUTPUT_MODE_ARGB8888 * @arg @ref LL_DMA2D_OUTPUT_MODE_RGB888 * @arg @ref LL_DMA2D_OUTPUT_MODE_RGB565 * @arg @ref LL_DMA2D_OUTPUT_MODE_ARGB1555 * @arg @ref LL_DMA2D_OUTPUT_MODE_ARGB4444 * @retval Output Green color value between Min_Data=0 and Max_Data=0xFF */ uint32_t LL_DMA2D_GetOutputGreenColor(DMA2D_TypeDef *DMA2Dx, uint32_t ColorMode) { uint32_t color = 0U; /* Check the parameters */ assert_param(IS_DMA2D_ALL_INSTANCE(DMA2Dx)); assert_param(IS_LL_DMA2D_OCMODE(ColorMode)); /* DMA2D OCOLR register reading ------------------------------------------*/ if (ColorMode == LL_DMA2D_OUTPUT_MODE_ARGB8888) { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0xFF00U) >> 8U); } else if (ColorMode == LL_DMA2D_OUTPUT_MODE_RGB888) { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0xFF00U) >> 8U); } else if (ColorMode == LL_DMA2D_OUTPUT_MODE_RGB565) { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0x7E0U) >> 5U); } else if (ColorMode == LL_DMA2D_OUTPUT_MODE_ARGB1555) { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0x3E0U) >> 5U); } else /* ColorMode = LL_DMA2D_OUTPUT_MODE_ARGB4444 */ { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0xF0U) >> 4U); } return color; } /** * @brief Return DMA2D output Red color. * @param DMA2Dx DMA2D Instance. * @param ColorMode This parameter can be one of the following values: * @arg @ref LL_DMA2D_OUTPUT_MODE_ARGB8888 * @arg @ref LL_DMA2D_OUTPUT_MODE_RGB888 * @arg @ref LL_DMA2D_OUTPUT_MODE_RGB565 * @arg @ref LL_DMA2D_OUTPUT_MODE_ARGB1555 * @arg @ref LL_DMA2D_OUTPUT_MODE_ARGB4444 * @retval Output Red color value between Min_Data=0 and Max_Data=0xFF */ uint32_t LL_DMA2D_GetOutputRedColor(DMA2D_TypeDef *DMA2Dx, uint32_t ColorMode) { uint32_t color = 0U; /* Check the parameters */ assert_param(IS_DMA2D_ALL_INSTANCE(DMA2Dx)); assert_param(IS_LL_DMA2D_OCMODE(ColorMode)); /* DMA2D OCOLR register reading ------------------------------------------*/ if (ColorMode == LL_DMA2D_OUTPUT_MODE_ARGB8888) { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0xFF0000U) >> 16U); } else if (ColorMode == LL_DMA2D_OUTPUT_MODE_RGB888) { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0xFF0000U) >> 16U); } else if (ColorMode == LL_DMA2D_OUTPUT_MODE_RGB565) { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0xF800U) >> 11U); } else if (ColorMode == LL_DMA2D_OUTPUT_MODE_ARGB1555) { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0x7C00U) >> 10U); } else /* ColorMode = LL_DMA2D_OUTPUT_MODE_ARGB4444 */ { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0xF00U) >> 8U); } return color; } /** * @brief Return DMA2D output Alpha color. * @param DMA2Dx DMA2D Instance. * @param ColorMode This parameter can be one of the following values: * @arg @ref LL_DMA2D_OUTPUT_MODE_ARGB8888 * @arg @ref LL_DMA2D_OUTPUT_MODE_RGB888 * @arg @ref LL_DMA2D_OUTPUT_MODE_RGB565 * @arg @ref LL_DMA2D_OUTPUT_MODE_ARGB1555 * @arg @ref LL_DMA2D_OUTPUT_MODE_ARGB4444 * @retval Output Alpha color value between Min_Data=0 and Max_Data=0xFF */ uint32_t LL_DMA2D_GetOutputAlphaColor(DMA2D_TypeDef *DMA2Dx, uint32_t ColorMode) { uint32_t color = 0U; /* Check the parameters */ assert_param(IS_DMA2D_ALL_INSTANCE(DMA2Dx)); assert_param(IS_LL_DMA2D_OCMODE(ColorMode)); /* DMA2D OCOLR register reading ------------------------------------------*/ if (ColorMode == LL_DMA2D_OUTPUT_MODE_ARGB8888) { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0xFF000000U) >> 24U); } else if ((ColorMode == LL_DMA2D_OUTPUT_MODE_RGB888) || (ColorMode == LL_DMA2D_OUTPUT_MODE_RGB565)) { color = 0x0U; } else if (ColorMode == LL_DMA2D_OUTPUT_MODE_ARGB1555) { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0x8000U) >> 15U); } else /* ColorMode = LL_DMA2D_OUTPUT_MODE_ARGB4444 */ { color = (uint32_t)(READ_BIT(DMA2Dx->OCOLR, 0xF000U) >> 12U); } return color; } /** * @brief Configure DMA2D transfer size. * @param DMA2Dx DMA2D Instance * @param NbrOfLines Value between Min_Data=0 and Max_Data=0xFFFF * @param NbrOfPixelsPerLines Value between Min_Data=0 and Max_Data=0x3FFF * @retval None */ void LL_DMA2D_ConfigSize(DMA2D_TypeDef *DMA2Dx, uint32_t NbrOfLines, uint32_t NbrOfPixelsPerLines) { MODIFY_REG(DMA2Dx->NLR, (DMA2D_NLR_PL | DMA2D_NLR_NL), \ ((NbrOfPixelsPerLines << DMA2D_NLR_PL_Pos) | NbrOfLines)); } /** * @} */ /** * @} */ /** * @} */ #endif /* defined (DMA2D) */ /** * @} */ #endif /* USE_FULL_LL_DRIVER */ /************************ (C) COPYRIGHT STMicroelectronics *****END OF FILE****/
{ "pile_set_name": "Github" }
More Resources Peonies Silicone Embossers Product Description The Peonies Silicone Embosser can be used with any medium, edible or non-edible that allows a design to be pressed into them. Perfect for cake decorating, these flexible embossers allow you to build your own design from the beautiful peonies and leaf elements in this set. You can achieve stunning unique textured backgrounds on cakes, cookies, cake boards or use them to create perfect guidelines for brush embroidery, dusting, painting or gilded line piping. Press and cut around the outer edge of the design to create appliqué pieces to give a 3D embossed embellishment. The Butterflies Silicone Embosser can be used with any medium, edible or non-edible that that allows a design to be pressed into them. Perfect for cake decorating, these flexible embossers allow you to build your own design from the beautiful range of 7 different sized butterflies in this set. You can achieve stunning unique textured backgrounds on cakes, cookies, cake boards or use them to create perfect guidelines for brush embroidery, dusting, painting or gilded line piping. Press and cut around the outer edge of the design to create appliqué pieces to give a 3D embossed embellishment. The Butterflies Silicone Embosser can be used with any medium, edible or non-edible that that allows a design to be pressed into them. Perfect for cake decorating, these flexible embossers allow you to build your own design from the beautiful range of 7 different sized butterflies in this set. You can achieve stunning unique textured backgrounds on cakes, cookies, cake boards or use them to create perfect guidelines for brush embroidery, dusting, painting or gilded line piping. Press and cut around the outer edge of the design to create appliqué pieces to give a 3D embossed embellishment. We aim to dispatch orders next working day from when the order was placed. Please allow 3-5 working days for delivery. Please note: during busier periods this may be slightly longer. Our standard delivery charges are shown below: - FREE delivery for all orders over $49.99 - $5.00 for all orders under $49.99 Some customers will need to request a postage cost. To do this, simply select the products you want to order and add them to your basket. Proceed to the basket page and click the Request Shipping Costs button. We will then update your basket and you will be able to proceed with the order. Please note: if you were to update your basket after requesting your initial shipping costs a new request would need to be calculated. Refunds & Returns We want you to enjoy your purchase from Katy Sue Designs. If you're not 100% satisfied with your items, you can return your order by post within 30 days of the purchase date.
{ "pile_set_name": "Pile-CC" }
Be Still Our Heart – ‘Black Mirror: San Junipero’ Wins Best TV Movie at the 2017 Emmys Black Mirror is the type of show that is so freakishly terrifying and dreadful, you can’t really picture it getting recognized at the Emmys. But it’s good creator and writer Charlie Brooker decided to try something different with the third season of his (now) Netflix series. “San Junipero,” a heartwarming queer romance, was the first uplifting episode of the tech-sci-fi-horror anthology series, and also one of the most clever. And now it has not one, but two Emmy awards. Earlier in the night, Brooker also home a second Emmy, winning the Outstanding Writing in a Limited Series/Movie Drama award for “San Junipero.” Soon after, the Black Mirror episode was named Outstanding TV Movie, beating out Wizard of Lies, Dolly Parton’s Christmas of Many Colors, Sherlock: The Lying Detective, The Immortal Life of Henrietta Lacks, and The Wizard of Lies. When accepting the Best TV Movie award, Brooker spoke about how much his episode celebrates love and hope, which is much needed these days. “Love will defeat hate, love will win. But it might need a bit of help,” Brooker said before encouraging everyone in the Emmys audience to hook up and make that love, literally. Sadly, the Emmys did not include a massive orgy tonight. I won’t spoil too much if you haven’t seen “San Junipero” – it’s a total delight that you should definitely experience for yourself – but the episode stars Halt and Catch Fire‘s Mackenzie Davis and Gugu Mbatha-Raw as two women who meet and fall in love in a 1980s beach town. As I wrote in my review of the third season, the episode “replaced the usual cynicism of the series with the sweetness and hope of finding love via technology.” Black Mirror‘s double wins tonight also make this year’s Emmys feel especially diverse.
{ "pile_set_name": "Pile-CC" }
1These are the words of the Teacher, King David’s son, who ruled in Jerusalem. Everything Is Meaningless 2“Everything is meaningless,” says the Teacher, “completely meaningless!” 3What do people get for all their hard work under the sun? 4Generations come and generations go, but the earth never changes. 5The sun rises and the sun sets, then hurries around to rise again. 6The wind blows south, and then turns north. Around and around it goes, blowing in circles. 7Rivers run into the sea, but the sea is never full. Then the water returns again to the rivers and flows out again to the sea. 8Everything is wearisome beyond description. No matter how much we see, we are never satisfied. No matter how much we hear, we are not content. 9History merely repeats itself. It has all been done before. Nothing under the sun is truly new. 10Sometimes people say, “Here is something new!” But actually it is old; nothing is ever truly new. 11We don’t remember what happened in the past, and in future generations, no one will remember what we are doing now. The Teacher Speaks: The Futility of Wisdom 12I, the Teacher, was king of Israel, and I lived in Jerusalem. 13I devoted myself to search for understanding and to explore by wisdom everything being done under heaven. I soon discovered that God has dealt a tragic existence to the human race. 14I observed everything going on under the sun, and really, it is all meaningless—like chasing the wind. 15What is wrong cannot be made right. What is missing cannot be recovered. 16I said to myself, “Look, I am wiser than any of the kings who ruled in Jerusalem before me. I have greater wisdom and knowledge than any of them.” 17So I set out to learn everything from wisdom to madness and folly. But I learned firsthand that pursuing all this is like chasing the wind. 18The greater my wisdom, the greater my grief. To increase knowledge only increases sorrow.
{ "pile_set_name": "OpenWebText2" }
The African American Experience in Crime Fiction: A Critical StudyThe Arresting Eye: Race and the Anxiety of DetectionDreams for Dead Bodies: Blackness, Labor, and the Corpus of American Detective Fiction Paul Grimstad teaches literature at New York University and Columbia University. His first book, Experience and Experimental Writing: Literary Pragmatism from Emerson to the Jameses (2013), is out in paperback from Oxford University Press. His essays and reviews have appeared in Bookforum, the London Review of Books, n + 1, the New Yorker, Nonsite, the Paris Review, the Times Literary Supplement, and Raritan. Paul Grimstad; The African American Experience in Crime Fiction: A Critical StudyThe Arresting Eye: Race and the Anxiety of DetectionDreams for Dead Bodies: Blackness, Labor, and the Corpus of American Detective Fiction. American Literature 1 December 2017; 89 (4): 898–900. doi: https://doi.org/10.1215/00029831-4257964 From C. August Dupin’s needling repartee with the Parisian police in Edgar Allan Poe’s “The Purloined Letter” to Sherlock Holmes’s insinuating banter with Lestrade, Hercule Poirot’s passive-aggressive one-upmanship with Chief Inspector Japp of Scotland Yard, hard-boiled Sam Spade’s agon with the district attorney in The Maltese Falcon (1930), and Philip Marlowe’s dismissal from the police force for insubordination, detective fiction has always shown the private investigator at odds with official police bureaucracy. It’s one way of dramatizing the messiness of the idea of justice—at once an individual (possibly personal or private) code and at the same time susceptible to a codifying proceduralism (all part of the detective’s “advantage of being unofficial,” as Holmes puts it in Arthur Conan Doyle’s “The Silver Blaze” [The Memoirs of Sherlock Holmes (1893), New York, 20]). But when the law itself is shown to be tilted...
{ "pile_set_name": "Pile-CC" }
Q: Vector graphics in LaTeX I need to add some vector graphics to my LaTeX files. I would like to end up with good looking wireframes, such as in Hatcher's book "Algebraic Topology" (for an example take a look here). Which tools would you recommend? Any help would be appreciated, thanks in advance. EDIT: The best thing would be to use an external tool, such as a 3d editor (just a simple one, which lets you easily model a 3d mesh from scratch) and then export the wireframe as a vector image. I don't know if something like this could exist. Tools like tikz or pstricks could do the job, but they are mainly suitable for flat drawings, and require more effort for 3d (drawing something like this could be very tedious). A: You can use tikz or pstricks to draw diagrams from within a LaTeX document. Diagram drawing software capable of creating eps or pdf files (e.g. xfig (free) or Adobe Illustrator) will also yield good results. For examples using TikZ (including 3D), see here. A: Ipe is another drawing program you may want to consider. It has very nice TeX integration. Inkscape is yet another option; see this.
{ "pile_set_name": "StackExchange" }
Modeling of Droplet Impact onto Polarized and Nonpolarized Dielectric Surfaces. This paper is concerned with simulation of the droplet impact on a dielectric surface, referred to as the dynamic electrowetting-on-dielectric (DEWOD). In particular, we seek to shed more light on the fundamental processes occurring during the impact of an electrically conducting droplet onto a dielectric surface with and without an applied voltage. The liquid in the droplet is an ionic conductor (a leaky dielectric). This work employs an approach based on Cahn-Hilliard-Navier-Stokes (CHNS) modeling. The simulations are validated by predicting the equilibrium contact angle, droplet oscillations, and charge density estimation. Then, four cases of droplet impact are studied, namely, the impact onto a surface with no voltage applied and the impacts onto the surfaces with 2, 4, and 6 kV applied. The modeling results of water droplet impact allow for direct comparison with the experimental results reported by Lee et al. [ Langmuir 2013, 29, 7758]. The results reveal the electric field, the body forces acting on the droplet, the velocity and pressure fields inside and outside the droplet, as well as the free charge density and the electric energy density. The model predicts the droplet shape evolution (e.g., the spreading distance over the surface and the rebound height) under different conditions that are consistent with the experimental observations. Thus, our findings provide new qualitative and quantitative insights into the droplet manipulation that can be used in novel applications of the DEWOD phenomenon.
{ "pile_set_name": "PubMed Abstracts" }
Q: C/C++ bluetooth program to interact with Nrf connect android app I am writing a C program to interact with the nrf connect android app on my mobile. I installed libbluetooth-dev on my linux machine for development. The requirement is I need to find the bluetooth USB dongle which is on my Linux machine on the nrf connect app. Then I need to connect from the mobile app to the Linux machine and thenexchange data. To achieve this I wrote the program such that, it first creates a RFComm socket, listens to it and accepts connection if anyone wants to connect and then use Read/write calls to exchange data. The problem is I dont know how to make the USB dongle visible so that it is discoverable on the nrf connect app. I tried googling around a lot but couldnt find any working suggestions. A: Bluetooth Low Energy advertisement is different from making device discoverable. Read this link for a high level explanation of it. Bluez is the name of Linux Bluetooth stack and it exposes DBus API's for all Bluetooth operations. If you want your Linux device to start advertising, you need to use Bluez DBus API. Download Bluez source and see doc/advertising-api.txt file to know DBus API for advertisement. For a python example code see test/example-advertisement. Default Linux BLE advertisement interval is 1.2 seconds. So, once you register advertisement with Bluez, using its DBus API, your Linux machine advertises its presence every 1.2 second and nRFConnect Mobile app will find it and shows it in its list. But advertisement only helps to find the device. To read and write data (read and write is BLE terminology) you need to implement GATT services. Read this link to know more, in case you don't know about it. For implementing GATT services in Linux, Bluez has DBus APIs, see doc/gatt-api.txt. For python example of how to use these see test/example-gatt-server in Bluez source directory. So, once your nRFConnect Mobile App finds your advertising Linux machine, it shows a Connect Button, if your Linux machine is doing Connectable advertisement. When you click the Connect button, Mobile App performs GATT discovery and retrieves all the GATT services implemented by your Linux Bluetooth application. It then shows up read and write options, using which you can do data transmission.
{ "pile_set_name": "StackExchange" }
$(PYTHON) | $(PYTHON_TOOLCHAIN)
{ "pile_set_name": "Github" }