text
stringlengths
0
3.78M
meta
dict
Use W3C technologies (according to specification) and follow accessibility guidelines. Where it is not possible to use a W3C technology, or doing so results in material that does not transform gracefully, provide an alternative version of the content that is accessible. 11.1 - Use W3C technologies when they are available and appropriate for a task and use the latest versions when they are supported. Priority 2 11.3 - Provide information so that users may receive documents according to their preferences. Priority 3 11.4 - If, after best efforts, you cannot create an accessible page. provide a link to an alternative page that uses W3C technologies, is accessible, has equivalent information (or functionality), and is updated as often as the inaccessible (original) page. Priority 1
{ "pile_set_name": "Pile-CC" }
Captain Tony's Saloon Captain Tony's Saloon is a bar located at 428 Greene Street (eastern street side), in Key West, Florida, United States. The bar has been patronized through the years by many well-known artists, writers and celebrities. In fact, an interesting feature of the bar is that when any celebrity visits, a barstool is added with that patron's name. You will find barstools painted with the names of famous people such as Ernest Hemingway, Truman Capote, Jimmy Buffett, Shel Silverstein, John Prine, and even John F. Kennedy and Harry Truman, among others. Above the sign outside the building is a large Jewfish that Captain Tony caught and had preserved. It is said that if you throw a quarter into the mouth of the fish, good luck will follow you until you leave the island. History The building housing Captain Tony's Saloon has a history as colorful as the town of Key West itself. When first constructed in 1852, 428 Greene Street was an ice house that doubled as the city morgue. In the 1890s, it housed a wireless telegraph station. The telegraph's most important utilization came in 1898, during the Spanish–American War. The battleship Maine was destroyed, as the news came from Havana to Key West and it was reported all over the world from this building. In 1912, the building was home to a cigar factory. Later, it was a bordello and a bar popular with the Navy until it was forced out of business. After that, it became several speakeasies, the last of which was named The Blind Pig, specializing in gambling, women, and bootleg rum. By the 1930s, a local named Josie Russell bought the business and created Sloppy Joe's Bar. This was where Ernest Hemingway spent most of his evenings between 1933 and 1937. In 1938, when the building's landlord raised the rent one dollar per week, Russell and his customers picked up the entire bar and moved everything to Sloppy Joe's current location at 201 Duval Street. The bar then went through several iterations until 1958, when Captain Tony Tarracino, a local charter boat captain, purchased the bar and named it Captain Tony's Saloon. As Captain Tony's, the bar is where Jimmy Buffett got his start in Key West. Buffett played Capt. Tony's in the early '70s, and was often paid in tequila. Buffett immortalized the bar, & Tarracino himself, in his song "Last Mango in Paris". On occasion, Jimmy will make surprise appearances at the bar, but only performs at his own place around the corner called Margaritaville Cafe. Tarracino sold the bar in 1989, but continued to appear there most Thursdays to greet customers and fans until his death in November 2008. Popular culture The Conch that Roared, Gregory W. King Jimmy Buffett: The Man from Margaritaville Revealed, Steve Eng Jimmy Buffett includes a reference to the bar in the song "Last Mango in Paris" References External links Official site Category:Buildings and structures in Key West, Florida Category:Landmarks in Key West, Florida Category:History of Key West, Florida Category:Tourist attractions in Key West, Florida Category:Drinking establishments in Florida Category:1958 establishments in Florida
{ "pile_set_name": "Wikipedia (en)" }
Malshree dhun Malshree or Malashree Dhun or Malshree Dhoon (Nepal Bhasa: मालश्री धून) is a Newa artform in which musicians perform devotional music, based on classical raga and taal system. The dhun is incorporated into mainstream Nepalese music as the music of Dashain. It is the tune that announces that Dashain, the biggest Hindu festival of Nepal, has arrived. Malashree dhun is one of the oldest surviving devotional musics of Nepal, with its origin in the 17th century. The Malshree dhun originally belongs to the Newari culture from the Kathmandu valley, and it’s a folk music of Newari culture which later on got amalgamated with the large Nepali culture and has become a traditional music of the biggest festival of Nepal, Dashain. History Classic devotional music has been in existence in Nepal for more than a thousand years. The time period between 11th to 17th century saw an increase in literary activity in Kathmandu. Numerous devotional music, dances, and plays have been found from this era. Most experts believe that the literary development during this era culminated in the development of Newa music form. The earliest treatise on Malshree dhun found till date is a book in Nepal Bhasa called Sangit Chandra. The book was written as an appendix to Natya Shastra by the king of Bhaktapur Jagat Jyoti Malla and his minister Vanshamani Ojha. The book elaborates on Bharata Muni's Natya Shastra and Abhinavagupta's Abhinavabharati. This was followed by Gayanlochan, written during the reign of Jitamitra Malla. Gayanlochan focuses more on introduction to raga (and raginis), their characteristics, and performance. Performance This popular Malshree tune is very melodious and extremely soothing, and the listener becomes one with the natural order of things in the universe. The sitar, the tabla, the taa and the dhimay are the mainstays of the spiritually uplifting dhun, with some other instruments like the sarangi and flute taking a more subdued role. The melody is maintained by the sitar. No wonder the malshree dhun is so very evocative, and succeeds every time in connecting with the human heart, leaving behind the cluttered mind for a blessed moment of peace and serenity. The Malshree music is performed according to a fixed schedule, which is during the Dashain festival. There are specific pieces of music which are played during the specific season, specific day of the week and specific hours of the day. Seasons, their festivals and music accompanying them are as follows This melodious Malshree or Dashain dhun is played using different musical instruments but the key instruments are sitar and tabla. These two instruments are beautifully combined with the notations that have given birth to this melodious music. Nowadays we can find people using different instruments to play this music, like guitars, drums just to name a few. The music is so freshening and joyful that takes everyone into a mood of celebration which is the beautiful part of this melodious dhun. Therefore, Dashain dhun in Malshree dhun is a beautiful music that is very much important for the most happening and awaited festival of Nepal, Dashain. The different tabs for the Malshree dhun are as follows- See also Newa music References External links Malshree Dhun British Library clip of Dapha (1955-56) Newari Music - Mwe Dyahlhaygu 1952 Asan Dapha Khala performing Dapha Kathmandu, a valley fertile for music (Himal magazine) Category:Nepalese musical genres
{ "pile_set_name": "Wikipedia (en)" }
DESCRIPTION (provided by investigator): Fluorogenic minor groove binder (MGB) probes containing an MGB-quencher at the 5'-end and a fluorophore at the 3'-end have been recently reported. These probes fluoresce on hybridization to the complementary targets. The 5'-MGB-quencher group prevents 5' - nuclease digestion by Taq polymerase during homogeneous amplification. The 5'-MGB-quencher-oligonucleotide-fluors can be used as probes in general nucleic acid and SNP detection assays. We propose to use a new software prediction program to develop MGB Eclipse probe assays to detect Clostridium botulinum, Bacillus anthracis and Yersinia pestis. The designed probes and primers will be optimized with use of three modified bases to improve probe performance of AT- and GC-rich sequences. In the Phase 1 effort, we will design and optimize the primers and probes and demonstrate function of the MGB Eclipse probe assays on a set of known target samples. The specificity of the probes will be evaluated against panels of closely related non-pathogenic organisms. In Phase II, we will expand the number of Category A organisms and improve throughput by multiplexing. In addition, commercial prototype MGB Eclipse(TM) probe assays will be developed for each of these organisms.
{ "pile_set_name": "NIH ExPorter" }
<?xml version="1.0" encoding="ASCII"?> <!--This file was created automatically by html2xhtml--> <!--from the HTML stylesheets.--> <xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:saxon="http://icl.com/saxon" xmlns:lxslt="http://xml.apache.org/xslt" xmlns:redirect="http://xml.apache.org/xalan/redirect" xmlns:doc="http://nwalsh.com/xsl/documentation/1.0" xmlns="http://www.w3.org/1999/xhtml" version="1.1" exclude-result-prefixes="doc" extension-element-prefixes="saxon redirect lxslt"> <!-- ******************************************************************** $Id: oldchunker.xsl 6910 2007-06-28 23:23:30Z xmldoc $ ******************************************************************** This file is part of the XSL DocBook Stylesheet distribution. See ../README or http://docbook.sf.net/release/xsl/current/ for copyright and other information. ******************************************************************** --> <!-- ==================================================================== --> <!-- This stylesheet works with Saxon and Xalan; for XT use xtchunker.xsl --> <!-- ==================================================================== --> <xsl:param name="default.encoding" select="'ISO-8859-1'" doc:type="string"/> <doc:param xmlns="" name="default.encoding"> <refpurpose xmlns="http://www.w3.org/1999/xhtml">Encoding used in generated HTML pages</refpurpose> <refdescription xmlns="http://www.w3.org/1999/xhtml"> <para>This encoding is used in files generated by chunking stylesheet. Currently only Saxon is able to change output encoding. </para> </refdescription> </doc:param> <!-- ==================================================================== --> <xsl:param name="saxon.character.representation" select="'entity;decimal'" doc:type="string"/> <doc:param xmlns="" name="saxon.character.representation"> <refpurpose xmlns="http://www.w3.org/1999/xhtml">Saxon character representation used in generated HTML pages</refpurpose> <refdescription xmlns="http://www.w3.org/1999/xhtml"> <para>This character representation is used in files generated by chunking stylesheet. If you want to suppress entity references for characters with direct representation in default.encoding, set this parameter to value <literal>native</literal>. </para> </refdescription> </doc:param> <!-- ==================================================================== --> <xsl:template name="make-relative-filename"> <xsl:param name="base.dir" select="'./'"/> <xsl:param name="base.name" select="''"/> <xsl:variable name="vendor" select="system-property('xsl:vendor')"/> <xsl:choose> <xsl:when test="contains($vendor, 'SAXON')"> <!-- Saxon doesn't make the chunks relative --> <xsl:value-of select="concat($base.dir,$base.name)"/> </xsl:when> <xsl:when test="contains($vendor, 'Apache')"> <!-- Xalan doesn't make the chunks relative --> <xsl:value-of select="concat($base.dir,$base.name)"/> </xsl:when> <xsl:otherwise> <xsl:message terminate="yes"> <xsl:text>Chunking isn't supported with </xsl:text> <xsl:value-of select="$vendor"/> </xsl:message> </xsl:otherwise> </xsl:choose> </xsl:template> <xsl:template name="write.chunk"> <xsl:param name="filename" select="''"/> <xsl:param name="method" select="'html'"/> <xsl:param name="encoding" select="$default.encoding"/> <xsl:param name="indent" select="'no'"/> <xsl:param name="content" select="''"/> <xsl:message> <xsl:text>Writing </xsl:text> <xsl:value-of select="$filename"/> <xsl:if test="name(.) != ''"> <xsl:text> for </xsl:text> <xsl:value-of select="name(.)"/> <xsl:if test="@id"> <xsl:text>(</xsl:text> <xsl:value-of select="@id"/> <xsl:text>)</xsl:text> </xsl:if> </xsl:if> </xsl:message> <xsl:variable name="vendor" select="system-property('xsl:vendor')"/> <xsl:choose> <xsl:when test="contains($vendor, 'SAXON 6.2')"> <!-- Saxon 6.2.x uses xsl:document --> <xsl:document href="{$filename}" method="{$method}" encoding="{$encoding}" indent="{$indent}" saxon:character-representation="{$saxon.character.representation}"> <xsl:copy-of select="$content"/> </xsl:document> </xsl:when> <xsl:when test="contains($vendor, 'SAXON')"> <!-- Saxon uses saxon:output --> <saxon:output file="{$filename}" href="{$filename}" method="{$method}" encoding="{$encoding}" indent="{$indent}" saxon:character-representation="{$saxon.character.representation}"> <xsl:copy-of select="$content"/> </saxon:output> </xsl:when> <xsl:when test="contains($vendor, 'Apache')"> <!-- Xalan uses redirect --> <redirect:write file="{$filename}"> <xsl:copy-of select="$content"/> </redirect:write> </xsl:when> <xsl:otherwise> <!-- it doesn't matter since we won't be making chunks... --> <xsl:message terminate="yes"> <xsl:text>Can't make chunks with </xsl:text> <xsl:value-of select="$vendor"/> <xsl:text>'s processor.</xsl:text> </xsl:message> </xsl:otherwise> </xsl:choose> </xsl:template> <xsl:template name="write.chunk.with.doctype"> <xsl:param name="filename" select="''"/> <xsl:param name="method" select="'html'"/> <xsl:param name="encoding" select="$default.encoding"/> <xsl:param name="indent" select="'no'"/> <xsl:param name="doctype-public" select="''"/> <xsl:param name="doctype-system" select="''"/> <xsl:param name="content" select="''"/> <xsl:message> <xsl:text>Writing </xsl:text> <xsl:value-of select="$filename"/> <xsl:if test="name(.) != ''"> <xsl:text> for </xsl:text> <xsl:value-of select="name(.)"/> </xsl:if> </xsl:message> <xsl:variable name="vendor" select="system-property('xsl:vendor')"/> <xsl:choose> <xsl:when test="contains($vendor, 'SAXON 6.2')"> <!-- Saxon 6.2.x uses xsl:document --> <xsl:document href="{$filename}" method="{$method}" encoding="{$encoding}" indent="{$indent}" doctype-public="{$doctype-public}" doctype-system="{$doctype-system}" saxon:character-representation="{$saxon.character.representation}"> <xsl:copy-of select="$content"/> </xsl:document> </xsl:when> <xsl:when test="contains($vendor, 'SAXON')"> <!-- Saxon uses saxon:output --> <saxon:output file="{$filename}" href="{$filename}" method="{$method}" encoding="{$encoding}" indent="{$indent}" doctype-public="{$doctype-public}" doctype-system="{$doctype-system}" saxon:character-representation="{$saxon.character.representation}"> <xsl:copy-of select="$content"/> </saxon:output> </xsl:when> <xsl:when test="contains($vendor, 'Apache')"> <!-- Xalan uses redirect --> <redirect:write file="{$filename}"> <xsl:copy-of select="$content"/> </redirect:write> </xsl:when> <xsl:otherwise> <!-- it doesn't matter since we won't be making chunks... --> <xsl:message terminate="yes"> <xsl:text>Can't make chunks with </xsl:text> <xsl:value-of select="$vendor"/> <xsl:text>'s processor.</xsl:text> </xsl:message> </xsl:otherwise> </xsl:choose> </xsl:template> </xsl:stylesheet>
{ "pile_set_name": "Github" }
3 - Fonts At Lommelegen we are passionate about typography and the written word. We have chosen fonts and weights with readability in mind, but that also gives us freedom to experiment. 3.1 - Roboto Roboto is our base font and used in most cases. It's a font with good rhythm and spacing. Roboto Black in large size is well suited for headlines, and Roboto Light is a good contrast when setting large blocks og text. Available weights are light, normal, bold, and black. The font is hosted externally and included as a stylesheet <link href="http://fonts.googleapis.com/css?family=Roboto:400,400italic,300italic,300,900,900italic,700italic,700,500italic,500" rel="stylesheet" type="text/css">
{ "pile_set_name": "Pile-CC" }
577 F.2d 175 In re EASTERN FREIGHT WAYS, INC., Bankrupt.Sidney B. GLUCK, Trustee in Bankruptcy of Eastern FreightWays, Inc., Plaintiff-Appellee,v.SEABOARD SURETY COMPANY, Defendant-Appellant,Manufacturers Hanover Trust Company, individually and asagent for other institutional lenders, InternationalHarvester Credit Corporation, Fruehauf Corporation and theChase Manhattan Bank, National Association, and Thomas J.Cahill, Trustee in Bankruptcy of Associated Transport, Inc.,Defendants-Appellees. No. 738, Docket 77-5036. United States Court of Appeals,Second Circuit. Argued March 27, 1978.Decided May 25, 1978. Solomon M. Cheser, New York City (Tell, Cheser, Breitbart & Lefkowitz, and Wickes, Riddell, Bloomer, Jacobi & McGuire, New York City, James W. Harbison, Jr., Thomas R. Stritter, New York City, of counsel), for defendant-appellant Seaboard Surety Company. Michael R. Kleinerman, New York City (Booth, Lipton & Lipton, Edgar H. Booth, New York City, of counsel), for plaintiff-appellee Sidney B. Gluck, Trustee in Bankruptcy of Eastern Freight Ways, Inc. Theodore Gewertz, New York City (Wachtell, Lipton, Rosen & Katz, Ronald M. Neumann, New York City, of counsel), for defendant-appellee Manufacturers Hanover Trust Co. Lewis Kruger, New York City (Krause, Hirsch & Gross, Christina Burks Lee, Barbara G. Kaplan, New York City, of counsel), for defendant-appellee International Harvester Credit Corp. Toni C. Lichstein, New York City (Milbank, Tweed, Hadley & McCloy, Russell E. Brooks, New York City, of counsel), for defendant-appellee The Chase Manhattan Bank, National Association. Anderson Russell Kill & Olick, New York City (Arthur S. Olick, Poppy B. Quattlebaum, New York City, of counsel), for defendant-appellee Thomas J. Cahill, Trustee in Bankruptcy of Associated Transport, Inc. Before FEINBERG, MANSFIELD and OAKES, Circuit Judges. FEINBERG, Circuit Judge: 1 The conflicting claims of two trustees in bankruptcy, a surety to the bankrupts, an obligor on a two million dollar letter of credit in favor of the surety, and three secured creditors with perfected interested in the accounts receivable of one of the bankrupts form the background for this appeal. The surety, Seaboard Surety Company ("Seaboard"), appeals from an order of Judge Edmund L. Palmieri in the United States District Court for the Southern District of New York, which affirmed an order of Bankruptcy Judge Roy Babitt denying Seaboard the right to benefit from certain setoffs in bankruptcy at least until such time as it has exhausted the proceeds of the letter of credit in the satisfaction of outstanding claims. With certain minor modifications, we affirm. 2 * It is necessary to state the factual and legal history of this case in some detail. Eastern Freight Ways, Inc. ("Eastern") and Associated Transport, Inc. ("Associated"), both of which are now in bankruptcy proceedings, were licensed common carriers of freight regulated by the Interstate Commerce Commission. Under ICC regulations, such trucking firms are allowed to self-insure against various risks subject, in some cases, to the filing of appropriate surety bonds. See 49 C.F.R. Part 1043. For many years, appellant Seaboard had written assorted surety bonds for Associated. When Associated began to run into financial troubles in 1974, these suretyships were collateralized by $600,000 worth of negotiable instruments and other security. Shortly thereafter, subsequent to Eastern's acquisition of control over Associated,1 appellant agreed to act as surety for both Eastern and Associated. The two trucking companies in turn agreed to collateralize Seaboard's obligations under surety bonds issued on behalf of either or both bankrupts, and to indemnify appellant for any and all liabilities incurred under such bonds. Following these agreements, Seaboard released the $600,000 collateral and accepted a $2,000,000 letter of credit from Chase Manhattan Bank2 which, however, purported to cover only Seaboard's liabilities incurred on behalf of Eastern. Still later, Manufacturers Hanover Trust Company, International Harvester Credit Corporation and Fruehauf Corporation, also parties to this litigation, obtained apparently perfected security interests in Eastern's accounts receivable and other assets, which ultimately secured some $4,750,000 in debt. 3 In April 1976, Eastern and Associated each filed a petition for arrangement under Chapter XI of the Bankruptcy Act, 11 U.S.C. §§ 701 et seq., but each was thereafter adjudicated a bankrupt;3 Sidney B. Gluck became the bankruptcy trustee for Eastern. Since at this time approximately 20,000 cargo claims against the bankrupts were outstanding upon which Seaboard was potentially liable, it "drew down" the full $2,000,000 proceeds of the letter of credit.4 Many of those who had such cargo claims against the bankrupts also owed them unpaid freight charges. After drawing down the $2,000,000, Seaboard began notifying the cargo claimants that they should deduct any unpaid freight charges owed to a particular bankrupt from the amount of the cargo claim against that bankrupt. Seaboard's notice stated that, in any event, it would not be liable for more than the difference between these amounts. 4 In September 1976, Eastern's trustee petitioned the bankruptcy judge for an order which would, among other things, require Seaboard to account for all cargo claims pending or paid and the use of the proceeds of the letter of credit, and would enjoin Seaboard from further interfering with the administration of the bankrupt's estate. Seaboard in turn asked the bankruptcy court to declare that it was entitled to use unpaid freight charges as setoffs against the cargo claims. In November 1976, Bankruptcy Judge Babitt issued a temporary restraining order against Seaboard pending further litigation and ordered Seaboard to render the requested accounting. In various colloquies in open court leading up to this order, all parties agreed that the setoff issue should be settled in one litigation before the bankruptcy judge. Pursuant to these discussions, Eastern's trustee commenced an adversary proceeding5 in the bankruptcy court against Seaboard, the three secured creditors referred to above, Chase Manhattan Bank and the Associated trustee, Thomas J. Cahill. 5 The Eastern trustee's complaint sought, in part, (1) a declaration that Seaboard was not entitled (a) to any setoffs whatsoever because of the prior perfected assignment of the accounts receivable; (b) to any setoffs that a cargo claimant had waived by paying in full to Eastern's trustee the freight charges owed the bankrupt; or (c) to any setoff based on a freight charge not arising out of the same transaction giving rise to the cargo claim; and (2) a declaration (a) that Seaboard could apply the proceeds of the letter of credit only against Eastern cargo claims and (b) that Seaboard would have no right to setoffs until such proceeds were properly exhausted.6 After the other defendants had answered,7 Seaboard moved to dismiss the first cause of action described above (and related cross-claims) for failure to state a claim upon which relief could be granted, and to dismiss the second for lack of summary jurisdiction in the bankruptcy court. Seaboard also sought a declaration that it was entitled to the contested setoffs. 6 In a lengthy opinion filed in April 1977, Bankruptcy Judge Babitt granted substantial relief to the trustee. Although the bankruptcy judge did not reach the merits of the issues raised by the first cause of action, he held "that until the proceeds of the letter of credit are exhausted, no right of set off can be claimed by Seaboard, and the trustee is entitled to a declaratory judgment to that effect." Judge Babitt also rejected Seaboard's contentions that the bankruptcy court had no jurisdiction over the allocation of the proceeds, since Seaboard had submitted itself to that jurisdiction by seeking affirmative relief on its claimed right to setoff, "an issue inextricably intertwined with the existence of the proceeds of the letter of credit . . . ." The bankruptcy judge also enjoined8 Seaboard from soliciting setoffs until further order of the court and directed it to render an accounting of the cargo claims. Finally, Judge Babitt ordered an evidentiary hearing, to be stayed pending determination of an appeal, on the issue of allocating the proceeds of the letter of credit. 7 Seaboard appealed to the district court; in October 1977, Judge Palmieri affirmed the bankruptcy judge in a thorough opinion. The district judge agreed that Seaboard had no right to any equitable setoffs until the proceeds of the letter of credit were exhausted, and that the bankruptcy court had jurisdiction to decide how the proceeds were to be applied. The district court based the latter holding, however, not on the bankruptcy judge's rationale of seaboard's implied consent to jurisdiction, but rather on the theory that determination of the proper allocation of the proceeds of the letter of credit "is a necessary prerequisite to the final resolution of the rights of the parties with respect to the setoffs, over which the court clearly has jurisdiction." Lastly, Judge Palmieri concluded that in light of the complex factual and legal issues posed by the conflicting claims of the secured creditors regarding the setoffs, Seaboard's motion to dismiss the trustee's first cause of action for failure to state a claim should be denied. II 8 The parties reiterate these contentions in this court, and focus particularly on whether Seaboard's right to benefit from the setoffs is properly conditioned on exhaustion of the proceeds of the letter of credit and whether the bankruptcy court has jurisdiction to determine allocation of those proceeds. We turn to the setoff issue first, since its resolution affects our analysis of the jurisdictional point. 9 As all parties and both judges recognized, our starting point is Judge Friendly's opinion, captioned In re Yale Express Systems, Inc., 362 F.2d 111 (2d Cir. 1966). In that case, a surety for a trucking company in reorganization under Chapter X, 11 U.S.C. §§ 501 et seq., was found to be entitled to setoffs similar to those sought here, provided that on remand the surety could demonstrate that the setoffs "would be compatible with the requirements of the reorganization . . . ." Id. at 117. Seaboard, which is concededly a surety to the bankrupt trucking firms,9 contends that Yale Express controls in this straight bankruptcy proceeding, where there are no rehabilitative concerns as were present in Yale Express. While Judge Friendly did opine that "had this been an ordinary bankruptcy, it would have been error to deny the applications for setoff," id. at 116, a closer scrutiny of the Yale Express analysis demonstrates that Seaboard is not entitled to such setoffs, at least until the proceeds of the letter of credit are exhausted. 10 Seaboard argues that Yale Express stands for the proposition that "the surety of an insolvent debtor is entitled to have a creditor apply a debt owing to the debtor to satisfaction of his claim . . . ." Id. But the principle just stated is an equitable one, id.; see Restatement of Security § 133, Comment c (1941), especially when applied by the bankruptcy court, which is a court of equity. See Bank of Marin v. England, 385 U.S. 99, 103, 87 S.Ct. 274, 17 L.Ed.2d 197 (1966) (equitable application of seemingly mandatory statutory rule); Pepper v. Litton, 308 U.S. 295, 304-05, 60 S.Ct. 238, 84 L.Ed. 281 (1939). Thus, the crucial question is whether a surety who has dollar for dollar recourse against its principal, albeit an insolvent one, is equitably entitled to setoffs existing between the principal and the principal's debtors. Cf. Tucson House Constr. Co. v. Fulford, 378 F.2d 734, 737 (9th Cir. 1967). We think that this question was properly answered in the negative here. 11 Normally, a surety to an insolvent principal is without recourse against the principal except insofar as the surety may ultimately receive some dividend from the bankruptcy proceedings. If such a surety is forced to pay in full a claim against a bankrupt principal without being permitted to deduct from the amount to be paid the freight charge due from the claimant to the principal, and the claimant then pays the freight charge to the bankrupt's estate, the bankrupt benefits at the surety's expense. Such an inequitable result "is contrary to the fundamental relation between the (principal and surety)." United States ex rel. Johnson v. Morley Constr. Co., 98 F.2d 781, 790 (2d Cir.), cert. denied, 305 U.S. 651, 59 S.Ct. 244, 83 L.Ed.2d 421 (1938), quoted with approval in Yale Express, supra, 362 F.2d at 115. It therefore follows that the surety to a bankrupt should ordinarily be allowed to take the type of setoff sought here. In effect, this creates an equitable lien in favor of the surety over the claimant's natural security against the bankrupt, that is, the right to setoff. Such a rule prevents the bankrupt's unjust enrichment at the expense of the surety. 12 Here, however, the surety has dollar for dollar recourse against the bankrupt principal in the form of the proceeds of the Chase Manhattan letter of credit. Until Seaboard has properly paid out two million dollars worth of cargo claims, the principal cannot benefit at Seaboard's expense, because the latter will retain one dollar of proceeds for every dollar of claim paid. Since it appears that here the principal is "able (up to $2,000,000) to respond to the surety's claim over against him for indemnity," United States ex rel. Johnson v. Morley Constr. Co., supra, 98 F.2d at 790, the rationale for allowing a surety to compel use of an existing setoff does not arise until the proceeds are exhausted. See Clark Car Co. v. Clark, 48 F.2d 169, 170 (3d Cir. 1931). If and when Seaboard exhausts those proceeds, it may well be entitled to the benefit of the setoffs, subject to such priority, if any, as might be accorded to the adverse claims of the secured creditors.10 But since Seaboard is currently protected and since it is not clear that the proceeds of the letter of credit will ever be exhausted,11 both the bankruptcy judge and the district judge correctly held that Seaboard had not established a present right to the setoffs.12 13 Seaboard argues that this view inequitably deprives it of the security of the setoffs to which it was otherwise entitled, simply because it obtained a letter of credit in addition to that security. While this claim has superficial appeal, the right to setoff is inadequate security at best whenever the setoff (the freight charge) is less than the claim against the principal (the cargo claim). Thus, a surety will usually benefit by obtaining collateral to cover its potential liabilities. Indeed, if Seaboard had been fully collateralized, the setoff issue would never have arisen. Seaboard was better off with the letter of credit than with the limited security of the setoffs, which the letter of credit, until exhausted, was designed to replace. Under this view, it is not unfair to require Seaboard to utilize the greater security it obtained. 14 Seaboard also argues that if it is compelled to wait to use the setoffs, it will be unfairly harmed by the order of the bankruptcy court. This could result from the following scenario: The letter of credit is construed to cover claims against both Eastern and Associated, which are estimated substantially to exceed $2,000,000. As Seaboard pays these claims, various claimants fail to utilize their own outstanding liability for freight charges to the bankrupt trucking companies as a setoff against the trustees of those companies, and pay the freight charges in full to the trustees. Thereafter, when Seaboard's payment of cargo claims exceeds $2,000,000, it will lose money on all setoffs not theretofore utilized by the claimants, if appellees are correct in their assertion that such payments in full by cargo claimants waive the surety's setoff rights.13 Without passing on any of these contentions, we note that this possibility exists. Moreover, we were informed at oral argument that the trustee has been paying over the accounts receivable as they are collected to the secured creditors, thereby enhancing the potential for harm to appellant. We therefore modify Bankruptcy Judge Babitt's order to direct the trustee to collect the accounts receivable, but to hold in a special account pending final resolution of this litigation such sums as are collected from shippers who have asserted claims against Seaboard. Such a procedure will help protect appellant by allowing an adjustment of monies and claims between the surety, the bankrupt, and the secured creditors, should Seaboard eventually demonstrate its entitlement to use the setoffs in one form or another. III 15 We turn now to the jurisdictional issue raised by the litigants: Does the bankruptcy court have the power to decide in a summary proceeding whether the letter of credit covers claims against Eastern only or claims against Associated as well?14 As indicated above, the district court held that there was jurisdiction over this issue of allocation of the proceeds of the letter of credit because that question was necessarily intertwined with the setoff issue, over which the bankruptcy court clearly had jurisdiction. Appellant disputes this conclusion and also rejects the various other theories proffered by appellees to justify summary jurisdiction. We now turn to these contentions. 16 Jurisdiction of the bankruptcy courts is generally defined by sections 2 and 23 of the Bankruptcy Act, 11 U.S.C. §§ 11 and 46. These sections taken as a whole limit summary jurisdiction to matters relating to the administration of the bankrupt's estate, property in the court's constructive or actual possession, and other bankruptcy issues to to which the parties expressly or impliedly consent. See, e. g., Katchen v. Landy, 382 U.S. 323, 327, 86 S.Ct. 467, 15 L.Ed.2d 391 (1966); Thompson v. Magnolia Petroleum Co.,309 U.S. 478, 481, 60 S.Ct. 628, 84 L.Ed. 876 (1940); Harris v. Avery Brundage Co., 305 U.S. 160, 164, 59 S.Ct. 131, 83 L.Ed. 100 (1938); see generally 2 Collier on Bankruptcy PP 23.02-.08 (14th ed. 1976). In determining whether a particular controversy falls within the bankruptcy court's summary powers, the courts have recognized that Congress has not rigidly delineated the boundaries of jurisdiction. See Katchen v. Landy, supra, 382 U.S. at 328, 86 S.Ct. 467; see also 1 Collier on Bankruptcy P 2.04, at 147 (14th ed. 1974). Rather, "bankruptcy court jurisdiction has been expanded to meet the exigencies of particular fact situations," Law Research Service, Inc. v. Crook, 524 F.2d 301, 314 (2d Cir. 1975), and "the exact scope of summary proceedings in bankruptcy . . . is a matter to be determined by (reference to case law) after due consideration of the structure and purpose of the Bankruptcy Act as a whole . . . ." Katchen v. Landy, supra, 382 U.S. at 328, 86 S.Ct. at 472. 17 Appellant urges that the trustee must invoke plenary proceedings here because Seaboard holds "possession of the proceeds of the letter of credit as an adverse claimant with a substantial and good faith claim . . . ." If the trustee sought to litigate the surety's right to retain collateral in it possession, then appellant's contention would be persuasive. See Jaquith v. Rowley, 188 U.S. 620, 23 S.Ct. 369, 47 L.Ed. 620 (1903). However, the trustee has expressly denied making a claim to the proceeds of the letter of credit. Moreover, the allocation issue was raised only because of its pivotal importance to the setoff issue. As our analysis in Part II above demonstrates, the right to setoff depends on whether the surety has properly exhausted the $2,000,000 collateral, which in turn may depend upon whether the letter of credit protects Seaboard on claims against both bankrupts or on claims against Eastern only. The setoff issue was clearly within the summary jurisdiction of the bankruptcy court, because the trustee had constructive possession of, and title to, the accounts receivable for freight charges, see section 70(a)(5) of the Bankruptcy Act, 11 U.S.C. § 110(a)(5). This justified the trustee's invocation of summary jurisdiction over any attempt to reduce the amount of the collectible accounts receivable by means of setoffs, whether asserted by a creditor or by the surety. See Cumberland Glass Mfg. Co. v. DeWitt & Co., 237 U.S. 447, 455, 35 S.Ct. 636, 59 L.Ed. 1042 (1915); 2 Collier on Bankruptcy P 23.05(4), at 489 (14th ed. 1976). 18 It follows that the bankruptcy judge had jurisdiction to adjudicate the allocation issue insofar as it was determinative of the setoff issue. Accordingly, we hold that the allocation issue was a "controvers(y) relating to property over which (the bankruptcy court had) actual or constructive possession." Katchen v. Landy, supra, 382 U.S. at 327, 86 S.Ct. at 471, quoting Thompson v. Magnolia Petroleum Co., supra, 309 U.S. at 481, 60 S.Ct. 628. Moreover, the overriding policy of the Bankruptcy Act to administer a bankrupt's estate with expedition15 is best served here by resolving the thoroughly interrelated and interdependent allocation and setoff issues in a single summary proceeding before the bankruptcy judge. See O'Dell v. United States, 326 F.2d 451, 455-56 (10th Cir. 1964); cf. James Talcott, Inc. v. Glavin, 104 F.2d 851, 853 (3d Cir.), cert. denied, 308 U.S. 598, 60 S.Ct. 130, 84 L.Ed. 501 (1939). 19 We also note that Seaboard's filing of a proof of claim against the Eastern estate seemingly justified the bankruptcy court's assertion of jurisdiction here. Cf. Chase Nat. Bank v. Lyford, 147 F.2d 273, 277 (2d Cir. 1945). At least where the claim against the estate exceeds the amount of the contested setoff, it appears that the filing of a proof of claim constitutes implied consent to summary jurisdiction over the setoff issue. See 4 Collier on Bankruptcy P 68.20(4), at 946 (14th ed. 1978). Furthermore, since the size of Seaboard's unsecured claim against Eastern will ultimately depend upon the allocation of the proceeds of the letter of credit, see note 11 supra, the bankruptcy court has jurisdiction to hear the allocation issue which is determinative of the value of the security held by Seaboard as regards Eastern. See Rule of Bankruptcy Procedure 306(d); section 57(h) of the Bankruptcy Act, 11 U.S.C. § 93(h).16 20 Finally, appellant contends that we should direct the bankruptcy judge to decline jurisdiction in order to avoid the appearance of institutional bias in favor of a trustee administering the estate. Whatever strength the argument might have in other contexts, it is unsound here. The Eastern and Associated trustees have taken contrary positions on the allocation issue. Moreover, Seaboard's reliance on In re Lehigh and Hudson River Ry. Co., 468 F.2d 430 (2d Cir. 1972) is misplaced. That case dealt with the question whether the bankruptcy court should exercise summary jurisdiction to order "an obligor to pay something which he has substantial grounds for contending he no longer owed when the (bankruptcy) petition was approved." Id. at 434. This case does not involve a trustee's attempt to recover assets held by the surety, and the considerations involved in Lehigh and Hudson River Ry. Co. are inapplicable. 21 Subject to the modification discussed in Part II concerning the collection of the accounts receivable, the order of the district court is affirmed. The bankruptcy judge should commence hearings on the allocation of proceeds issue as soon as practicable so that all of the setoff issues including the priority claims of the secured creditors, see note 10 supra may be rapidly decided and the collection and distribution of the estate may proceed with expedition. 1 By 1974, Eastern owned over 45 percent of Associated's outstanding stock and was granted temporary authority by the ICC to assume control of Associated's operations 2 We are informed that Manufacturers Hanover Trust Company has a 25 percent interest in this letter of credit 3 Eastern apparently reentered Chapter XI in June 1976, but was again adjudicated a bankrupt in August of that year 4 In addition to the outstanding cargo claims, Seaboard is potentially liable for other claims as well, including workmen's compensation claims. See note 9 infra. For convenience, we will ordinarily refer to the claims against Seaboard as cargo claims 5 See Rules of Bankruptcy Procedure 701-82. Rule 701 provides: The rules of this Part VII govern any proceeding instituted by a party before a bankruptcy judge to (1) recover money or property, other than a proceeding under Rule 220 or Rule 604, (2) determine the validity, priority, or extent of a lien or other interest in property, (3) sell property free of a lien or other interest for which the holder can be compelled to take a money satisfaction, (4) object to or revoke a discharge, (5) obtain an injunction, (6) obtain relief from a stay as provided in Rule 401 or 601, or (7) determine the dischargeability of a debt. Such a proceeding shall be known as an adversary proceeding. 6 The complaint also sought damages for Seaboard's alleged conversion of the bankrupt's accounts receivable in the form of setoffs already taken. This cause of action was dismissed, and that decision is not appealed here 7 Many of the answers contained cross-claims against Seaboard which raised the same issues as the main complaint 8 See Rule of Bankruptcy Procedure 765, which provides: Rule 65 of the Federal Rules of Civil Procedure applies in adversary proceedings except that a temporary restraining order or preliminary injunction may be issued on application of a trustee, receiver, or bankrupt without compliance with subdivision (c) of that rule. When security is required under subdivision (c) of that rule and is given in the form of a bond or other undertaking, Rule 925 governs its enforcement against the surety thereon. 9 Seaboard issued bonds for personal injury, cargo and workmen's compensation claims against Eastern and Associated. Since Seaboard has undertaken these obligations, upon which the two trucking firms were primarily liable, Seaboard was clearly acting as a surety. See Restatement of Security § 82 (1941) 10 The secured creditors claim that the rights of the perfected assignees of the accounts receivable are prior to and superior to the surety's equitable lien over the setoffs. We do not address this point nor do we reach the other questions raised in the trustee's first cause of action. We agree with Judge Palmieri, however, that there are apparently material issues of fact in dispute which may well be determinative of the legal questions involved, and that Seaboard's motion to dismiss this first cause of action was therefore properly denied 11 If the letter of credit is held to protect Seaboard as to Eastern claimants only, the proceeds of the letter of credit will apparently be more than ample to cover Seaboard's approximately $700,000 in liabilities on behalf of Eastern 12 The result here is arguably consistent with the equitable dictates of the marshaling of assets doctrine recognized in bankruptcy. Thus, where one creditor (Seaboard) can reach two funds of the debtor (the proceeds of the letter of credit and the accounts receivable for freight charges in the form of setoffs) and another creditor (e. g., Manufacturers Hanover) can only reach one of those two funds (the accounts receivable), a bankruptcy court will require the first creditor initially to attempt to satisfy his claim out of the asset unavailable to the second creditor. See In re Beacon Distributors, Inc., 441 F.2d 547, 548 (1st Cir. 1971) 13 Appellees contend that the cargo claimant waives his right to setoff, see section 68(a) of the Bankruptcy Act, 11 U.S.C. § 108(a), by choosing to pay the freight charge in full and pursue the surety for the full amount of the cargo claim. See 4 Collier on Bankruptcy P 68.07 (14th ed. 1978). If such payments in full here waive the cargo claimants' rights (a point upon which we express no opinion), it perhaps follows that the surety's right to setoff is also waived because the surety's rights are arguably derivative of the cargo claimants' rights. See United States ex rel. Johnson v. Morley Constr. Co., supra, 98 F.2d at 790: However, it is only after the surety pays the creditor that he is subrogated to all the creditor's securities, and that would be a condition here, except that the surety cannot pay the debt without losing the security, for it consists only of the creditor's power to defeat the counterclaim by using his claim to cancel it. Therefore to exact of the surety the normal condition of paying the debt, would be to destroy the security, and it follows that he must be allowed to set it up himself. See also section 57(i) of the Bankruptcy Act, 11 U.S.C. § 93(i). 14 Basically, summary proceedings are expedited and simplified judicial proceedings before the bankruptcy judge over matters relating to the administration of the bankrupt's estate and property in the court's possession. If such jurisdiction does not exist and an adverse party is unwilling to consent to summary jurisdiction, then the trustee must initiate more formalized plenary proceedings in the appropriate state or federal court. Significantly, there are no rights to a jury in summary proceedings, except as provided by section 19 of the Bankruptcy Act, 11 U.S.C. § 42. See generally 2 Collier on Bankruptcy P 23.02 (14th ed. 1976) 15 See Katchen v. Landy, supra, 382 U.S. at 328-29, 86 S.Ct. 467 16 Our result here is strongly supported by appellant's express consent to litigate the setoff issue before the bankruptcy court. There is much force to appellees' arguments that such consent should be dispositive of appellant's jurisdictional objection, because, as already stated, the setoff issue depends upon the proper exhaustion of the proceeds of the letter of credit. Furthermore, as Eastern's trustee points out, it is somewhat anomalous for appellant to concede that the bankruptcy court could decide one side of the question but not the other. Indeed, "(o)nce consent to the summary jurisdiction of the bankruptcy court appears, that jurisdiction generally will be retained for the determination of all the claims of the parties and for the enforcement of all their rights against each other." 2 Collier on Bankruptcy P 23.08(1), at 536 (14th ed. 1976). Nor is this a case in which the issues are "entirely disconnected" so that consent as to one matter might not be considered consent as to another matter. See Daniel v. Guaranty Trust Co., 285 U.S. 154, 161, 76 L.Ed. 675 (1932)
{ "pile_set_name": "FreeLaw" }
Osprey Aether 70 Backpack- will attack with knife to lighten 4.9 oz lb g kg lb oz lb g kg 1
{ "pile_set_name": "OpenWebText2" }
1998 J.League Cup Statistics of J. League Cup in the 1998 season. Overview It was contested by 20 teams, and Jubilo Iwata won the championship. Results Group A Group B Group C Group D Semifinals Shimizu S-Pulse 0-2 Jubilo Iwata JEF United Ichihara 3-2 Kashima Antlers Final Jubilo Iwata 4-0 JEF United Ichihara Jubilo Iwata won the championship. References rsssf J. League Category:J.League Cup Lea
{ "pile_set_name": "Wikipedia (en)" }
/// Copyright (c) 2012 Ecma International. All rights reserved. /** * @path ch15/15.4/15.4.4/15.4.4.22/15.4.4.22-9-c-i-16.js * @description Array.prototype.reduceRight - element to be retrieved is inherited accessor property on an Array */ function testcase() { var testResult = false; function callbackfn(prevVal, curVal, idx, obj) { if (idx === 1) { testResult = (curVal === 1); } } try { Object.defineProperty(Array.prototype, "1", { get: function () { return 1; }, configurable: true }); var arr = [0, , 2]; arr.reduceRight(callbackfn, "initialValue"); return testResult; } finally { delete Array.prototype[1]; } } runTestCase(testcase);
{ "pile_set_name": "Github" }
--- abstract: 'Scintillating CaWO$_4$ single crystals are a promising multi-element target for rare-event searches and are currently used in the direct Dark Matter experiment CRESST (Cryogenic Rare Event Search with Superconducting Thermometers). The relative light output of different particle interactions in CaWO$_4$ is quantified by Quenching Factors (QFs). These are essential for an active background discrimination and the identification of a possible signal induced by weakly interacting massive particles (WIMPs). We present the first precise measurements of the QFs of O, Ca and W at mK temperatures by irradiating a cryogenic detector with a fast neutron beam. A clear energy dependence of the QFs and a variation between different CaWO$_4$ single crystals were observed for the first time. For typical CRESST detectors the QFs in the region-of-interest (10-40keV) are $QF_O^{ROI}=(11.2{\pm}0.5)$%, $QF_{Ca}^{ROI}=(5.94{\pm}0.49)$% and $QF_W^{ROI}=(1.72{\pm}0.21)$%. The latest CRESST data (run32) is reanalyzed using these fundamentally new results on light quenching in CaWO$_4$ having moderate influence on the WIMP analysis. Their relevance for future CRESST runs and for the clarification of previously published results of direct Dark Matter experiments is emphasized.' author: - 'R. Strauss' - 'G. Angloher' - 'A. Bento' - 'C. Bucci' - 'L. Canonica' - 'A. Erb' - 'F.v.Feilitzsch' - 'P.Gorla' - 'A. Gütlein' - 'D. Hauff' - 'J. Jochum' - 'H. Kraus' - 'J.-C. Lanfranchi' - 'J. Loebell' - 'A. Münster' - 'F.Petricca' - 'W. Potzel' - 'F. Pröbst' - 'F. Reindl' - 'S. Roth' - 'K. Rottler' - 'C. Sailer' - 'K. Schäffner' - 'J.Schieck' - 'S. Scholl' - 'S. Schönert' - 'W. Seidel' - 'M.v.Sivers' - 'L. Stodolsky' - 'C. Strandhagen' - 'A.Tanzke' - 'M. Uffinger' - 'A. Ulrich' - 'I. Usherov' - 'S. Wawoczny' - 'M. Willers' - 'M. Wüstrich' - 'A. Zöller' - 'W. Carli' - 'C. Ciemniak' - 'H. Hagn' - 'D. Hellgartner' bibliography: - 'quenching\_final.bib' title: 'Precision Measurements of Light Quenching in CaWO$_4$ Crystals at mK Temperatures' --- Rare-event searches for Dark Matter (DM) in the form of weakly interacting massive particles (WIMPs) [@Bertone:2004pz; @Jungman:1995df] have reached impressive sensitivities during the last decade [@Cushman:2013zza]. Well motivated WIMP candidates with masses $m_\chi$ between a few GeV/$c^2$ and a few TeV/$c^2$ might be detectable via nuclear recoils of few keV in terrestrial experiments [@Lewin:1995rx]. While the DAMA/LIBRA [@Bernabei:2010mq], and recently the CoGeNT [@Aalseth:2010vx], CRESST [@Angloher:2012vn], and the CDMS(Si) [@PhysRevLett.111.251301] experiments observed excess signals that might be interpreted as induced by DM particles with $m_\chi{\sim10}$GeV/$c^2$ at WIMP-nucleon cross-sections of ${\sim}10^{-4}$pb, this scenario is ruled out by the LUX [@Akerib:2013tjd] and XENON100 [@Aprile:2012nq] experiments, and almost excluded by the CDMS(Ge) [@Ahmed:2009zw; @Ahmed:2010wy] and EDELWEISS [@Armengaud:2011cy; @Armengaud:2012pfa] experiments. It is strongly disfavoured by accelerator constraints [@ATLAS:2012ky; @Chatrchyan:2012me] and in mild tension with an extended analysis [@PhysRevD.85.021301] of published CRESST data [@Angloher2009270].\ The CRESST experiment [@Angloher:2012vn] employs scintillating CaWO$_4$ crystals [@edison; @PhysRevB.75.184308] as a multi-element target material. The key feature of a CRESST detector module is the simultaneous measurement of the recoil energy $E_r$ by a particle interaction in the crystal (operated as cryogenic calorimeter at mK temperatures [@Probst:1995fk]) and the corresponding scintillation-light energy $E_l$ by a separate cryogenic light absorber. Since the relative light yield $LY{=}E_l/E_r$ is reduced for highly ionizing particles compared to electron recoils (commonly referred to as quenching) nuclear-recoil events can be discriminated from e$^-$/$\gamma$ and $\alpha$ backgrounds. The phenomenological Birks model [@birks1964theory] predicts this quenching effect to be stronger the higher the mass number $A$ of the recoiling ion, which allows to distinguish, in general, between O ($A{\approx}16$), Ca ($A{\approx}40$) and W ($A{\approx}184$) recoils. The expected WIMP-recoil spectrum - assuming coherent scattering - is completely dominated by W-scatters for $m_\chi\,\gtrsim 20$GeV/c$^2$. However, the light targets O and Ca make CRESST detectors particularly sensitive to low-mass WIMPs of $1$GeV$\,\lesssim\, m_\chi\,\lesssim$20GeV. Furthermore, the knowledge of the recoil composition of O, Ca and W allows a test of the assumed $A^2$-dependence of the spin-independent WIMP-nucleon cross-section [@Jungman:1995df]. In addition, background neutrons, which are mainly visible as O-scatters (from kinematics [@scholl_paper]), can be discriminated statistically.\ The mean LY of e$^-$/$\gamma$ events ($LY_{\gamma}$) is energy dependent and phenomenologically parametrized as ${LY_{\gamma}(E_r){=}(p_0+p_1E_r)(1-p_2\exp(-E_r/p_3)}$ [@strauss_PhD]. By convention, $LY_{\gamma}$(122keV) is normalized to unity. The parameters $p_{0}$, $p_1$, $p_2$ and $p_3$ are derived from a maximum-likelihood (ML) fit for every detector module individually. For the module used in this work the fit yields: $p_0\,{=}\,1.07$, $p_1\,{=}\,{-}1.40\cdot 10^{-5}$keV$^{-1}$, $p_2\,{=}\,6.94\cdot 10^{-2}$ and $p_3\,{=}\,147$keV (errors are negligible for the following analysis). The exponential decrease towards lower recoil energies (quantified by $p_2$ and $p_3$) accounts for the scintillator non-proportionality [@Lang:2009uh]. The Quenching Factor (QF) of a nucleus $x$ - in general energy dependent - is defined as $QF_x(E_r)=LY_x(E_r)/LY_{\gamma,corr}(E_r)$ where $LY_x$ is the mean LY of a nuclear recoil x. For normalization, the LY of e$^{-}$/$\gamma$ events corrected for the scintillator non-proportionality (which is not observed for nuclear recoils) is used by convention: $LY_{\gamma,corr}=p_0+p_1E_r$. For typical CRESST detector modules, the uncertainties in energy and LY are well described by gaussians [@Angloher:2012vn] consistent with photon-counting statistics in the energy range considered in this work.\ Since the resolution of light-detectors operated in the CRESST setup at present is not sufficient to disentangle O, Ca and W recoils unambiguously, dedicated experiments to measure the QFs of CaWO$_4$ are necessary. Earlier attempts yield inconclusive results, in particular for the value of $QF_W$ [@Jagemann:2006sx; @Ninkovic:2006xy; @Bavykina:2007ze].\ At the accelerator of the Maier-Leibnitz-Laboratorium (MLL) in Garching a dedicated neutron-scattering facility for precision measurements of QFs at mK temperatures was set up (see FIG.\[fig:setupMLL\]). A pulsed $^{11}$B beam of ${\sim}65$MeV in bunches of 2-3ns (FWHM) produces monoenergetic neutrons of ${\sim}11$MeV via the nuclear reaction p($^{11}$B,n)$^{11}$C in a pressurized H$_2$ target [@Jagemann2005245]. These neutrons are irradiated onto a CRESST-like detector module consisting of a ${\sim}$10g cylindrical CaWO$_4$ single crystal (20mm in diameter, 5mm in height) and a separated Si light absorber (20mm in diameter, 500$\mu$m thick) [@Strauss:2012fk]. Both are operated as cryogenic detectors in a dilution refrigerator at ${\sim}20\,$mK [@Lanfranchi20091405]. Undergoing elastic (single) nuclear scattering in CaWO$_4$ the neutrons are tagged at a fixed scattering angle $\Theta$ in an array of 40 liquid-scintillator (EJ301) detectors which allow fast timing (${\sim}2$ns) and n/$\gamma$ discrimination. Depending upon which of the three nuclei is hit a distinct amount of energy is deposited by the neutron in the crystal. Triple-coincidences between (1) a $^{11}$B pulse on the H$_2$ target, (2) a neutron pulse in a liquid-scintillator detector and (3) a nuclear-recoil event in the CaWO$_4$ crystal can be extracted from the data set. A neutron time-of-flight (TOF) measurement between neutron production and detection combined with a precise phononic measurement of the energy deposition in the crystal (resolution ${\sim}1$keV (FWHM)) allows an identification of the recoiling nucleus. To derive the individual QF the corresponding scintillation-light output is measured simultaneously by the light detector. Since the onset uncertainty of cryodetector pulses is large (${\sim}5\,\mu$s) compared to typical neutron TOFs (${\sim}$50ns) an offline coincidence analysis has to be performed [@strauss_PhD].\ ![Schematic experimental setup of the neutron-scattering facility. Neutrons produced by the accelerator are scattered off a CRESST-like detector module (operated at 20mK) and tagged in liquid-scintillator neutron detectors at a fixed scattering angle $\Theta$.[]{data-label="fig:setupMLL"}](facility.pdf){width="38.00000%"} The experiment was optimized for the measurement of $QF_W$ [@strauss_PhD; @strauss_ltd15]. To enhance the number of W-scatters a scattering angle of ${\Theta\,{=}\,80^\circ}$ was chosen due to scattering kinematics [@Jagemann:2006sx]. For this specific angle, the expected recoil energy of triple-coincident events is ${\sim}\,100$keV for W, ${\sim}\,450$keV for Ca, and ${\sim}\,1.1$MeV for O . In ${\sim}\,3$ weeks of beam time a total of ${\sim}\,10^8$ cryodetector pulses were recorded. FIG.\[fig:timing\] shows the time difference $\Delta t$ between neutron events with the correct TOF identified in one of the liquid-scintillator detectors and the closest W-recoil (in time) in the CaWO$_4$ crystal ($E_r=100{\pm}20$keV). A gaussian peak of triple-coincidences on W (dashed red line) at $\Delta t\,{\approx}\,0.016$ms and a width of $\sigma_t\,{\approx}\,4.8\,\mu$s (onset resolution of the cryodetector) is observed above a background due to accidental coincidences uniformly distributed in time (shaded area). Within the $2\sigma$-bounds of the peak 158 W-scatters are identified with a signal-to-background (S/B) ratio of ${\sim}\,7:1$.\ ![Histogram of the time difference $\Delta t$ between neutron events with the correct TOF and the closest W-recoil in the CaWO$_4$ crystal ($E_r\,{=}\,100\,{\pm}\,20$keV). A fit to the distribution (solid black line) including a constant for the accidental background (shaded area) and a gaussian for the triple-coincidences on W (dashed red line) is shown. 158 W-scatters are identified with a signal-to-background ratio of ${\sim}\,7:1$. []{data-label="fig:timing"}](time_final.eps){width="48.00000%"} The mean LY of the extracted W-scatters is found at a lower value compared to the mean LY of all nuclear recoils, i.e., the (overlapping) contributions of O, Ca and W if no coincidence measurement is involved. The accidental coincidences have a LY-distribution equal to that which is modelled by a probability-density function (background-pdf) [@strauss_PhD]. A simultaneous maximum-likelihood (ML) fit is performed including (1) the timing distribution which fixes the S/B ratio and the number of identified W-events, and (2) the LY distribution described by a gaussian (W-events) and the background-pdf. The final results are $LY_W\,{=}\,0.0208\,{\pm}\,0.0024$ and $QF_W\,{=}\,(1.96\,{\pm}\,0.22)$%, correspondingly (errors are dominated by statistics). FIG.\[fig:LY\] shows the LY histogram of the identified events and the fit by the gaussian (dashed red line) and the background-pdf (shaded area).\ ![LY histogram of the 158 events identified as triple-coincidences on W. A fit to the distribution (solid black line) is shown which includes a gaussian (dashed red line) accounting for W-scatters and the background-pdf (shaded area) describing accidental coincidences. The simultaneous ML fit including the timing distribution yields $QF_W\,{=}\,(1.96\,{\pm}\,0.22)$%. []{data-label="fig:LY"}](LY_final.eps){width="48.00000%"} For the measurement of $QF_{Ca}$ and $QF_O$ no coincidence signals are necessary, instead, an analysis of the nuclear-recoil data alone is sufficient. Commonly CRESST data is displayed in the energy-LY plane [@Angloher:2012vn] giving rise to nearly horizontal bands which correspond to different types of particle interactions ($LY\,{\approx}\,1$ for electron and $LY\,{\lesssim}\,0.2$ for nuclear recoils). The nuclear-recoil bands of the data recorded during ${\sim}1$ week of beam time (${\sim}\,5\cdot 10^5$ pulses) are shown in FIG.\[fig:energyDependence\] bottom (grey dots). From kinematics using ${\sim}11$MeV neutrons as probes the O-recoil band extends up to ${\sim}2.4$MeV while the Ca- and W-bands extend up to ${\sim}1.05$MeV and ${\sim}240$keV, respectively [@Jagemann2005245]. Despite the strong overlap of the 3 nuclear-recoil bands the contributions of O and Ca fitted by two gaussians can be disentangled at $E_r\,{\gtrsim}\,350$keV (see FIG.\[fig:energyDependence\] top) due to high statistics and a good light-detector resolution. In FIG.\[fig:qf\_results\] the results for $QF_O$ and $QF_{Ca}$ (red error bars) derived by these independent one-dimensional (1-dim) fits are shown for selected recoil-energy slices of 20keV in width. All parameters in the fit are left free except for the LY-resolutions which are fixed by a ML fit of the electron-recoil band [@strauss_PhD]. While $QF_O$ clearly rises towards lower recoil energies, this effect is less pronounced for $QF_{Ca}$.\ ![ Top/Middle: LY histograms of two energy slices at 350 and 40keV (of 20keV in width) fitted by gaussians. Bottom: Neutron-induced nuclear-recoil events of O, Ca, and W plotted in the LY-energy plane (grey dots). The corresponding 1$\sigma$ acceptance bounds as derived from the correlated ML fit are indicated (see text). []{data-label="fig:energyDependence"}](canLy300.eps "fig:"){width="48.00000%"} ![ Top/Middle: LY histograms of two energy slices at 350 and 40keV (of 20keV in width) fitted by gaussians. Bottom: Neutron-induced nuclear-recoil events of O, Ca, and W plotted in the LY-energy plane (grey dots). The corresponding 1$\sigma$ acceptance bounds as derived from the correlated ML fit are indicated (see text). []{data-label="fig:energyDependence"}](canLy40.eps "fig:"){width="48.00000%"} ![ Top/Middle: LY histograms of two energy slices at 350 and 40keV (of 20keV in width) fitted by gaussians. Bottom: Neutron-induced nuclear-recoil events of O, Ca, and W plotted in the LY-energy plane (grey dots). The corresponding 1$\sigma$ acceptance bounds as derived from the correlated ML fit are indicated (see text). []{data-label="fig:energyDependence"}](LY_allNR_v2.eps "fig:"){width="48.60000%"} Below ${\sim}350$keV, due to the strong overlap of the nuclear-recoil bands, this simple approach fails. Instead, a correlated ML fit was performed based on the following assumptions: (1) for the mean LY of O- and Ca-scatters the phenomenological parametrization $LY_x(E_r)\,{=}\,LY_x^\infty\left(1+f_x\cdot \exp{(-E_r/\lambda_x)}\right)$ is proposed with the free parameters $LY_x^\infty$ (LY at $E_r\,{=}\,\infty$), $f_x$ (fraction of energy-dependent component) and $\lambda_x$ (exponential decay with energy), and (2) the mean LY of W-scatters is approximated to be constant in the relevant energy range (up to $\sim$240keV) at the value precisely measured with the triple-coincidence technique ($LY_W\,{=}\,0.0208\,{\pm}\,0.0024$). These assumptions are supported by the result of the 1-dim fits (see FIG.\[fig:qf\_results\]), by Birks’ model [@birks1964theory], and by a recent work [@sabine_phD] which predict the strength of the energy-dependence to decrease with $A$. The nuclear-recoil bands are cut into energy intervals of 10keV (20keV to 1MeV), of 20keV (1MeV to 1.4MeV) and 50keV (above 1.4MeV) and fitted with up to 3 gaussians depending on the recoil energy (e.g., shown in FIG.\[fig:energyDependence\] middle for $E_r{=}40$keV). Except for the assumptions mentioned above and the LY-resolution all parameters are left free in the fit. The fit converges over the entire energy range (20-1800keV). In TABLE\[tab:energydependence\] the results for $LY_x^\infty$, $f_x$ and $\lambda_x$ are presented which correspond, e.g. at 40keV, to $QF_O{=}(12.6{\pm}0.5)$%, $QF_{Ca}{=}(6.73{\pm}0.43)$% (here, the errors are dominated by systematics) and $QF_W{=}(1.96{\pm}0.22)$% at $1\sigma$ C.L. The 1-$\sigma$ acceptance bounds of O, Ca and W recoils as obtained in the correlated ML fit are shown in FIG.\[fig:energyDependence\] bottom. The final results for $QF_O$, $QF_{Ca}$ and $QF_W$ are presented in and are found to be in perfect agreement with the outcome of the 1-dim fits (red error bars). These are the first experimental results which clearly show a rise of the QFs of O (Ca) of ${\sim}28$% (${\sim}6$%) towards the ROI (10-40keV) compared to that at a recoil energy of 500keV.\ --------- --------------------- ------------------- ---------------- nucleus $LY_x^\infty$ $f_x$ $\lambda_x$ O $0.07908\pm0.00002$ $0.7088\pm0.0008$ $567.1\pm0.9$ Ca $0.05949\pm0.00078$ $0.1887\pm0.0022$ $801.3\pm18.8$ --------- --------------------- ------------------- ---------------- : \[tab:energydependence\]Results for the free parameters $LY_x^\infty$, $f_x$ and $\lambda_x$ of the ML analysis. The statistical errors are given at $1\sigma$ C.L. ![Results of the correlated ML analysis for $QF_O$, $QF_{Ca}$ and $QF_W$ (solid lines). The shaded areas indicate the 1$\sigma$ and 2$\sigma$ bounds. For the first time a clear energy dependence of $QF_O$ and $QF_{Ca}$ is observed. These results are in agreement with that of the 1-dim fits of discrete energy intervals (see text) shown as red error bars. $QF_W$ is fixed (in the correlated fit) at the value measured by the triple-coincidence technique. []{data-label="fig:qf_results"}](bands_v7.eps){width="48.00000%"} In previous works, the QFs of CaWO$_4$ were assumed to be constant over the entire energy range [@Angloher:2012vn]. A statistical analysis shows that this simple model is clearly disfavoured. Employing a likelihood-ratio test in combination with Monte-Carlo simulations gives a p-value of $p<10^{-5}$ for the data presented here to be consistent with constant QFs. Furthermore, the derived energy spectra of the individual recoiling nuclei agree with the expectation from incident 11MeV neutrons while the constant QF approach provides non-physical results.\ In the present paper, using the 8 detector modules operated in the last CRESST measurement campaign (run32) an additional aspect was investigated: the variation of the quenching behaviour among *different* CaWO$_4$ crystals [@strauss_PhD]. Nuclear recoils acquired during neutron-calibration campaigns of CRESST run32 are completely dominated by O-scatters at $E_r\gtrsim 150$keV (from kinematics) [@Angloher:2012vn]. Despite low statistics (a factor of ${\sim}100$ less compared to the measurement presented here) in the available data, the mean LY of O-events can be determined by a gaussian fit with a precision of $\mathcal{O}$(1%) for every module. In this way, the mean QF of O between 150 and 200keV was determined individually for the 8 detector modules operated in run32 ($\overline{QF_O^\ast}$) and for the reference detector operated at the neutron-scattering facility ($\overline{QF_O}$). Different values of $\overline{QF_O^\ast}$ are observed for the CRESST detector crystals (variation by ${\sim}11$%) and for the reference crystal (${\sim}12$% higher than the mean of $\overline{QF_O^\ast}$). This variation appears to be correlated with the crystal’s optical quality. The QF - which is a relative quantity - is found to be lower if a crystal has a smaller defect density and thus a higher absolute light output, i.e., the LY of nuclear recoils is less affected by an increased defect density. This is in agreement with the prediction described in a recent work [@sabine_phD]. In the present paper, a simple model to account for this variation is proposed: For every detector module which is to be calibrated a scaling factor $\epsilon$ is introduced, $\epsilon\,{=}\,\overline{QF_O^\ast}/\overline{QF_O}$. Then, within this model the QFs of the nucleus $x$ can be calculated for every module by $QF_{x}^\ast(E_r)\,{=}\,\epsilon\cdot QF_{x}(E_r)$ where $QF_{x}$ is the value precisely measured within this work. The nuclear-recoil behaviour of CRESST modules is well described by energy-dependent QFs. In the QFs, averaged over the ROI (10-40keV), and the scaling factor $\epsilon$ are listed for two selected detector modules (Rita and Daisy, with the lowest and highest absolute light output, respectively) and the mean of all 8 detector modules of run32 (Ø), $QF_O^{ROI}\,{=}\,(11.2{\pm}0.5)$%, $QF_{Ca}^{ROI}\,{=}\,(5.94{\pm}0.49)$% and $QF_W^{ROI}\,{=}\,(1.72{\pm}0.21)$%.\ ------- ------------------- -------------------------- ----------------------------- -------------------------- $\epsilon$ $QF_O^\mathrm{ROI}$\[%\] $QF_{Ca}^\mathrm{ROI}$\[%\] $QF_W^\mathrm{ROI}$\[%\] Rita $0.844{\pm}0.006$ $10.8{\pm}0.5$ $5.70{\pm}0.44$ $1.65{\pm}0.19$ Daisy $0.939{\pm}0.021$ $12.0{\pm}0.7$ $6.33{\pm}0.58$ $1.84{\pm}0.24$ Ø $0.880{\pm}0.011$ $11.2{\pm}0.5$ $5.94{\pm}0.49$ $1.72{\pm}0.21$ ------- ------------------- -------------------------- ----------------------------- -------------------------- : \[tab:CRESST\] QF results averaged over the ROI (10-40keV) and adjusted by the scaling factor $\epsilon$ for the modules Rita and Daisy, and the mean (Ø) of all run32 detectors ($1\sigma$ errors). We now turn to the effect of energy-dependent quenching since constant QFs as assumed in earlier CRESST publications do not sufficiently describe the behaviour of the nuclear-recoil bands. The value of $QF_O$ in the ROI was underestimated by ${\sim}8$% while the room-temperature measurements overestimated the values of $QF_{Ca}$ and $QF_W$ by ${\sim}7$% and ${\sim}130$%, respectively [@Angloher:2012vn]. Therefore, the parameter space of accepted nuclear recoils is larger than assumed in earlier publications (by ${\sim}46$%) requiring a re-analysis of the published CRESST data.\ During the latest measuring campaign (run32) a statistically significant signal ($4.2\sigma$) above known backgrounds was observed. If interpreted as induced by DM particles two WIMP solutions were found [@Angloher:2012vn], e.g. at a mass of $m_\chi=11.6\,$GeV/c$^2$ with a WIMP-nucleon cross section of $\sigma_\chi=3.7\cdot10^{-5}$pb. The dedicated ML analysis was repeated using the new QF values ($\O$ in TABLE\[tab:CRESST\]) yielding $m_\chi=12.0$GeV/c$^2$ and $\sigma_\chi=3.2\cdot10^{-5}$pb at 3.9$\sigma$. Beside this moderate change of the WIMP parameters also the background composition ($e^-$, $\gamma$, neutrons, $\alpha$’s and $^{206}$Pb) is influenced. This is mainly due to the significantly lower value of $QF_W$ which increases the leakage of $^{206}$Pb recoils into the ROI (by ${\sim}$18%). The other WIMP solution is influenced similarly: $m_\chi$ changes from 25.3 to 25.5GeV/c$^2$, $\sigma_\chi$ from $1.6\cdot10^{-6}$ to $1.5\cdot10^{-6}$pb and the significance drops slightly from 4.7 to 4.3$\sigma$.\ In conclusion, the first precise measurement of $QF_W$ at mK temperatures and under conditions comparable to that of the CRESST experiment was obtained at the neutron-scattering facility in Garching by an extensive triple-coincidence technique. Furthermore, the QFs of all three nuclei in CaWO$_4$ were precisely determined by a dedicated maximum-likelihood analysis over the entire energy range (${\sim}20{-}1800$keV). The observed energy dependence of the QFs, which is more pronounced for lighter nuclei, has significant influence on the determination of the ROI for DM search with CRESST. The observed variation of the QFs between different CaWO$_4$ crystals is related to the optical quality and can be adapted to every individual crystal by the simple model proposed above. The updated values of the QFs are highly relevant to disentangle the recoil composition (O, Ca and W) of a possible DM signal and, therefore, to determine the WIMP parameters. Since the separation between the O and W recoil bands is higher by ${\sim}46$% compared to earlier assumptions, background neutrons which are mainly visible as O-scatters [@scholl_paper] can be discriminated more efficiently from possible WIMP-induced events. A reanalysis of the run32 data shows a moderate influence of the new QF values on the WIMP parameters.\ The results obtained here are of importance for the current CRESST run (run33) and upcoming measuring campaigns. Providing a highly improved background level run33 has the potential to clarify the origin of the observed excess signal and to set competitive limits for the spin-independent WIMP-nucleon cross section in the near future. For the planned multi-material DM experiment EURECA (European Underground Rare Event Calorimeter Array) [@Kraus:2011zz] the neutron-scattering facility will be an important tool to investigate the light quenching of alternative target materials in the future.\ This research was supported by the DFG cluster of excellence: “Origin and Structure of the Universe”, the DFG “Transregio 27: Neutrinos and Beyond”, the “Helmholtz Alliance for Astroparticle Phyiscs”, the “Maier-Leibnitz-Laboratorium” (Garching) and by the BMBF: Project 05A11WOC EURECA-XENON.
{ "pile_set_name": "ArXiv" }
The IL-1 receptor accessory protein is essential for PI 3-kinase recruitment and activation. Interleukin-1 (IL-1) binds to its type I receptors (IL-1R), which in complex with IL-1R accessory protein (IL-1R AcP) induces various intracellular signaling events. We report here that IL-1 triggers the recruitment of phosphoinositide 3-kinase (PI 3-kinase) to a signaling complex and induces its lipid kinase activity in a biphasic manner. This IL-1-induced complex consists of IL-1R, IL-1R AcP, PI 3-kinase, and the IL-1-receptor-associated kinase (IRAK). Deletion of the C-terminus 27 amino acids of IL-1R AcP resulted in a mutant, CDelta27, that could not recruit PI 3-kinase to the signalsome nor stimulate PI3-kinase activity. Moreover, CDelta27 functioned as a dominant-negative mutant that inhibited IL-1-induced PI 3-kinase and NFkappaB activation. CDelta27, however, had no effect on IL-1-dependent activation of the Jun N-terminal kinase (JNK), indicating that distinct regions of IL-1R AcP mediate the activation of PI 3-kinase and JNK. Thus, our results identified a functional region in the IL-1R AcP required for the recruitment and activation of PI 3-kinase.
{ "pile_set_name": "PubMed Abstracts" }
"There are lots of sections that would be flat and good for new riders, and there are some technical and more hilly sections that would be attractive to more experienced riders," she said.
{ "pile_set_name": "OpenWebText2" }
None of Congress president Rahul Gandhi’s recent barbs is as effective as the old ‘suit-boot sarkar’. He should’ve gone back to farmer distress & lack of jobs. Earlier this week, Rahul Gandhi, accompanied by his mother and Manmohan Singh, met the ambassadors of the G20 countries over lunch. The ambassadors cannot be blamed for having expected a formal statement by Mr Gandhi on his approach to foreign policy. All they got was polite chitchat as the Congress president circulated from one table to the next. Waste of time, said one diplomat present. Missed opportunity, said another. If, by general consent, Prime Minister Narendra Modi has regained lost ground since the Bharatiya Janata Party’s poor showing in the state elections of November-December, one reason has to be the failure of the opposition to say what they stand for, even as Modi’s government has ramped up its flow of full-page advertisements listing sundry achievements (the Aam Aadmi Party has been doing the same in Delhi to mark its fourth anniversary in office). Modi has also got away, unchallenged, when he has claimed repeatedly that nothing happened before his government took charge. Indeed, the Congress has been a bystander while the BJP has appropriated Congress stalwarts from the past like Subhas Chandra Bose and Vallabhbhai Patel, even Mahatma Gandhi. What Rahul Gandhi has done so far is to attack Modi on a variety of issues, but his barbs have not been even remotely as effective as the old retort about a “suit-boot sarkar”. The Rafale accusations have been blunted by the report of the Comptroller and Auditor General, which conveniently failed to include in its calculations the cost of the sovereign guarantee foregone. The business of Modi being a chor or thief cuts no ice because (unlike Bofors) there is not even a hint of a money trail. Worse, any fool would know that tackling Modi on a national security platform, in the wake of Pulwama and Balakot, is like playing Rafael Nadal on clay. Wisdom would have suggested getting back as quickly as possible to the farmer distress-lack of jobs platform that had Modi on the defensive. Also read: A national security election gives Rahul Gandhi the perfect excuse to lose The fact is that, for all its failures (for which it got voted out), the Manmohan Singh government had significant achievements to show. In the wake of the BJP campaign that the impossible has been made possible (Namumkin ab mumkin hai), it would have been an obvious gambit for Gandhi to remind voters that the Congress-led United Progressive Alliance delivered in the past, and to assert that it can deliver again. In case he needs reminding, the UPA’s achievements included a dramatic drop in poverty at an unprecedented rate, doubling investment in infrastructure (as a percentage of GDP), new airports in all the major cities, enough power capacity for the first time to put an end to power shortages, a sharp decline in Left-wing extremism by the end of UPA rule and a notably quieter Kashmir, record agricultural growth plus crop diversification, the Aadhaar initiative, empowering citizens through the law on the right to information, the rural employment guarantee programme, giving two million forest-dwellers their land rights under a new law, successfully tackling AIDS, and so on. Would reminding people of these achievements have helped the Congress to rebut that it is not just Modi who delivers? If yes, why is Gandhi as reticent on this as he was at the meeting with G20 ambassadors? Also read: Rahul Gandhi, share your foreign policy ideas beyond closed-door meetings By general consensus, Gandhi has emerged as a more serious politician after his initial, wrong-footed forays. Certainly, it took him a while to get serious about politics (having entered Parliament 15 years ago). For the last six years, he has been either vice-president or president of the Congress. But he has manifestly failed to re-build the party at the grassroots during this period, or throw up new leaders. Still, the Congress has begun to fare better in elections — state as well as by-elections — while the BJP’s record in by-elections is just five of 13 seats that it originally held. But Gandhi looks in danger of frittering away the momentum gifted to him by the government’s mis-steps. That risk is compounded by critical failures in alliance formation, in both Delhi and the all-important Uttar Pradesh. By Special Arrangement with Business Standard. Subscribe to our channels on YouTube & Telegram
{ "pile_set_name": "OpenWebText2" }
Anonymous (ID: hYpqmQGj) O1/19/13(Sat)07:32:25 No.452153060 Replies: >>452153414 >>452153772 >>452154186 >>452157264 >>452157960 >>452161987 >>452162321 >>452162418 >>452162608 >>452163065 >>452163220 >>452163858 What to do /b!? I've been in love with the same girl for basically all my life but the situation is all flicked up now and I don't know how to stop flicking caring about her. Pic related, it's her >Be crushin on same girl for all my life >Knew her since kindergarten >Her parents are poor and live in a one bedroom with four kids so they don't care she sleeps over most nights >Hang out almost everyday for years >All our friends joke about us getting married one day >She knows I'm into her and she says she feels same way but 'doesn't want to label it >Get her to make out but really not much more >Says she likes me too much and is afraid well go all the way if we do anything more >Resigned to being a virgin til I eventually many this girl >Both of us mainly hang out with two other guys (lets call Eric and Dave) >Mainly consists of playing Halo at my house >Sometimes smoke weed when Eric can get it >Talk about parties but never get invited >Eric starts hanging out with his oldfag cousin sometimes >Make fun of him for hanging out with 37 year old >Says cousin buys beer and lets him smoke at his place >wellwhydidnlyousaysointhefirstplace.jpg >Start going to his cousins place to drink and play halo once a week when his wife and kids are gone visiting wife's parents >He buys the beer. has food. videogames, not bad situation >He can have a pretty annoying bossy attitude and thinks hes the king of our weekly hangs but whatever >Start bringing the pseudo-gf to these things >Cousin is always eyeing the fuck out of her but she's used to being the only girl at our hangs so whatever Continued Anonymous (ID: hYpqmQGj) 01/19/13(Sat)07:50:03 No.452154764 Replies: >>452155342 >>452162321 >>452162508 >>452163698 File: 1358599803376.joq-(68 KB. 800x600. For4Chan02.jpg) Sorry I suck at typing. >Even though this cousinfag knows that this girl should be off limits he is always flicking hitting on her >Worst part is she doesn't seem to mind >One day he asks her why it doesn't say I'm her boyfriend on facebook >mfw when she says `Oh he's more like my best friend than anything° >seething anger when he says 'Man you gotta lock that shit down bro. she's banging >Only really see this cousinfag once a week and she still sleeps over all the time so thinking whatever nothing will come of it >I keep telling her he's an asshole >She agrees but tells me 'you know me. I don't even know how to be rude' >Besides not like we can really stop going, ritual is pretty ingrained at this point >Eventually start combining Halo and drinking. halo drinking games >We're retards we didn't think of this sooner >Old cousinfag instates random different rules all the time >House rules he says >Since pseudo-gf doesn't really play, he sometimes has rules involving her >She has to get the beers if theres a multikill, shit like that >One day he proposes she has to sit on lap of the guy who wins for the next game >Randomly this oldfag is the best of us so rule is obviously for him >I start to say. 'Dude I don't think she wants..." >When at the same time she laughs and says 'You boys.... implying okay >Feel like a huge faggot for being too protective, get red and just go with it >She spends the majority of the next couple of hours on his lap >Raging as we go home. get in a fight with her. make up as we always do continued Anonymous (ID: hYpqmQGj) 01/19/13(Sa007:51:26 No.452154902 also harder than i thought for me to relive all this shit so sorry for the slow pace, ill try to be faster Anonymous (ID: hYpqmQGj) 01/19/13(Sat)08:01:19 No.452155892 Replies: >>452156101 >>452156116 >>452156329 >>452156350 >>452156363 >>452156429 >>452162321 >Shit continues like this for the next few times >Mostly lap sitting >Sometimes they get her to do a joke sexy dance >Nothing I can get publically too mad about >My uncle has a wedding on the same day one of these hangs happens >Ask her not to go >She says she probably won't' >Ask her again, basically begging this time >She says she'll try to get out of it but that the guys are pushy and she's bad at saying no >Both true statements. but I get mad at her telling her to have a spine >Get in a fight again >Don't have time to make up before leaving for wedding >ihaveareallybadfeeling.jpg >Fidgeting entire weekend >Text with her on ride back with the parents. she says to call her once I get back, by the tone I know she feels guilty >ohfuck.png >Turns out she had gotten too drunk and they incorporated stripping into the game. cousin. Eric and Dave all saw her completely naked >Whattheflyingfuck.jpg >get in another fight >mfw i realize that they've gotten more sexual pleasure out of her than me at this point >think its basically over. have to find a new social life >she calls me really late and comes over >cries apologizing, says she has a really big problem saying no and will try to fix it >forgive her and go to bed cuddling continued Anonymous (ID: PVdqgKy3) 01/19/13(Sat)08:03:30 No.452156101 >>452155892 also more pics please Anonymous (ID: hYpqmQGj)01/19/13(Sat)08:11:55 No.452156963 Replies: >>452157229 >>452157609 >>452162321 >Really awkward with Eric and Dave the next time I see them >Don't really address it for a while but eventually we have an awkward apology talk since I'm clearly pissed >She stops going to the cousinfags for a while >Eventually starts going again >"to repair all our broken friendships" she says >Things slowly but surely evolve back to where they were >I know I gotta put a stop to this >Realize booze is really the main difference between my place and oldfags >Start taking booze out of parents cabinet when we play halo at my place >Didn't really know what the fuck I was thinking since we still went to cousinfags as much as we used to >Eventually parents find out >My grades also been going down also >Combination gets them megapissed >Pseudo-gf can't sleep over and I can't go out for a week >pseudo-gf and I fight over this can't even remember why the fuck we did >Get text couple of days later from cousinfag telling us he has the place to himself so to come over >n00000000000000000.jpg >Try to sneak out but get caught >Frantically try to call her but she's still pissed, not picking up >Next day still no contact, weekend so don't see her at school >whatthefuckwhatthefuckingfuck.jpg >freak the fuck out, basically having emotional breakdown continued Anonymous (ID: 1n00tOiK) 01/19/13(Sat)08:11:59 No.452156969 Hurry the fuck up op Anonymous (ID: YsFAhA2+) 01/19/13(Sat)08:20:31 No.452157818 >>452157730 I want to believe OP wouldn't do that. Anonymous (ID: hYpqmQGj) 01/19/13(Sat)08:22:01 No.452157949 Replies: >>452158091 >>452158459 >>452158483 >>452158492 >>452158501 >>452158745 >>452162321 File: 1358601721575.joq-(56 KB, 800x598, For4Chan03.jpg) >see her at school when Monday finally fucking comes >she avoids me all day >she leaves before I can track her down afterschool >text her a zillion times, tell her grounding is over and I really want to talk to her, if its over she can at least tell me >find Eric and Dave, too freaked out to be subtle ask them what the fuck happened >really flicking flicking awkward but basically tell me that they played strip halo again >Eric quickly leaves but Dave tells me later that Eric and cousin fag were feeling her up while she was half passed out >says hes sorry and he tried to stop it >have no one else to be mad at so flip out at dave >eventually she texts me back eventually saying 'you're acting like there's something to end' >get this in front of dave and start crying, run away >so flicking embarrassed to even remember this flicking shit >thinking life is over >she comes over that night, no text no call no nothing >is sobbing at the door >don't even know how to be mad at her >I tell her its okay, I heard what happened and I forgive you >she just keeps crying and we go to bed continued Anonymous (ID: qwj4zea5) 01/19/13(Sat)08:22:11 No.452157960 Replies:>>452158646 >>452159762 >>452153060 (OP) I don't doubt OP is beta. but those two can't be the only parameters. I don't want to be either of them. Anonymous (ID: hYpqmQGj) 01/19/13(Sat)08:32:22 No.452158975 Replies: >>452159150 >>452159216 >>452159237 >>452159303 >>452162616 sorry I'm so slow. recanting is really affecting me >middle of the night, she randomly says 1 love you' >unexpectedbestmomentomylifejpg >don't even hesitate. say 1 love you to& >1-no matter what'?" she says >I say of course >asking no matter what continues for a while >eventually get bad feeling >she tells me that she had no where to go once my parents didn't let me have her over >that she hated staying at her house and how I knew how much she hated her parents >eventually admits she was telling oldfag this by text on her way home Friday night (when stripping happened) >he tells her his house is free until Monday, invites her to stay over >I am shaking while she tells me this >The way she was acting all clicks and makes sense in my mind >Never had a moment of clarity like this >I don't even have to ask but I do >She tells me they went all the way >Not even sure why I asked the details but I had to >how many times? >she says I don't know a billion times and then settles down on five >did you enjoy it? >she says no but I press her and she says she orgasmed >what positions? >missionary and doggy >condom? >pause, no >we're both crying this entire time >still in state of shock in the morning, get morning after pill though at least continued Anonymous (ID: hYpqmQGj) 01/19/13(Sat)08:46:24 No.452160373 Replies: >>452160525 >>452160559 >>452160612 >>452160617 >>452160628 >>452160654 >>452160657 >>452160685 >>452160689 >>452160701 >>452160703 >>452160713 >>452160718 >>452160721 >>452160779 >>452160801 >>452160890 >>452160943 >>452160950 >>452161031 >>452161065 >>452161086 >>452161274 >>452161301 >>452161327 >>452161384 >>452161465 >>452161486 >>452161770 >>452162138 >>452162321 >>452162589 >>452162670 >>452162862 >>452162975 >>452163457 >>452163786 >We're still really weird the next few days but I'm still oddly positive >She says I love you all the time from never saying it at all >actually go facebook official >everyone at school has heard about what happened but I don't give a shit >hold hands everywhere. we tell each other as long as we have each other it'll be okay >Finally catch up to yesterday >Get a text from oldfag saying to come over >Almost laugh that he thinks we're still going >After school look for real-gf now >see her with Eric and Dave >Still pissed at Eric, so already in bad mood >MFW They say they are on way over to cousinfags >I don't even know what to say >I say I'm not going >when it's clear they are going to go with or without me I go with them >just play halo and drink for a while >so mad but don't even know what to do >sense of awkwardness is even worse >feel like I'm not even in the room >try to get her to go home multiple times, eric and cousin convince her to stay >she's on my lap the entire time with my arms around her >end up watching Prometheus >dave has gone home at this point >make the mistake of getting up to get a beer >when I'm back she's on oldfags lap >I ask her if she's okay >she says yes >halfway through oldfag and her start kissing >eric goes 'dude chill our >mfw when she says, 'don't worry he knows' >I tell her that I'm leaving >She says she's going to stay This was last night and I haven't talked to her since
{ "pile_set_name": "OpenWebText2" }
Genetic amyloidosis: recent advances. The hereditary amyloidoses are usually associated with peripheral neuropathy and, for this reason, they have been called familial amyloidotic polyneuropathy (FAP). The neuropathy usually involves both the peripheral sensory motor and autonomic nervous systems, resulting in not only loss of sensation and motor function but also bowel dysfunction and orthostatic hypotension. In addition, most of the FAP syndromes involve other organ systems, in particular the renal and cardiac systems. Renal amyloidosis usually presents as nephrotic syndrome and later terminates in azotemia. Cardiac amyloidosis may present as congestive heart failure or arrhythmia. Whereas the neuropathy of hereditary amyloidosis may be the most prominent clinical feature, it is renal or cardiac disease that often dictates the length of survival.
{ "pile_set_name": "PubMed Abstracts" }
ATL and MFC changes and fixes in Visual Studio 2013 August 20th, 2013 Hello, I’m Pat Brenner, a developer on the Visual C++ Libraries team. In this blog post I would like to share with you the changes that we’ve made in ATL and MFC for Visual Studio 2013. One of the major changes we made was to eliminate the ATL DLL altogether. All ATL code is now static, either in the header files or in the ATL static library. We also reduced the amount of code in the ATL static library substantially, so there are no longer multiple static libraries for debug/release mode or Unicode/ANSI character set. There is only one ATL static library that is common to all configurations. The changes to ATL also included the elimination of the ATL/MFC Trace Tool and the simplification of the tracing mechanism. The TRACE macros now essentially boil down to OutputDebugString, and there is no external controller of tracing level (like the trace tool provided)—the tracing level is set in the application itself. This does cause source-breaking changes in some uses of the ATL::CTraceCategory class, which will require changes in source code when migrating to Visual Studio 2013. The major change we made in MFC was the deprecation of MBCS support (see more information in this separate blog post). In addition, we fixed about 105 bugs in MFC and about 60 bugs in ATL. About one-fourth of these bugs (in both libraries) were reported by customers. Though I cannot provide a complete list of the bugs in our internal bug database, here is a list of the bugs that were reported by customers through our Connect site that have been fixed in ATL and MFC for Visual Studio 2013 RTM. Click on any Connect bug number to see more information about that bug. Note that most of these bugs were fixed for the Preview release as well. Connect # Bug Title 710163 atlbase.h disables no longer existing C4217 warning 714790 Useless line of code in AtlSafeRealloc() 714791 AtlSafeRealloc() treats failures inconsistently and this leads to memory leaks 714840 CAtlServiceModuleT::LogEventEx() contains a useless check 714802 Suspicious error handling code in CAtlExeModuleT::StartMonitor() 742895 CComApartment::Apartment() leaks objects on edge cases 736213 ATL::CComSafeArray::operator[] ambiguity 764800 wrong/missing sal annotations on consumer oledb macros 750369 Breaking change in how the ATL OLE DB CCommand::Execute method behaves 774871 Certification fails for Windows Store App with ATL-based library 785396 Uninstalling VS2012 Update 2 and repair of VS results in ATL files missing. 789669 ATL CRBMap::Lookup code analysis markup issue 790309 VC++11 regression: error C2338: db_command using v110 toolset 745790 Static MFC executables produced by Visual Studio 2012 RC are huge 750838 MFC loads DLLs using LoadLibraryEx with flag only supported on Windows8 757588 CMFCRibbonBar::AddToTabs removes a wrong button from the m_arButtons array 763947 EndDialog in OnInitDialog reopen Dialog 763517 IMPLEMENT_DYNAMIC produces compile error for statically linked MFC projects 768378 CMFCTabCtrl bug 769093 MFC Edit Browse box not showing browse button. 772859 Calling EndDialog() within OnInitDialog() causes the dialog to be displayed twice. 750859 Visual Studio 11 Beta – bug running .exe in XP service pack 3 763474 Errors detected in the Visual C++ 2012 libraries 760371 LocalFree called twice in CDatabase (MFC 11) 710858 MFC OLE-Server doesn’t seem to support the new style MFC Toolbars 773463 Attempting to use DrawStatusText after including afxwin.h results in link error 768257 Probems with CRecordset::GetFieldValue(short nIndex, CDBVariant& varValue) in VS2012 772549 x64 MFC Macro Bug – ON_WM_POWERBROADCAST() / CWnd::OnPowerBroadcast 773448 CHttpFile::QueryInfo() returns “corrupted” CStrings with invalid lengths. 778201 Missing MFC Functions 777604 CWnd::GetScrollLimit returns 1 if scrolling is deactivated 781179 CMFCPopupMenu crash when you click outside while submenu still open 781379 CMFCShellTreeCtrl fails to handle some UNC pathnames correctly 781257 MFC – CMFCTabCtrl – when style is STYLE_3D_VS2005 and SetActiveTabBoldFont() is set 789970 Unpaired pragma warning push/pop in afxwin.h in Release build 790246 MFC: bad hard typecast in CMFCToolBarMenuButton::CompareWith 790975 HTTP_QUERY_FLAG_REQUEST_HEADERS on CHttpFile::QueryInfo() asserts wrongly 792003 CMFCShellListCtrl::OnContextMenu ‘Delete’ context menu handler does not work I hope you find this information useful. Please let us know if you have any questions. Pat Brenner, Visual C++ Libraries Development Team
{ "pile_set_name": "OpenWebText2" }
Friday, September 05, 2008 Get Gamm - Week Two Hard to believe it's almost Saturday. Told you I've been busy. I've had football thoughts swirling my head all week but no time to share! Predictably, last week was a pretty even week for picking the games. Dan was closest on the Mizzou - Illinois tiebreaker and holds the lead. If I can catch my breath, Dan and this week's winner will spilt the games next week and predict on the blog. For now, here are the games and my quick thoughts as well as the predictions from BigTen.org. Picks are due by kick of the first game. Eastern Illinois at Illinois - The Illini offense was on full display last week, especially through the air. Problem is, the defense was more full of holes than Swiss cheese! Redemption this week, albeit against a far inferior foe. Illinois 45 - EIU 17 Murray State at Indiana - Indiana never really put Western Kentucky away last week but it wasn't Kellen Lewis' fault. He was almost as amazing as Juice Williams. Indiana needs to find a runner other than Lewis, games like this help. Indiana 38 - Murray State 7 Miami-OH at Michigan - The Red Hawks might be just what the doctor ordered for Michigan. The Wolverines struggled offensively against Utah and the defense didn't come to play until the second half. This should be a much easier game for RichRod and the maize and blue, but we'll see if the improvements are enough to satisfy expectant Michigan fans. Michigan 31 - Miami-OH 9 Eastern Michigan at Michigan State - Eastern Michigan is an improved football team. Michigan State is young and coming off its seventh loss in two seasons of 7 points or less. Are the Spartans mature enough to jam the throttle to the floor and not let up? Look for much more out of the ground game from Ringer and company and while EMU might hang for a half, they'll wear down late. Michigan State 40 - Eastern Michigan 16. Minnesota at Bowling Green - Okay, I picked this one before the season and after BGSU's beating of Pitt, at Pitt last week, and the Gophers' struggle with middle-tier MAC squad Northern Illinois, I feel even more confident. Minnesota is getting better, and is gutsy to hit the road, but they'll wish they hadn't with this one. Bowling Green makes it 2-fer over BCS foes. BGSU 30 - Minnesota 23. Northwestern at Duke - Ah the battle of the intellectuals! A horrid Duke team beat NU in Evanston last season, with Hurricane Hanna approaching, and conditions looking to be dismal, can they do the same? Paybacks are hell. Northwestern 27 - Duke 17. Ohio at Ohio State - Chump two in the warm-up campaign for the trek to Southern Cal. Ohio State looked awfully good last week but will see how it can run without Beanie Wells. Look for Pryor to get more time and for the Bucks to roll. Ohio State 41 - Ohio 10. Oregon State at Penn State - Perhaps the only decent match-up on the slate. Penn State suspended three for this game but the Beavers come cross-country after a rough loss to Stanford last week. It'll be a game most of the way, but Penn State is too good to lose this one at Beaver Stadium. Penn State 33 - Oregon State 17. Northern Colorado at Purdue - The Boilers got their bye in week one and have to be chomping at the bit to hit someone else. Painter should have a field day. Purdue rolls. Purdue 48 - Northern Colorado 14. Marshall at Wisconsin - Not a bad test for the home field dominant Badgers but not a test a la Michigan/Utah, Illinois/Missouri or Michigan State/Cal either. Step up from the Zips who played UW tough. Wisconsin 35 - Marshall 17. AHHHHHHH, I missed week one of Get Gamm! I was in Boston last week and didn't get to watch a single game, so I am more egar then anyone for this weekends games. The Big Ten goes undefeated at home and 1-1 on the road this weekend: TheFinalScore The Final Score blog is my personal podium for Big Ten football and basketball. From previews to predictions, insights & opinions on games, teams, players and coaches, TheFinalScore is your source for Big Ten sports.
{ "pile_set_name": "Pile-CC" }
Castelmaurou Castelmaurou is a commune in the Haute-Garonne department in southwestern France. Population See also Communes of the Haute-Garonne department References INSEE Category:Communes of Haute-Garonne
{ "pile_set_name": "Wikipedia (en)" }
Thursday, September 24, 2009 Have you ever seen someone get excited about accounting software? Yes, I mean the kind of software for which you used to need a diploma in number-crunching and a PhD in bean-counting in order to be able to use it. This is not one of those product reviews where someone spends an hour testing five different applications and writes a roundup afterwards. No, this guy has spent a year working with FreeAgent, so his opinion is extremely well-founded. The article gives a good overview of what FreeAgent is all about and why it’s so much better than Sage (which is or at least used to be the de-facto standard accounting software in the UK). I urge you to read the full article, but if you want the conclusion only, here you go: FreeAgent ranks in my top couple of web applications of any sort. As an extremely busy person, I confess to almost enjoying doing the accounts now! It’s rare that I feel able to recommend a product unreservedly: this is one of those occasions. FreeAgent starts at £15 per month for a sole trader and, given the range of features and ease of use, could easily become your most important application for administering your business. Congrats to Ed, Olly and Roan at FreeAgent Central for building such an outstanding product – and for managing to turn an extremely unsexy product category into something which people get excited about!
{ "pile_set_name": "Pile-CC" }
--- author: - 'Z. Shah' - 'N. Mankuzhiyil' - 'A. Sinha' - 'R. Misra' - 'S. Sahayanathan' - 'N. Iqbal' bibliography: - 'ms89.bib' title: 'Log-normal flux distribution of bright *Fermi* blazars' --- Introduction ============ Blazars are subclass of Active Galactic Nuclei (AGNs) with their relativistic jets pointing towards line of sight of the observer [@Blandford1979]. Even though the mechanism behind the formation of relativistic jets is not fully understood yet, it is most likely related to the focusing properties of the fully ionized, rotating accretion disk [@Blandford1977]. Blazars include BL Lac objects and Flat-Spectrum Radio Quasars (FSRQs), where the significant difference between the two classes being their optical emission/absorption lines, which are strong for FSRQs, while weak or absent for BL Lacs [@Urry1995]. The spectral energy distribution (SED) of blazars consists of two broad emission components, where the low energy component peaks at optical to X-ray band, while the high energy component peaks at MeV to TeV band. BLLac objects are further subdivided based on the peak frequency ($\nu_s$) of their low energy component namely, high energy peaked BLLac (HBL; $\nu_s > 10^{15.3}$ Hz), intermediate energy peaked BLLac (IBL; $10^{14}<\nu_s\leq10^{15.3}$ Hz), and low energy peaked BLLac (LBL; $\rm \nu_s\leq10^{14}$ Hz) [@Fan2016] . In case of FSRQs, $\nu_s$ usually falls at relatively lower frequencies ($\lesssim10^{14}$ Hz). The low energy component of the blazar SED is commonly attributed to the synchrotron emission due to the interaction of relativistic electrons in the jet magnetic field; whereas the high energy component is explained as inverse Compton (IC) scattering process. If the target low energy photons for the IC process is the synchrotron photon itself then the IC mechanism is called Synchrotron Self Compton (SSC; @Marscher1985 [@Band1985]). On the other hand, if the photon origin is external to the jet, e.g. broad line region (BLR), obscuring torus, Cosmic Microwave Background (CMB) etc., then the process is called external Compton (EC) mechanism [@Dermer1992; @Sikora1994; @Shah2017]). Alternate to this leptonic interpretation of the high energy emission, hadronic models involving nuclear cascades were also put forth and are successful in explaining many observed features of blazars [@Mannheim1992; @Bottcher2007]. One of the distinct property of blazars is their rapid flux and spectral variability across the entire electromagnetic spectrum on time scales ranging from minutes to years. Though the cause of variability is still not well understood, plausible clues can be obtained by studying the long term flux distribution of blazars. Such studies have been performed in detail at X-ray energies for Seyfert galaxies and X-ray binaries, where the emission at these energies is dominated by the accretion disk or its corona. The X-ray flux of Seyfert1 IRAS13224-3809 using ASCA observations in different epochs, exhibit a log-normal distribution [@Gaskell2004]. In another study, [@Uttley2005] found that the X-ray flux of Seyfert1 NGC4051 also shows a log-normal distribution, which was comparable to the X-ray flux of the black-hole X-ray binary CygX-1. Linear relationship between the optical flux and the corresponding variation were noticed in Seyfert1 NGC4151 [@Lyutyi1987], which in turn is an indication of log-normality of flux distribution. A similar relationship was also noticed in X-ray band in both Seyfert1 Mrk766 [@Vaughan2003a], and Seyfert2 MCG6-30-15 [@Vaughan2003b]. The log-normality of flux distribution in a blazar was first detected in BL Lacertae, from the RXTE observations [@Giebels2009]. This result is particularly interesting since for blazars, X-ray emission originate from jets rather than the accretion disk or its environment. Hence, this result may hint the plausible disk-jet connection in blazars, which is still not clearly understood. The log-normality was later observed in many blazars at different energies. For instance, such behavior was inferred in Mrk421 and Mrk501 at Very High Energy (VHE $>$100GeV) band, though the data was noncontinuous [@Tluczykont2010]. Similarly, the 4-year flux distribution of blazars given in the third Fermi-LAT catalog of AGNs (3LAC; [@fermi3agn]), showed a log-normal behaviour. While quantifying the flux variability in Mrk421, [@Sinha2016] also noticed a log-normal flux distribution (more than normal) trend, through out the frequencies from radio to VHE. On the contrary, a detailed multi-wavelength study of FSRQ PKS1510-089, [@Kushwaha2016] found that the flux distribution follow two distinctive log-normal profiles in both optical and $\gamma$-rays, while X-ray flux distribution follow a single log-normal distribution. Interestingly, the $\gamma$-ray flux distribution of the same source, obtained from a near continuous data during August2008-October2015, was well fitted by a log-normal distribution and similar was the case of HBL Mrk421 and FSRQs B21520+31. On the other hand, the $\gamma$-ray flux distribution of FRI radio galaxy NGC1275 was not able to be represented by a log-normal or normal function, even though the rms increases linearly with flux [@Kushwaha2017]. In this work, we aim to study the flux distribution properties of the brightest Fermi blazars using the data collected in more than 8 years. We also investigate the associated spectral properties of these brightest blazars. Further, we examine the above properties in order to associate the unclassified blazar types (BCUs) with the known blazar classes. We select bright blazars from the 3LAC, and analyze the data (described in Sect.2). In order to overcome the effect of short-term flux variations, which are most likely associated with the change in the emission region geometry, we consider the flux in monthly bins for our study. After analyzing the features of the flux distribution, and verifying the log-normality (Sect.3), we study the association of flux distribution with spectral properties (Sect.4). The results and possible implications are discussed in Sect.5. *Fermi*-LAT analysis ==================== The Large Area Telescope (LAT) on board *Fermi* satellite is a pair conversion detector [@Atwood2009] with an effective area $\sim 8000 \,\rm cm^2/GeV$ photon, and field of view $\sim 2.4 $sr, in the energy range from 20MeV to more than 300GeV, which scans entire sky in every 3 hours. We made a primary selection of 25 FSRQs and 25 BLLacs from the four year NASA’S Fermi 3LAC interactive table [^1]. The selection was based on the criteria such that the chosen FSRQs and BLLacs should have monthly averaged photon flux $\rm > 6.5\times 10^{-9}\,photons\,cm^{-2} s^{-1}$ and $\rm > 5.5\times 10^{-9}\,photons\,cm^{-2} s^{-1}$ respectively, and the number of upper limits (i.e, non detections) should be less than or equal to 4. We have then downloaded the first 8.4 years of data ( from 2008 August to 2016 December) for the selected sources. The data were analyzed in the energy range from 100MeV to 500GeV, in a region of interest (ROI) of $10^o$ centering the nominal source positions. The analysis was carried out using the maximum likelihood method (*gtlike*) and standard *Fermi* [SCIENCE TOOLS]{} (version v9r12) with the instrument response function [‘$\rm P8R2\_SOURCE\_V6$’]{}, Galactic diffuse model [‘$\rm gll\_iem\_v06.fit$’]{} and isotropic background model [‘$\rm iso\_p8R2\_SOURCE\_V6\_v06.txt$’]{}. Events which were contaminated by the bright Earths limb were excluded using zenith angle cut of $90^o$. Further the time bins with $TS < 9$ were excluded, which correspond to a detection significance of $\sqrt{TS}\approx 3\sigma$ We estimated monthly photon flux, energy flux, and spectral index for all the sources using the maximum likelihood analysis. Flux distribution ================= The monthly average $\gamma$-ray flux obtained in the analysis of $\sim$ 100 months of data were distributed to a histogram of fluxes, for each source. An adaptive binning was used for each source to ensure the bin width is larger than the average error of the flux within a bin. Apart from the flux that corresponds to a TS value $TS\leq9$, we have also excluded the flux with larger uncertainty, such that F/$\delta$F$<$2. In order to avoid the bias due to a possible lack of lower luminosity flux states, we restrict our focus only on the blazars, for which the total excluded flux points (after the cuts mentioned above) are less than 10$\%$. After this cut, 38 (out of 50) blazars survived, which include 19 BLLacs and 19 FSRQs. We fit all 38 flux histograms in log-scale, with functions $$\rm{L(x)}=\frac{1}{\sqrt{2\pi}\sigma}\exp^{\frac{-(x-\mu)^2}{2\sigma^2}} \,\,\,\, [\rm{log-normal\,distribution}]$$ and $$\rm{G(X)}=\frac{1}{\sqrt{2\pi}\sigma}\exp^{\frac{(10^x-\mu)^2}{2\sigma^2}}10^x\,log_e(10)\,\,\,\, [\rm{normal\,distribution}]$$ where $\sigma$ and $\mu$ are the standard deviation and mean of the distribution, respectively. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ![Flux distribution of bright blazars in $\gamma$-ray band. The blue and red lines correspond to log-normal and normal fit respectively.[]{data-label="fig:blazar"}](ms89fig1_1.eps "fig:"){width="85.00000%"} ![Flux distribution of bright blazars in $\gamma$-ray band. The blue and red lines correspond to log-normal and normal fit respectively.[]{data-label="fig:blazar"}](ms89fig1_2.eps "fig:"){width="85.00000%"} ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------- ![(Continued)[]{data-label="fig:blazar"}](ms89fig1_3.eps "fig:"){width="85.00000%"} ![(Continued)[]{data-label="fig:blazar"}](ms89fig1_4.eps "fig:"){width="85.00000%"} ------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------- ![(Continued)[]{data-label="fig:blazar"}](ms89fig1_5.eps "fig:"){width="85.00000%"} ![(Continued)[]{data-label="fig:blazar"}](ms89fig1_6.eps "fig:"){width="85.00000%"} ------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------- ![(Continued)[]{data-label="fig:blazar"}](ms89fig1_7.eps "fig:"){width="85.00000%"} ------------------------------------------------------------------------------------- The flux histograms of the blazars are plotted in log-scale in Fig.\[fig:blazar\]. The normal and log-normal fits are shown as red and blue lines respectively. Fig.\[fig:skw\_skw\] (left panel) shows the comparison between the reduced $\chi^2$ obtained from normal and log-normal distributions. The fit parameters together with the computed skewness for both distributions are shown in Table\[table:blac\]. The flux distributions are found to be significantly skewed, whereas the skewness of the log of flux distribution is consistent with zero, thus suggesting log-normal trend (Fig.\[fig:skw\_skw\], right panel). Apart from calculating the reduced $\chi^2$, we have also performed Anderson-Darling (AD) test, in order to verify the normality/log-normality of the fits. The reduced $\chi^2$ of the fit, together with the AD test statistics and rejection/null hypothesis probability (p-value) are also shown in the Table\[table:blac\] . We note that the reduced $\chi^2$ for the normal flux distribution of some of the blazars fall in a reasonable range. However, the p-value estimated from the AD test rejects the normal distribution ($\rm p < 0.05$) for all sources, except for the FSRQ J0957.6+5523 (with a high reduced $\chi^2$ in this case). On the other hand, the AD test p-value, and the reduced $\chi^2$ of the flux distribution of J0957.6+5523 do not reject the log-normal distribution of flux either. It is interesting to note that the $\chi^2$ and AD tests do not reject the log-normality of the flux distribution of most of the blazars. Nevertheless, both tests reject the log-normality of the flux distribution of FSRQs J2329.3-4955, J1504.4+1029 and J1625.7-2527. Even though the AD tests marginally (eg: J1427.9-4206), and completely (J1512.8-0906) reject the log-normal fits of a few blazar flux distributions, the corresponding $\chi^2$ values are reasonable enough not to reject the log-normality. The standard deviation obtained from the log-normal fits, which is a measure of flux variability, is comparatively high for FSRQs. In the case of BL Lacs, HBLs show a lower variability, while the variability of LBLs are similar to that of FSRQs. The variability of IBLs roughly fall in between HBLs and LBLs. The mean values of the standard deviation obtained from the log-normal fit of the considered FSRQs, HBLs, IBLs and LBLs are 0.41$\pm$0.11, 0.21$\pm$0.04, 0.27$\pm$0.03, and 0.37$\pm$0.10 respectively. We have also noticed that the standard deviation of the flux distribution of J0957.6+5523 is significantly smaller compared to other FSRQs, and could be treated as a *steady FSRQ*. [@ l c c c c c c c c c c c c]{} & & & & & FSRQ & & & & & &\ Blazar & &&\ Name & width & centroid & skewness($\rm \kappa$) & $\chi^2/dof$ & AD (prob) && width$^*$ & centroid$^*$ & skewness$^*$ & $\chi^2/dof$ & AD (prob)\ J0457.0-2324 & 0.26$\pm$0.03 & -3.96$\pm$0.04 & -0.52$\pm$0.40 & 2.21 & 0.64 (0.09) && 8.33$\pm$1.40 & 11.1$\pm$1.60 & 0.71$\pm$0.40 & 1.12 & 1.50 (6.7e-04)\ J0730.2-1141 & 0.30$\pm$0.02 & -4.17$\pm$0.02 & -0.08$\pm$0.39 & 0.42 & 0.37 (0.41) && 6.39$\pm$1.17 & 6.71$\pm$2.01 & 1.40$\pm$0.39 & 2.88 & 3.32 (2.3e-08)\ J0957.6+5523 & 0.12$\pm$0.01 & -4.24$\pm$0.01 & -0.14$\pm$0.39 & 0.53 & 0.22 (0.84) && 1.54$\pm$0.21 & 5.85$\pm$0.28 & 0.62$\pm$0.39 & 2.89 & 0.69 (0.07122)\ J1127.0-1857 & 0.45$\pm$0.04 & -4.49$\pm$0.06 & 0.33$\pm$0.39 & 0.67 & 0.72 (0.06) && 6.48$\pm$2.04 & 3.17$\pm$3.18 & 1.83$\pm$0.39 & 7.38 & 6.40 (7.7e-16)\ J1224.9+2122 & 0.57$\pm$0.02 & -4.17$\pm$0.03 & 0.17$\pm$0.39 & 0.16 & 0.33 (0.51) && 23.8$\pm$8.34 & 8.26$\pm$17.6 & 3.41$\pm$0.39 & 11.7 & 10.97 ($<$2.2e-16)\ J1246.7-2547 & 0.30$\pm$0.03 & -4.45$\pm$0.04 & 0.31$\pm$0.39 & 0.93 & 0.72 (0.06) && 3.79$\pm$1.08 & 3.25$\pm$1.50 & 1.34$\pm$0.39 & 5.21 & 5.44 (1.6e-13)\ J1427.9-4206 & 0.33$\pm$0.02 & -3.75$\pm$0.03 & -0.88$\pm$0.40 & 0.75 & 1.02 (0.01) && 15.2$\pm$3.28 & 19.6$\pm$5.39 & 1.78$\pm$0.40 & 1.73 & 4.61 (1.6e-11)\ J1512.8-0906 & 0.37$\pm$0.04 & -3.73$\pm$0.05 & -0.80$\pm$0.38 & 0.71 & 2.44 (3.2e-06) && 15.7$\pm$4.52 & 17.6$\pm$6.85 & 2.27$\pm$0.38 & 5.26 & 10.36 ($<$2.2e-16)\ J0237.9+2848 & 0.33$\pm$0.02 & -4.43$\pm$0.02 & 0.59$\pm$0.39 & 0.36 & 0.71 (0.06) && 3.04$\pm$0.77 & 3.78$\pm$1.22 & 3.39$\pm$0.39 & 3.11 & 5.44 (1.6e-13)\ J2254.0+1608 & 0.60$\pm$0.10 & -3.37$\pm$0.12 & -0.57$\pm$0.60 & 1.44 & 0.83 (0.03) && 78.7$\pm$47.1 & 66.4$\pm$96.9 & 2.42$\pm$0.60 & 2.92 & 4.65 (9.7e-12)\ J1522.1+3144 & 0.27$\pm$0.02 & -4.07$\pm$0.02 & -1.02$\pm$0.39 & 0.84 & 0.62 (0.10) && 5.58$\pm$0.65 & 9.13$\pm$0.96 & 1.29$\pm$0.39 & 0.90 & 2.11 (2.1e-05)\ J1635.2+3809 & 0.38$\pm$0.03 & -4.14$\pm$0.03 & 0.27$\pm$0.39 & 0.72 & 0.76 (0.05) && 11.1$\pm$3.45 & 6.49$\pm$5.65 & 1.71$\pm$0.39 & 7.54 & 6.78 ($<$2.2e-16)\ J2329.3-4955 & 0.54$\pm$0.10 & -3.97$\pm$0.14 & -0.24$\pm$0.39 & 3.88 & 1.09 (0.01) && 21.7$\pm$6.67 & 15.6$\pm$12.9 & 1.90$\pm$0.39 & 6.33 & 4.16 (2.0e-10)\ J2345.2-1554 & 0.51$\pm$0.03 & -4.10$\pm$0.04 & -0.29$\pm$0.40 & 0.56 & 0.22 (0.84) && 14.5$\pm$5.63 & 10.7$\pm$9.85 & 2.09$\pm$0.40 & 5.70 & 6.66 ($<$2.2e-16)\ J0808.2-0751 & 0.45$\pm$0.05 & -4.53$\pm$0.06 & 0.51$\pm$0.41 & 0.77 & 0.65 (0.09) && 2.72$\pm$0.78 & 2.71$\pm$1.25 & 2.75$\pm$0.41 & 4.42 & 8.46 ($<$2.2e-16)\ J1229.1+0202 & 0.34$\pm$0.04 & -4.28$\pm$0.04 & 0.57$\pm$0.38 & 1.48 & 0.70 (0.06) && 3.89$\pm$1.25 & 5.29$\pm$1.93 & 3.50$\pm$0.38 & 3.12 & 12.89 ($<$2.2e-16)\ J1256.1-0547 & 0.34$\pm$0.02 & -3.94$\pm$0.02 & 0.29$\pm$0.37 & 0.38 & 0.27 (0.68) && 9.92$\pm$2.83 & 11.9$\pm$4.16 & 3.86$\pm$0.37 & 3.01 & 8.63 ($<$2.2e-16)\ J1504.4+1029 & 0.63$\pm$0.10 & -4.38$\pm$0.15 & 0.14$\pm$0.38 & 2.22 & 0.98 (0.01) && 17.9$\pm$7.48 & 5.29$\pm$11.4 & 1.84$\pm$0.38 & 11.7 & 8.54 ($<$2.2e-16)\ J1625.7-2527 & 0.30$\pm$0.04 & -4.28$\pm$0.05 & 0.47$\pm$0.45 & 2.12 & 1.11 (0.01) && 5.96$\pm$1.88 & 4.64$\pm$2.98 & 1.94$\pm$0.45 & 5.71 & 6.87 ($<$2.2e-16)\ & & & & & BL Lac & & & & & &\ J0222.6+4301 & 0.23$\pm$0.02 & -4.04$\pm$0.02 & 0.45$\pm$0.38 & 0.50 & 0.44 (0.28) && 5.23$\pm$1.07 & 8.88$\pm$1.42 & 2.35$\pm$0.38 & 2.30 & 3.55 (6.1e-09)\ J0238.6+1636 & 0.56$\pm$0.06 & -4.42$\pm$0.08 & 0.30$\pm$0.42 & 0.67 & 0.85 (0.03) && 5.19$\pm$2.04 & 3.57$\pm$2.97 & 2.98$\pm$0.42 & 6.97 & 7.70 ($<$2.2e-16)\ J0428.6-3756 & 0.33$\pm$0.03 & -3.95$\pm$0.04 & -0.90$\pm$0.38 & 1.84 & 11.45 (0.01) && 9.75$\pm$2.14 & 11.5$\pm$2.83 & 1.03$\pm$0.38 & 1.47 & 2.15 (1.7e-05)\ J0538.8-4405 & 0.45$\pm$0.06 & -3.48$\pm$0.08 & 0.42$\pm$0.38 & 1.30 & 1.02 (0.01) && 73.1$\pm$27.3 & 30.5$\pm$40.2 & 2.25$\pm$0.38 & 10.5 & 8.04 ($<$2.2e-16)\ J0721.9+7120 & 0.31$\pm$0.02 & -3.96$\pm$0.03 & -0.37$\pm$0.38 & 1.05 & 0.66 (0.08) && 9.66$\pm$1.75 & 11.1$\pm$2.56 & 1.03$\pm$0.38 & 1.94 & 2.25 (9.7e-06)\ J1104.4+3812 & 0.21$\pm$0.02 & -3.39$\pm$0.02 & -0.42$\pm$0.38 & 0.91 & 0.48 (0.22) && 23.0$\pm$1.89 & 45.1$\pm$3.15 & 1.67$\pm$0.38 & 0.92 & 2.67 (8.9e-07)\ J1427.0+2347 & 0.14$\pm$0.01 & -4.00$\pm$0.01 & -0.02$\pm$0.38 & 0.20 & 0.34 (0.50) && 3.74$\pm$0.56 & 9.92$\pm$0.68 & 0.61$\pm$0.38 & 1.78 & 1.13 (0.01)\ J1555.7+1111 & 0.17$\pm$0.01 & -3.84$\pm$0.01 & -0.04$\pm$0.38 & 0.22 & 0.5124 (0.19) && 6.88$\pm$0.78 & 14.6$\pm$0.97 & 1.00$\pm$0.38 & 1.04 & 2.12 (2.1e-05)\ J2158.8-3013 & 0.18$\pm$0.01 & -3.38$\pm$0.02 & 0.25$\pm$0.38 & 0.75 & 0.1918 (0.89) && 19.1$\pm$2.52 & 42.2$\pm$2.75 & 2.17$\pm$0.38 & 0.86 & 2.68 (8.4e-07)\ J0112.1+2245 & 0.31$\pm$0.01 & -4.42$\pm$0.01 & -0.05$\pm$0.38 & 0.13 & 0.14 (0.97) && 4.06$\pm$0.76 & 3.50$\pm$1.31 & 1.70$\pm$0.38 & 3.19 & 4.21 (9.2e-11)\ J0449.4-4350 & 0.23$\pm$0.02 & -4.02$\pm$0.03 & -0.44$\pm$0.38 & 1.57 & 0.51 (0.20) && 6.35$\pm$0.80 & 9.55$\pm$0.93 & 0.75$\pm$0.38 & 0.89 & 1.11 (0.01)\ J0509.4+0541 & 0.25$\pm$0.02 & -4.36$\pm$0.02 & 0.14$\pm$0.39 & 0.69 & 0.19 (0.89) && 3.63$\pm$0.95 & 3.65$\pm$1.27 & 1.53$\pm$0.39 & 4.44 & 3.02 (1.2e-07)\ J0818.2+4223 & 0.20$\pm$0.01 & -4.52$\pm$0.02 & -0.12$\pm$0.38 & 0.95 & 0.26 (0.72) && 1.61$\pm$0.16 & 3.02$\pm$0.18 & 0.91$\pm$0.38 & 0.72 & 2.05 (3.0e-05)\ J1015.0+4925 & 0.22$\pm$0.01 & -4.09$\pm$0.01 & 0.26$\pm$0.38 & 0.34 & 0.31 (0.56) && 4.45$\pm$0.66 & 8.11$\pm$0.97 & 2.80$\pm$0.38 & 1.36 & 3.94 (7.1e-10)\ J1058.5+0133 & 0.25$\pm$0.03 & -4.43$\pm$0.04 & -0.31$\pm$0.39 & 1.24 & 0.45 (0.27) && 2.70$\pm$0.43 & 3.83$\pm$0.41 & 0.82$\pm$0.39 & 1.09 & 2.67 (8.6e-07)\ J1653.9+3945 & 0.28$\pm$0.02 & -2.88$\pm$0.03 & -0.48$\pm$0.38 & 0.98 & 0.63 (0.10) && 9.33$\pm$1.22 & 13.6$\pm$1.58 & 0.86$\pm$0.38 & 1.06 & 1.30 (2.1e-3)\ J2202.7+4217 & 0.35$\pm$0.03 & -4.02$\pm$0.04 & -0.14$\pm$0.38 & 0.81 & 0.74 (0.05) && 11.6$\pm$3.02 & 9.69$\pm$4.56 & 1.09$\pm$0.38 & 4.85 & 2.82 (3.8e-07)\ J2236.5-1432 & 0.41$\pm$0.03 & -4.51$\pm$0.04 & 0.54$\pm$0.42 & 0.68 & 0.63 (0.10) && 7.91$\pm$2.48 & 2.23$\pm$4.92 & 3.63$\pm$0.42 & 8.65 & 12.24 ($<$2.2e-16)\ J0521.7+2113 & 0.28$\pm$0.02 & -4.05$\pm$0.02 & 0.45$\pm$0.46 & 0.34 & 0.38 (0.39) && 6.06$\pm$1.26 & 8.30$\pm$1.66 & 2.41$\pm$0.46 & 1.54 & 3.69 (2.6e-09)\ \ \[table:blac\] The case of Uncertain type blazars ---------------------------------- More than 500 sources were classified as blazars of uncertain type (BCU) in 3LAC. Even though these sources are associated with extra-galactic counterparts, and show some of the blazar characteristics, they lack reliable classification based on spectral information. In order to investigate the flux distribution properties of such sources, we analyzed the long term data (in the same time period as of the other bright blazars) of three brightest BCUs (namely, J0522.9-3628, J0532.0-4827, and J1328.9-5608). These sources are comparatively less brighter than the known classified blazars that we considered. After analyzing the *Fermi*-LAT data of three bright BCUs with the standard *Fermi* [SCIENCE TOOL]{} and using the quality cuts i.e. the flux after the cuts of $F/\delta F<2$ and $TS\leq9$, it was not possible to match with the acceptance criteria of 90%. Therefore, we modified our acceptance criteria from 90$\%$ to 60$\%$ of total flux. Since the flux states with TS$<$9 belong to low flux states (quiescent states) or less variable states, the difference in the acceptance criteria will not significantly bias our final results. The flux distribution of all three sources suggest log-normal distributions. The reduced $\chi^2$ of the log-normal flux distribution for the sources J0522.9-3628, J0532.0-4827, and J1328.9-5608 are found to be 0.29, 1.18 and 0.73 respectively (instead of 5.67, 3.09, 5.79 in the case of normal distribution). The AD test statistic p-values of the logarithmic flux distribution for the sources (in the same order as above) are 0.78, 0.80 and 0.17 (instead of $6.72\times10^{-15}$, $2.86\times10^{-16}$ and $2.37\times10^{-11}$ for normal distribution), which also propose log-normal distributions of flux over normal distributions. The obtained standard deviation from the log-normal fit of J0522.9-3628 and J1328.9-5608 are 0.29 and 0.34 respectively, while it is high (0.47, which is similar to FSRQs and LBLs) for the source J0532.0-4827. ![Flux distribution of bright blazars in $\gamma$-ray band. The pointers are same as in the Fig.\[fig:blazar\][]{data-label="fig:ucb"}](ms89fig3.eps "fig:"){width="100.00000%"}\ Association of flux distribution with spectral index ==================================================== In order to investigate the association of flux variability with spectral indices, we estimated the monthly spectra of the blazars. All the considered blazars were well described by either simple power law or log parabola models. In order to compare the spectral indices of the spectra described by both models, it would be meaningful to calculate the spectral indices at a specific energy, which was chosen to be 1 GeV (denoted by $\alpha_{1\rm{GeV}}$). The spectral index at energy E is defined by $$\alpha_E=\alpha+2\beta\log(E/E_p)$$ where $\alpha$ is spectral index at pivot Energy $\rm E_p$, and $\beta$ is the measure of spectral curvature. We have found that the average spectral indices for all FSRQs is 2.28$\pm$0.03. However, the FSRQ J2254.0+1608 (a.k.a. 3C 454.3, which is the brightest blazar in $\gamma-ray$ band) shows a harder spectrum of index 1.72$\pm$0.06. It has to be also noted that the spectral index of the *steady FSRQ* J0957.6+5523 is also smaller, which is 1.91$\pm$0.05. The mean spectral indices of all other FSRQs fall in the range of 2.08-2.75. However, the mean spectral indices of BLLacs fall in the range of 1.61-2.49, with a mean value of 2.01$\pm$0.11. The mean spectral indices of BCUs J0522.9-3628, J0532.0-4827 and J1328.9-5608 are 2.70, 2.64, and 2.74 respectively. These values fall in the range of spectral indices of other bright FSRQs, LBLs or IBLs, but comparatively higher than the spectral indices of HBLs. The flux variability has been plotted against the spectral index in Fig\[fig:lum\_sig\]. The HBLs (red square) fall in the left-low corner of the diagram, while FSRQs (pink circle) show a wider distribution. The IBLs (green triangle) and LBLs (gray dumbbell) fall in similar range of spectral index, though the variability distribution is wider in the case of former. The boxes represent the two-standard deviation uncertainty in $\alpha_{1\,GeV}$ and $\sigma$ from their respective mean value. The bright BCUs that were analyzed fall in the band of FSRQs. We also notice a slight correlation between the spectral index and standard deviation of the flux. The $\alpha_{1\,GeV}$ and $\sigma$ of all blazars can be roughly fitted by a straight line of slope 0.24$\pm$0.04, which is indicated by a blue dotted line in the figure\[fig:lum\_sig\]. The brightest BCUs show similar features as in the case of other blazars with respect to spectral index and flux distribution. All three BCUs (indicated as purple tilted square in fig.\[fig:lum\_sig\]) fall beyond the 2-standard deviation uncertainty region (dotted box) of BLLac sources. However, they are placed within the 2-standard deviation uncertainty region of FSRQ. ![The standard deviation ($\sigma$) of the blazar flux distribution vs their corresponding average spectral index at 1GeV ($\alpha_{1\,\rm{GeV}}$). Each blazar class has been marked with different pointers. HBL: red filled square, IBL: green triangle, LBL: gray dumbbell, FSRQ: pink circle, BCU: purple tilted square. The FSRQs which reject the log-normal flux distribution has been marked as pink open circle. The *steady FSRQ* has been shown separately black filled circle. The rectangle boxes correspond to two-standard-deviation uncertainty from the mean of $\sigma$ and $\alpha_{1\,\rm{GeV}}$ for each blazar class. The color of the box is chosen to be same as that of pointers for each blazar class. The blue-violet dotted box corresponds to two-standard-deviation uncertainty from the mean of $\sigma$ and $\alpha_{1\,\rm{GeV}}$ for all BLLac sources[]{data-label="fig:lum_sig"}](ms89fig4.eps) Additionally, we have also compared the monthly spectral indices of each source with their corresponding luminosity. It is interesting to note that every source shows *harder when brighter* phenomena. The monthly spectral indices and corresponding luminosity can be well fitted by a straight line. The average indices are found to be -0.09+0.01 for FSRQs, while it is -0.11$\pm$0.01, -0.13$\pm$0.01, -0.13$\pm$0.01 for HBL, IBL, and LBL respectively, suggesting the *harder when brighter* phenomena among the different bright blazar classes are not significantly different. Discussion ========== After a detailed study on the $\gamma$-ray flux of 38 brightest blazars, we found that the flux distributions predominantly suggest log-normal distribution rather than a normal distribution. We verified the log-normality (over normality) using both reduced $\chi^2$ and AD-test. The log-normality was rejected only in the case of three (in a sample of 38) blazars. However, the normal distribution was rejected for all blazars (except J0957.6+5523, though the reduced $\chi^2$ was high). The flux distribution of the three brightest BCUs follow log-normal distribution. From the obtained spectral index and the flux standard deviation parameters, they fall beyond the 2-standard deviation uncertainty limits of HBL, IBL and LBL. Though it can not be asserted, we are tempted to associate these sources with FSRQs. The log-normal distribution of the observed flux indicates the perturbation associated with the emission process to be of multiplicative nature rather than additive [@Lyubarskii1997; @Arevalo2006]. Flux variation in blazars can be attributed to the complex interplay between the intrinsic and source parameters. A simple scenario is to associate the flux variation with the fluctuation in the emitting electron number density or the magnetic field. However, the linear dependence of the these quantities with the differential flux suggests, this will cause a normal flux distribution contrary to the observations. Alternatively, the particle acceleration and the diffusion processes can modify the shape of the emitting electron distribution [@Kirk1998] and hence can be accounted for various flux distributions, including a log-normal one. The flux variation can also be associated with the change in the emission region geometry. Even though the change in volume associated with this can only produce normal flux distribution, inclusion of light travel time effects can significantly modify the same [@Chiaberge1999]. However, the timescales associated with these processes are too short and hence will not reflect the log-normal distribution obtained in our study, where we used monthly averaged fluxes. A log-normal flux distribution can directly hint the linkage of blazar jet with the accretion phenomena since the latter is well proven to produce such distribution through the study of galactic X-ray binaries (XRBs)[@Uttley2001]. The fluctuations in the disk at different radii are known to be produced independently by viscosity fluctuation on local viscous time scales, which modulates the mass accretion rate at larger distances from black-hole. The accretion rate variations then propagate to small radii through accretion flow and concoction of variations at different radii results in multiplicative emission. This model was put forward by [@Lyubarskii1997] for explanation of observed X-ray variability time-scales in XRBs. Also, for non beamed accreting objects the variability timescales are found to be proportional to $\rm M/\dot{m}$, where M is mass of black hole and $\rm \dot{m}$ is accretion rate [@Kording2007]. [@McHardy2008] had found that same relation surprisingly holds even for beamed jet emission from blazars e.g, 3C273, which should have otherwise shorter observed variability timescale due to relativistic time dilation than the timescale predicted using the black hole mass and accretion rate. Consequently, this lead to inference that source of variations in blazars lie out-side the jet i.e, in the accretion disks which then modulates the jet emission. A detailed study of month scale averaged flux distribution of blazars can hence be a key to understand disk-jet connection. On the contrary to the interpretations above, a log-normal flux distribution can also arise from additive processes under specific conditions. For example, if the blazar jet is assumed to be a large collection of mini-jets, then the logarithm of composite flux will show a normal distribution [@Biteau2012]. We note that the AD statistics does not reject the normality of flux distribution of J0957.6+5523. Moreover, the standard deviation obtained from the flux distribution of this source exhibits a significant difference from that of other blazars. 3LAC labeled this source as an FSRQ, based on the presence of broad optical emission lines, large redshift and high $\gamma$-ray luminosity of the order of $\rm \approx 10^{47} erg\,s^{-1}$. However, the integrated spectrum and morphological properties obtained from the VLBA observations question the FSRQ classification of the source, and suggest it as one of the weakest Compact Symmetric Object [@Rossetti2005]. Moreover, the brightness temperature of this source was found to be significantly lower ($2\times10^{8}$K at 5GHz, @Taylor2007), than that of other $\gamma$-ray blazars [@McConville2011]. These studies, together with our results, suggest that more multi-wavelength studies are required before associating this source to an FSRQ. ![Double log-normal fit to the flux distribution of the blazars J1625.7-2527, J1504.4+1029, and J2329.3-4955, which reject log-normal distribution. Since the statistics is not significant enough, these fits should be taken only as indicative.[]{data-label="fig:double"}](ms89fig5_1.eps "fig:"){width="\linewidth"} ![Double log-normal fit to the flux distribution of the blazars J1625.7-2527, J1504.4+1029, and J2329.3-4955, which reject log-normal distribution. Since the statistics is not significant enough, these fits should be taken only as indicative.[]{data-label="fig:double"}](ms89fig5_2.eps "fig:"){width="\linewidth"} ![Double log-normal fit to the flux distribution of the blazars J1625.7-2527, J1504.4+1029, and J2329.3-4955, which reject log-normal distribution. Since the statistics is not significant enough, these fits should be taken only as indicative.[]{data-label="fig:double"}](ms89fig5_3.eps "fig:"){width="\linewidth"} We have also investigated the possibility of double log-normal distribution of fluxes for the sources that reject log-normal distribution both in $\chi^2$ and AD test (J1625.7-2527, J1504.4+1029, and J2329.3-4955). The two distinct log-normal profiles may indicate different flux states correspond to a low and high states of the source [@Kushwaha2016]. It is interesting to note that the flux distribution of all three sources exhibit hints of double log-normal distribution (Fig.\[fig:double\]). However, the statistics of this distribution is not significant enough, hence these result should be taken only as an indicative. Another implication of our study is on the averaging of long term flux. We recommend the usage of the average of flux in log scale, rather than estimating average flux in a linear scale, especially for the highly variable sources. We show the difference of averaged flux in both linear and log-scale in Fig \[fig:flux\_vs\_flux\]. For example, in the case of FSRQs, the average value of Flux/Log$_{10}$(Flux) falls around $\sim$1.7, while the maximum value (in the case of 3C454.3) goes up-to 2.8. These values imply that averaging flux over a linear scale will significantly overestimate the same, which would in turn gives rise to inaccurate SED non-thermal emission model parameters. Conclusion ========== We studied in detail the flux distribution properties of 38 brightest $\gamma$-ray blazars using *Fermi*-LAT data of more than 8 years. The flux distribution suggest log-normal distribution, for 35 blazars, indicating a multiplicative perturbation associated with the emission process. Similar features were obtained also in the case of BCUs. On the other hand, the flux distributions of three FSRQs – J2329.3-4955, J1504.4+1029, and J1625.7-2527 – reject both log-normal and normal distribution. This could be due to two or more independent flux states associated with the source, however, more statistics is required to study these effects in detail. It would be also interesting to perform an elaborate study with better statistics for more blazars in $\gamma$-rays, and compare the properties with that of their X-ray counterparts. Acknowledgement =============== ZS, SS and NI are thankful to Indian Space Research Organization program (ISRO-RESPOND) for the financial support under grant no. ISRO/RES/2/396. [^1]: https://fermi.gsfc.nasa.gov/ssc/data/access/lat/4yr$_-$catalog/3FGL-table/
{ "pile_set_name": "ArXiv" }
Accelerated aging of dermal fibroblast-like cells from senescence-accelerated mouse (SAM). 1. Acceleration of population aging in vitro. Fibroblast-like cells were isolated from the senescence accelerated mouse (SAM) and cultured, after which evidence of accelerated senescence was sought. Fibroblast-like cell lines were established from the dorsal dermis of neonate mice of both the accelerated senescence-prone strain, SAMP11 and the accelerated senescence-resistant strain, SAMR1. All cell lines from both strains showed a crisis in growth and were immortalized. At crisis, all cultures were composed of morphologically characteristic senescent cells. However, in cell lines from SAMP11, this change was more rapid and at earlier population doublings (PDs) than seen in cell lines from SAMR1. Crises (SAMP11; SAMR1) were also operationally taken to be the point of the least change in PDs (11.2 +/- 1.1; 15.4 +/- 0.5 PDs), the least saturation density (11.3 +/- 0.8; 19.1 +/- 2.6 PDs), and the longest population doubling time (10.1 +/- 0.8; 14.2 +/- 0.6 PDs). Crisis occurred significantly earlier (P < 0.05) and the aging process was accelerated in cell lines from SAMP11, compared with lines from SAMR1. This evidence tends to support various observations made in the accelerated senescence-prone strains of SAMP, in vivo.
{ "pile_set_name": "PubMed Abstracts" }
From the death, confusion and fear of Thursday’s terrorist attack, the Barcelona boulevard of Las Ramblas has returned to its historic role as a centre of life, reflection and defiance. The paving stones on which the victims died have been cleaned of blood and transformed into a shrine that widens by the hour as mourners bring more tokens of sympathy – flickering candles, bunches of flowers, soft toys and messages of solidarity, love and defiance from around the world. The words are in Arabic, English, Chinese, Japanese, Russian, French and Hebrew. They come from individuals, embassies and business groups, from tour parties and religious groups. “Las Ramblas cries, but it is still alive,” read one. “Stop Daesh. Stop fascism,” asserted another. “No words. Just love,” concluded another. But the most common phrase was “No tinc por” – the Catalan expression for “We are not afraid”, which was also shouted out after a minute of silence on Friday at a memorial service attended by tens of thousands of people, including the king of Spain, the Spanish prime minister, the Barcelona mayor and the president of the Catalan government, who stood side by side in a rare display of unity for this fiercely independent region. The nation is in the midst of three days of mourning, but there is far more than grief on display on Las Ramblas, which has never been a place where time stands still. Shortly before the Spanish civil war in 1936, the revolutionary poet Federico García Lorca described Barcelona’s main thoroughfare as the most joyful street in the world. It was he said, “the street where all the four seasons live together. The only street I wish would never end. Rich in sounds, abundant in breeze, beautiful in its encounters, old in its blood: Rambla de Barcelona.” Two women hold placards that read ‘We suffered it too’ and ‘We are against any injustice’ at an impromptu memorial two days after a van crashed into pedestrians at Las Ramblas in Barcelona’ Photograph: Reuters These words are now circulating as never before on social media, as more people are drawn physically to the space where 14 people were killed and dozens more injured by a van driven at high speed through the crowds by Moroccan jihadists. Guillem Gargallo, a restaurant waiter who had come by motorcycle to light a candle, was in tears, but determined not to let sadness breed anger. “This is very hard for us Catalans. We love our city. We never thought this would happen here,” he said. “We must maintain our normal lives. If we dwell on it too much, it will pull us all down.” Most of the kiosks in the centre of Las Ramblas are closed. Every 50-100 metres is a shrine. At night, hundreds of people gather around these glowing pools of remembrance. Some stop by on the way home from work. Others during a walk with their dogs or on the way back from shipping. Many were tourists, snapping sad-faced selfies against the latest backdrop of shared anxiety and anger. The murderous route appears to have been chosen for maximum global impact. As well as being crammed with camera-carrying tourists hooked up to social networks around the world, the 500 metre stretch of killing started and ended on two of the city’s most famous and symbolic landmarks: the Canaletes fountain, where fans of Barcelona FC usually celebrate their team’s triumphs; and the Mosaico de Joan Miró – one of three artworks by the Catalan surrealist that the city commissioned to welcome overseas visitors arriving by air, sea and land. At the former, one local football fan, Josep Gargallo turned up, as he has done countless times, in his team’s football shirt, but this time he was paying his respects and trying to salvage something positive from the loss. “It’s still sinking in, but I believe this will make our city a better place,” he said. “We are very united. It makes me proud the way people have responded with offers of help and hospitality.” A few steps from here is the building where George Orwell first stayed when he came to join the International Brigade in the fight against fascism in the 1930s. Back then, Las Ramblas was a centre of socialist idealism, fluttering with red and black flags, More recently, the displays are more likely to be advertising and – until last Thursday – the major concerns were excessive tourism, gentrification and tensions over Catalan independence. Already there are accusations that this tragedy is being exploited in the tussle between Madrid and Barcelona over that independence. Some locals grumbled at an El País editorial yesterday that suggested the city had dropped its guard because it was too focused on an upcoming referendum. The counter-argument here is that Madrid is responsible for the lack of coordination between the Catalan and Spanish police in counter-terrorism. But most people were at pains to keep such disputes at bay. There was a notable absence of flags from either side at the memorial ceremony and on the street. “This is not the time to go into that issue. We’re all crying for the same reason. We’re all praying for the victims,” said Lucia Gil, a teacher from Salamanca, who sat in reflection beside the Mosaico de Joan Miró, now entirely covered by candles and flowers. “I was thinking about the blood that was on this spot. I was thinking it could have been me. I was going to walk here at that time, but I stopped in a side street to get my nails done. That manicure saved my life.” On another side-street, dozens of people fled into a tapas restaurant called Bo de Boqueria. They closed the door and took everyone to a terrace at the back of the building. “We thought we were going to be killed. People were shouting and crying,” recalls waiter Imran Sajid. “For the first 10 minutes it was total confusion. Then we put on the TV and saw what had happened.” A placard reading ‘Pray for Barcelona’ on Las Ramblas. Photograph: Susana Vera/Reuters While the immediate fear of an attack has abated, his longer-term concern is about the impact on business. “This is going to affect us badly. I’m 100% sure of that. People will now think twice about coming to Barcelona,” said the Pakistan-born waiter. “It’ll be like France. Many people will not want to visit.” Having lived in the city for 14 years, Sajid said he did not expect a backlash against the Muslim community. “The Spanish aren’t like that. They are very open-minded. They accept you no matter your nationality or religion. It’s a welcoming place for migrants compared to the US or UK,” he said. Others are not so sure. Carmen Pasa, a Romanian who is married to a Moroccan, was one of very few in a headscarf to pay her respects at Las Ramblas. She said she had been crying on and off for a day. “I was too frightened to come at first,” she said. “Today, I wanted to put a candle but there are too many people here now so I have decided to do it tomorrow.” Her worries were not just related to acts of terrorism. “I have felt hostility before and don’t want to feel it again,” she said, breaking into tears. Although Barcelona has long been a transit point between northern Africa and northern Europe, most of the city’s Muslim community have arrived since the 1960s. Most are Pakistanis and Moroccans, but there is a wide diversity of origins as well as divisions between Sunni and Shia Muslims. Although there have been arrests of terrorists from Girona and Tarragona, until now jihadism was thought to have been relatively weak in Spain, from which 160 people are known to have joined Isis in Syria and Iraq, compared to more than 1,000 from France. Intelligence chiefs say this is because Spain is better prepared to deal with terrorism, thanks to techniques developed during the four-decade conflict between the government and the Basque separatist group, Eta. But it is also because the Muslim population is smaller (2.1% of Spain’s 46 million people, compared with to the 7.5% of France’s 67 million, and 4.8% of Britain’s 65 million). Some believe that Muslims are also better integrated. At a late-night kebab restaurant in the El Raval district, the chefs – all from Morocco – said Barcelona was a more welcoming place than most cities in Europe because it was easier to secure documentation to live and work. But many fear this could now change. “I haven’t experienced any racism here in 12 years,” said a Moroccan, who gave only his first name, Omar. He said he feels more comfortable in Barcelona than in his own country. Chatting over a beer at a tapas restaurant, the 28-year-old chef said he had been encouraged by his Spanish friends, who posted messages of support on social networks. But he fears the attack – even though it was on international tourists rather than Barcelona itself – would stir up hostility to people like him. “Some people are saying all Moroccans and Arabs are the same. Others differentiate,” he said. “But now I feel that the majority of people hate Arabs.”
{ "pile_set_name": "OpenWebText2" }
Q: Can I launch app from my app for google home? I have a problem i want to launch playlist of a music streamming application (spotify, deezer, ...) from my custom app for google-home (I think we call that action) but I doesn't find how to do that. I have already try to play some sound with the tag but with that you can just play 120 second from an audio file. And I need a way to launch app not just play music A: I had some returns from Google and they told me that actually we can't launch other app from our app
{ "pile_set_name": "StackExchange" }
El tren de la muerte El tren de la muerte ("The Death Train") refers to a network of Mexican freight trains that are utilized by U.S.-bound migrants to more quickly traverse the length of Mexico, also known as La Bestia ("The Beast") and El tren de los desconocidos ("The train of the unknowns"). It is estimated that yearly between 400,000 and 500,000 migrants, the majority of whom are from El Salvador, Guatemala, and Honduras, ride atop these trains in the effort to reach the United States. Although these trains (which transport products and materials including corn, cement, and minerals) are regarded as a free form of travel that allows migrants to avoid Mexico's numerous immigration checkpoints and 48 detention centers, the risks are high and many riders are left with life-altering injuries that limit their capacity to work. As of May 9, 2014, train operators have banned the passengers from traveling by the train. Passenger risks Many of the dangers posed by this journey result from the train itself and the process of climbing aboard and getting off moving trains. Because migrants board between 10 and 15 trains during their 1450-mile journey, which typically begins in Arriaga, Chiapas, the chances of sustaining a major injury are high before they even arrive at Lechería station in Mexico City, which serves as a sort of halfway point before the train route scatters into various directions that head closer to different points on the U.S. border. Often, migrants fall asleep while riding atop trains and are jolted off and onto the tracks where many are killed instantly by decapitation, blood loss, and shock. Because accidents often occur during the night and in rural areas, victims are often not found immediately. As with all migrant routes, those who use freight trains are subject to high rates of violence and property crime. Mexican states crossed by the freight trains also experience very high rates of kidnapping. Due to fears of deportation, it is believed that the actual rates of such crimes are higher than reported. Reactions by citizens and the Mexican government Many Central American migrants receive aid from Mexican families and community members who provide migrants with food, shelter, clothes, and medicine despite their own poverty. A government support service, called Grupos Beta, was also created to help migrants. Often, Grupos Beta ride along the train tracks and visit rest stops, where they provide medical aid and information to migrants. Essentially, they are a "mobile humanitarian unit [that] does not enforce the law." That is, their purpose is not to convince migrants to not ride the trains to the border, rather their goal is simply to educate migrants about how to protect themselves throughout their journey. Apart from Grupos Beta, the Mexican Government has been criticized for its relaxed approach to the countless instances of rights violations and abuses regarding Central American migrants. In the media "El Tren de la Muerte" has been depicted in literature, news articles, and in many films, including documentaries. One example is Which Way Home, which specifically follows the stories of children who have left their homes to come to the United States. The children range in age from 9–15 years old and are from places like Guatemala, Honduras, El Salvador, and Mexico. Like many other children, the kids in this documentary travel without an accompanying adult and their mode of transportation is "El Tren de la Muerte." These stories focus on the emotional impact of the journey as well as the physical danger. The documentary also shows what happens to children when they fail to arrive at their destination and are forced to go back to their countries of origin. Many of the other films that center around this topic feature similar stories, such as Sin Nombre, De Nadie, and El Tren de la Muerte. Most of these films have been acclaimed for bringing to light the many circumstances that migrants endure during their journey to the United States. Sonia Nazario's best-selling novel, "Enrique's Journey", also depicts the process and obstacles of train migration. The book depicts the struggles and dangers of the journey north through the eyes of one migrant. It includes explicit details about migrants' encounters with street gangs, corrupt officials, hunger, exhaustion, discrimination, poor weather, and trains. El Salvadorian journalist Óscar Martínez's book The Beast also depicts the hardships faced by migrants on the journey to the United States. Other forms of media have also discussed the topic of migration and the means by which migrants travel to the United States. The presses in Central America, Mexico, and the United States cover the topic with a particular focus on the grim and unfortunate aspects of the migration process. The train was also featured in Al Jazeera America's Borderland. References External links Category:Illegal immigration to the United States Category:Rail freight transport Category:Rail transportation in Mexico Category:Human rights in Mexico Category:Northern Triangle refugee crisis
{ "pile_set_name": "Wikipedia (en)" }
--- abstract: 'G 207-9 and LP 133-144 are two rarely observed ZZ Ceti stars located in the middle and close to the blue edge of the ZZ Ceti instability domain, respectively. We aimed to observe them at least during one observing season at Konkoly Observatory with the purpose of extending the list of known pulsation modes for asteroseismic investigations and detect any significant changes in their pulsational behaviour. We determined five and three new normal modes of G 207-9 and LP 133-144, respectively. In LP 133-144, our frequency analysis also revealed that at least at three modes there are actually triplets with frequency separations of $\sim4\mu$Hz. The rotational period of LP 133-144 based on the triplets is $\simeq42$h. The preliminary asteroseismic fits of G 207-9 predict $T_{\rmn{eff}}=12\,000$ or $12\,400$K and $M_*=0.855-0.870\,M_{\sun}$ values for the effective temperature and mass of the star, depending on the assumptions on the spherical degree ($l$) values of the modes. These results are in agreement with the spectroscopic determinations. In the case of LP 133-144, the best-fitting models prefer $T_{\rmn{eff}}=11\,800$K in effective temperature and $M_*\geq0.71\,M_{\sun}$ stellar masses, which are more than $0.1\,M_{\sun}$ larger than the spectroscopic value.' author: - | Zs. Bognár,$^{1}$[^1] M. Paparó,$^{1}$ L. Molnár,$^{1}$ P. I. Pápics,$^{2}$ E. Plachy,$^{1}$ E. Verebélyi,$^{1}$ and Á. Sódor$^{1}$\ $^{1}$Konkoly Observatory, MTA Research Centre for Astronomy and Earth Sciences, Konkoly Thege Miklós út 15-17, H–1121 Budapest\ $^{2}$Instituut voor Sterrenkunde, KU Leuven, Celestijnenlaan 200D, B-3001 Leuven, Belgium bibliography: - 'g207\_lp133\_mnras.bib' date: 'Accepted XXX. Received YYY; in original form ZZZ' title: 'G 207-9 and LP 133-144: light curve analysis and asteroseismology of two ZZ Ceti stars ' --- \[firstpage\] techniques: photometric – stars: individual: G 207-9, LP 133-144 – stars: interiors – stars: oscillations – white dwarfs Introduction ============ ZZ Ceti (or DAV) stars constitute the most populated group of pulsating white dwarfs. Their light variations are the results of local changes in their surface temperatures due to the excitation of nonradial $g$-mode pulsations in their non-degenerate envelope. This envelope consists of an inner helium and an outer hydrogen layer, therefore, the hydrogen Balmer-lines dominate the spectra of ZZ Ceti stars. The pulsations are driven by the so-called ‘convective driving’ mechanism [@1991MNRAS.251..673B; @1999ApJ...511..904G], as the driving region is associated with the base of the envelope convection zone. Otherwise, pulsating white dwarfs are just like their non-pulsating counterparts, and the information we gain on white dwarf structures by asteroseismic investigations can be essential to understand white dwarfs as a whole group. ZZ Ceti stars are short-period and low-amplitude pulsators with $11\,000-13\,000$K effective temperatures and modes excited typically in the $100-1400$s period range with $\sim$mmag amplitudes. However, within this period and amplitude range the stars exhibit a large variety of pulsational behaviour, from the star showing one rotational triplet only (G 226-29, @1995ApJ...447..874K) to the ‘rich’ DA pulsators with more than a dozen normal modes known (see e.g. @2009AIPC.1170..621B). Temporal variations in their pulsational behaviour are also well documented in white dwarfs, e.g. the case of GD 154 showing once a strongly non-sinusoidal light curve with one dominant mode and a series of its harmonic and near-subharmonic ($\sim n/2f_i$) peaks in its Fourier transform, or just behaving as a simple multiperiodic pulsator another time [@1978ApJ...220..614R; @2013MNRAS.432..598P]. For comprehensive reviews of the observational and theoretical aspects of pulsating white dwarf studies, see the papers of and . We also refer to the work of @2013ApJ...762...57V, in which the authors successfully reconstructed the boundaries of the empirical ZZ Ceti instability strip applying theoretical calculations, including its extension to lower effective temperatures and surface gravities, that is, further to the domain of the extremely low-mass DA pulsators. White dwarf observations with the *Kepler* space telescope revealed another new feature in ZZ Ceti stars, namely recurring increases in the stellar flux (‘outbursts’) in two cool DAVs being close to the red edge of the instability strip [@2015ApJ...809...14B; @2015ApJ...810L...5H]. G 207-9 and LP 133-144 were observed as part of our project aiming at least one-season-long local photometric time series measurements of white dwarf pulsators. Our purposes are to examine the short-term variability of pulsation modes in amplitude and phase, and to obtain precise periods for asteroseismic investigations. We have already published our findings on two cool ZZ Ceti stars (KUV 02464+3239, @2009MNRAS.399.1954B and GD 154, @2013MNRAS.432..598P), one ZZ Ceti located in the middle of the instability strip (GD 244; @2015ASPC..493..245B), and the DBV type KUV 05134+2605 . With the observations of G 207-9 and LP 133-144, we extended our scope of investigations to higher effective temperatures in the DAV instability domain. Observations and data reduction =============================== We collected photometric data both on G 207-9 ($B=14.8$mag, $\alpha_{2000}=18^{\mathrm h}57^{\mathrm m}30^{\mathrm s}$, $\delta_{2000}=+33^{\mathrm d}57^{\mathrm m}25^{\mathrm s}$) and LP 133-144 ($B=15.5$mag, $\alpha_{2000}=13^{\mathrm h}51^{\mathrm m}20^{\mathrm s}$, $\delta_{2000}=+54^{\mathrm d}57^{\mathrm m}43^{\mathrm s}$) in the 2007 observing season. We used the 1-m Ritchey-Chrétien-Coudé telescope at Piszkéstető mountain station of Konkoly Observatory. The detector was a Princeton Instruments VersArray:1300B back-illuminated CCD camera. The measurements were made in white light and with 10 or 30s integration times, depending on the weather conditions. We observed G 207-9 and LP 133-144 on 24 and 28 nights, respectively. Tables \[table:logg207\] and \[table:loglp\] show the journals of observations. Altogether, 85 and 137h of photometric data were collected on G 207-9 and LP 133-144, respectively. ----- --------- --------------- ------- -------- -------- Run UT date Start time Exp. Points Length no. (2007) (BJD-2450000) (s) (h) 01 Mar 26 4185.540 30 279 2.57 02 Mar 27 4186.533 30 280 2.70 03 Apr 02 4192.527 10 743 2.70 04 Apr 03 4193.540 30 208 1.88 05 Jun 15 4267.351 10 1001 4.46 06 Jun 16 4268.374 30 427 4.10 07 Jun 17 4269.396 10 1028 3.68 08 Jun 18 4270.341 30 500 4.75 09 Jun 19 4271.345 10 1173 4.89 10 Jun 20 4272.454 30 198 2.23 11 Jul 06 4288.389 30 184 2.42 12 Jul 07 4289.347 10 1417 5.18 13 Jul 08 4290.337 10 1449 5.60 14 Jul 09 4291.351 30 34 0.30 15 Jul 10 4292.434 30 227 2.27 16 Jul 26 4308.434 30 349 3.12 17 Jul 27 4309.337 10 1071 3.69 18 Jul 30 4312.452 30 134 1.42 19 Jul 31 4313.312 30 492 5.03 20 Aug 01 4314.460 10 885 3.05 21 Aug 10 4323.327 30 46 0.40 22 Aug 13 4326.323 30 721 6.43 23 Aug 14 4327.341 10 1646 5.74 24 Aug 15 4328.315 10 1896 6.53 85.16 ----- --------- --------------- ------- -------- -------- : Journal of observations of G 207-9. ‘Exp.’ is the exposure time used.[]{data-label="table:logg207"} ----- --------- --------------- -------- -------- -------- Run UT date Start time Exp. Points Length no. (2007) (BJD-2450000) (s) (h) 01 Jan 15 4115.614 30 299 2.81 02 Jan 17 4117.622 30 154 1.54 03 Jan 26 4126.615 30 233 2.19 04 Jan 28 4128.544 30 441 4.17 05 Jan 30 4130.528 30 493 4.58 06 Feb 17 4148.551 30 375 3.53 07 Mar 15 4175.283 30 725 9.27 08 Mar 16 4176.279 30 960 9.29 09 Mar 22 4182.356 30 562 6.04 10 Mar 24 4184.496 30 410 3.76 11 Mar 25 4185.398 30 338 3.12 12 Mar 26 4186.282 30 636 5.88 13 Mar 27 4187.273 30 718 7.94 14 Mar 30 4190.307 30 862 8.05 15 Mar 31 4191.357 30 325 2.98 16 Apr 01 4192.289 30 596 5.47 17 Apr 03 4194.276 30 202 1.92 18 Apr 12 4203.388 10 1483 5.58 19 Apr 13 4204.337 10 1808 6.80 20 Apr 14 4205.304 10 1946 7.66 21 Apr 15 4206.309 10 1608 7.27 22 Apr 16 4207.296 10 1422 5.51 23 Apr 17 4208.378 10 1439 5.26 24 May 10 4231.316 10 1026 4.08 25 May 12 4233.358 30 259 2.33 26 May 13 4234.315 10 1192 4.32 27 May 14 4235.372 10 763 2.82 28 May 16 4237.365 30 342 3.12 137.27 ----- --------- --------------- -------- -------- -------- : Journal of observations of LP 133-144. ‘Exp.’ is the exposure time used.[]{data-label="table:loglp"} We reduced the raw data frames following the standard procedure: we applied bias, dark and flat corrections on the frames using <span style="font-variant:small-caps;">iraf</span>[^2] routines, and performed aperture photometry of the variable and comparison stars with the <span style="font-variant:small-caps;">iraf daophot</span> package. We converted the observational times of every data point to barycentric Julian dates in barycentric dynamical time ($\mathrm{BJD_{TDB}}$) using the applet of @2010PASP..122..935E[^3]. We then checked the comparison star candidates for variability and instrumental effects. We selected three stars in the field of G 207-9 and two stars in the field of LP 133-144 and used the averages of these reference stars as comparisons for the differential photometry of the two pulsators. The panels of Fig. \[fig:ccd\] show the variable and the comparison stars in the CCD fields. We applied low-order polynomial fits to the light curves to correct for the instrumental trends and for the atmospheric extinction. This method did not affect the pulsation frequency domains. Figure \[fig:lcshort\] shows two illustrative light curve segments of G 207-9 and LP 133-144. All the light curves obtained for both pulsators are presented in Appendix \[app:g207\] and in Appendix \[app:lp133\]. Frequency analyses of the light curves ====================================== We determined the frequency content of the datasets on daily, weekly or monthly, and yearly time bases. We analysed the daily observations with custom developed software tools, as the command-line light curve fitting program <span style="font-variant:small-caps;">LCfit</span> [@2012KOTN...15....1S]. <span style="font-variant:small-caps;">LCfit</span> has linear (amplitudes and phases) and nonlinear (amplitudes, phases and frequencies) least-squares fitting options, utilizing an implementation of the Levenberg-Marquardt least-squares fitting algorithm. The program can handle unequally spaced and gapped datasets. <span style="font-variant:small-caps;">LCfit</span> is scriptable easily, which made the analysis of the relatively large number of nightly datasets very effective. We performed the standard Fourier analyses of the weekly or monthly data subsets and the whole light curves with the photometry modules of the Frequency Analysis and Mode Identification for Asteroseismology (<span style="font-variant:small-caps;">famias</span>) software package [@2008CoAst.155...17Z]. Following the traditional way, we accepted a frequency peak as significant if its amplitude reached the 4 signal-to-noise ratio (S/N). The noise level was calculated as the average amplitude in a $\pm1200\,\mu$Hz interval around the given frequency. ![image](lc_rep.eps){width="16cm"} ![image](g207.eps){width="6cm"} ![image](lp133.eps){width="6cm"} G 207-9 ------- ### Previous observations G 207-9 was announced as the 8th known member of pulsating white dwarf stars in 1976 [@1976ApJ...207L..37R]. Four high ($\mathrm{F}_1$–$\mathrm{F}_4$) and one low ($\mathrm{F}_5$) amplitude peaks were detected at $\mathrm{F}_1=1354$, $\mathrm{F}_2=1794$, $\mathrm{F}_3=3145$, $\mathrm{F}_4=3425$ and $\mathrm{F}_5=3860\,\mu$Hz. Even though G 207-9 is a relatively bright target, and has been known as a pulsator for decades, no other time series photometric observations and frequency analysis have been published on this star up to now. ### Konkoly observations {#sect:g207freq} The analyses of the daily datasets revealed one dominant and four low amplitude peaks in the FTs. The dominant frequency of all nights’ observations in 2007 was at $3426\,\mu$Hz. This was the 3rd highest amplitude mode in 1975 ($\mathrm{F}_4=3425\,\mu$Hz). Two lower amplitude frequencies at $1672$ and $5098\,\mu$Hz reached the 4S/N detection limit in 12 and 14 of the daily datasets, respectively. Two additional low-amplitude frequencies were detected at $1608$ and $7725\,\mu$Hz in 3 and 4 cases, respectively. These frequencies are medians of the daily values. The $1608$ and $1672\,\mu$Hz frequencies could be determined separately only in the last three nights’ datasets. We present the FT of one night’s dataset (the second longest run) in the first panel of Fig. \[fig:g207FTa\]. Considering the consecutive nights of observations, five weekly time base datasets can be formed: Week 1 (JD2454185–193), Week 2 (JD2454267–272), Week 3 (JD2454288–292), Week 4 (JD2454308–314) and Week 5 (JD2454323–328). The Fourier analyses of these data verified the five frequencies found by the daily observations. In three cases the first harmonic of the dominant frequency was also detected. Additionally, the analysis of the Week 2 and Week 5 data suggested that the peaks at $\sim1672$ and $\sim5098\,\mu$Hz may be actually doublets or triplets and not singlet frequencies. The separations of the frequency components were found to be between $\sim2$ (close to the resolution limit) and $14\,\mu$Hz, but we mark these findings uncertain because of the effect of the 1d$^{-1}$ aliasing. The 2nd–6th panels of Fig. \[fig:g207FTa\] shows the FTs of the weekly datasets. We found only slight amplitude variations from one week to another. The amplitude of the dominant frequency varied between 8.6 and 10.5mmag. ![G 207-9: amplitude spectra of one night’s observation (*top panel*) and the weekly datasets (*lower panels*).[]{data-label="fig:g207FTa"}](g207FTa.eps){width="\columnwidth"} The standard pre-whitening of the whole dataset resulted 26 frequencies above the 4S/N limit. Most of them are clustering around the frequencies already known by the analyses of the daily and weekly datasets. Generally, amplitude and (or) phase variations during the observations can be responsible for the emergence of such closely spaced peaks. In such cases, these features are just artefacts in the FT, as we fit the light curve with fixed amplitudes and frequencies during the standard pre-whitening process. Another possibility is that some of the closely spaced peaks are rotationally split frequencies. We can resolve such frequencies if the time base of the observations is long enough. The Rayleigh frequency resolution ($1/\Delta T$) of the whole dataset is $0.08\,\mu$Hz. We also have to consider the 1d$^{-1}$ alias problem of single-site observations, which results uncertainties in the frequency determination. ---------- -------------------- ------- ------ ------ ------- $f_1$ $3426.303\pm0.001$ 291.9 10.1 111.5 $f_2$ $1678.633\pm0.003$ 595.7 2.0 15.4 $f_1^-?$ $3414.639\pm0.004$ 292.9 11.7 1.6 18.0 $f_3$ $5098.861\pm0.003$ 196.1 1.2 12.5 $f_2^-?$ $1667.328\pm0.005$ 599.8 11.3 1.1 8.6 $f_4$ $1603.071\pm0.004$ 623.8 1.1 8.1 $f_1^+?$ $3437.384\pm0.005$ 290.9 11.1 1.0 11.6 $f_5$ $7726.540\pm0.003$ 129.4 1.0 13.0 $f_4^-?$ $1595.481\pm0.004$ 626.8 7.6 0.8 6.1 $2f_1$ $6852.604\pm0.005$ 145.9 0.6 8.5 $f_6$ $3146.670\pm0.007$ 317.8 0.5 5.0 $f_7$ $3276.485\pm0.008$ 305.2 0.4 4.6 ---------- -------------------- ------- ------ ------ ------- : G 207-9: frequency content of the 2007 dataset. The errors were calculated by Monte Carlo simulations. $\delta f$ denotes the frequency differences of the closely spaced frequencies to $f_1$, $f_2$ or $f_4$.[]{data-label="table:g207freq"} ![image](g207prewh.eps){width="17.5cm"} ![G 207-9: comparison of the frequencies obtained in 1975 (*red dashed lines*) and in 2007 (*black solid lines*). The amplitudes of the 1975 observations are from the paper of @2006ApJ...640..956M.[]{data-label="fig:g207oldnew"}](g207oldnewfrek.eps){width="\columnwidth"} We checked the frequency content of the whole dataset by averaging three consecutive data points of the $10\,$s measurements as a test. That is, we created a new, more homogeneous dataset mimicking $30\,$s exposure times. We then compared the frequency solutions of this $30\,$s dataset with the frequencies of the original mixed $10$–$30\,$s data. Finally, we accepted as the frequencies characterizing the whole light curve the frequencies that could be determined in both datasets, that is, without 1d$^{-1}$ differences. This resulted a reduced frequency list of 12 frequencies. We list them in Table \[table:g207freq\]. There are still several closely spaced frequencies around three of the main frequencies ($f_1$, $f_2$ and $f_4$) remained with separations between $7.6$ and $11.7\,\mu$Hz. In the case of $f_1$ and $f_2$, these separations are close to $11.574\,\mu$Hz (1d$^{-1}$). It is possible that at least some of these frequency components are results of rotational splitting, but considering the uncertainties mentioned above, we do not accept them as rotationally split frequencies. In such cases when the frequency separations of the rotationally split components are around 1d$^{-1}$, multi-site or space-based observations are needed for reliable determination of the star’s rotational rate. Summing it up: besides the five frequencies ($f_1$–$f_5$) known also by the analyses of shorter (daily and weekly) data segments, we could detect two additional independent frequencies ($f_6$ and $f_7$) in the whole dataset. Frequency $f_6$ at $3146.7\,\mu$Hz was also detected in 1975 ($\mathrm{F}_3=3145\,\mu$Hz). Moreover, this was one of the dominant peaks at that time. Frequency $f_7$ at $3276.5\,\mu$Hz is a newly detected one. Note that the frequency $f_7$ is close to $f_2+f_4=3281.7\,\mu$Hz, however, the difference is $5.2\,\mu$Hz, which seems too large to claim that $f_7$ is the linear combination of these peaks considering the errors. Thus, we consider $f_7$ as an independent mode. Fig. \[fig:g207prewh\] shows the FT of the whole dataset and the frequency domains of $f_1-f_7$ on separate panels. Comparing the frequency content of the 1975 and 2007 observations, we can conclude that three of the five frequencies found in the 1975 dataset did not appear in 2007 ($\mathrm{F}_1$, $\mathrm{F}_2$ and $\mathrm{F}_5$), while two stayed at an observable level ($\mathrm{F}_3=f_6$ and $\mathrm{F}_4=f_1$). Figure \[fig:g207oldnew\] summarizes the frequencies of the two epochs. It seems that even though there were no large amplitude variations during our five-months observing season in 2007, on the time scale of years or decades, remarkable changes can happen in the pulsation of G 207-9: new frequencies can be excited to a significant level, while other modes can disappear. LP 133-144 ---------- ### Previous observations The variability of LP 133-144 was discovered in 2003 [@2004ApJ...600..404B]. Four pulsation frequencies were determined at that time, including two closely spaced peaks: $\mathrm{F}_1=3055.1$, $\mathrm{F}_2=3258.4$, $\mathrm{F}_3=3284.1$ and $\mathrm{F}_4=4780.6\,\mu$Hz. Similarly to the case of G 207-9, no further results of time series photometric observations have been published up to now. ### Konkoly observations {#sect:lp133freq} We found four recurring frequencies in the daily datasets at 3055, 3270, 3695 and 4780$\mu$Hz (median values). Their amplitudes varied from night to night, but the 4780$\mu$Hz peak was the dominant in almost all cases. One additional peak exceeded the 4S/N limit at 5573$\mu$Hz, but on one night only. We created four monthly datasets and analysed them independently. These are Month 1 (JD2454115–130), Month 2 (JD2454175–194), Month 3 (JD2454203–208) and Month 4 (JD2454231–237). The analyses of the monthly data revealed that at the 3270, 3695 and 4780$\mu$Hz frequencies there are actually doublets or triplets with 2.6–4.7$\mu$Hz frequency separations. This explains the different amplitudes in the daily FTs. The 3055$\mu$Hz frequency was found to be a singlet. In Month 3, the linear combination of the largest amplitude components of the 3270 and 4780$\mu$Hz multiplets also could be detected. The 5573$\mu$Hz frequency was significant in Month 2. The panels of Fig. \[fig:lp133FTa\] show the FT of one daily dataset and the monthly data. As in the case of G 207-9, there were no remarkable amplitude variations from one month to another. ![LP 133-144: amplitude spectra of one night’s observation (*top panel*) and the monthly datasets (*lower panels*).[]{data-label="fig:lp133FTa"}](lp133FTa.eps){width="\columnwidth"} The analysis of the whole 2007 dataset resulted in the detection of 19 significant frequencies in the $\sim2300-8000\,\mu$Hz frequency region. We also performed the test analysis utilizing the averaged 30s dataset, which confirmed the presence of the 14 largest amplitude frequencies (the other five peaks remained slightly under the significance level). Thus we accepted them as the frequencies characterizing the pulsation of LP 133-144 and list them in Table \[table:lp133freq\]. The Rayleigh frequency resolution of the whole dataset is $0.09\,\mu$Hz. --------- -------------------- ------- ----- ------ ------- $f_1$ 4780.555$\pm$0.001 209.2 10.9 100.9 $f_2$ 3269.302$\pm$0.001 305.9 3.9 35.4 $f_3$ 3695.083$\pm$0.002 270.6 3.5 31.2 $f_3^-$ 3691.627$\pm$0.002 270.9 3.5 3.4 30.5 $f_2^+$ 3272.475$\pm$0.002 305.6 3.2 3.0 26.7 $f_4$ 3055.125$\pm$0.002 327.3 2.8 25.1 $f_3^+$ 3698.551$\pm$0.003 270.4 3.5 2.0 18.4 $f_2^-$ 3266.125$\pm$0.005 306.2 3.2 1.2 10.4 $f_1^+$ 4784.696$\pm$0.005 209.0 4.1 1.1 10.6 $f_1^-$ 4776.400$\pm$0.007 209.4 4.2 1.0 8.7 $f_5$ 7116.986$\pm$0.010 140.5 0.6 5.9 $f_6^+$ 5574.381$\pm$0.009 179.4 4.8 0.6 6.0 $2f_1$ 9561.115$\pm$0.011 104.6 0.5 5.5 $f_6^-$ 5564.876$\pm$0.013 179.7 4.7 0.5 5.1 ($f_6$) 5569.618$\pm$0.020 179.5 0.4 4.1 --------- -------------------- ------- ----- ------ ------- : LP 133-144: frequency content of the 2007 dataset. The errors were calculated by Monte Carlo simulations. $\delta f$ denotes the frequency differences of the closely spaced frequencies to $f_1$, $f_2$ $f_3$ or $f_6$. We discuss the case of $f_6$ in the text. The signal-to-noise ratios refer to the original 10-30s dataset.[]{data-label="table:lp133freq"} The first eleven peaks in Table \[table:lp133freq\] are three triplets with frequency separations of $4.1-4.2\,\mu$Hz ($f_1$), $3.2\,\mu$Hz ($f_2$) or $3.5\,\mu$Hz ($f_3$), and two singlet frequencies ($f_4$ and $f_5$). In the case of $f_6$, three peaks can be determined in the original 10-30s dataset with frequency separations of $4.7-4.8\,\mu$Hz. However, the low amplitude central peak of this triplet at $f_6=5569.6\,\mu$Hz do not reach the 4S/N significance limit in the test 30s data. Still, to make the discussion of the triplet structures clear, we added $f_6$ to the list of Table \[table:lp133freq\] in parentheses. Besides these, the first harmonic of $f_1$ also appeared. Fig. \[fig:lp133prewh\] shows the FT of the whole dataset, the consecutive pre-whitening steps at the multiplet frequencies and at the frequency domains of $f_4$, $f_5$ and $2f_1$. We plot the frequencies of @2004ApJ...600..404B and the frequencies found in the 2007 Konkoly observations together in Fig. \[fig:lp133oldnew\]. Assuming that the closely spaced peaks at $\mathrm{F}_2$ and $\mathrm{F}_3$ are results of the not properly resolved components of the $f_2$ triplet, we found, with similar amplitudes, all the frequencies observed in 2003. Besides these, we detected three new frequencies: a relatively large amplitude mode at $f_3$, and two additional low-amplitude modes at $f_5$ and $f_6$. That is, we doubled the number of modes can be used for the asteroseismic fits. The schematic plot of the triplets can be seen in Fig. \[fig:lp133triplet\]. It is clearly visible that the frequency separations of the components are larger at higher frequencies. We discuss the rotation of LP 133-144 based on the investigation of these triplets in Sect. \[sect:lp133rot\]. ![image](lp133prewh.eps){width="17.5cm"} ![LP 133-144: comparison of the frequencies obtained in 2003 (*red dashed lines*) and in 2007 (*black solid lines*).[]{data-label="fig:lp133oldnew"}](lp133oldnewfrek.eps){width="\columnwidth"} ![LP 133-144: schematic plot of the triplets found at different frequency domains. The frequency errors are comparable to the width of the lines.[]{data-label="fig:lp133triplet"}](lp133triplet.eps){width="\columnwidth"} Asteroseismology ================ We built our model grid for the asteroseismic investigations of our targets utilizing the White Dwarf Evolution Code (<span style="font-variant:small-caps;">wdec</span>; @1974PhDT........56L [@1969ApJ...156.1021K; @1975ApJ...200..306L; @1991PhDT.........XX; @1986PhDT.........2K; @1990PhDT.........5W; @1993PhDT.........4B; @1998PhDT........21M; @2008ApJ...675.1512B]). The <span style="font-variant:small-caps;">wdec</span> evolves a hot polytrope model ($\sim10^5$K) down to the requested temperature, and provides an equilibrium, thermally relaxed solution to the stellar structure equations. Then we are able to calculate the set of possible zonal ($m=0$) pulsation modes according to the adiabatic equations of non-radial stellar oscillations [@1989nos..book.....U]. We utilized the integrated evolution/pulsation form of the <span style="font-variant:small-caps;">wdec</span> code created by @2001PhDT.........1M to derive the pulsation periods for the models with the given stellar parameters. More details on the physics applied in the <span style="font-variant:small-caps;">wdec</span> can be found with references in @2008ApJ...675.1512B and in our previous papers on two ZZ Ceti stars [@2009MNRAS.399.1954B; @2013MNRAS.432..598P]. Considering the limited visibility of high spherical degree ($l$) modes due to geometric cancellation effects, we calculated the periods of dipole ($l=1$) and quadrupole ($l=2$) modes for the model stars only. The goodness of the fit between the observed ($P_i^{\rmn{obs}}$) and calculated ($P_i^{\rmn{calc}}$) periods was characterized by the root mean square ($\sigma_\mathrm{{rms}}$) value calculated for every model with the <span style="font-variant:small-caps;">fitper</span> program of @2007PhDT........13K: $$\sigma_\mathrm{{rms}} = \sqrt{\frac{\sum_{i=1}^{N} (P_i^{\rmn{calc}} - P_i^{\rmn{obs}})^2}{N}} \label{equ1} %\]$$ where *N* is the number of observed periods. We varied five main stellar parameters to build our model grid: the effective temperature ($T_{\rmn{eff}}$), the stellar mass ($M_*$), the mass of the hydrogen layer ($M_\rmn{H}$), the central oxygen abundance ($X_\rmn{O}$) and the fractional mass point where the oxygen abundance starts dropping ($X_{\rmn{fm}}$). We fixed the mass of the helium layer ($M_\rmn{He}$) at $10^{-2}\,M_*$. The grid covers the parameter range $11\,400-12\,800$K in $T_{\rmn{eff}}$ (the middle and hot part of the ZZ Ceti instability strip), $0.500-0.900\,M_{\sun}$ in stellar mass, $10^{-4}-10^{-8}\,M_*$ in $M_\rmn{H}$, $0.3-0.9$ in $X_\rmn{O}$ and $0.1-0.7$ in $X_{\rmn{fm}}$. We used step sizes of $200$K ($T_{\rmn{eff}}$), $0.005\,M_{\sun}$ ($M_*$), $0.2$dex (log$M_\rmn{H}$) and 0.1 ($X_\rmn{O}$ and $X_{\rmn{fm}}$). Period lists ------------ In the case of G 207-9, we could detect seven linearly independent pulsation frequencies by the 2007 Konkoly dataset ($f_1-f_7$; see Table \[table:g207freq\]). The question is, if we could add more frequencies to this list by the 1975 observations of @1976ApJ...207L..37R. As we mentioned already in Sect. \[sect:g207freq\], two of the frequencies detected in 1975 were also found in the Konkoly data ($\mathrm{F}_3=f_6$ and $\mathrm{F}_4=f_1$). The status of the remaining three 1975 frequencies is questionable. Assuming at least a couple of $\mu$Hz errors for the 1975 frequencies, $\mathrm{F}_1=\mathrm{F}_3-\mathrm{F}_2$ (or $\mathrm{F}_2=\mathrm{F}_3-\mathrm{F}_1$, or $\mathrm{F}_3=\mathrm{F}_1+\mathrm{F}_2$), thus, these three frequencies do not seem to be linearly independent. The fact that $\mathrm{F}_2$ and $\mathrm{F}_3$ are the two dominant peaks in the FT of @1976ApJ...207L..37R suggests that $\mathrm{F}_2$ and $\mathrm{F}_3$ might be the parent modes and $\mathrm{F}_1$ is a combination peak. Furthermore, @1976ApJ...207L..37R pointed out that $\mathrm{F}_5-\mathrm{F}_4\approx\mathrm{F}_2-\mathrm{F}_1$, thus, further combinations are possible. We also note that $f_5$ of the Konkoly dataset is almost at twice the value of $\mathrm{F}_5$ ($\delta f=6.5\mu$Hz), however, there is no sign of any pulsation frequency at $0.5f_5$ in the 2007 data. We used two sets of observed periods to fit the calculated ones. One set consists of the seven periods of $f_1-f_7$ observed in 2007, while we complemented this list with the period of $\mathrm{F}_2$ detected in 1975 to create another set. We selected $\mathrm{F}_2$ because it was the second largest amplitude peak in 1975, which makes it a good candidate for an additional normal mode. In LP 133-144, we found all the previously observed frequencies in our 2007 dataset, as we show in Sect. \[sect:lp133freq\]. Thus, we cannot add more frequencies to our findings, and performed the model fits with six periods. We summarized the periods utilized for modelling in Table \[table:periods\] for both stars. ----------------- -------- ------- -------- Period Period (s) (s) $f_1$ 291.9 $f_1$ 209.2 $f_2$ 595.7 $f_2$ 305.9 $f_3$ 196.1 $f_3$ 270.6 $f_4$ 623.8 $f_4$ 327.3 $f_5$ 129.4 $f_5$ 140.5 $f_6$ 317.8 $f_6$ 179.5 $f_7$ 305.2 +$\mathrm{F}_2$ 557.4 ----------------- -------- ------- -------- : G 207-9 and LP 133-144: periods utilized for the model fits.[]{data-label="table:periods"} Best-fitting models for G 207-9 ------------------------------- We determined the best-matching models considering several cases: at first, we let all modes to be either $l=1$ or $l=2$. Then we assumed that the dominant peak is an $l=1$, considering the better visibility of $l=1$ modes over $l=2$ ones. At last, we searched for the best-fitting models assuming that at least four of the modes is $l=1$, including the dominant frequency. We obtained the same model as the best-fitting asteroseismic solution both for the seven- and eight-period fits. It has $T_{\rmn{eff}}=12\,000$K, $M_*=0.870\,M_{\sun}$ and $M_\rmn{H}=10^{-4}\,M_*$. This model has the lowest $\sigma_\mathrm{{rms}}$ ($1.04-1.06$s) both if we do not apply any restrictions on the $l$ values of the modes, and as it gives $l=1$ solution to the dominant frequency, this model is also the best-fit if we assume that the $291.9$s mode is $l=1$. Note that in this model solution only this mode is an $l=1$, all the other six or seven modes are $l=2$. In the case of four expected $l=1$ modes and seven periods, the best-matching model has the same effective temperature ($T_{\rmn{eff}}=12\,000$K), a bit lower stellar mass ($M_*=0.865\,M_{\sun}$), and thinner hydrogen layer ($M_\rmn{H}=10^{-6}\,M_*$). Assuming four $l=1$ modes and eight periods, the best-matching model has $T_{\rmn{eff}}=12\,400$K, $M_*=0.855\,M_{\sun}$ and $M_\rmn{H}=10^{-4.6}\,M_*$. The second best-fit model is the same as for four $l=1$ modes and seven periods. We denoted with open circles these two latter models in Fig. \[fig:grids\] (left panel) on the $T_{\rmn{eff}}-M_*$ plane, together with the spectroscopic solution. Both in the case of G 207-9 and LP 133-144, we utilized the $T_{\rmn{eff}}$ and surface gravity ($\mathrm{log}\,g$) values provided by @2011ApJ...743..138G, and then corrected them according to the results of @2013AA...559A.104T based on radiation-hydrodynamics 3D simulations of convective DA stellar atmospheres. We accepted the resulting values as the best estimates for these atmospheric parameters. We converted the surface gravities to stellar masses utilizing the theoretical masses determined for DA stars by @1996ApJ...468..350B. Considering the mass of the hydrogen layer (see the left panel of Fig. \[fig:grids2\]), we found that most of the models up to $\sigma_\mathrm{{rms}}=3.0$s are in the $M_\rmn{H}=10^{-4}-10^{-6}\,M_*$ range, while about a dozen models predict thinner hydrogen layer down to $10^{-8}\,M_*$. The best-fitting models favour the $M_\rmn{H}=10^{-4.6}\,M_*$ value. We summarize the results of the spectroscopic atmospheric parameter determinations, the former modelling results based on the 1975 frequency list, the main stellar parameters of the models mentioned above and the calculated periods fitted with our observed ones in Table \[table:g207params\]. We also list the $\sigma_\mathrm{{rms}}$ values of the models. The $T_{\rmn{eff}}=12\,000$K solutions are in agreement with the spectroscopic value. The $T_{\rmn{eff}}=12\,400$K model seems somewhat too hot comparing to the $\sim12\,100$K spectroscopic temperature, but considering that the uncertainties of both values are estimated to be around $200$K, this model still not contradicts to the observations. The $0.855-0.870\,M_*$ stellar masses are also close to the value derived by spectroscopy, considering its uncertainty. Summing it up, we can find models with stellar parameters and periods close to the observed values even if we assume that at least half of the modes is $l=1$, including the dominant mode. ![image](grids_colour.eps){width="17.5cm"} ![image](grids2.eps){width="17.5cm"} [llrrrr]{} $T_{\rmn{eff}}$ (K) & & & & & Reference\ \ 12078$\pm$200 & 0.84$\pm$0.03 & & & & @2011ApJ...743..138G\ & & & & & @2013AA...559A.104T\ \ 12000 & 0.815 & 2.0 & 8.5 & 259.0, 292.0, 317.3, 557.3, 740.7, 787.5$^\star$ & @2009MNRAS.396.1709C\ 11700 & 0.530 & 3.5 & 6.5 & 259.0, 292.0, 317.3, 557.3, 740.7, 787.5$^\star$ & @2009MNRAS.396.1709C\ 12030 & 0.837 & 2.5 & 6–7 & 259.1 (1,4), 292.0 (2,10), 318.0 (1,5),& @2012MNRAS.420.1462R [@2013ApJ...779...58R]\ & & & & 557.4 (1,12), 740.4 (1,17) &\ & & & & &\ & & &\ & & & & &\ 12000 (1.06s) & 0.870 & 2.0 & 4.0 & 291.0 (1,7), 595.5 (2,32), 195.8 (2,9), &\ & & & & 625.6 (2,34), 129.0 (2,5), 319.7 (2,16), &\ & & & & 305.4 (2,13), 558.6 (2,28) &\ 12000 (1.61s) & 0.865 & 2.0 & 6.0 & 290.6 (1,5), 594.5 (1,14), 193.1 (2,6), &\ & & & & 623.9 (1,15), 130.4 (2,3), 316.6 (1,6), &\ & & & & 306.2 (2,12), 555.1 (2,24) &\ 12400 (1.50s) & 0.855 & 2.0 & 4.6 & 290.5 (1,6), 594.7 (1,16), 194.0 (1,3), &\ & & & & 624.7 (1,17), 132.3 (2,4), 318.7 (2,14), &\ & & & & 304.6 (2,13), 557.0 (2,27) &\ \ \ Best-fitting models for LP 133-144 ---------------------------------- The model with the lowest $\sigma_\mathrm{{rms}}$ ($0.46$s) has $T_{\rmn{eff}}=11\,800$K, $M_*=0.710\,M_{\sun}$ and $M_\rmn{H}=10^{-4.0}\,M_*$ if we do not apply any restrictions on the $l$ values of modes. Generally, the best-matching models have masses around $0.7\,M_{\sun}$, which are at least $0.1\,M_{\sun}$ larger than the spectroscopic value. These models provide $3-4$ $l=1$ solutions to the observed modes. We searched for the best-matching models in a second run, assuming that the three largest amplitude modes showing triplet structures at 209.2, 305.9 and 270.6s are all $l=1$ modes. The best-matching model has the same effective temperature ($T_{\rmn{eff}}=11\,800$K), slightly larger mass ($M_*=0.725\,M_{\sun}$) and much thinner hydrogen layer ($M_\rmn{H}=10^{-8.0}\,M_*$) than the previously selected model. The mass still seems too large comparing to the spectroscopic value, but it gives $l=1$ solutions for all the four modes with triplet frequencies, including the mode at 179.5s. These modes are consecutive radial overtones with $k=1-4$. We denoted this model with an open circle on the middle and right panels of Fig. \[fig:grids\]. The hydrogen layer masses versus the $\sigma_\mathrm{{rms}}$ values of these models are plotted in the right panel of Fig. \[fig:grids2\]. This figure also shows that the best-fitting models have thin hydrogen layer with $M_\rmn{H}=10^{-8.0}\,M_*$. Otherwise, two families of model solutions outlines: one with $M_\rmn{H}=10^{-4.0}-10^{-6.0}\,M_*$ and one with thinner, $M_\rmn{H}=10^{-7.6}-10^{-8.0}\,M_*$ hydrogen layers. If we restrict our period fitting to the models with effective temperatures and masses being in the range determined by spectroscopy, the best-matching model has $T_{\rmn{eff}}=12\,000$K, $M_*=0.605\,M_{\sun}$ and $M_\rmn{H}=10^{-4.2}\,M_*$. However, the 179.5s mode is $l=2$ in this case, while all the other frequencies are consecutive radial order $l=1$ modes. At last, we searched for models in this restricted parameter space and assuming that all the four frequencies showing triplets are $l=1$. Our finding with the lowest $\sigma_\mathrm{{rms}}$ has $T_{\rmn{eff}}=12\,000$K, $M_*=0.585\,M_{\sun}$ and $M_\rmn{H}=10^{-5.0}\,M_*$, however, its $\sigma_\mathrm{{rms}}$ is relatively large ($6.8$s), which means that there are major differences between the observed and calculated periods. Table \[table:lp133params\] lists the stellar parameters and theoretical periods of the models mentioned above. For completeness, we included this last model solution, too. We concluded, that our models predict at least $0.1\,M_{\sun}$ larger stellar mass for LP 133-144 than the spectroscopic value. Nevertheless, it is possible to find models with lower stellar masses, but in these cases not all the modes with triplet frequency structures has $l=1$ solutions and (or) the corresponding $\sigma_\mathrm{{rms}}$ values are larger than for the larger mass models. Considering the effective temperatures, the $T_{\rmn{eff}}=12\,000$K solutions are in agreement with the spectroscopic determination ($\sim12\,150$K) within its margin of error. As in the case of G 207-9, taking into account that the uncertainties for the grid parameters are of the order of the step sizes in the grid, the $T_{\rmn{eff}}=11\,800$K findings are still acceptable. [llrrrr]{} $T_{\rmn{eff}}$ (K) & & & & & Reference\ \ 12152$\pm$200 & 0.59$\pm$0.03 & & & & @2011ApJ...743..138G\ & & & & & @2013AA...559A.104T\ \ 11700 & 0.520 & 2.0 & 5.0 & 209.2 (1,2), 305.7 (2,7), 327.3 (2,8) & @2009MNRAS.396.1709C\ 12210 & 0.609 & 1.6 & $\sim6$ & 209.2 (1,2), 305.7 (2,8), 327.3 (2,9) & @2012MNRAS.420.1462R\ & & & & &\ & & &\ & & & & &\ 11800 (0.46s) & 0.710 & 2.0 & 4.0 & 208.8 (1,3), 305.6 (2,11), 270.1 (1,5), &\ & & & & 327.2 (1,6), 140.6 (2,4), 180.4 (1,2) &\ 11800 (1.46s) & 0.725 & 2.0 & 8.0 & 209.5 (1,2), 304.5 (1,4), 268.8 (1,3), &\ & & & & 328.3 (2,9), 138.5 (2,2), 181.0 (1,1) &\ 12000 (2.89s) & 0.605 & 2.0 & 4.2 & 204.5 (1,2), 307.9 (1,4), 271.5 (1,3), &\ & & & & 326.2 (1,5), 138.4 (1,1), 183.7 (2,4) &\ 12000 (6.83s) & 0.585 & 2.0 & 5.0 & 215.3 (1,2), 311.6 (1,4), 273.3 (1,3), &\ & & & & 326.6 (2,9), 126.6 (2,2), 176.4 (1,1) &\ ### Stellar rotation {#sect:lp133rot} A plausible explanation for the observed triplet structures is that these are rotationally split frequency components of $l=1$ modes. We used this assumption previously in searching for model solutions for our observed periods. Knowing the frequency differences of the triplet components ($\delta f$), we can estimate the rotation period of the pulsator. In the case of slow rotation, the frequency differences of the $m=-1,0,1$ rotationally split components can be calculated (to first order) by the following relation: $$\label{eq:rot} \delta f_{k,\ell,m} = \delta m (1-C_{k,\ell}) \Omega,$$ where the coefficient for high-overtone ($k\gg\ell$) $g$-modes and $\Omega$ is the (uniform) rotation frequency. In the case of LP 133-144, the presumed $l=1$ modes are low radial-order frequencies ($k=1-6$), but the $C_{k,\ell}$ values of the fitted modes can be derived by the asteroseismic models. We used the average of the frequency separations within a triplet and calculated the stellar rotation rate separately for $f_1$, $f_2$, $f_3$ and $f_6$ (see e.g. @2015MNRAS.451.1701H). We utilized the $T_{\rmn{eff}}=11\,800$K, $M_*=0.725\,M_{\sun}$ model. The resulting rotation periods are: $P_{f_1} = 1.83$d ($\overline{\delta f_1}=4.15\,\mu$Hz, $C_{k,\ell}=0.345$), $P_{f_2} = 1.82$d ($\overline{\delta f_2}=3.2\,\mu$Hz, $C_{k,\ell}=0.497$), $P_{f_3} = 1.69$d ($\overline{\delta f_3}=3.5\,\mu$Hz, $C_{k,\ell}=0.489$) and $P_{f_6} = 1.60$d ($\overline{\delta f_6}=4.75\,\mu$Hz, $C_{k,\ell}=0.343$). The average rotation period thus $1.74\pm0.11$d ($\sim42$h). This fits perfectly in the known rotation rates of the order of hours to days of ZZ Ceti stars (cf. Table 4 in @2008PASP..120.1043F). Note that the rotation periods calculated by the different multiplet structures are strongly depend on the actual values of observed frequency spacings and also on the $C_{k,\ell}$ values, which vary from model to model. Thus the different rotation periods calculated for the different modes does not of necessarily mean that e.g. in this case we detected differential rotation of the star, but we can provide a reasonable estimation on the global rotation period of LP 133-144. Summary and Conclusions ======================= We have presented the results of the one-season-long photometric observations of the ZZ Ceti stars G 207-9 and LP 133-144. These rarely observed pulsators are located in the middle and in the hot part of the instability strip, respectively. G 207-9 was found to be a massive object previously by spectroscopic observations, comparing its predicted $M_*>0.8\,M_{\sun}$ mass to the average $\sim0.6\,M_{\sun}$ value of DA stars (see e.g. @2013ApJS..204....5K). In contrary, the mass of LP 133-144 was expected to be around this average value. With our observations performed at Konkoly Observatory, we extended the number of known pulsation frequencies in both stars. We found seven linearly independent modes in G 207-9, including five newly detected frequencies, comparing to the literature data. We also detected the possible signs of additional frequencies around some of the G 207-9 modes, but their separations being close to the 1d$^{-1}$ value makes their detection uncertain. Multi-site or space-based observations could verify or disprove their presence. In the case of LP 133-144, we detected three new normal modes out of the six derived, and revealed that at least at three modes there are actually triplet frequencies with frequency separations of $\sim4\mu$Hz. All the pulsation modes of LP 133-144 and most of the modes of G 207-9 are found to be below 330s, with amplitudes up to $\sim10$mmag. This fits to the well-known trend observed at ZZ Ceti stars that at higher effective temperatures we see lower amplitude and shorter period light variations than closer to the red edge of the instability strip (see e.g. @2008PASP..120.1043F). We also found that on the five-month time scale of our observations there were no significant amplitude variations in either stars. This suits to their location in the instability domain again, as short time scale large amplitude variations are characteristics of ZZ Cetis with lower effective temperatures. However, in the case of G 207-9, the different frequency content of the 1975 and 2007 observations shows that amplitude variations do occur on decade-long time scale. In addition, similar pulsational feature of the two stars is that both show light variations with one dominant mode ($A=10-11$mmag) and several lower amplitude frequencies. The extended list of known modes allowed to perform new asteroseismic fits for both objects, in which we compared the observed and calculated periods both with and without any restrictions on the $l$ values of modes. The best-matching models of G 207-9 have found to be close to the spectroscopic effective temperature and stellar mass, predicting $T_{\rmn{eff}}=12\,000$ or $12\,400$K and $M_*=0.855-0.870\,M_{\sun}$. For LP 133-144, the best-fitting models prefer more than $0.1\,M_{\sun}$ larger stellar masses than the spectroscopic measurements and $T_{\rmn{eff}}=11\,800$K effective temperatures. The main sources of the differences in our model solutions and the models presented by @2009MNRAS.396.1709C, even though they also used the <span style="font-variant:small-caps;">wdec</span>, can arise from the different periods utilized for the fits, the different core composition profiles applied, and the different way they determined the best-fitting models utilizing the amplitudes of observed periods as weights to define the goodness of the fits. At last, we derived the rotational period of LP 133-144 based on the observed triplets and obtained $P_{\rmn{rot}}\simeq42$h. Note that the results of the asteroseismic fits presented in this manuscript are preliminary findings, and both objects deserve more detailed seismic investigations utilizing the extended period lists, similarly to the modelling presented for other hot DAV stars, GD 165 and Ross 548 [@2016ApJS..223...10G]. In the case of these objects, the authors could identify models reproducing the observed periods quite well while staying close to the spectroscopic stellar parameters, and also verified the credibility of the selected models in many other ways, including the investigation of rotationally split frequencies. Acknowledgements {#acknowledgements .unnumbered} ================ The authors thank the anonymous referee for the constructive comments on the manuscript. The authors thank Agnès Bischoff-Kim for providing her version of the <span style="font-variant:small-caps;">wdec</span> and the <span style="font-variant:small-caps;">fitper</span> program. The authors also thank the contribution of E. Bokor, Á. Győrffy, Gy. Kerekes, A. Már and N. Sztankó to the observations of the stars. The financial support of the Hungarian National Research, Development and Innovation Office (NKFIH) grants K-115709 and PD-116175, and the LP2014-17 Program of the Hungarian Academy of Sciences are acknowledged. P.I.P. is a Postdoctoral Fellow of the The Research Foundation – Flanders (FWO), Belgium. L.M. and Á.S. was supported by the János Bolyai Research Scholarship of the Hungarian Academy of Sciences. {#app:g207} Normalized differential light curves of G 207-9 obtained in 2007 at Piszkéstető mountain station of Konkoly Observatory. {#app:lp133} Normalized differential light curves of LP 133-144 obtained in 2007 at Piszkéstető mountain station of Konkoly Observatory. \[lastpage\] [^1]: E-mail: bognar.zsofia@csfk.mta.hu (Zs.B.) [^2]: <span style="font-variant:small-caps;">iraf</span> is distributed by the National Optical Astronomy Observatories, which are operated by the Association of Universities for Research in Astronomy, Inc., under cooperative agreement with the National Science Foundation. [^3]: http://astroutils.astronomy.ohio-state.edu/time/utc2bjd.html
{ "pile_set_name": "ArXiv" }
Switch generic icon to negative feedback for non-https sites - diafygi https://bugzilla.mozilla.org/show_bug.cgi?id=1041087 ====== codezero There have been a few times when I've got a legitimate red icon for bad certificates and what not. Pushing this to the rest of the web will mean I'll miss real errors through the noise because they happen so infrequently that I'll just stop checking if every website has a red icon. ~~~ briansmith Browsers completely stop the page from loading and show a full-page error for a certificate error. There's a huge difference between that and a small icon in the location bar. Plus, if the red icon that is suggested in that bug report is too loud, a less loud indicator could be used instead. There's a lot more to designing a UI for this than just changing the icon. For example, when you type "foo.com" into the address bar, browsers generally default to "[http://foo.com"](http://foo.com") instead of "[https://foo.com."](https://foo.com.") And, consequently, browsers tend to show "[http://foo.com"](http://foo.com") as "foo.com" to suggest that you don't need to type the "[http://"](http://") part. All of that needs to change to become a lot smarter in order for this type of idea to succeed. However, it doesn't seem completely unreasonable to consider making all those changes. In fact, I think these changes should be a high priority for browsers makers. tl;dr: I suggest people brainstorm ways to improve upon the idea to make it workable, instead of trying to shoot it down. ~~~ codezero Honestly, I'd prefer a heuristic that could determine whether https was significant on the current URL. Are there submitted values, cookies of importance, get parameters? There are a lot of reasons https is important and there are a lot of places where it's totally not important. If you draw people's attention to something that isn't seriously important, then those times when the whole screen sends a warning you go, "oh well, I had that red warning going all along and it didn't matter, so why do I care?" I am saying that by pushing a warning where it's not necessary, you diminish the value of any warning. ~~~ briansmith > There are a lot of places where it's totally not important. See my other replies on this page for some reasons why I think there are no pages where HTTPS is not important. I agree with you regarding the UI issues and the potential to generate apathy by crying wolf. That's why I think that the specifics of the linked-to proposal won't work. But, I think the general idea is worth investigating. It just requires some user research. Also, the fact that browsers support a non-HTTPS mode at all is really the bigger UI issue. Imagine if HTTPS was the only option. The biggest UI security problems would instantly vanish! That's a big reason why a lot of people are actively working so hard on finding ways to make HTTPS work for everybody on every site. ------ mplewis Putting a red icon on 90% of all websites means the meaning of the icon will just saturate and people won't pay attention to the red icon any more. ~~~ briansmith FWIW, ~33% of all pages are loaded over HTTPS already in Firefox, according to the metrics collected by the browser. And, over 50% of all HTTP requests (including subresources like images and scripts embedded on a page) are over HTTPS, again according to the usage data collected by the browser. ~~~ scrollaway I'd be willing to bet quite high all these HTTPS requests are all on the same specific services (facebook, gmail, google would already take most of them). ------ danso No. Not all sites exchange data worth the SSL-layer...let's say, 30-50% of the sites...that means for roughly half a user's non-email/social-networking web- browsing, they're going to either be saturated with a warning message that, if psychology research is to believed, is going to be promptly ignored like your apartment's super-sensitive smoke detector or the boy watching out for wolves. What's the actual reasoning in OP's mind here? That the average web user is someone who, when the computer gives some warning sign that is disconnected from any kind of discernable threat, that the user will automatically take it seriously? That they'll demand to know why they're in danger, and then will rise up and petition the Internet regulatory commission to make all sites do what it takes to make that red icon go away, and the web will be more secure? I don't want to be overtly negative towards well-intended idealism, but this is such a bizarrely naive viewpoint that it must be openly challenged. That, and it just blithely ignores all the research showing what happens when humans are overloaded with impotent warning signs. This is the kind of idealism- without-consequences that can end up causing more harm than good. ~~~ scrollaway This is not a user-oriented proposal, this is clearly directed at the website owners which are not going to want _their_ users to see red stuff on the URL bar. ~~~ danso Not a bad strategy. Until the website owners take the path of least resistance between: A. Reconfiguring their stack to use SSL. B. Putting a Javascript-powered banner helpfully informing all Firefox users that their browser has a security flaw ("that's why that red icon is there") and they should follow the included hyperlinks to install the latest versions of Internet Explorer or Chrome and then delete Firefox from their systems. ~~~ scrollaway That B strategy might have worked a few years back for grandmas that got Firefox installed by their geeky grandson, but Firefox is popular now. And people (geek or no geek) don't like being told the stuff _they_ use is not good. Here's an experiment you can do at home: Try telling an emacs user Vim is better. ------ omni Why should my blog of static pages need to be served over HTTPS to avoid having Firefox slap a scary red icon next to it? ~~~ scrollaway Why shouldn't it is the real question. There's a parallel universe where ssh is plaintext, and only "sensitive commands", such as "sudo", are encrypted. In that universe though, plaintext HTTP doesn't exist and they're making fun of us. ~~~ mynameisvlad Because no sensitive content is being transferred. Why put the extra hassle of getting and installing a non-self-signed certificate for a blog where the user doesn't even submit data? There's no reason for that connection to be secure. ~~~ scrollaway > Because no sensitive content is being transferred. You're answering "why" instead of answering "why not" again. "Why should you lock your door if you don't have anything expensive?" Plaintext HTTP should not exist, then we wouldn't be having this discussion. I wouldn't have to come up with elaborate scenarios where having HTTPS from the get go would have saved lives, and you wouldn't have to come up with crazy "but that'll never happen" retort to them. Unfortunately, plaintext HTTP exists, so here we are, with me telling you that the pro-gay rights piece you wrote on your static blog contains keywords that make it be viewed as extremism/terrorism by Russia's automated monitoring systems and anyone reading it gets immediately added to a watchlist. Unfortunately, a few of your readers are from russia and six months later those readers join a political protest against the killing of kittens or something. Their government notices that and makes sure to "take action". And to think HTTPS could have avoided that. ~~~ Yver > "Why should you lock your door if you don't have anything expensive?" Locks come standard on every door, they don't expire after a given time and every child knows how to use them. See how your comparison to acquiring, setting up and maintainning an SSL certificate is nonsensical? > And to think HTTPS could have avoided that. If the NSA tags people who look for info on TOR as extremists, an hypothetical state might tag people who use HTTPS. And to think that HTTP could have avoided that! I mean, if every argument is an hypothetical, anything is possible. ~~~ scrollaway If HTTPS is used globally, people can't be flagged for using it (or the flags end up being useless). Right now, you are correct, people could hypothetically be flagged for using HTTPS. This would not happen if every static blog and what not out there would use it. Thank you for reinforcing my point, I appreciate the help. ------ rcthompson What about warning the user when they start to type in a login box on a non- https site? Browsers should already know what is a login box, since they know how to prompt you to remember the password. ~~~ timmclean Sort of like what IE used to do the first time you submitted a form? [http://bmlinks-committee.jbmia.or.jp/eng/image/EnDlg03.gif](http://bmlinks- committee.jbmia.or.jp/eng/image/EnDlg03.gif) ~~~ scrollaway Talk about full circle. ------ john2x The proposed icon is hard to parse. Better an open lock? And maybe in orange instead of jarring red. Or even better, make the secure icon something universally positive, like a green smiley face or a check mark. Then the insecure icon can be an orange sad face or X mark. (Lock icon can be ambiguous to non-techies. i.e. why is the url locked? or is that a suitcase/purse?) ------ Karunamon Greeaaaat. Just what everyone needs. An extra expense and further entrenchment of our exploitative CA system. I like this idea, but not when it puts more money in the pocket of the CAs. ~~~ scrollaway If a better/broader alternative to CAs comes along and is adopted (say, such as SPDY), I take it the icon would behave the same way. Your comment is really unwarranted... Not to mention this is just some random guy. It's not like mozilla is actually thinking about this (they really should). ~~~ Karunamon >Your comment is really unwarranted... Not really - changes like this don't exist in a vacuum. Anything that makes the existing CA's more indispensable (say, by driving customers their way by making it appear bad to not do business with them) is a net negative. ------ kbaker They should at least wait for DANE + DNSSEC, which is a tangible (and free) alternative to the CA system, even though it would still be quite a bit of effort. I'd be curious to know how this would affect local servers in the intranet. Surely we wouldn't want to have to start issuing certs for everything inside the firewall as well? I think this is a bit too shortsighted of a bug report. Anyways, since this is not an official proposal, I think it will just be closed as invalid by Mozilla. ------ peterkelly I vote for the NSA logo
{ "pile_set_name": "HackerNews" }
The increase in electronic commerce has increased the focus on security of the electronic transactions using this medium of commerce. In the world of computer transactions and electronic contracts, there is no face-to-face acknowledgement to identify the consumer or other person wishing to perform the transaction. As institutions become more reliant on computers, they have modified their business infrastructure (i.e., their “business process”) in an attempt to keep up with electronic commerce. The business process of an institution includes the methods used to interact with a customer (e.g., how transactions occur, what information is required from the customer, help desks to support the customer), the information contained in customer accounts, the databases used and how they are modified by the institution, and personnel training. Institutions and persons desiring to utilize electronic commerce are faced with several issues regarding electronic transactions. The first issue is whether the person requesting the transaction is who they say they are (“identification”). And the second issue is whether the requested transaction is actually the transaction intended to be requested (“accuracy”). In other words, whether the requested transaction has been compromised, either fraudulently or through transmission errors, during the course of transmitting and receiving the request. To address the identity, of the person requesting the transaction, current financial business processes bind information in accounts to authenticate non-face-to-face transactions. For example, an account holder's mother's maiden name, a personal identification number (PIN), and a social security number have all been used and integrated into the current financial infrastructure to aid in reliably identifying someone requesting a non-face-to-face transaction. To address the accuracy of the electronic message being sent and the identity of the person sending the electronic message, digital signatures are utilized. Digital signatures are used with electronic messages and provide a way for the sender of the message to electronically “sign” the message as a way of providing proof of the identity of the sender and the accuracy of the message. In a digital signature system, a sender digitally “signs” the message using a private key (encryption software used to create a digital signature). The receiver validates the sender's digital signature by using the sender's public key (software used to decrypt the digital signature) sent to the receiver by the sender. While, digital signatures provide some assurance of accuracy for the message and the identity of the sender, they are also subject to security risks. These risks include compromised private and public keys or merchant fraud. To address the security risks and validate the digital signatures, computer technology has developed “certification authorities” to be used in a Certificate Authority Digital Signature (“CADS”) system. In a CADS system, certification authorities are third parties that essentially “vouch” for the validity of a digital signature's public key and, hence, the validity of the digital signature. However, certification authorities used in the CADS system come with inherent risks, such as an expired certification authority and a compromised private key, which affect the entire public key infrastructure. In addition, the increased reliability provided by certification authorities does not easily combine with the business process currently established. Therefore, there is a need in the art for a method to increase the reliability of electronic transactions while not imposing significant modifications on the business processes already in place.
{ "pile_set_name": "USPTO Backgrounds" }
According to this bug report, we can't use Skype on an hardened system. Is there any workaround ? I guess that running Skype in a chroot solves the problem, doesn't it ? Any way, I would prefer a simpler solution than putting in place a chroot. I know that Skype is a closed-source application, and using it on hardened systems is a total non-sense for some of you. I'm a daily Skype user, so I really need it on my system. Message to the log: I could successfully upgrade sun-jdk from 1.6.0.17 to 1.6.0.19 after I've upgraded the kernel version from 2.6.31-hardened-r11 to 2.6.33-hardened. I'm suspect this issue had something to do with PaX - but not sure. Previously I had problems using with 2.6.32-hardened: X crashed instantly. Now 2.6.33-hardened seems to be OK, so I can move on. 2.6.31-hardened-r11 seems to be the culprit factor. The strange thing is, that everything was running fine both on the laptop and the server apart from these failures... The Easter holiday will be an excellent occasion to give openoffice-3.2.0 another spin with the new kernel. Regards: Dw. Same problem as before while bumping sun-jdk from 1.6.0.19 to 1.6.0.20. The ebuild fails at the same place in the install phase. To workaround it I had to paxctl -ps {S}/bin/java and finish merging the package using ebuild install and qmerge... Openoffice 3.2 still have problems with regcomp and access violation occurs. For the latter I suspect a wrong environment path detection - probably hardened related. I try to workaround openoffice also. I disabled binfilter, which also makes the ebuild die. Joined: 30 Mar 2008Posts: 364Location: Umeå The north part of scandinavia Posted: Sat May 01, 2010 1:09 pm Post subject: We have change alot in the overlay for the gcc part. We have change code in toolchain.eclass so we support piepatches instead of the espf stuff. On the patch stuff we have rename the patchset and change some name but it still the espf patchset. Moste of this is done so it can move to the tree later on. Happy testing._________________gcc version 4.6.2 (Gentoo Hardened 4.6.2 p1.1, pie-0.5.0) We have change alot in the overlay for the gcc part. We have change code in toolchain.eclass so we support piepatches instead of the espf stuff. On the patch stuff we have rename the patchset and change some name but it still the espf patchset. Moste of this is done so it can move to the tree later on. Happy testing. Joined: 30 Mar 2008Posts: 364Location: Umeå The north part of scandinavia Posted: Sat May 15, 2010 1:32 pm Post subject: GCC 4.3.4 is gone form the overlay use 4.4.3 for it is on the way to get stable when the arch tester have done the testing. Still waiting for may changes to toolchain.eclass and glibc to get approved. Grub need a bump in the patchset in the tree. Have good day._________________gcc version 4.6.2 (Gentoo Hardened 4.6.2 p1.1, pie-0.5.0) Openoffice 3.2 still fails to compile (even after fixing the access violation and setting runtime paxctl flags on a binary). Openoffice 3.1 still compiles fine. It would be more important, but others have better luck with oOO as I recall. I still didn't give it up. So as one can see these files define their custom _init and _fini procedures. That was the point where I gave up and unmerged the package. I had no time to fix these (dated back to 2000). Regards: Dw. Although I've said I had unmerged it, I couldn't actually give up. Here is the solution: media-libs/ladspa-sdk calls $(LD) directly besides using cc instead of ld, one should pass -nostartfiles for linking those object having their own custom _init and _fini. Gosh... from what I can tell it's either not directly hardened-related (say: use google), you have not enough memory or you could temporarily try whether older versions are effected too (1.6.0.19)/emerge fine, etc. Here is my workaround: Issue the emerge command and observe, the failure. After that "paxctl -ps /var/tmp/portage/dev-java/sun-jdk-1.6.0.xx/bin/java". Then ebuild /usr/portage/dev-java/sun-jdk-1.6.0.xx.ebuild install. Don't forget to qmerge and clean at the end. There you go.
{ "pile_set_name": "Pile-CC" }
Blog A 2018 Honda Accord assembled at a plant in Ohio on Wednesday became the 25 millionth car produced by Honda in the United States. The Marysville Auto Plant in Ohio produced the milestone Accord and to celebrate the occasion the car was painted in obsidian blue pearl. The plant began production in 1982 as Honda became the first Japanese automaker to produce cars in the U.S. Honda now has five U.S. auto plants. "This achievement truly represents 25 million customers who put their faith in the Honda brand and we will continue to honor this relationship with a focus on achieving the highest levels of quality and innovation in the next 25 million vehicles," said Tom Shoupe, executive vice president and chief operating officer of Honda of America Mfg., in a press release. To celebrate the milestone Honda started an annual scholarship fund with an initial donation of $25,000. Students pursuing degrees in engineering, supply chain and manufacturing at Historically Black Colleges and University are eligible. Scholarship recipients will be invited to interview for internships and co-op positions at Honda operations. Our Partners VehiclesTEST uses Flick Fusion's SMARTFLICKS as its video hosting platform, and the HTML5 player is the most effective way to stream videos online, for display on mobile phones and desktops/laptops and tablets. We are partners with www.testimonialbuilder.com a great company that helps businesses gain exposure to potential customers with video testimonials. Their app available for iPhone and iPad or Android makes it easy to film and syndicate video testimonials from happy customers. Build positive online exposure and impact new buyers by creating personal references from people who have done business with you and share it across social media.
{ "pile_set_name": "Pile-CC" }
Facebook’s former Chief Security Officer (CSO), Alex Stamos, claimed on Thursday that Apple needs to “come clean” about its practices in China. After Apple CEO Tim Cook spoke about privacy in Brussels on Wednesday, Stamos responded in a series of Twitter posts, criticizing the media for praising Cook’s support for more privacy in the West while denying Chinese consumers the same right. “I agree with almost everything Tim Cook said in his privacy speech today, which is why it is so sad to see the media credulously covering his statements without the context of Apple’s actions in China,” declared Stamos. “The missing context? Apple uses hardware-rooted DRM to deny Chinese users the ability to install the VPN and E2E messaging apps that would allow them to avoid pervasive censorship and surveillance. Apple moved iCloud data into a PRC-controlled joint venture with unclear impacts.” “China is an ethical blind spot for many in tech: We ignore the working conditions under which our beautiful devices are made, the censorship and surveillance necessary to ship apps there, the environmental externalities of coal-powered Chinese Bitcoin farms,” he continued. “We don’t want the media to create an incentive structure that ignores treating Chinese citizens as less-deserving of privacy protections because a CEO is willing to bad-mouth the business model of their primary competitor, who uses advertising to subsidize cheaper devices.” “Cook is right, the US needs a strong privacy law and privacy regulator, and advertising companies like Google, Facebook and Twitter need to collect less data and minimize more often,” Stamos concluded, adding, however, that “Apple needs to come clean on how iCloud works in China and stop setting damaging precedents for how willing American companies will be to service the internal security desires of the Chinese Communist Party.” Stamos left his position at Facebook in August following the social network’s user data scandal, and announced that he had accepted a teaching role at Stanford University.
{ "pile_set_name": "OpenWebText2" }
The home page at http://www.cyber24.com/ has a white background. There is no blue ribbon on the page. On the first content page, a picture taken by Tipper Gore. There are six sections, with introductory pieces written by interesting people. Al Gore! And he isn't talking about freedom of speech on the Internet. Rick sold out. It's so disappointing! I've been talking with Rick privately and publicly over the last few days. "What's more disturbing is how many people I respect are willing to go along with Clinton and Gore on this. I don't care if the Republicans would be worse. I don't care if it's unconstitutional. Clinton is the president of the United States. Remember what that means! Let's be clear that attempted censorship is a crime against humanity, much as attempted murder is serious felony. "We are offended. It may not be the end. These guys run campaigns. They're here for the long haul. Gore looks good. That man will run for president some day, and he knows it. What is he really saying about us? He looks good, until you look at the truth." I hoped he would read it, and see that his contribution could be a positive one. I talked with him on Tuesday night and asked that he support free speech on the Internet. I told him that it would be OK if Gore was part of the project if he would go on the record about free speech. A blue ribbon is required. I believe selling out is the normal way of doing business in the world that Rick comes from. I've never seen such a clear example. I wanted to believe the best about Rick, I've seen him stand up for what's right, but apparently only when it's easy for him to do so. He may be missing the point. The Internet is about freedom. Until we get sold out. Then it's about sucking up. I said: "The US government is clamping down. Even if the new censorship law isn't widely enforceable, or if it's judged unconstitutional, someone is going to be the test case, and that person will feel like a citizen of Stalinist Russia. The new law imprisons all of us, as it did in Russia, because it causes us to pull back from offending people with political power." I'm sorry I pointed my readers at his site. It's a vestige of an old way of doing business. When we vote Clinton out of office in November we will be voting against the team that Smolan apparently wants to please. I can even appeal to Clinton, at the last minute, to send this bill back to Congress for correction. Fundamental change could happen in 1996. It might be the year when we elect neither a Republican or a Democrat as president of the United States. If it weren't for Perot's incompetence, it might have happened in 1992. And in 1996 we have the Internet as an organizational tool. So... There's still time to fix it! Rick: please take Gore off your site until he's ready to talk about freedom. Switch background colors. And put up a blue ribbon. The web is a positive energy space. You're on the wrong side. Dave Winer PS: If I were a photographer working on Rick's project, I would not send in my pictures until the site is corrected.
{ "pile_set_name": "Pile-CC" }
Analysis of Rhioxma Curcumae Aeruginosae volatiles by solid-phase microextraction with gas chromatography-mass spectrometry. In this paper, a headspace solid-phase microextraction (HS-SPME) method was applied to analyse the volatile compounds in a traditional Chinese medicine (TCM), Rhioxma Curcumae Aeruginosae. SPME parameters such as fibers, extraction temperature, extraction time and desorption time were investigated. Thirty-five volatile compounds were separated and identified. Relative standard deviations (RSDs) were less than 8.4%, showing that the method has a good reproducibility. The volatile constituents were also analyzed by steam distillation (SD) and thirty-seven compounds were identified. The similar results obtained by the two methods showed that SPME is a good alternative for the analysis of volatile constituents in Rhioxma Curcumae Aeruginosae samples and it is a relatively simple, rapid and solvent-free method.
{ "pile_set_name": "PubMed Abstracts" }
Jehovah's Witness abuser quoted scripture while assaulting daughter As a child growing up in a strict Jehovah's Witness household she was taught to obey her father as head of the family and warned that outsiders were "worldly people" who served Satan. In a harrowing day of evidence before the Royal Commission into Institutional Responses to Child Sexual Abuse, the woman detailed how her father repeatedly sexually abused her and her three sisters. The father, given the pseudonym BCH, was a respected figure in the church who would conduct door-to-door preaching and deliver talks from an elevated platform at his congregation's kingdom hall in Queensland. At home the man became a tyrant, with the commission hearing that he would beat his daughter so hard with a leather belt she would bleed from the welts.
{ "pile_set_name": "Pile-CC" }
Q: Waterline - Where with sum of fields I've got the following model Test module.exports = { attributes: { a: { type: 'number' }, b: { type: 'number' } } } I would like to build a query that allows me to put sum of fields a and b in where statement. SQL equavilent: SELECT * FROM Test WHERE a + b = myValue I read in sails doc's about Criteria modifiers but there is no word about that. Is there any clever way to do that? Of course I can use native query but I would like to avoid that because I must use the sum along with other modifiers. The reason is I'm generating dynamic queries from separate files and with native queries I will have to also handle already defined functionality like or, and, etc. A: I found a workaround. Maybe it will be useful to someone. It is not stricte sails/node solution, but database one, however, it fits my case perfectly. From MySQL 5.7 there is something like generated columns. Columns are generated because the data in these columns are computed based on predefined expressions. All I had to do was add an extra, auto generated column to my Test model: module.exports = { attributes: { a: { type: 'number', columnType: 'int' }, b: { type: 'number', columnType: 'int' }, c: { type: 'number', columnType: 'int GENERATED ALWAYS AS(a + b) VIRTUAL' } } } Now I'm able to do such query: const result = await Test.find({ c: 2 }) ...and I get the correct result. Waterline treats my column like any other, database does everything instead of me. Of course I can mix it with other modifiers with no problems. I haven't seen any complications so far.
{ "pile_set_name": "StackExchange" }
Many electronic devices such as personal computers, mobile devices including phones and personal digital assistants (PDAs) use some form of authentication, typically a password that must be input into the device to gain access. The password is most often typed onto a keyboard or other interface which then allows the user to gain partial or full access to the utility of the device and/or network. A problem associated with using passwords is that they are time consuming and inconvenient for the user to enter. Users often use informal passwords or share their password with others which works to compromise system security. These practices negate the password's value and make it difficult to have an accurate auditing of access. Moreover, passwords are expensive to administer when forgotten or misplaced. Although the use of other types of security access systems such as voice recognition, fingerprint recognition or iris scans have been implemented, these types of systems require a different procedure to access and use the device. These techniques also require a specific and time-consuming enrollment process in order to be operational. Additionally, radio frequency (RF), infrared (IR), and ultrasonic transmitter devices have also been used as proximity-type devices to allow access when the transmitter is in a predetermined range of the device. The problem associated with these types of systems is the transmitter must be continuously worn or otherwise carried by the user. Should the transmitter signal be lost, misplaced or become inoperative, the user will no longer have any access to the device. Moreover, if another user has possession of the transmitter, the other user gains full access to the device. Obviously, this can lead to all types of security issues should the transmitter be lost or stolen. Finally, biometric authentication using facial recognition is also often used to gain access to electronic devices. U.S. Pat. No. 6,853,739 to Kyle and U.S. Pat. No. 6,724,919 to Akiyama et al., which are both herein incorporated by reference, disclose examples of identity verification systems wherein a database is employed to compare facial features of a user to those in the pre-established database. Once a comparison is made, then authentication is verified and access is granted to the system. The disadvantage of this type of system is the requirement of a separate and specific enrollment procedure by the user to create the database. As with this type of facial recognition system and others in the prior art, the database must be populated before being used; otherwise, the system will not operate. This puts an unnecessary burden on the system operator, requiring detailed education on the steps to populate the database before the system may become operational. Additionally, this type of security system does not permit the automatic updating of the database to accommodate changes in head position, user features (such as different glasses), a change in the camera's operational characteristics, lighting and other environmental factors. This can limit the speed, accuracy, and even the success of database matching (recognition). Also, these prior art facial recognition and other biometric systems operate only at the instant of authentication. Thus, these systems have no way of confirming the identity of the user even milliseconds after the actual authentication. The device has no way of knowing when a user has stepped away from the device, leaving the device unsecured. Existing methods of locking based on inactivity of data entry, such as keyboard or mouse activity, do not provide the needed flexibility. If they are set to lock on a very short delay, the user is locked out as the user is using the device. Conversely, if the delays are set long enough to not impact the user, the device is vulnerable to unauthorized access when the user steps away. Hence, the need exists to provide a system and method for providing secure access to an electronic device using facial recognition that provides continuous authentication, no special enrollment process, automatic updates to the biometric database to improve recognition performance and multi-factor authentication while not requiring unnecessary data processing. The recognition system and method should be capable of running on devices requiring relatively low computing power so as to provide an inexpensive and responsive approach to providing biometric user authentication with a high level of security.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Is there an inbuilt function to expand ipv6 addresses? I'm working on a project where I need to expand IPv6 addresses. Is there an inbuilt function in Go? What I'm currently doing is ipv6 := "fe80:01::af0" addr := net.ParseIP(ipv6) fmt.Println(addr.String()) but this still prints fe80:01::af0 What I actually need is fe80:0001:0000:0000:0000:0000:0000:0af0 A: There's nothing in the standard library to do this, but it's easy to write your own function. One possible approach (of many): func FullIPv6(ip net.IP) string { dst := make([]byte, hex.EncodedLen(len(ip))) _ = hex.Encode(dst, ip) return string(dst[0:4]) + ":" + string(dst[4:8]) + ":" + string(dst[8:12]) + ":" + string(dst[12:16]) + ":" + string(dst[16:20]) + ":" + string(dst[20:24]) + ":" + string(dst[24:28]) + ":" + string(dst[28:]) } Playground
{ "pile_set_name": "StackExchange" }
Urbano Cairo, intervenuto a Radio 24, non ha voluto esprimersi in merito alla possibile esclusione dalle coppe del Milan, sottolineando però che il Torino meriterebbe di disputare l'Europa League: "Non mi esprimo. Abbiamo fatto un campionato molto importante, 63 punti e settimo posto finale. Negli ultimi 15 anni non è mai successo con questi numeri di non andare in Europa. L’avremmo meritato. Se poi il Milan dovesse essere escluso, siamo pronti e faremo tutto quello che serve per ben figurare. Ma non mi piace aspettare cose che svantaggino qualcuno"
{ "pile_set_name": "OpenWebText2" }
A A An environmental group blocked traffic Sunday in downtown Halifax as part of a protest with the message that climate change could wipe out humanity. Extinction Rebellion has been sounding the alarm about effecting urgent global change immediately to avoid drought, floods, extreme poverty and poverty for millions. Bundled up against a bitter winter wind, Justin Lundrigan and his son Jaylen, 5, were among more than 150 protesters who gathered near Halifax Central Library and later moved Spring Garden Road. “It’s important for us to be here, cold or not,” Lundrigan said. “We’re in the middle of a crisis. It’s time for the government to wake up and understand, to address the problem and to inform us, stop hiding really, because that’s essentially what they’re doing, they’re hiding the facts.” Jaylen Lundrigan, 5, holds a sign referring to the consequences of climate change at a protest organized by the Extinction Rebellion group in downtown Halifax on Sunday. - John McPhee Lundrigan said he’s “ very concerned” about the future that awaits his son and wants government to get serious about alternative energy sources. ‘Every time I look at kids nowadays, it just breaks my heart to know where we’re headed,” he said. “A lot of times, the opposition we get, supporters of oil, supporters of fossil fuels, they have a huge concern of losing their jobs but ... I think your jobs and your cars and your toys are going to be irrelevant in an uninhabitable planet.” Vehicles initially had to stop and turn around on Spring Garden when the protesters moved into the street. But Halifax Regional Police eventually blocked off the street as people carrying signs with slogans such as There’s No Planet B and Put the Brakes on Climate Change chanted and sang songs at the intersection of Spring Garden and Queen Street. Earlier in the protest, the group symbolized the threats to species such as the piping plover, Blanding’s turtle and the sea mink in a “die-in” as people lay down on the ground holding signs with the species’ names. A group that has spread internationally from its beginnings in the United Kingdom, Extinction Rebellion points to reports such as the United Nations intergovernmental panel report released in October, which said dire consequences can only be avoided by preventing global temperatures from rising by more than 1.5 degrees Celsius over the next dozen years. Patrick Yancey of Antigonish, spokesman for the group’s local chapter, said Sunday that the protest was part of “Rebellion Week” being held across Canada. “Our concerns are that according to scientific consensus, we’re on course for extinction,” Yancey said. “Our current course is up to like three or four degrees warming and that is just an uninhabitable disaster according to everything we know. So we feel our governments have let us down, they have failed to protect our lives and our livelihoods, they’ve broken the social contract and therefore have lost their legitimacy. So we think it’s every citizen’s right and duty to stand up and rebel non-violently.” The protest ended at about 2 p.m. after police escorted the group as they marched up Spring Garden to South Park Street and back to the library.
{ "pile_set_name": "OpenWebText2" }
RPI's homecoming weekend will proceed without a football game. The Engineers' contest against U.S. Merchant Marine Academy, scheduled for 1 p.m. Saturday in Troy, was postponed on Thursday because of the federal government's partial shutdown. The game has been tentatively rescheduled for Nov. 2 at noon at East Campus Stadium, pending the resolution of the government's budget impasse. To take its place, RPI moved its women's soccer match against Clarkson, which was to be played after the football game, to 1 p.m. in East Campus Stadium. "I wouldn't say there's disappointment," RPI associate athletic director for communications Kevin Beattie said. "I think it's an opportunity to showcase our women's soccer program and our athletes from a different sport. There are things you can control and things you can't." Merchant Marine, overseen by the Department of Transportation, closed for normal operations this week because of the government's budget impasse. The Merchant Marine coaching staff can not have contact with players during the shutdown, which prevented the team from holding supervised practices. The teams could play on Nov. 2, when both have a bye. It was originally thought Merchant Marine couldn't make up the game because the academy has exams that week. But the shutdown has canceled classes this week and therefore moved the exam period. Beattie said RPI is also applying for a waiver to play the game on Nov. 16, the week after the regular season ends, in case the shutdown drags on. That would be contingent on neither team qualifying for the NCAA Division III tournament. Ellen Johnston, senior communications specialist for RPI's alumni association, said she thinks many alumni who would have attended the football game will still check in on women's soccer. The event will include a FanFest and a Ferris wheel in honor of its inventor, 1881 RPI graduate George G.W. Ferris. "It'll have a little bit of a different feel to it," Johnston said. "It's a good chance to see our soccer team." Army's football game at Boston College and the Navy-Air Force contest will go ahead as scheduled this weekend. The Department of Defense gave the go-ahead for those three service academies to play. Service academy football games are paid for with non-appropriated funds and have been long planned. Such funds generally come from outside sources and are not approved through Congress. Wire services were used in this story. msingelais@timesunion.com • 518-454-5509
{ "pile_set_name": "OpenWebText2" }
/* * Copyright © 2016 Cask Data, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); you may not * use this file except in compliance with the License. You may obtain a copy of * the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the * License for the specific language governing permissions and limitations under * the License. */ import PropTypes from 'prop-types'; import React, { Component } from 'react'; import DeleteAction from 'components/FastAction/DeleteAction'; import TruncateAction from 'components/FastAction/TruncateAction'; import StartStopAction from 'components/FastAction/StartStopAction'; import ExploreAction from 'components/FastAction/ExploreAction'; import SetPreferenceAction from 'components/FastAction/SetPreferenceAction'; import LogAction from 'components/FastAction/LogAction'; import { objectQuery } from 'services/helpers'; export default class FastAction extends Component { constructor(props) { super(props); } // This function is using switch statement because just using const mapping, // react already creating virtual DOM element for it, so it was failing the // Props validation. renderFastAction(type) { switch (type) { case 'delete': return ( <DeleteAction entity={this.props.entity} onSuccess={this.props.onSuccess} argsToAction={objectQuery(this.props.argsToAction)} /> ); case 'truncate': return ( <TruncateAction entity={this.props.entity} onSuccess={this.props.onSuccess} argsToAction={objectQuery(this.props.argsToAction)} /> ); case 'startStop': return ( <StartStopAction entity={this.props.entity} onSuccess={this.props.onSuccess} argsToAction={objectQuery(this.props.argsToAction)} /> ); case 'explore': return ( <ExploreAction entity={this.props.entity} opened={this.props.opened} argsToAction={objectQuery(this.props.argsToAction)} /> ); case 'setPreferences': return ( <SetPreferenceAction entity={this.props.entity} onSuccess={this.props.onSuccess} argsToAction={objectQuery(this.props.argsToAction)} /> ); case 'log': return ( <LogAction entity={this.props.entity} argsToAction={objectQuery(this.props.argsToAction)} /> ); default: return null; } } render() { return this.renderFastAction(this.props.type); } } FastAction.propTypes = { type: PropTypes.oneOf(['delete', 'truncate', 'startStop', 'explore', 'setPreferences', 'log']), entity: PropTypes.object, onSuccess: PropTypes.func, opened: PropTypes.bool, argsToAction: PropTypes.object, };
{ "pile_set_name": "Github" }
// Copyright (c) .NET Foundation. All rights reserved. // Licensed under the Apache License, Version 2.0. See License.txt in the project root for license information. using System; using JetBrains.Annotations; using Microsoft.EntityFrameworkCore.Infrastructure; using Microsoft.Extensions.DependencyInjection; namespace Microsoft.EntityFrameworkCore.Internal { /// <summary> /// <para> /// This is an internal API that supports the Entity Framework Core infrastructure and not subject to /// the same compatibility standards as public APIs. It may be changed or removed without notice in /// any release. You should only use it directly in your code with extreme caution and knowing that /// doing so can result in application failures when updating to a new Entity Framework Core release. /// </para> /// <para> /// The service lifetime is <see cref="ServiceLifetime.Singleton" />. This means a single instance /// is used by many <see cref="DbContext" /> instances. The implementation must be thread-safe. /// This service cannot depend on services registered as <see cref="ServiceLifetime.Scoped" />. /// </para> /// </summary> public interface ISingletonOptionsInitializer { /// <summary> /// This is an internal API that supports the Entity Framework Core infrastructure and not subject to /// the same compatibility standards as public APIs. It may be changed or removed without notice in /// any release. You should only use it directly in your code with extreme caution and knowing that /// doing so can result in application failures when updating to a new Entity Framework Core release. /// </summary> void EnsureInitialized( [NotNull] IServiceProvider serviceProvider, [NotNull] IDbContextOptions options); } }
{ "pile_set_name": "Github" }
{ "pile_set_name": "PubMed Central" }
Endothelium dysfunction classification: why is it still an open discussion? In the nineties, the present author developed a didactic endothelium dysfunction classification based on personal experience while waiting for a consensus about the need of such an accomplishment. As time went by and no publications regarding this subject were released, he published a text entitled "An open discussion about endothelial dysfunction: is it timely to propose a classification? Eight years later and the question about endothelium dysfunction classification remains "an open discussion". Nevertheless, we still keep using our proposed classification although always questioning its suitability and wondering reasons for why the scientific communities avoid discussing this very subject. Based on these thoughts we attempted to hypothesize the causes of why this proposed discussion is not an inciting issue: (I) First hypothesis: An endothelium dysfunction classification is not important; (II) Second hypothesis: Such classification is still a "premature reductionism"; (III) Third hypothesis: Endothelium dysfunction is a multifaceted disorder and involves uncountable variations becoming impossible to propose an adequate classification; (IV) Fourth hypothesis: Vasoplegic syndrome and massive nitric oxide release accounts for the functional classification, thus, it seems that cardiovascular journals feel apprehensive about this since their point of view is closely associated with impaired endothelium nitric oxide release as a cause to increased risk of spasm and thrombosis and; (V) Fifth hypothesis: The classification is so fulfilling that it discards the need of discussion or the pioneer attitude to propose such classification has incited some degree of jealousy. Obviously, the fifth hypothesis is pretentiously and overwhelmed, but we again attempt to reopen this discussion because it is time to update the presented classification. In this manner, we are sure that this issue demands special attention of the scientific community. Therefore, the aim of this text is exclusively to "reopen" the discussion about the need of an effective endothelium dysfunction classification.
{ "pile_set_name": "PubMed Abstracts" }
Q: How to extract all rows from a large postgres table using python efficiently? I have been able to extract close to 3.5 mil rows from a postgres table using python and write to a file. However the process is extremely slow and I'm sure not the most efficient. Following is my code: import psycopg2, time,csv conn_string = "host='compute-1.amazonaws.com' dbname='re' user='data' password='reck' port=5433" conn = psycopg2.connect(conn_string) cursor = conn.cursor() quert = '''select data from table;''' cursor.execute(quert) def get_data(): while True: recs = cursor.fetchmany(10000) if not recs: break for columns in recs: # do transformation of data here yield(columns) solr_input=get_data() with open('prc_ind.csv','a') as fh: for i in solr_input: count += 1 if count % 1000 == 0: print(count) a,b,c,d = i['Skills'],i['Id'],i['History'],i['Industry'] fh.write("{0}|{1}|{2}|{3}\n".format(a,b,c,d)) The table has about 8 mil rows. I want to ask is there is a better, faster and less memory intensive way to accomplish this. A: I can see four fields, so I'll assume you are selecting only these. But even then, you are still loading 8 mil x 4 x n Bytes of data from what seems to be another server. So yes it'll take some time. Though you are trying to rebuild the wheel, why not use the PostgreSQL client? psql -d dbname -t -A -F"," -c "select * from users" > output.csv
{ "pile_set_name": "StackExchange" }
Transcript 1. 11 Key Marketing Trends for 2011 Highlights from the Annual Unica Marketing SurveyWILL MORE MARKETING OPPORTUNITIES LEAD 2. MARKETERS WILL LET CUSTOMERS LEADTO PROFITABLE PATHWAYS – OR DEAD ENDS? THE DANCE BY TAKING ADVANTAGE OF INBOUND INTERACTIONS.“More” is certainly the key word for our times. But, asthe results of our annual survey of marketers reveal, the For as long as anyone can remember, marketing has beenproliferation of marketing channels and the concomitant all about getting a message out. Advances in technologyexplosion of data pose a wealth of challenges for marketers are driving a shift in direction. Today, inbound marketing isin 2011. As the survey results suggest, marketers are looking seizing the momentum: customers are taking the initiativefor ways to turn more marketing possibilities into better and directing the relationship on their terms. Marketers aremarketing results. Our survey reveals the following key getting the message. When asked if their departments weretrends for 2011: planning to deliver personalized messages in customer initiated transactions, participants demonstrated substantial1. MARKETERS WILL BRIDGE THE GAP commitments to using, or planning to use, inbound channelBETWEEN ANALYSIS AND ACTION (FINALLY!) communications – via their websites (57% already in place, 25% planning to do so within the year), customer service/When does a rich set of customer data become a mixed call centers (52% vs. 18%) and point of sale/kiosk/ATMblessing? When asked to rank the top bottlenecks in the (28%/21%).marketing process, participants identified “measurement,analysis & learning” as the number one impediment, reflecting Inbound Marketing Adoption by Channelappreciation of its value. Yet, in a follow-up questionregarding the most important marketing issues, “turning data Web Site 57% 25% 82%into action” earned top honors. Over the last decade, manymarketers have become data junkies, absorbing information Customer Service 52% 18% 70% / Call Centerfor its own sake. But, as they say, recognizing a problem isthe first step toward solving it. Marketers can no longer blame Point of Sale / Kiosk / ATM 28% 21% 49%IT for withholding information; with so much data readilyavailable, it’s time to overcome “analysis paralysis” and turn Currently Don’t currently do this but do this plan to in the next 12 monthsthis newly found knowledge into action by integrating datacaptured across all channels into subsequent campaigns Base: Total Sample (279 Respondents)and more personal offers. 57% 62% SAID THEIR TOP BOTTLENECK SAID THEIR TOP MARKETING WAS MEASUREMENT, ISSUE WAS TURNING DATA ANALYSIS & LEARNING INTO ACTION 2. 3. MARKETERS WILL LEVERAGE ONLINE Value of Using Web Data inBEHAVIORAL DATA TO HELP TURN DATA Customer Analytics and DecisioningINTO ACTION.Whatever anyone says about information Very Important 63% 90% sayoverload, marketers cherish the data they web data iscollect from their websites. Web interactions Somewhat important important 27%open a priceless window on customerinterests, intentions and desires – a wealth of Somewhat Not important 8%precise information that easily trumps meredemographics or transactional data. It’s no Not Important Base: Total Sample At All 2% (279 Respondents)surprise that 90% of marketers see web dataas important to drive campaign decisioning.While only 41% currently use this data in Use of Web Data in Campaign Decisioningcampaign decisioning, another 35% saythey will in the next 12 months. Currently do this 41% 76% will use it in campaign decisioning Plan to do this by the end of the year 35% (next 12 months) Plan to do this (>12 months) 10% No plans to Base: Total Sample do this 14% (259 Respondents)4. TO KEEP EMAIL RELEVANT, 5. “FREE” ONLINE MARKETINGMARKETERS WILL FOCUS ON TOOLS WILL GET EXPENSIVE.IMPROVING INTEGRATION, Like email, web analytics and paid search areSEGMENTATION, AND TARGETING. contemporary marketing mainstays. But moreEmail hasn’t lost its status as a deeply than half (53%) of marketers rely on “free” toolsentrenched, well understood marketing channel. for Web analytics and more than a third (37%)85% of total participants reported they are using rely on tolls from the search engines to manageor planning to use email software. But now that PPC marketing. The savviest marketers arethe low-hanging fruit has been plucked and now considering the cost of “free.” For starters,the field is glutted with competing messages, a free search tool is limited by its applicabilityhow will marketers sustain email’s relevance? to the search engine that provides it. Worse,Today, smart marketers are actually addressing neither the search tools nor free web analyticsthis problem by integrating campaigns with can be incorporated with the marketer’s otherdata and triggers from other channels to make systems, making it impossible to close the loopemail an essential part of an ongoing, evolving and understand the value of the customers thatdialog with customers and prospects. The job these efforts are delivering. Precisely becauseisn’t easy: only 34% of marketers say their the information these tools provide is soemail data is automatically integrated with other valuable, it cannot remain stranded, leaving youmarketing data; another 39% say the integration incapable of realizing the full potential of searchis accomplished manually. Looking ahead, and web data. Investing in web analytics andemail will become the natural integration point search bid management solutions will pay shortwith emerging channels such as social and and long term dividends.mobile. In fact, over half (54%) of marketersreport including social sharing links in email andabout a third (35%) are already creating mobilespecific versions of emails. 3. 6. CHANNEL PROLIFERATION WILL Social Media Marketing UsageDRIVE THE NEED TO NURTURENEW CHANNELS. 11%New channels continue to multiply like rabbits 10%with familiar channels, such as mobile, breeding 53%new “micro-channels” e.g., Foursquare. With the 26%growth of smart phones and tablet computerse.g., the iPad, there’s no reason to expect theproliferation of channels to decelerate any timesoon – nor is it reasonable to expect successfrom all of them (remember Second Life?).But in the face of a rapidly evolving marketing Base: 254 Respondentslandscape, what is reasonable is this: marketers Current Activity No Plansneed a structured process for assessingopportunities, testing tactics, measuring Planned activity Planned activity (>12 months) (Next 12 months)results and evaluating further involvement innew channels. For example, a leading financialservices organization developed a structure to 8. MARKETERS WILL TREAT MOBILE AS A DEVICE WITH MANY CHANNELS,determine which business goals each social NOT A SINGLE CHANNEL.media channel might support. They discoveredthat business Facebook is a great place to Survey results show that marketers are growingdrive new customer acquisition, but wasn’t ever more bullish on mobile, with over fortyparticularly effective for customer service. percent of marketers currently using mobileThey use web analytics to measure traffic on marketing tactics. Among survey participants,their Facebook wall and correlate this traffic mobile applications lead the way with 44%with traffic from their other web properties and current usage; mobiles sites and mobilemicro-sites. When traffic arrives at their website messaging follow at 40% and 36% respectively.from Facebook, the customer more often than But the real question isn’t whether to use mobilenot signs-up for a card rather than logging into or not, but which mobile marketing channels,their account for a service interaction. With if any, are relevant to your business and itssocial media and mobile, individual channels will customers? Is it SMS texting? Mobile versionscome and go; but a solid evaluation process will of websites? Paid mobile search? Or the tacticbe a lasting investment. du jour, mobile applications? Or some mix of the above?7. SOCIAL MEDIA WILL EXPERIENCEGROWING PAINS. Use of Mobile Marketing TacticsThis year, social media is no longer the adorablebaby everyone wants to hold, but the angst- Mobile application 44% 31% 20% 5%filled adolescent – still immature yet no longer Mobile version ofcute – who inspires mixed feelings. All things website 40% 31% 20% 9%social continue to hold intense interest, with Mobile messaging53% of marketers currently applying it to their SMS/MMS/WAP) 36% 26% 17% 21%marketing efforts. But as tactics rise and fall,a more sophisticated approach is emerging. Mobile version of email 35% 34% 17% 14%Instead of thinking tactic by tactic, marketersare beginning to think strategically across three Mobile Ads 30% 29% 17% 24% (PPC or Display)major areas of social content: owned (what theycreate), earned (what customers create) and Location-based targeting 29% 27% 18% 26%paid (what marketers spend money for). Currently use Don’t currently use but plan to in the next 12 months Don’t currently use but plan Don’t currently use and have to in the future more than no plans at this time 12 months from now 4. 9. INTERACTIVE MARKETING WILL 11. ADOPTION OF AN INTEGRATED REACH THE TIPPING POINT AS A MARKETING SUITE WILL ACCELERATE. DOMINANT MARKETING DISCIPLINE. Marketers remain confident that technology will MORE THAN HALF Each of these trends isn’t taking place in ease application More than half of marketers said their pain. Mobil 44% 31% 20% 5% isolation. Marketing messages delivered during that technology would increase productivity inbound interactions need to be coordinated more than additional staff or external agency Mobile version 40% 31% 20% 9% with outbound campaigns. Web analytics data support. Moreover, an overwhelming 87% website (53%) OF MARKETERS should inform both online and offline marketing agreed that marketing needs a more integrated SAID THEY HAVE AN Mobile messaging 36% 26% 17% 21% campaigns. Integrating social, mobile and suite of software to improve their effectiveness. (SMS/MMS/WAP) ISSUE ATTRIBUTING other emerging channels in the marketing mix Why the strong interest? Integrated tools mean SUCCESS TO MARKETING Mobile version 35% 34% 17% 14% will play a pivotal role in meaningful cross- email integrated, interactive marketing, with shared channel dialogs. Interactive Marketing bridges sources of data and real-time behavioral triggers Mobile Ads these trends to facilitate customer awareness, 30% 29% 17% 24% allowing marketers to take communications to (PPC or Display) centralize decisioning, and execute across the next level: personally relevant messaging to 90% say Location-basedVery Important 63% channels. Most marketers understand the need 29% 27% 18% 26% the right audiences at the right times. To deliver targeting web data to create cross-channel dialogs and buy into the is important a more coordinated customer experience and Somewhat Important Interactive27% Marketing strategy. Yet, when asked integrate activities across channels,currently use but Currently use Don’t marketers Somewhat about their current practices, a mere 10% say will turn toward a comprehensive suitethe next 12 months plan to in for 8% Don’t currently use but plan to in the future No Important they have completed their Interactive Marketing centralized, strategic than 12 months more control. Adoption shouldNot Important journey. The good news? Half of marketers accelerate as theDon’t currentlyeases out no plans at this time economy use and have of the At All 2% say they are currently integrating across some downturn and releases pent up demand for channels. Over the next year, savvy marketers more integrated marketing solutions. will increase their adoption of Interactive Marketing and expand the number of channels Increasing Marketing Productivity with an they include in this orchestrated strategy. Integrated Marketing Suite 11% 10. MARKETERS WILL GET 10% 8% 5% MORE SERIOUS ABOUT USING 25% CROSS-CHANNEL 53% ATTRIBUTION 26% TO UNDERSTAND MARKETING EFFECTIVENESS. 62% It’s not enough to coordinate campaigns and deliver results. Marketers must better understand which activities, programs, andCurrent Activitycampaigns No Plans are contributing to those results. In Planned Activity Planned Activity (>12 months) (Next 12 months) the ranking of top marketing issues, “attributing Strongly agree Base: Total Sample (279 Respondents) Somewhat Do not agree Somewhat at all disagree agree success to marketing” took the second spot with more than half of marketers saying they Strongly agree Do not agree at all find it challenging. Attribution — the process Somewhat agree Somewhat disagree of assigning credit to marketing campaigns and exposures that lead to conversions — has become a critical component of marketing analytics. Marketers will look for cross-channel attribution that demonstrates the value of specific tactics and helps them direct resources to the most productive options. For successful attribution, marketers will need a centralized interaction history of marketing contacts and customer responses. The good news? Those marketers who adopt an Interactive Marketing strategy will already have a centralized view of marketing touches.
{ "pile_set_name": "Pile-CC" }
e -6*x - 6*a - 4*a = 620, -202 = -82541*x + 82546*x - 3*a + 6*a for x. -5 Solve -s - 230 = 3*r - 182, 0 = 2*r - 5*s - 172 for r. -4 Solve -8*f - 2720 = -4*k - 2628, 2*f - 35*k = -533 for f. -4 Solve -10 = -3*b + 15*m - 31, -21 = -5*b + 9*b + 2*m + 51 for b. -17 Solve -t - 2*r - r - 2768 + 2761 = 0, 62 = -6*t + 2*r for t. -10 Solve -65*z - 25 = -0*c - 4*c, 10 + 12 = 1236*c - 1238*c - 3*z + z for c. -10 Solve 2*p - 8*o - 2 = 10, 96*o - 4 = 92*o for p. 10 Solve 359 = 3*o + 83*u + 12*u, 4*o - 2*o + 18 = u for o. -7 Solve 5*v - 487*r + 165*r + 160*r = -156*r + 79, 65 = 4*v - 3*r for v. 17 Solve 5*v + 7*v - 178*s - 7*s - 735 = 10*v - 3*v, -15 = -v + 4*s for v. -1 Solve 25561*m - 22*w + 88 = 25562*m, m - 3*w + 12 = 0 for m. 0 Solve -40 - 10 = -5*w - 5*b, 317811 = 2*w + b + 317796 for w. 5 Solve -a - a - 49 = 5*b - 16, 7*b + 48*b = -a + 36 for a. -19 Solve 470*g = 4*t + 469*g + 24, -3*g + 57 = -9*t for t. -5 Solve -5*h + 10*h - 8*h = 41*m + 88, -10 = 5*h for m. -2 Solve d - 2*d - 5698*z + 5699*z + 7 + 2 = 0, 6*d = -4*z + 104 for d. 14 Solve 6 = -2*l - 2*x, -40 = -10*l + 4*x - 38 + 38 for l. 2 Solve 2*s - 3*s - 6 = 2*o, 33*o - 157 = s - 22*o + 20 for s. -12 Solve 5*g = 3*x - 105, 15593*g = 15601*g + 3*x - 105 for g. 0 Solve 2*n - u + 10 = n - 4, 4*u = n + 5*u - 18 for n. 2 Solve d + 3299*k - 3294*k = 8, -5*d = 7*k - 58 for d. 13 Solve 1573*m = 5*v + 785*m + 783*m, 5*v + 2*m - 35 = 0 for v. 5 Solve 5*a + 19 = 4*z, 2*a + 4385*z - 26 = 4390*z - 71 for a. 5 Solve 0 = 3*v + 21, -149*v = -t - 64*v - 87*v - 13 for t. 1 Solve 16*q - 3*h - 81 = 22*q, -79 = -4*q + 5*h for q. -4 Solve -b - 433959*h + 433955*h - 88 = 0, -5*b - 9*h = 187 for b. 4 Solve -2*b + 10*b - 3*b - 12*t + 7*t + 80 = 0, -53 = 2*b - 7*t + 79 for b. 4 Solve -22 = -11*t - 9*q, -36490 = 2*t + q - 36494 for t. 2 Solve 2*m - 75 = -p + 17 + 5, 3*p - 195 = -4*m for p. 1 Solve -14074102 + 14074000 = -3*p - 8*n, -164 = -4*p - 13*n for p. 2 Solve k - 3*t + 0*t - 92 = -0*k, 204*k = 171*k - 7*t - 250 for k. -1 Solve -369 + 365 = 4*u - 4*q, 7*q + 9 = 5*u + 22 for u. 3 Solve -2*a - a + 1128 = -385*x, -3*x = 4*a - 1056 + 1101 for x. -3 Solve 28 = -3*g + 73*h - 68*h, 0 = -2*g + 36*h + 14 for g. -11 Solve 59 = 4*t - 0*d + 5*d, 994*t - 1001*t - 3*d = -17 for t. -4 Solve -8*n + 33463 = -6*k + 33447, k + 9 = -5*n for n. -1 Solve -w = 3*b + b - 5*w + 32, -6*b - 38 = -15029*w + 15024*w for b. 2 Solve 3*c = -5*o - 48, -61*c + 7*o = -59*c - 92 for c. 4 Solve -5*y + 31*w + 336 = 0, -4068*y + 4069*y + 8*w = -2*w + 8*w - 23 for y. -1 Solve -c + 0 = d - 9, -9*c + 15*d = -12*c - c - 8 for c. 13 Solve 9186*p - 53 = -26*m + 9181*p, 3*m - 2*p + 30 + 18 = 0 for m. -2 Solve 3*d + 3*d - 9*d - 3*v = -24, 8*d = 11*v + 26 for d. 6 Solve -3*a = -y - 22, -3*a - 142367*y = -142365*y + 80 for a. -4 Solve -7*i = -l - 321, -8*i - 123*l + 127*l + 364 = 0 for i. 46 Solve -5*r + 20 - 155 = 0, 4388*r = -3*p + 4422*r + 915 for p. -1 Solve 190430*t - 5 = 190431*t, 2*p = -2*t for p. 5 Solve 2 = 3*m + 4*s, 73*m - 44*m - 25*m = -2*s + s + 7 for m. 2 Solve -9*q - 4*w + 59 = 0, 2*w = -71*q + 75*q - 3*w - 33 for q. 7 Solve -4*t - 3*c + 10 = 0, -880*c + 885*c = -t - 6 for t. 4 Solve 40652*w - 40655*w = 3, 9 = 5*n + w for n. 2 Solve 4*b - 149 = -2*b + y - 35, 0 = -9*b + y + 171 for b. 19 Solve -16 = -2*d, -48074 + 48108 = 2*s + 4*d for s. 1 Solve -66 = 8*f + 2*a, 101 = 4*f + 3*a + 136 for f. -8 Solve -i + 4*i + 2*v + 84 - 122 = 0, 3*i + v - 37 = 0 for i. 12 Solve 1092 = 3*o - 10*d - 5*d, 279*o - 5*d = 275*o + 376 for o. 4 Solve -130*l + 126*l - 6 = 2*s, -11 = -l - 3*s for l. -4 Solve -8*r + 5*b - 190 = 0, 76 = 3*r + 299*b - 297*b for r. 0 Solve 1267*i - 1278*i - 4*k = -225, -3*k + 88 = 4*i for i. 19 Solve -4*d + 12 = p, 0 = 4*d - 2*p + 14*p + 21*p - 140 for d. 2 Solve 6127*d - 6131*d - 142 = -2*n, n + d + 40 = 0 for n. -3 Solve 4*n = 3*h - 23 + 19, -56 + 14 = -4*h - 2616*n + 2614*n for h. 8 Solve 2*p - 4*g = 4, -45692*p + 2 = -45690*p - 3*g for p. -2 Solve 2*g - 2977*p + 33 = -g - 2975*p, -8*g = -2*g + 6*p + 96 for g. -13 Solve -8*t + 0*t = -10*t + 3*l + 15, 4*t - l - 35 = 0 for t. 9 Solve -10*s - 7495*f + 7497*f - 58 = 0, -4*s = 3*f + 27 for s. -6 Solve -40 = 23448*r - 23444*r + p, 4*p = 2*r + 38 for r. -11 Solve 14*n = 10*n - 9*f - 41, -5 = 5*n - 9*f + 11*f for n. 1 Solve -3*z + 158 - 318 = v - 149, z = 3*z + 7*v - 37 for z. -6 Solve 2*q + 3*i + 96 = 109, 5*i - 20 = -3*q for q. 5 Solve 25*f - 64*f + 38*f = 3*c - 22, 0 = 4*c - 5*f + 15 for c. 5 Solve -5*v + 22 = v + 2*r + 4 - 30, 0 = 4*v - r - 32 for v. 8 Solve 8*u + 5*y - 4845 + 5306 = 0, 5*u = -3*y - 0*y - 2*y - 290 for u. -57 Solve -4*k = 14*x + 296, k + 32 = 3*k - 2*x for k. -4 Solve -2*v - 36 = 4*a, -125*a + 126*a = 8*v + 93 for v. -12 Solve 7*a = -t - 147 + 6 + 313, -6*a = -4*t - t - 165 for t. -3 Solve 32*u - 64*u + r - 61 = -35*u, 4*u + 2*r - 84 = 0 for u. 19 Solve 15697*w - 15702*w = -2*y + 11, 3*y + 15 = -3*w for w. -3 Solve -18 = 254*n - 2*w, -112*n - 4*w + 36 = -113*n for n. 0 Solve 0*v + 85 = v - 3*w, -22*v + 2150 = -5*w + 6*w + 3*w for v. 97 Solve -o + 40 = 2*f - 4*o - 0, 13*f - 2*o - 190 = 0 for f. 14 Solve 4*x - 112 + 69 = -4*n - 71, -2*n - 4 = 0 for x. -5 Solve -4*s - 109 + 5 = 4*y, -2*s + 128 = -189*y + 185*y for y. -30 Solve n + 47 = -15*f - 2*n - 16, 0 = -5*f - 3*n - 83 for f. 2 Solve -87*b - 13 = -92*b + d + 97, -8*b + 209 = 5*d for b. 23 Solve 5*w - 7 = -f, 62 - 43 = f - 5*w + 7*w for f. 27 Solve 5*m - 1 = -r, m + 0*m - 14436 + 14459 = -6*r for m. 1 Solve -3*t + b = -34, 0 = -4*t - 17*b + 19 - 8 + 71 for t. 12 Solve 0 = -z - 4*b - 24, 2*z + 309628 - 309658 = -z + 5*b for z. 0 Solve 30*c + 179 = -4*k - 32*c + 112*c - 43*c, -c = k + 42 for k. -43 Solve -3*f + 562 = -187*h - 545, 16*f - 12*f = -20 for h. -6 Solve -20 = -2*k - 0*k - 4*j, -4*k + 1703 - 1723 = -7*j for k. 2 Solve 7*g + 4*i + 74 - 177 = 0, 124 = 4*i for g. -3 Solve -5*c - 3*f + 138 = 124, -556*c + f = -559*c - 2 for c. -5 Solve -2*j = 13*n + 50, 2 = -72*j + 70*j - n for j. 1 Solve 5*k + 21*u = 23*u - 95, 89*k + 4*u = 84*k + 115 for k. -5 Solve -4*b + 4 = f, 4*f + 44 = -6*b + 10*b - 5*f for b. 2 Solve 0 = 596*q - 593*q + 7*x + 34, 218 - 31 = -9*q - 4*x for q. -23 Solve -5*j = 30*z + 10, 0 = -z - 283983*j + 283984*j - 5 for z. -1 Solve 22 = -3*j - 2*h - 3, 146*j - 3*h - 491 = 344 - 45 for j. 5 Solve 32*g = 3*q - 171, 4*q = -212*g + 208*g + 88 for g. -3 Solve 7*c - 3*c = u - 6*u + 57, 11*u - 31 = 3*c for u. 5 Solve 3*z - 3*d + 1165755 - 1165725 = 0, 16*z - d + 100 = 0 for z. -6 Solve 80*c = 35*u + 76*c + 68, -2*u = -5*c + 85 for u. 0 Solve -3*d + 2 = 5*p, 2 = -3*p + 55*d - 30*d - 26*d for p. -2 Solve 12 = 2*x - 169*w + 171*w, 6 = 4*x - 2*w for x. 3 Solve 2905*r - 16*u = 2908*r + 34*u + 156, -3*r + 3*u + 3 = 0 for r. -2 Solve -5*o + 5*b = -35, -26*o - 1983 = 4*b - 3823 + 1928 for o. -2 Solve -3*m - 22*m + 7*a + 63 = -23*m, 3*m + 4*a = -36 for m. 0 Solve -4*w = -27*o + 26*o + 4*w + 470, 2*o - 232 = 4*w for o. -2 Solve -15*l + z + 47 - 32 = -12*l, 14*l + 75 = -5*z for l. 0 Solve 2*j + h - 19210 = -19190, 0 = 5*j - 3*h + 5 for j. 5 Solve h + 205*s - 208*s = 4*h + 36, 4*h - 47 = 15*s for h. -7 Solve 614*v + z + 35 = 617*v, 4*v - 40 = 3*z for v. 13 Solve -b = -2*x - 1948 + 1958, -6*b - 42 - 72 = 3*b - 6*x for b. -14 Solve -2*n - 13 + 47 = 4*b, -4545*b + 5*n - 50 = -4548*b for b. 5 Solve 2*g + 0*a + 15268 = -g - 4*a + 15227, -11 = 9*g - 6*g - 2*a for g. -7 Solve 10*y + 2098 = 3*n + 2058, -4*n = -4*y - 72 for y. 2 Solve -3448*s + 3451*s - 26*k = 140, 3*s - 16 = -5*k for s. 12 Solve -2*m + 5*m - 3*d - d - 93 = -3*d, -5*d = -19*m + 585 for m. 30 Solve 0 = -14*s - 3*d + 52, -16*s = -9*s - 11*s - 10*d - 40 for s. 5 Solve y = 5*p + 105, 276*y + 284*y - 558*y - 130 = 6*p for p. -20 Solve 3*q - 4*a = -191, -220 + 405 = -5*q + 4*a for q. 3 Solve 2*j = 2*n + 12, -973*j + 10 = -968*j - 25 for n. 1 Solve 23*v + 20 + 58 = 12*v + 7*v + 18, -a - 163 = 11*v for a. 2 Solve 634*j + 10 = -3*r + 638*j, 1 = j for r. -2 Solve 3*l = -0*l + l + 2, -x + 5*x + 9*x = 3*l - 146 for x. -11 Solve 2*v = 10607*z - 10603*z + 24, 0 = -2*z - 3*v + 76 for z. 5 Solve -8*v - 26 = 5*d + 38, -2*v - d - 141 = -125 for v. -8 Solve -5*f - 3*b + 70 + 24 = -11, 4*f = 3*b + 84 for f. 21 Solve -3*v + 2*r + 348 = 416, 0 = -3*v + 70*r - 340 for v. -20 Solve -5*g - 2*o =
{ "pile_set_name": "DM Mathematics" }
16, what is c9 - 3b? 8e In base 3, what is 1 - -11102021? 11102022 In base 2, what is -10100111 - -10? -10100101 In base 4, what is 20 + -130? -110 In base 15, what is 210 - 2? 20d In base 7, what is -64 + 1? -63 In base 9, what is -82 + 4? -77 In base 10, what is 10 + 362? 372 In base 15, what is 2 - -b0? b2 In base 9, what is -4 - 13? -17 In base 13, what is -87 - -1? -86 In base 9, what is -1 - 866? -867 In base 7, what is -21 + 3365? 3344 In base 9, what is -11 + -2? -13 In base 6, what is -51 - 4? -55 In base 16, what is -c + 134? 128 In base 15, what is 2 - 148? -146 In base 10, what is -3 - 2226? -2229 In base 9, what is 5 - 1203? -1187 In base 14, what is -13c - 15? -153 In base 12, what is 42 + -2? 40 In base 12, what is b2b - -2? b31 In base 14, what is -ac2 - -5? -abb In base 10, what is -1 - 499? -500 In base 8, what is -4575 + -2? -4577 In base 11, what is 3a + -7? 33 In base 15, what is 91 + -93? -2 In base 3, what is -211021 - -10? -211011 In base 16, what is db - -1? dc In base 2, what is -10000001001 - 1? -10000001010 In base 9, what is 5 - 180? -174 In base 14, what is 13 + 2b? 40 In base 9, what is -221 - 3? -224 In base 9, what is 0 + 1314? 1314 In base 5, what is -2 - -13043? 13041 In base 13, what is 9b - -73? 141 In base 16, what is -1 + -c5? -c6 In base 16, what is -20 + 20? 0 In base 6, what is -4 - 5552? -10000 In base 13, what is -5 - -1654? 164c In base 2, what is -10100 - -1001? -1011 In base 12, what is 22 - 16? 8 In base 11, what is -2 - -2? 0 In base 16, what is 229b - -1? 229c In base 13, what is 4 + -52? -4b In base 7, what is 14256 - 2? 14254 In base 9, what is -1 - -36? 35 In base 11, what is 76 - 0? 76 In base 11, what is 1809 - -1? 180a In base 10, what is 1834 + 0? 1834 In base 13, what is -2a + 0? -2a In base 13, what is -37c - -4? -378 In base 6, what is -31304 + -1? -31305 In base 14, what is -27 + -19? -42 In base 6, what is -15 - 124? -143 In base 4, what is 2 - 1232? -1230 In base 10, what is 10 + 145? 155 In base 8, what is -3 + 247? 244 In base 16, what is -5 + -1fe? -203 In base 2, what is -10 - -11101101? 11101011 In base 6, what is -1522 - 0? -1522 In base 3, what is 10 - 102? -22 In base 5, what is 420 - 0? 420 In base 10, what is 6 - 1261? -1255 In base 11, what is -12 + -38? -4a In base 8, what is -137 - 6? -145 In base 4, what is -1 - -3232? 3231 In base 16, what is ab - -2? ad In base 2, what is -100 - -110111000? 110110100 In base 9, what is -4 + 1180? 1175 In base 11, what is -13147 + 5? -13142 In base 2, what is 11 - 110101001? -110100110 In base 10, what is -4 + 540? 536 In base 4, what is -11 - 213232? -213303 In base 9, what is -13 + -5? -18 In base 5, what is -1 + 12042? 12041 In base 6, what is 50 + -24? 22 In base 3, what is -1112 + -12? -1201 In base 5, what is 3403 + 3? 3411 In base 6, what is 2423 - -13? 2440 In base 8, what is 4 - 15024? -15020 In base 12, what is 2 + -5a? -58 In base 15, what is -1a - -3? -17 In base 7, what is -1014 - 5? -1022 In base 16, what is -bd6 + 2? -bd4 In base 3, what is 2210111 + -12? 2210022 In base 16, what is 1d + -61? -44 In base 6, what is -12 - 1? -13 In base 7, what is 62 + 101? 163 In base 13, what is -55 + 9? -49 In base 7, what is -56564 + -3? -56600 In base 2, what is -1001 - -101011100? 101010011 In base 3, what is -10 + -1110121? -1110201 In base 14, what is -31 - -6? -29 In base 16, what is -5 - 17d7? -17dc In base 9, what is 115 - -35? 151 In base 11, what is -1 - 402? -403 In base 13, what is 0 - -c8b? c8b In base 7, what is -6 - 46? -55 In base 11, what is -63 - 9? -71 In base 13, what is 6 - -2c? 35 In base 6, what is 1 - -3213? 3214 In base 3, what is -10021 + -11? -10102 In base 8, what is -4 + 11? 5 In base 4, what is 11310 + 10? 11320 In base 15, what is -7 + -2? -9 In base 9, what is -3 - 50? -53 In base 14, what is -8 + -dc? -106 In base 9, what is -1877 + 5? -1872 In base 4, what is 1 - -1311031? 1311032 In base 11, what is 2 + 17? 19 In base 4, what is -2 - 30013? -30021 In base 11, what is -3 + -31? -34 In base 4, what is -23 + 313? 230 In base 16, what is 3 - f4? -f1 In base 10, what is 1 - 1332? -1331 In base 15, what is -3 + 47? 44 In base 9, what is 4 - -26? 31 In base 5, what is -24 + 1? -23 In base 13, what is -a - 46? -53 In base 10, what is -306 + 1? -305 In base 6, what is -15 - -14? -1 In base 8, what is 472 - -1? 473 In base 13, what is -3ba + -1? -3bb In base 16, what is dd - -4? e1 In base 5, what is -4 + 3331? 3322 In base 9, what is 1 + -75? -74 In base 9, what is -6 + 60? 53 In base 13, what is -5a + 31? -29 In base 6, what is 2 - 41035? -41033 In base 6, what is 3 + 54? 101 In base 14, what is 3 + -30? -2b In base 8, what is -72 + -2? -74 In base 12, what is -2 - 3370? -3372 In base 12, what is 1 - -9? a In base 3, what is -11 + -211012? -211100 In base 11, what is -67 + 3? -64 In base 11, what is -60 + -87? -137 In base 12, what is -7 + -28? -33 In base 3, what is -2101 - 10? -2111 In base 16, what is -821 - -2? -81f In base 7, what is -162 + 13? -146 In base 6, what is -4 - 2435? -2443 In base 4, what is -121123 + -10? -121133 In base 7, what is 316301 + 3? 316304 In base 4, what is -2032 - 1? -2033 In base 5, what is 0 - 133230? -133230 In base 6, what is 124432 - -3? 124435 In base 14, what is -d + -54? -63 In base 11, what is -5 + -346? -350 In base 4, what is 1 + -22233? -22232 In base 9, what is -15 - 3? -18 In base 15, what is 2a + 5? 30 In base 4, what is -110033 + 1? -110032 In base 16, what is -5 + -41? -46 In base 2, what is -101 + -10110001? -10110110 In base 12, what is 1 + -21a? -219 In base 5, what is -2 + 122? 120 In base 11, what is 101 - -3? 104 In base 9, what is -5477 + 2? -5475 In base 5, what is 23 - -1112? 1140 In base 10, what is 2 - -87? 89 In base 2, what is 1000100 - 11111? 100101 In base 2, what is -11 - 101? -1000 In base 6, what is 2 + -5020? -5014 In base 11, what is -5 + -34a? -354 In base 6, what is 0 - 323? -323 In base 10, what is -4753 + -5? -4758 In base 10, what is 137 + 2? 139 In base 4, what is 0 + -1322? -1322 In base 10, what is 3475 - 3? 3472 In base 4, what is 0 + -2232? -2232 In base 14, what is 3 - 17? -14 In base 13, what is 55 + 11c? 174 In base 3, what is -10 - -222? 212 In base 9, what is 208 + -48? 150 In base 13, what is 1 - -202? 203 In base 11, what is 2 + -70? -69 In base 13, what is 4 + 1? 5 In base 16, what is 6 - -c? 12 In base 6, what is 10 - 11? -1 In base 15, what is 25 + 3d? 63 In base 5, what is 142 + 42? 234 In base 11, what is -4 - 64? -68 In base 8, what is -5 - 70? -75 In base 12, what is -1 - 14b? -150 In base 6, what is 1152 - 1? 1151 In base 7, what is 2506 + 0? 2506 In base 8, what is -65714 + -1? -65715 In base 16, what is -1a5b + 4? -1a57 In base 11, what is 79 - a? 6a In base 2, what is 1110111100 + 1001? 1111000101 In base 8, what is -3 - 1271? -1274 In base 12, what is -9 - -41b? 412 In base 2, what is 11 + 1111011101? 1111100000 In base 8, what is 2 - 3746? -3744 In base 6, what is -2542 + -2? -2544 In base 8, what is -61 + 2? -57 In base 13, what is -4 - -22? 1b In base 14, what is 7 - -b5? bc In base 4, what is 1 - 3103? -3102 In base 10, what is 4 + -83? -79 In base 3, what is 1 - -10012? 10020 In base 15, what is 86e8 - 0? 86e8 In base 13, what is 1191 - -3? 1194 In base 15, what is 5 + -28? -23 In base 12, what is -4 - -61b? 617 In base 13, what is -14b - a? -158 In base 8, what is -5 + -55? -62 In base 11, what is 79 - 5? 74 In base 12, what is -2 - 169? -16b In base 9, what is 80 + -32? 47 In base 13, what is 8 - 62? -57 In base 8, what is 126 + 51? 177 In base 10, what is 5 - 11? -6 In base 12, what is -6 - -319? 313 In base 5, what is 0 - 4320? -4320 In base 14, what is 5 + 14b6? 14bb In base 12, what is 2 + -99? -97 In base 2, what is 111 + -101010? -100011 In base 12, what is a + -1? 9 In base 2, what is 11000101100111 - 100? 11000101100011 In base 7, what is -1 + -4604? -4605 In base 15, what is -e + 8? -6 In base 3, what is -101220 + 2? -101211 In base 8, what is 207 - 1? 206 In base 16, what is 17 + -25? -e In base 4, what is -231 + 3? -222 In base 3, what is 1111 + -10? 1101 In base 10, what is 106 - -38? 144 In base 8, what is -24 + 2? -22 In base 5, what is -113311 - 4? -113320 In base 16, what is -7bc - -3
{ "pile_set_name": "DM Mathematics" }
The manuscripts of his books about endgame studies ("Wege zur Endspielstudie" - two books about pawns endgames and queens endgames) were written in 1940-41, discovered 50 years later and published in 1992. He invented the Imitator in 1939 (under the pseudonym of Gerrit Jansen, in an article published in Fairy Chess Review, April, 1939; source: Julia's Fairies forum).
{ "pile_set_name": "Pile-CC" }
Q: Android licence for app Please clear up something for me. For my own interest I want to write an Android app to use on my phone, by me alone. Maybe written in Mono, or perhaps something else. It has been suggested to me that I will need to pay a license fee for this. The Android licensing documentation hasn't cleared this up in my mind. Do I need to implement any form of licensing or pay any license for this? I stress, the app will be for use by me alone (and maybe my wife), on my phone alone (or hers). It won't go near Google Play Store or anything like that. A: As long as you don't submit the app to Google Play store, you don't need the licence. You can use the app or even give it to your family and friends. However, you cannot submit to the app store.
{ "pile_set_name": "StackExchange" }
UEFI Rootkit attacks no longer theoretical after one has been discovered in the wild. ESET Cybersecurity researchers have discovered malware, named LoJax, capable of modifying a computer’s Unified Extensible Firmware Interface (UEFI), making it able to sustain an attack even after OS reinstallation and hard disk replacement. The malware was developed by Sednet, a Russian state sponsored hacking group who have been operating since 2007 and have carried out a number of high profile attacks. UEFI is a critical firmware component of a computer which allows the hardware and operating system software to communicate when booting the computer. This software is inaccessible to users. LoJax works by introducing malicious code into the UEFI, which then cannot be removed without specific software and knowledge that the typical user will not be familiar with. There has long been mystery surrounding this type of exploit, with some believing it only theoretical, the discovery of LoJax proves this is no longer the case, and a wipe and reboot will no longer guarantee you have purged your machine. LoJax first appeared in 2017 as a Trojan version a legitimate LoJax software. The original LoJax software was created by a company called Absolute Software and is an anti-theft software that works by installing an agent into the computers firmware, that cannot be removed by reinstallation or drive replacement. It then notifies the owner of the location of the laptop in the event of it being stolen. There is likely to be increased security measures taken by tech companies to better protect users after this discovery. There needs to be ways to detect malware at a firmware level, and a review of the secure boot configuration on their computer hardware, to ensure no unauthorized access can be granted. Secure Boot is a mechanism user in chips and hardware that allows only secured firmware and software can be booted from a system. [stackCommerce layout=”2″ count=”5″ sort=”best_sellers”][/stackCommerce]
{ "pile_set_name": "OpenWebText2" }
PES 2015: Patch 1.03 Released, Notes Included Patch 1.03 is now available for PES 2015 on all consoles and PC. Below are the official patch notes and that feature a lot of fixes to problems previously reported by players. Players available in myClub has been added. Screen presentation for the probability rate for successfully signing a player has been updated. Position display section for the Manager’s details in the myClub Hiring Manager has been updated. Icons to represent [Contract Expired], [Injury] and [Suspended] have been updated to be shown in the Squad Management window of myClub. The issue of that the wrongly displayed player name still showing after setting the user name of the cursor in VS Com of myClub has been fixed. Users can now confirm their promotion or relegation before finishing a myClub: Divisions season. The delay in the Division promotion information display shown on screen hasbeen fixed. The issue that the manager name of the National team not being updated after the manager name had been changed in Master League has been fixed. The issue that sometimes the PK was not taken by a team mate in Become a Legend has been fixed. The issue that sometimes users had not been able to purchase myClub Coins after downloading the DataPack has been fixed. PES 2015 was released by Konami last year in November for the PS3, PS4, Xbox 360, Xbox One and PC. The game was received with mostly positive reviews, where it was marked highly for providing modern players with almost everything they would want from a football title, a feat that the publisher had missed upon in the recent years. The first two launch months saw to the release of PES 2015’s first two downloadable content packs,the first of which released ahead of the game’s release date.
{ "pile_set_name": "Pile-CC" }
1. Introduction =============== Type 1 diabetes (T1D) is an incurable autoimmune disease that destroys the pancreas's ability to naturally produce insulin, a hormone necessary for the absorption and storage of glucose. Failure to adequately monitor and manage blood glucose and insulin levels can lead to major vascular complications and organ damage from hyperglycemia \[ [@JR0047-1] \] on the one hand and seizures, loss of consciousness, and death from hypoglycemia on the other \[ [@JR0047-2] \]. In the United States, over a million adults live with T1D, and recent estimates are that over 200,000 youth (individuals under the age of 20) live with it as well \[ [@JR0047-3] \]. While the United States Food and Drug Administration has recently approved an "artificial pancreas" device that will automatically manage blood sugar and release insulin into the bloodstream of a person with diabetes \[ [@JR0047-4] \], its relative newness, cost, and the requirement that patients be at least 14 years old limit its accessibility to a substantial portion of the T1D population. An alternative that some diabetics have pursued is the creation of their own insulin management system using resources such as OpenAPS (Open Artificial Pancreas System, openaps.org). To date, users of OpenAPS have self-reported improved glycohemoglobin levels and increases in the amount of time that they were in a desired blood-sugar range. These same users observed, however, that the amount of technical know-how and efforts needed to create and maintain their self-developed artificial pancreas system are likely substantial obstacles that will limit broader adoption \[ [@JR0047-5] \]. As such, diabetes management for most individuals with T1D involves frequent manual blood tests to measure the amount of sugar in one's blood coupled with the manual administration of insulin multiple times during the day. In some cases, devices such as insulin pumps or continuous glucose monitors (CGM) may be used. Such devices typically obtain and store several days' worth of specific data about how much insulin was administered and the blood sugar level readings for a patient over certain time intervals. Regardless of whether readings and administrations are done manually with a glucometer or with a pump or CGM, there are many measures being obtained by a person with diabetes even during a single day. What happens to those measures depends on the individual collecting the information and the technological infrastructure that they use, with some data being stored briefly mentally and others on proprietary cloud systems. This current paper is a case study showing the comparative realizations that were made by a T1D-affected family upon examination of aggregated blood sugar information obtained using two data collection methods. One method was manual testing involving regular finger pricking and use of a separate glucometer accompanied by systematic handwritten logging. The other involved use of a CGM device. The diabetic individual whose data are examined and shared in this report is the third author (Chris), who explicitly asked (and with consent of his parents, as he was 9 years old at the time of this writing) that his identity be disclosed. 2. Objectives ============= The primary objective of this report is to illustrate what regularities are detected in aggregate visualizations of different blood glucose data collection methods of end users. In this case, the end users are the child with diabetes and his parents. One data collection method involved manual data collection and recording over the course of three and a half years, and the other involved data collected by a CGM. With this family, manual data collection turned out to exhibit blind spots due to daily family routines and transition to formal schooling that were only fully realized when data were aggregated. On the other hand, automated data collection created more data but tended to invite only examinations of data from preceding hours but not aggregate analysis for recurring daily patterns. 3. Methods ========== The quantitative data for this report were obtained by the second and third author and other family members prior to any plans for a research study. As such, this is a post hoc analysis of existing data. Since those who collected data are co-authors and written records exist as a paper trail, we are able to describe the data collection process with some accuracy. The diabetic individual, Chris, had been diagnosed at approximately 20 months of age. His parents (including his father, the second author), began to prepare journals of Chris's blood sugar data from the time of his diagnosis (August, 2010). The written log initially included records of how much of which insulin type was administered and when along with a detailed specification of what foods were eaten and the equivalent number of carbohydrates that would lead to an increase in blood glucose. The log (see ► [Figure 1](#FI0047-1){ref-type="fig"} ) served as the sole record of Chris's blood sugar information in the family, and served as a boundary object \[ [@JR0047-6] \] around which Chris, his parents, and ultimately health care practitioners, would discuss recent trends observed over past days and make necessary adjustments. The records that were manually recorded by Chris's family were considered to be quite thorough relative to many other patient families and were important resources for both the parents and health care providers to examine when planning meals, activities, and insulin dosage. ![Journals recording blood glucose levels prepared by the third author and his family.](im_10-3414-me16-02-0047-i1){#FI0047-1} The journals changed in structure and content over time as carbohydrate and serving size information was internalized by family members, and they stopped logging that information. Eventually, only blood sugar levels and times of day were recorded. As part of another study related to educational and learning activities that take place by way of self-quantification in and out of the classroom \[ [@BR0047-7] -- [@JR0047-9] \], these journals were introduced to the first author. With the consent of Chris and his parents, the glucose measurements were digitized by the first author and research assistants. One month of data (March, 2013) was missing. In total, there were 7,437 entries from all the journals from August 2010 to February 2014. Details about the numbers of readings are provided in ► [Table 1](#TB0047-1){ref-type="table"} . ###### Number of digitized handwritten glucose data measurements per year. **Year** **2010** **2011** **2012** **2013** **2014** ------------------------------------------ ---------- ----------- ----------- ----------- -------------------- **Total Glucose Entries** 617 2595 2184 1899 142 **Time Period** 4 months 12 months 12 months 11 months 1 month and 5 days **Estimated number of readings per day** 5.14 7.21 6.07 5.75 4.06 Family circumstances changed in February, 2014 that made continued handwritten journaling difficult (February, 2014). Blood sugar readings were still obtained but not retained in a permanent record. In summer of 2014, Chris's parents were able to purchase a CGM device and switched to it as the primary source and repository of blood glucose information. None of the CGM data were collected with the intention of performing a pre-planned self-experiment or to be used for third party analysis. The CGM data were obtained through a Dexcom G4 Platinum (► [Figure 2](#FI0047-2){ref-type="fig"} ), which was configured to obtain a blood glucose reading every five minutes. The Dexcom unit was linked to Chris's parents' smart-phones so that they could be alerted to extraordinary deviations from desired blood sugar ranges (typically between 80 and 180 mg/dL). Because several dozen data points were accessible to Chris and his parents on an ongoing basis, these blood sugar data were not manually recorded by any individual. The information available when they were checking immediate blood sugar levels and the previous few hours was deemed adequate for routine in-the-moment decision making on their part with respect to deciding on Chris's insulin dosage. ![The Dexcom G4 Platinum continuous glucose monitoring device used by the third author and the mobile app and data display most frequently used by the third author's parents in monitoring his glucose levels.](im_10-3414-me16-02-0047-i2){#FI0047-2} Due to some misunderstandings about how and for how long data were stored by the device, the readings from the Dexcom were not downloaded to be viewed or retained separately by the family until October of 2016, when the family switched endocrinologists (due to retirement of their longstanding provider) and were explicitly requested by the new attending endocrinologist to export the Dexcom data and bring specific reports to their first consultation. For the purposes of this paper, 14 days of CGM data are considered. That is the equivalent of 6,720 blood sugar data points. This number of days is considered for two reasons. One is that after preparing and reviewing an aggregate visualization of these fourteen days, Chris's family noticed clear evidence of a regularity that they wanted to change for Chris's benefit. Thus, those 14 days were prior to any intervention that was meant to mitigate the detected regularity. Secondly, this number of data points is comparable to the number of data points obtained in the manual record, albeit over a different time scale and density. By comparing roughly equal numbers of manually and CGM collected data points, we feel that the density of sampling and the inferences made from large numbers of visualized data points becomes foregrounded in our analysis rather than the absolute number of measurements. In addition to the aforementioned numerical data, the first author met with Chris and his family on three occasions for 1--2 hours at a time to conduct open interviews with them about their data collection and experience with tracking and managing Chris's blood sugar. Two interviews were audiorecorded at Chris's home. One interview was recorded with handwritten notes as it took place in a public venue. These interviews form the basis of determining the family's response and impressions of the data visualized from these two tracking methods. These were also supplemented with some additional qualitative records such as email correspondence between the parents and the first author. The overarching study and the interview procedures described had been approved by an institutional review board, and all necessary consent and assents were obtained in writing. 4. Results ========== 4.1 Observed Features of Manually Collected Data Visualized ----------------------------------------------------------- A plot prepared in Tableau of all manually obtained glucose readings over time of day across all days in the journals appears in ► [Figure 3](#FI0047-3){ref-type="fig"} . A secondary set of plots for years 2010--2013 (2014 was excluded because it was far fewer data points) showing the number of readings during each fifteen minute time interval (dots) and the computed average blood sugar level given all records during the associated 15 minute time interval in the associated year (line) is provided in ► [Figure 4](#FI0047-4){ref-type="fig"} . ![Aggregated plot of all manual measurements of blood glucose according to time of day and the blood glucose level.](im_10-3414-me16-02-0047-i3){#FI0047-3} ![Multiyear plot of manually collected data from 2010--2013 showing numbers of measurements taken during 15-minute intervals (dots) and the average blood glucose levels from the corresponding readings (line).](im_10-3414-me16-02-0047-i4){#FI0047-4} From the audio and video records of the family's examination of all aggregated manually obtain data, it was clear to Chris's family that breakfast, lunch, and dinner were all heavily sampled times. This was reflected by the dark bars in the times roughly corresponding to 8:00 AM, 12:00 PM, and 7:00 PM. The evenings after 7:00 PM and up to roughly 11:00PM, when both parents were home, had more samples obtained than other four-hour time blocks including the time between breakfast and lunch and the time between lunch and dinner. They recognized that this was because of post-dinner snacking and the family was conscientious about monitoring blood sugar immediately before and after eating and in preparation of sleep. Chris's morning readings obtained around breakfast time tended to have higher blood glucose levels than later ones, which they retroactively attributed to having just woken up and having generally more physically active afternoons with recreational activities such as preschool soccer programs. There were not as many, but still several, readings in the middle of the night between midnight and 7:00 AM. As Chris's parents described, if there were unusual readings prior to bedtime or if they had an intuitive hunch that it was possible for his blood sugar to be too low, they would do a prick test themselves in the middle of the night. Chris's parents believe that there may have been more tests than reflected in ► [Figure 2](#FI0047-2){ref-type="fig"} and [Figure 3](#FI0047-3){ref-type="fig"} , but since it was the middle of the night, they recalled that they would overlook recording the middle of the night blood sugar readings especially if they were within what they considered to be an acceptable range. Based on their examination of ► [Figure 3](#FI0047-3){ref-type="fig"} , Chris's family did not feel there were any clear glucose level trends that could be ascertained. Since the data were separated by years and by times during the day, they were aware that outlier sensitivity could make some days' readings appear high. Thus, it was not obvious there was a regularity in blood sugar levels. However, they did notice that in 2013 there were two times in the plot when their appeared to be a substantial increase in the number of blood sugar readings relative to other years. One of those times was about 10:30 AM, which in 2013 had 48 readings. In other years it had at most just a few. The other increase was at 8:00 PM which had 112 readings whereas in previous years there would usually be between 70--80 readings. Upon reflection, Chris's family realized that 2013 was the year that Chris began Kindergarten. For over three months, his daily schedule became structured around the school schedule, and 10:30 AM corresponded to the time just before his school's morning recess. That was a consistent set time for a blood sugar reading at school. The 8:00 PM readings were attributable to a strict bedtime that was followed because of needing to wake up at a certain time for Kindergarten. Chris was the oldest child in the family and thus the first to have their home schedule affected by a public school schedule. 4.2 Observations from CGM Collected Data Visualized --------------------------------------------------- With the Dexcom CGM data, the family reported relying most often on the numerical display on the CGM device and the ongoing reports from the Dexcom mobile device app (► [Figure 2](#FI0047-2){ref-type="fig"} ). As parents of multiple children and one parent working outside of the home full-time and pursuing graduate studies part time, the just-in-time access to immediate information was considered the most pressing and useful. Chris's family had access to the Dexcom Clarity software, which produced data visualizations like the one shown in ► [Figure 5](#FI0047-5){ref-type="fig"} and [Figure 6](#FI0047-6){ref-type="fig"} . However, these were unused until they were switched to a new endicronologist who asked specifically for certain reports from the Clarity software. ![Visualization of two weeks of the third author's automatically obtained blood sugar data produced by Dexcom Clarity tool.](im_10-3414-me16-02-0047-i5){#FI0047-5} When the aggregated two weeks of Dexcom blood sugar data were examined as prepared in the Clarity software, the family noticed two clear, consistent, and surprising regularities (► [Figure 5](#FI0047-5){ref-type="fig"} ). One was that there was a steady increase in blood sugar levels in the morning between breakfast and lunch. As the previous manual sampling did not heavily sample during that time period, this regularity was not previously detected. This was consistent with another visualization of daily data provided by the Clarity visualization tool (► [Figure 6](#FI0047-6){ref-type="fig"} ). Together, this morning increase which they believe had been present for quite some time since they did not perceive major noteworthy changes to Chris's daily insulin, dietary, or physical activity routines between when they had stopped maintaining paper journals and when they began to use the CGM. This led to an immediate change in when insulin would be administered in the morning with the hope of making that blood sugar increase go away. ![Visualization of the third author's blood sugar levels each day of the week prepared by the Dexcom Clarity tool.](im_10-3414-me16-02-0047-i6){#FI0047-6} The other regularity that was noted by Chris's family was that the nighttime glucose levels were relatively high compared to awake hours. Chris's parents retroactively attributed this to a cautious stance of theirs in which they tended to prefer he run high rather than low at night, as falling into a coma and already being asleep when that happens is a major concern for people with diabetes. Again, night time was not heavily sampled or recorded by the manual method. These relatively high blood sugar levels were not a regularity that the family had monitored, and they have since been re-evaluating how to help Chris manage his blood sugar at night. 5. Discussion ============= Through this juxtaposition of comparable numbers of blood sugar measurements, we observe that different features of youth diabetic blood sugar measurements that were detected and interpreted differently by the family. First, in the aggregated view of the manual data recordings, periods of frequent and regular sampling were revealed. Sampling was driven largely by eating, formal school schedules, and both parents being in immediate proximity to Chris. This sampling approach inadvertently created data blind spots for the family. The continuous glucose monitoring visualizations revealed that some of these blind spots were consequential. There were two periods of time (early morning prior to awakening and the hours between breakfast and lunch) that were previously undersampled through manual approaches, and those times showed higher blood sugar levels than what Chris or his parents desired or expected. This led to a change in treatment regimen, discussed generally with their endocrinologist and refined through daily family practice, that was informed by this new visualization. However, that new CGM visualization was only obtained and reflectively examined when the family was called upon by a new doctor to provide a particular report using the Clarity tool. What was much more common and more accessible for the moment-to-moment decision making by individual members was independent examination of the most recent numerical readouts from Chris's CGM and mobile apps that only showed a partial window of the typical day. In retrospect, the family reported that the ease and frequency of immediate and abundant data access seemingly contributed to a sense that they knew more about what was happening with Chris's blood sugar already at any given moment. Until they switched endocrinologists, they were not otherwise being cued to produce aggregate reviews of his data, and operated off of partial (but to their view, seemingly abundant) blood sugar information. Thus, while they had the ability to examine blind spots in detail, there was little prompting that necessitated such examinations amidst the hustle and bustle of daily family life. As the opportunity for new technologies and more data obtained through a range of biosensors beyond CGM become increasingly available to aid in the management of chronic conditions like T1D \[ [@JR0047-10] \], such considerations for how such data will be routinely reviewed and used by families remain important for improving youth health management. 6. Conclusions ============== In conclusion, there are two major lessons embedded in this case study. One is that day-to-day routines and childhood school day schedules can affect how data are obtained for a T1D youth. This became apparent in this case with a family that diligently maintained a multiyear written record of blood sugar test results. The aggregation of these years of records revealed blind spots within a systematically collected personal data archive. The other lesson is that while new digital tools might have embedded features and accessories that allow families to inspect and review aggregated blood sugar data, there is no assurance that such features will be organically used. Studies of user-technology interaction consistently demonstrate that just because functionality exists, users may not know about or access it \[ [@BR0047-11] \] and the addition of just a few extra cognitive actions -- in this case, exporting data, switching to different view settings, and recognizing that there were times that were previously overlooked -- can implicitly dissuade pursuit of new routines \[ [@BR0047-12] \]. Considering these features went unused by a highly motivated family who took the time and effort to systematically record years of bloodsugar data and otherwise educate themselves and others about T1D, this suggests that those interested in medical information and personal information management should consider when and how data collection and reflection can be better motivated so that these blind spots are better examined in situ. Automated tools and resources such as artificial pancreas systems or CGM technology may be attractive because they have the potential of obtaining and storing large amounts of frequently obtained data. However, better prompting or cueing for examination of data visualization features should be encouraged for the collected data to be made maximally informative to families and their healthcare providers. This could take the form of automatic reports being generated and appearing as alerts in their applications or in creating expectations of standard data visualization forms that are to be shared between patients and healthcare providers. Designers and tool developers should also be aware that users can mistakenly take large amounts of recent data to be alone sufficient when views of data at multiple time scales would be more informative for better health management. The authors acknowledge the assistance of Joel Drake, Liam Fischback, and Kourtney Schut in assisting with data digitization and the Thurston family for sharing their data.
{ "pile_set_name": "PubMed Central" }
As the threat of another tense standoff at an Albuquerque city council meeting brews, protesters angry over a series of police shootings are harkening back to the city's long history of civil disturbance and modeling their demonstrations after those including a notorious 1960s citizen raid of a northern New Mexico courthouse. In 1967, protesters contending the US government stole millions of acres of land from Mexican American residents stormed a courthouse to attempt a citizen's arrest of the district attorney. During the raid, the group shot and wounded a state police officer and jailer, beat a deputy and took the sheriff and a reporter hostage. Now a leader of this week's protest cited that episode as the motivation for the city council demonstration in which protesters attempted a citizen's arrest of the police chief. "That's where we got the idea for the citizen's arrest," said David Correia, a University of New Mexico American studies professor and a protest organizer. He wasn't advocating violence, but a focus on civil disobedience, saying participants were willing to be arrested. It's an interesting turn of events in Albuquerque, where distrust of the police department is at an all-time high after an officer shot and killed an armed man following a weekend Swat standoff. Police in the city of 550,000 people have been involved in 39 shootings since 2010 and are under tough scrutiny following a harsh report from the US Justice Department over use of force. On Monday, activists stormed the city council chambers and forced city leaders to abruptly end the meeting, and they planned more unrest at a Thursday meeting. The rowdy disruption of the city council meeting, protesters say, also follows the tactics of another 1960s Mexican-American group – the Black Berets. Similar to the Black Panther Party, the Berets mounted community patrols, opened free clinics and protested police brutality in Albuquerque. To draw attention to their causes, they often attended meetings and events unannounced to force authorities to hear them out. The latest protest also highlighted the dilemma facing Albuquerque police. Police chief Gorden Eden was hired just three months ago to bring reform to the troubled department, which recently implemented changes such as lapel-mounted cameras on officers to lead to more transparency about police actions. But video of recent shootings, especially one in March involving a knife-wielding homeless camper, has only inflamed tensions once the footage went viral. And police insist that the suspect in the weekend shooting was a threat because he was armed and putting his family and others in danger. Deputy chief Eric Garcia stressed that officers patiently negotiated with suspect Armand Martin and attempted to de-escalate the situation but had no other choice when he exited his home with handguns. On Monday, protesters called for a citizen's arrest of Eden, charging him with "harboring fugitives from justice at the Albuquerque police department" and for "crimes against humanity" in connection with recent police shootings. The police chief quickly left the city council meeting after the citizen's arrest was announced, and no protesters tried to apprehend him. Had anyone touched him, authorities said they could have faced charges of battery on a police officer. Protesters also could have faced charges of disrupting a city council meeting under a city ordinance. But no arrests were made. A state attorney general's office spokesman said it was likely illegal for citizens to arrest a police chief. The 1967 courthouse protest inspiring demonstrators today also sparked the Chicano Movement, an aggressive civil rights push among Mexican Americans that involved boycotts, school walkouts and a new political party, La Raza Unida. The protest was in response to a land-grant disputes that date back centuries when what is now New Mexico was a Spanish colonial territory. Land grants were awarded to settlers by the Spanish government to encourage settlement in the empire's northern territories. A book by Correia outlines that Hispanic families later lost Spanish land grants to white land speculators through violence and the courts, and the families responded with violence. Isabela Seong Leong Quintana, a history professor at New Mexico State University, said she sees a link between the current protests in Albuquerque to those from the 1960s in New Mexico. "There are similarities how people are going about contesting domination," she said. "But I don't know if everyone involved is conscious of it." Nora Tachias-Anaya, one of the leaders of the protest, said demonstrators planned to attend the rescheduled council meeting Thursday when councilors are slated to debate possible reforms on how the Albuquerque hires a police chief. "The more people learn, the more people get angry," she said.
{ "pile_set_name": "OpenWebText2" }
Horloge heure (Crédits simplementNat Martel, CC-BY-SA 2.0) La France passe à l’heure d’hiver dans la nuit de samedi à dimanche. Un changement d’heure qui ne convainc guère les Français. Par la rédaction de Contrepoints. Le changement d’heure a eu lieu ce week-end. Les Français dorment une heure de plus durant la nuit. Ils passent à l’heure d’hiver en retardant les aiguilles de leur montre d’une heure : à 3 heures du matin, il sera alors officiellement 2 heures. Les jours leur paraîtront plus courts puisque le Soleil se couchera plus tôt le soir. Selon un sondage BVA pour Orange et iTélé réalisé en mars 2015, encore 13 % des Français ne savaient pas la veille que le passage à l’heure d’été avait lieu le week-end, soit tout de même plus de 6 millions de personnes. Le changement d’heure ne rencontre pas l’adhésion des Français Presque 40 ans après avoir été mis en place pour la deuxième fois, sous le mandat de Valéry Giscard d’Estaing, une large majorité de 58 % de Français reste opposée au changement d’heure (contre 40 % y étant favorables), selon ce même sondage. S’ils y sont opposés, c’est d’abord parce qu’ils sont 62 % à être perturbés par ce décalage horaire brutal, que les chronobiologistes qualifient de chrono-ruptures (qualité du sommeil, appétit). Ils sont même 19 % à l’être « beaucoup ». Sans surprise, l’opposition au changement d’heure est plus forte dans « la France qui se lève tôt » : les CSP- y sont nettement plus opposées que les CSP+ (61 %, contre 51 %). Par ailleurs, presque les trois-quarts des parents (73 %) considèrent que leurs enfants sont perturbés par ce changement d’heure. C’est même l’avis de 88 % des parents d’enfants de 5 à 10 ans. 66 % ne croient pas aux économies d’énergie Selon ses promoteurs, l’intérêt de l’heure d’été réside dans les économies d’énergie qu’elle est censée permettre afin de profiter plus tard de la lumière solaire pendant la période estivale. Que ce soit en 1917, quand ce système a été pour la première fois instauré en France, ou en 1976 quand il l’a été une deuxième fois, à chaque fois, la mise en place de ce système de changement d’heure a été justifiée par les économies d’énergie qu’il permettrait de réaliser. Mais 66 % des Français ne croient pas en cet argument, et peut-être moins encore en cette période de baisse du prix du pétrole. Seuls les sympathisants d’Europe-Écologie-Les Verts, plus sensibles à ces questions d’économies d’énergie, sont au contraire une majorité à penser que le changement d’heure permet de réaliser ce type d’économie (55 % contre 32 % de l’ensemble des Français). Au final, les Français continuent donc d’être largement opposés au changement d’heure, à la fois parce qu’il les perturbe souvent, eux et leurs enfants, mais aussi parce qu’il ne leur parait guère efficace pour réaliser des économies d’énergie. Cela ne devrait cependant pas perdurer puisque le dernier changement d’heure est programmé pour 2021. Article initialement publié en octobre 2018.
{ "pile_set_name": "OpenWebText2" }
The fifth annual Arizona Fall League Rising Stars was played last night at Surprise Stadium in Surprise, Ariz. The Brewers had three representatives in the game. OF Caleb Gindl, who started in left field and batted second and RHP Jeremy Jeffress will pitch out of the bullpen for the West squad. Mike Guerrero, who is managing the Surprise Rafters and is the manager of Double-A Huntsville, managed the West team. After the West tied the game at 2-2 in the third, neither team scored until a walk off home run by Leslie Anderson. The home run dazzled the crowd, but it was Jeffress who drew what were perhaps the loudest cheers of the night. The crowd rose to its feet and cheered his final pitch of the inning to strike out Brandon Laird that read 101 mph on the stadium scoreboard. Earlier in the at bat, the scoreboard read 99 and “00” for 100. Jeffress pitches during last night’s AFL Rising Stars game in Surprise, Ariz. “I don’t know if I had ever received an ovation like that,” said Jeffress. “The home run was a bigger deal than me hitting 100 tonight. That won us the game which is the most important thing. I was just trying to get the outs, hit my spots and I really let it go. I guess it’s the All-Star game and everyone is watching, so why not?” Jeffress pitched one inning, struck out two, walked one and allowed one hit. Gindl finished the night 0-for-4. Gindl at bat in last night’s AFL Rising Stars Game in Surprise, Ariz. A showcase game that features the top talent here in Arizona, 4,749 fans and scouts from every Major League team were in attendance. The game was broadcast on the MLB Network and on mlb.com. Guerrero was excited for the opportunity to manage the West team. “It is exciting to be here with all these future stars,” said Guerrero. “This is such a special league and to be a part of this game is an honor. It was nice to see Jeremy show everyone what he has. He has a bright future in the Brewers organization.” Gindl is currently hitting .298 (14-for-47) with two home runs and six RBI in 13 games. He also has four doubles and one triple in Fall League play. Jeffress has allowed only one earned run in 9.1 innings pitched in Fall League play this year. His 0.96 ERA ranks fourth among pitchers in the AFL. Today was a scheduled off day for the AFL. The teams were selected by scouting and minor-league directors from every Major League organization, in consultation with Fall League Director Steve Cobb and his staff. Twenty-eight of the 50 players who appeared in last year’s Rising Stars Game played in the Major Leagues in 2010. I’m currently at Sky Harbor International Airport about to board my flight back to Milwaukee. I’m trying to soak in the last couple minutes of sunshine before returning to Milwaukee and the beginning of winter. I have a couple of stories I will continue to post throughout the week regarding the Arizona Fall League. Also, please continue to send us your questions for Brewers General Manager Doug Melvin regarding the Brewers Minor League system. I can’t wait until I return to Phoenix for Spring Training! Meta The following are trademarks or service marks of Major League Baseball entities and may be used only with permission of Major League Baseball Properties, Inc. or the relevant Major League Baseball entity: Major League, Major League Baseball, MLB, the silhouetted batter logo, World Series, National League, American League, Division Series, League Championship Series, All-Star Game, and the names, nicknames, logos, uniform designs, color combinations, and slogans designating the Major League Baseball clubs and entities, and their respective mascots, events and exhibitions.
{ "pile_set_name": "Pile-CC" }
Eye on religion: considering the influence of Buddhist and Shinto thought on contemporary Japanese bioethics. Religious traditions can play a significant role in the shaping of bioethical thought. In Japan, traditional Buddhist and Shinto thought continue to influence contemporary bioethical perspectives. To better define this relationship, this paper examines the correlation between Japanese bioethical perspectives and Buddhist and Shinto thought. An in-depth discussion explores how Buddhist and Shinto scholars have used fundamental concepts with each religious tradition to agree and disagree with the disclosure of an incurable disease to a patient, brain death, and brain-dead organ transplantation.
{ "pile_set_name": "PubMed Abstracts" }
Le cose da difendere Le cose da difendere is the seventh studio album by Italian singer-songwriter Nek. It was released in 2002. Track listing Charts and certifications Peak positions Certifications References Category:2002 albums Category:Nek albums
{ "pile_set_name": "Wikipedia (en)" }
/** * \file * * \brief Peripheral I/O description for SAM4LS4B * * Copyright (c) 2014-2018 Microchip Technology Inc. and its subsidiaries. * * \asf_license_start * * \page License * * Subject to your compliance with these terms, you may use Microchip * software and any derivatives exclusively with Microchip products. * It is your responsibility to comply with third party license terms applicable * to your use of third party software (including open source software) that * may accompany Microchip software. * * THIS SOFTWARE IS SUPPLIED BY MICROCHIP "AS IS". NO WARRANTIES, * WHETHER EXPRESS, IMPLIED OR STATUTORY, APPLY TO THIS SOFTWARE, * INCLUDING ANY IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY, * AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL MICROCHIP BE * LIABLE FOR ANY INDIRECT, SPECIAL, PUNITIVE, INCIDENTAL OR CONSEQUENTIAL * LOSS, DAMAGE, COST OR EXPENSE OF ANY KIND WHATSOEVER RELATED TO THE * SOFTWARE, HOWEVER CAUSED, EVEN IF MICROCHIP HAS BEEN ADVISED OF THE * POSSIBILITY OR THE DAMAGES ARE FORESEEABLE. TO THE FULLEST EXTENT * ALLOWED BY LAW, MICROCHIP'S TOTAL LIABILITY ON ALL CLAIMS IN ANY WAY * RELATED TO THIS SOFTWARE WILL NOT EXCEED THE AMOUNT OF FEES, IF ANY, * THAT YOU HAVE PAID DIRECTLY TO MICROCHIP FOR THIS SOFTWARE. * * \asf_license_stop * */ /* * Support and FAQ: visit <a href="https://www.microchip.com/support/">Microchip Support</a> */ #ifndef _SAM4LS4B_PIO_ #define _SAM4LS4B_PIO_ #define PIN_PA00 0 /**< \brief Pin Number for PA00 */ #define GPIO_PA00 (1u << 0) /**< \brief GPIO Mask for PA00 */ #define PIN_PA01 1 /**< \brief Pin Number for PA01 */ #define GPIO_PA01 (1u << 1) /**< \brief GPIO Mask for PA01 */ #define PIN_PA02 2 /**< \brief Pin Number for PA02 */ #define GPIO_PA02 (1u << 2) /**< \brief GPIO Mask for PA02 */ #define PIN_PA03 3 /**< \brief Pin Number for PA03 */ #define GPIO_PA03 (1u << 3) /**< \brief GPIO Mask for PA03 */ #define PIN_PA04 4 /**< \brief Pin Number for PA04 */ #define GPIO_PA04 (1u << 4) /**< \brief GPIO Mask for PA04 */ #define PIN_PA05 5 /**< \brief Pin Number for PA05 */ #define GPIO_PA05 (1u << 5) /**< \brief GPIO Mask for PA05 */ #define PIN_PA06 6 /**< \brief Pin Number for PA06 */ #define GPIO_PA06 (1u << 6) /**< \brief GPIO Mask for PA06 */ #define PIN_PA07 7 /**< \brief Pin Number for PA07 */ #define GPIO_PA07 (1u << 7) /**< \brief GPIO Mask for PA07 */ #define PIN_PA08 8 /**< \brief Pin Number for PA08 */ #define GPIO_PA08 (1u << 8) /**< \brief GPIO Mask for PA08 */ #define PIN_PA09 9 /**< \brief Pin Number for PA09 */ #define GPIO_PA09 (1u << 9) /**< \brief GPIO Mask for PA09 */ #define PIN_PA10 10 /**< \brief Pin Number for PA10 */ #define GPIO_PA10 (1u << 10) /**< \brief GPIO Mask for PA10 */ #define PIN_PA11 11 /**< \brief Pin Number for PA11 */ #define GPIO_PA11 (1u << 11) /**< \brief GPIO Mask for PA11 */ #define PIN_PA12 12 /**< \brief Pin Number for PA12 */ #define GPIO_PA12 (1u << 12) /**< \brief GPIO Mask for PA12 */ #define PIN_PA13 13 /**< \brief Pin Number for PA13 */ #define GPIO_PA13 (1u << 13) /**< \brief GPIO Mask for PA13 */ #define PIN_PA14 14 /**< \brief Pin Number for PA14 */ #define GPIO_PA14 (1u << 14) /**< \brief GPIO Mask for PA14 */ #define PIN_PA15 15 /**< \brief Pin Number for PA15 */ #define GPIO_PA15 (1u << 15) /**< \brief GPIO Mask for PA15 */ #define PIN_PA16 16 /**< \brief Pin Number for PA16 */ #define GPIO_PA16 (1u << 16) /**< \brief GPIO Mask for PA16 */ #define PIN_PA17 17 /**< \brief Pin Number for PA17 */ #define GPIO_PA17 (1u << 17) /**< \brief GPIO Mask for PA17 */ #define PIN_PA18 18 /**< \brief Pin Number for PA18 */ #define GPIO_PA18 (1u << 18) /**< \brief GPIO Mask for PA18 */ #define PIN_PA19 19 /**< \brief Pin Number for PA19 */ #define GPIO_PA19 (1u << 19) /**< \brief GPIO Mask for PA19 */ #define PIN_PA20 20 /**< \brief Pin Number for PA20 */ #define GPIO_PA20 (1u << 20) /**< \brief GPIO Mask for PA20 */ #define PIN_PA21 21 /**< \brief Pin Number for PA21 */ #define GPIO_PA21 (1u << 21) /**< \brief GPIO Mask for PA21 */ #define PIN_PA22 22 /**< \brief Pin Number for PA22 */ #define GPIO_PA22 (1u << 22) /**< \brief GPIO Mask for PA22 */ #define PIN_PA23 23 /**< \brief Pin Number for PA23 */ #define GPIO_PA23 (1u << 23) /**< \brief GPIO Mask for PA23 */ #define PIN_PA24 24 /**< \brief Pin Number for PA24 */ #define GPIO_PA24 (1u << 24) /**< \brief GPIO Mask for PA24 */ #define PIN_PA25 25 /**< \brief Pin Number for PA25 */ #define GPIO_PA25 (1u << 25) /**< \brief GPIO Mask for PA25 */ #define PIN_PA26 26 /**< \brief Pin Number for PA26 */ #define GPIO_PA26 (1u << 26) /**< \brief GPIO Mask for PA26 */ #define PIN_PA27 27 /**< \brief Pin Number for PA27 */ #define GPIO_PA27 (1u << 27) /**< \brief GPIO Mask for PA27 */ #define PIN_PA28 28 /**< \brief Pin Number for PA28 */ #define GPIO_PA28 (1u << 28) /**< \brief GPIO Mask for PA28 */ #define PIN_PA29 29 /**< \brief Pin Number for PA29 */ #define GPIO_PA29 (1u << 29) /**< \brief GPIO Mask for PA29 */ #define PIN_PA30 30 /**< \brief Pin Number for PA30 */ #define GPIO_PA30 (1u << 30) /**< \brief GPIO Mask for PA30 */ #define PIN_PA31 31 /**< \brief Pin Number for PA31 */ #define GPIO_PA31 (1u << 31) /**< \brief GPIO Mask for PA31 */ #define PIN_PB00 32 /**< \brief Pin Number for PB00 */ #define GPIO_PB00 (1u << 0) /**< \brief GPIO Mask for PB00 */ #define PIN_PB01 33 /**< \brief Pin Number for PB01 */ #define GPIO_PB01 (1u << 1) /**< \brief GPIO Mask for PB01 */ #define PIN_PB02 34 /**< \brief Pin Number for PB02 */ #define GPIO_PB02 (1u << 2) /**< \brief GPIO Mask for PB02 */ #define PIN_PB03 35 /**< \brief Pin Number for PB03 */ #define GPIO_PB03 (1u << 3) /**< \brief GPIO Mask for PB03 */ #define PIN_PB04 36 /**< \brief Pin Number for PB04 */ #define GPIO_PB04 (1u << 4) /**< \brief GPIO Mask for PB04 */ #define PIN_PB05 37 /**< \brief Pin Number for PB05 */ #define GPIO_PB05 (1u << 5) /**< \brief GPIO Mask for PB05 */ #define PIN_PB06 38 /**< \brief Pin Number for PB06 */ #define GPIO_PB06 (1u << 6) /**< \brief GPIO Mask for PB06 */ #define PIN_PB07 39 /**< \brief Pin Number for PB07 */ #define GPIO_PB07 (1u << 7) /**< \brief GPIO Mask for PB07 */ #define PIN_PB08 40 /**< \brief Pin Number for PB08 */ #define GPIO_PB08 (1u << 8) /**< \brief GPIO Mask for PB08 */ #define PIN_PB09 41 /**< \brief Pin Number for PB09 */ #define GPIO_PB09 (1u << 9) /**< \brief GPIO Mask for PB09 */ #define PIN_PB10 42 /**< \brief Pin Number for PB10 */ #define GPIO_PB10 (1u << 10) /**< \brief GPIO Mask for PB10 */ #define PIN_PB11 43 /**< \brief Pin Number for PB11 */ #define GPIO_PB11 (1u << 11) /**< \brief GPIO Mask for PB11 */ #define PIN_PB12 44 /**< \brief Pin Number for PB12 */ #define GPIO_PB12 (1u << 12) /**< \brief GPIO Mask for PB12 */ #define PIN_PB13 45 /**< \brief Pin Number for PB13 */ #define GPIO_PB13 (1u << 13) /**< \brief GPIO Mask for PB13 */ #define PIN_PB14 46 /**< \brief Pin Number for PB14 */ #define GPIO_PB14 (1u << 14) /**< \brief GPIO Mask for PB14 */ #define PIN_PB15 47 /**< \brief Pin Number for PB15 */ #define GPIO_PB15 (1u << 15) /**< \brief GPIO Mask for PB15 */ /* ========== GPIO definition for TWIMS0 peripheral ========== */ #define PIN_PA24B_TWIMS0_TWCK 24 /**< \brief TWIMS0 signal: TWCK on PA24 mux B */ #define MUX_PA24B_TWIMS0_TWCK 1 #define PINMUX_PA24B_TWIMS0_TWCK ((PIN_PA24B_TWIMS0_TWCK << 16) | MUX_PA24B_TWIMS0_TWCK) #define GPIO_PA24B_TWIMS0_TWCK (1u << 24) #define PIN_PA23B_TWIMS0_TWD 23 /**< \brief TWIMS0 signal: TWD on PA23 mux B */ #define MUX_PA23B_TWIMS0_TWD 1 #define PINMUX_PA23B_TWIMS0_TWD ((PIN_PA23B_TWIMS0_TWD << 16) | MUX_PA23B_TWIMS0_TWD) #define GPIO_PA23B_TWIMS0_TWD (1u << 23) /* ========== GPIO definition for TWIMS1 peripheral ========== */ #define PIN_PB01A_TWIMS1_TWCK 33 /**< \brief TWIMS1 signal: TWCK on PB01 mux A */ #define MUX_PB01A_TWIMS1_TWCK 0 #define PINMUX_PB01A_TWIMS1_TWCK ((PIN_PB01A_TWIMS1_TWCK << 16) | MUX_PB01A_TWIMS1_TWCK) #define GPIO_PB01A_TWIMS1_TWCK (1u << 1) #define PIN_PB00A_TWIMS1_TWD 32 /**< \brief TWIMS1 signal: TWD on PB00 mux A */ #define MUX_PB00A_TWIMS1_TWD 0 #define PINMUX_PB00A_TWIMS1_TWD ((PIN_PB00A_TWIMS1_TWD << 16) | MUX_PB00A_TWIMS1_TWD) #define GPIO_PB00A_TWIMS1_TWD (1u << 0) /* ========== GPIO definition for TWIMS2 peripheral ========== */ #define PIN_PA22E_TWIMS2_TWCK 22 /**< \brief TWIMS2 signal: TWCK on PA22 mux E */ #define MUX_PA22E_TWIMS2_TWCK 4 #define PINMUX_PA22E_TWIMS2_TWCK ((PIN_PA22E_TWIMS2_TWCK << 16) | MUX_PA22E_TWIMS2_TWCK) #define GPIO_PA22E_TWIMS2_TWCK (1u << 22) #define PIN_PA21E_TWIMS2_TWD 21 /**< \brief TWIMS2 signal: TWD on PA21 mux E */ #define MUX_PA21E_TWIMS2_TWD 4 #define PINMUX_PA21E_TWIMS2_TWD ((PIN_PA21E_TWIMS2_TWD << 16) | MUX_PA21E_TWIMS2_TWD) #define GPIO_PA21E_TWIMS2_TWD (1u << 21) /* ========== GPIO definition for TWIMS3 peripheral ========== */ #define PIN_PB15C_TWIMS3_TWCK 47 /**< \brief TWIMS3 signal: TWCK on PB15 mux C */ #define MUX_PB15C_TWIMS3_TWCK 2 #define PINMUX_PB15C_TWIMS3_TWCK ((PIN_PB15C_TWIMS3_TWCK << 16) | MUX_PB15C_TWIMS3_TWCK) #define GPIO_PB15C_TWIMS3_TWCK (1u << 15) #define PIN_PB14C_TWIMS3_TWD 46 /**< \brief TWIMS3 signal: TWD on PB14 mux C */ #define MUX_PB14C_TWIMS3_TWD 2 #define PINMUX_PB14C_TWIMS3_TWD ((PIN_PB14C_TWIMS3_TWD << 16) | MUX_PB14C_TWIMS3_TWD) #define GPIO_PB14C_TWIMS3_TWD (1u << 14) /* ========== GPIO definition for IISC peripheral ========== */ #define PIN_PB05D_IISC_IMCK 37 /**< \brief IISC signal: IMCK on PB05 mux D */ #define MUX_PB05D_IISC_IMCK 3 #define PINMUX_PB05D_IISC_IMCK ((PIN_PB05D_IISC_IMCK << 16) | MUX_PB05D_IISC_IMCK) #define GPIO_PB05D_IISC_IMCK (1u << 5) #define PIN_PA31B_IISC_IMCK 31 /**< \brief IISC signal: IMCK on PA31 mux B */ #define MUX_PA31B_IISC_IMCK 1 #define PINMUX_PA31B_IISC_IMCK ((PIN_PA31B_IISC_IMCK << 16) | MUX_PA31B_IISC_IMCK) #define GPIO_PA31B_IISC_IMCK (1u << 31) #define PIN_PB02D_IISC_ISCK 34 /**< \brief IISC signal: ISCK on PB02 mux D */ #define MUX_PB02D_IISC_ISCK 3 #define PINMUX_PB02D_IISC_ISCK ((PIN_PB02D_IISC_ISCK << 16) | MUX_PB02D_IISC_ISCK) #define GPIO_PB02D_IISC_ISCK (1u << 2) #define PIN_PA27B_IISC_ISCK 27 /**< \brief IISC signal: ISCK on PA27 mux B */ #define MUX_PA27B_IISC_ISCK 1 #define PINMUX_PA27B_IISC_ISCK ((PIN_PA27B_IISC_ISCK << 16) | MUX_PA27B_IISC_ISCK) #define GPIO_PA27B_IISC_ISCK (1u << 27) #define PIN_PB03D_IISC_ISDI 35 /**< \brief IISC signal: ISDI on PB03 mux D */ #define MUX_PB03D_IISC_ISDI 3 #define PINMUX_PB03D_IISC_ISDI ((PIN_PB03D_IISC_ISDI << 16) | MUX_PB03D_IISC_ISDI) #define GPIO_PB03D_IISC_ISDI (1u << 3) #define PIN_PA28B_IISC_ISDI 28 /**< \brief IISC signal: ISDI on PA28 mux B */ #define MUX_PA28B_IISC_ISDI 1 #define PINMUX_PA28B_IISC_ISDI ((PIN_PA28B_IISC_ISDI << 16) | MUX_PA28B_IISC_ISDI) #define GPIO_PA28B_IISC_ISDI (1u << 28) #define PIN_PB04D_IISC_ISDO 36 /**< \brief IISC signal: ISDO on PB04 mux D */ #define MUX_PB04D_IISC_ISDO 3 #define PINMUX_PB04D_IISC_ISDO ((PIN_PB04D_IISC_ISDO << 16) | MUX_PB04D_IISC_ISDO) #define GPIO_PB04D_IISC_ISDO (1u << 4) #define PIN_PA30B_IISC_ISDO 30 /**< \brief IISC signal: ISDO on PA30 mux B */ #define MUX_PA30B_IISC_ISDO 1 #define PINMUX_PA30B_IISC_ISDO ((PIN_PA30B_IISC_ISDO << 16) | MUX_PA30B_IISC_ISDO) #define GPIO_PA30B_IISC_ISDO (1u << 30) #define PIN_PB06D_IISC_IWS 38 /**< \brief IISC signal: IWS on PB06 mux D */ #define MUX_PB06D_IISC_IWS 3 #define PINMUX_PB06D_IISC_IWS ((PIN_PB06D_IISC_IWS << 16) | MUX_PB06D_IISC_IWS) #define GPIO_PB06D_IISC_IWS (1u << 6) #define PIN_PA29B_IISC_IWS 29 /**< \brief IISC signal: IWS on PA29 mux B */ #define MUX_PA29B_IISC_IWS 1 #define PINMUX_PA29B_IISC_IWS ((PIN_PA29B_IISC_IWS << 16) | MUX_PA29B_IISC_IWS) #define GPIO_PA29B_IISC_IWS (1u << 29) /* ========== GPIO definition for SPI peripheral ========== */ #define PIN_PA03B_SPI_MISO 3 /**< \brief SPI signal: MISO on PA03 mux B */ #define MUX_PA03B_SPI_MISO 1 #define PINMUX_PA03B_SPI_MISO ((PIN_PA03B_SPI_MISO << 16) | MUX_PA03B_SPI_MISO) #define GPIO_PA03B_SPI_MISO (1u << 3) #define PIN_PB14B_SPI_MISO 46 /**< \brief SPI signal: MISO on PB14 mux B */ #define MUX_PB14B_SPI_MISO 1 #define PINMUX_PB14B_SPI_MISO ((PIN_PB14B_SPI_MISO << 16) | MUX_PB14B_SPI_MISO) #define GPIO_PB14B_SPI_MISO (1u << 14) #define PIN_PA21A_SPI_MISO 21 /**< \brief SPI signal: MISO on PA21 mux A */ #define MUX_PA21A_SPI_MISO 0 #define PINMUX_PA21A_SPI_MISO ((PIN_PA21A_SPI_MISO << 16) | MUX_PA21A_SPI_MISO) #define GPIO_PA21A_SPI_MISO (1u << 21) #define PIN_PA27A_SPI_MISO 27 /**< \brief SPI signal: MISO on PA27 mux A */ #define MUX_PA27A_SPI_MISO 0 #define PINMUX_PA27A_SPI_MISO ((PIN_PA27A_SPI_MISO << 16) | MUX_PA27A_SPI_MISO) #define GPIO_PA27A_SPI_MISO (1u << 27) #define PIN_PB15B_SPI_MOSI 47 /**< \brief SPI signal: MOSI on PB15 mux B */ #define MUX_PB15B_SPI_MOSI 1 #define PINMUX_PB15B_SPI_MOSI ((PIN_PB15B_SPI_MOSI << 16) | MUX_PB15B_SPI_MOSI) #define GPIO_PB15B_SPI_MOSI (1u << 15) #define PIN_PA22A_SPI_MOSI 22 /**< \brief SPI signal: MOSI on PA22 mux A */ #define MUX_PA22A_SPI_MOSI 0 #define PINMUX_PA22A_SPI_MOSI ((PIN_PA22A_SPI_MOSI << 16) | MUX_PA22A_SPI_MOSI) #define GPIO_PA22A_SPI_MOSI (1u << 22) #define PIN_PA28A_SPI_MOSI 28 /**< \brief SPI signal: MOSI on PA28 mux A */ #define MUX_PA28A_SPI_MOSI 0 #define PINMUX_PA28A_SPI_MOSI ((PIN_PA28A_SPI_MOSI << 16) | MUX_PA28A_SPI_MOSI) #define GPIO_PA28A_SPI_MOSI (1u << 28) #define PIN_PA02B_SPI_NPCS0 2 /**< \brief SPI signal: NPCS0 on PA02 mux B */ #define MUX_PA02B_SPI_NPCS0 1 #define PINMUX_PA02B_SPI_NPCS0 ((PIN_PA02B_SPI_NPCS0 << 16) | MUX_PA02B_SPI_NPCS0) #define GPIO_PA02B_SPI_NPCS0 (1u << 2) #define PIN_PA24A_SPI_NPCS0 24 /**< \brief SPI signal: NPCS0 on PA24 mux A */ #define MUX_PA24A_SPI_NPCS0 0 #define PINMUX_PA24A_SPI_NPCS0 ((PIN_PA24A_SPI_NPCS0 << 16) | MUX_PA24A_SPI_NPCS0) #define GPIO_PA24A_SPI_NPCS0 (1u << 24) #define PIN_PA30A_SPI_NPCS0 30 /**< \brief SPI signal: NPCS0 on PA30 mux A */ #define MUX_PA30A_SPI_NPCS0 0 #define PINMUX_PA30A_SPI_NPCS0 ((PIN_PA30A_SPI_NPCS0 << 16) | MUX_PA30A_SPI_NPCS0) #define GPIO_PA30A_SPI_NPCS0 (1u << 30) #define PIN_PA13C_SPI_NPCS1 13 /**< \brief SPI signal: NPCS1 on PA13 mux C */ #define MUX_PA13C_SPI_NPCS1 2 #define PINMUX_PA13C_SPI_NPCS1 ((PIN_PA13C_SPI_NPCS1 << 16) | MUX_PA13C_SPI_NPCS1) #define GPIO_PA13C_SPI_NPCS1 (1u << 13) #define PIN_PB13B_SPI_NPCS1 45 /**< \brief SPI signal: NPCS1 on PB13 mux B */ #define MUX_PB13B_SPI_NPCS1 1 #define PINMUX_PB13B_SPI_NPCS1 ((PIN_PB13B_SPI_NPCS1 << 16) | MUX_PB13B_SPI_NPCS1) #define GPIO_PB13B_SPI_NPCS1 (1u << 13) #define PIN_PA31A_SPI_NPCS1 31 /**< \brief SPI signal: NPCS1 on PA31 mux A */ #define MUX_PA31A_SPI_NPCS1 0 #define PINMUX_PA31A_SPI_NPCS1 ((PIN_PA31A_SPI_NPCS1 << 16) | MUX_PA31A_SPI_NPCS1) #define GPIO_PA31A_SPI_NPCS1 (1u << 31) #define PIN_PA14C_SPI_NPCS2 14 /**< \brief SPI signal: NPCS2 on PA14 mux C */ #define MUX_PA14C_SPI_NPCS2 2 #define PINMUX_PA14C_SPI_NPCS2 ((PIN_PA14C_SPI_NPCS2 << 16) | MUX_PA14C_SPI_NPCS2) #define GPIO_PA14C_SPI_NPCS2 (1u << 14) #define PIN_PB11B_SPI_NPCS2 43 /**< \brief SPI signal: NPCS2 on PB11 mux B */ #define MUX_PB11B_SPI_NPCS2 1 #define PINMUX_PB11B_SPI_NPCS2 ((PIN_PB11B_SPI_NPCS2 << 16) | MUX_PB11B_SPI_NPCS2) #define GPIO_PB11B_SPI_NPCS2 (1u << 11) #define PIN_PA15C_SPI_NPCS3 15 /**< \brief SPI signal: NPCS3 on PA15 mux C */ #define MUX_PA15C_SPI_NPCS3 2 #define PINMUX_PA15C_SPI_NPCS3 ((PIN_PA15C_SPI_NPCS3 << 16) | MUX_PA15C_SPI_NPCS3) #define GPIO_PA15C_SPI_NPCS3 (1u << 15) #define PIN_PB12B_SPI_NPCS3 44 /**< \brief SPI signal: NPCS3 on PB12 mux B */ #define MUX_PB12B_SPI_NPCS3 1 #define PINMUX_PB12B_SPI_NPCS3 ((PIN_PB12B_SPI_NPCS3 << 16) | MUX_PB12B_SPI_NPCS3) #define GPIO_PB12B_SPI_NPCS3 (1u << 12) #define PIN_PA23A_SPI_SCK 23 /**< \brief SPI signal: SCK on PA23 mux A */ #define MUX_PA23A_SPI_SCK 0 #define PINMUX_PA23A_SPI_SCK ((PIN_PA23A_SPI_SCK << 16) | MUX_PA23A_SPI_SCK) #define GPIO_PA23A_SPI_SCK (1u << 23) #define PIN_PA29A_SPI_SCK 29 /**< \brief SPI signal: SCK on PA29 mux A */ #define MUX_PA29A_SPI_SCK 0 #define PINMUX_PA29A_SPI_SCK ((PIN_PA29A_SPI_SCK << 16) | MUX_PA29A_SPI_SCK) #define GPIO_PA29A_SPI_SCK (1u << 29) /* ========== GPIO definition for TC0 peripheral ========== */ #define PIN_PB07D_TC0_A0 39 /**< \brief TC0 signal: A0 on PB07 mux D */ #define MUX_PB07D_TC0_A0 3 #define PINMUX_PB07D_TC0_A0 ((PIN_PB07D_TC0_A0 << 16) | MUX_PB07D_TC0_A0) #define GPIO_PB07D_TC0_A0 (1u << 7) #define PIN_PA08B_TC0_A0 8 /**< \brief TC0 signal: A0 on PA08 mux B */ #define MUX_PA08B_TC0_A0 1 #define PINMUX_PA08B_TC0_A0 ((PIN_PA08B_TC0_A0 << 16) | MUX_PA08B_TC0_A0) #define GPIO_PA08B_TC0_A0 (1u << 8) #define PIN_PB09D_TC0_A1 41 /**< \brief TC0 signal: A1 on PB09 mux D */ #define MUX_PB09D_TC0_A1 3 #define PINMUX_PB09D_TC0_A1 ((PIN_PB09D_TC0_A1 << 16) | MUX_PB09D_TC0_A1) #define GPIO_PB09D_TC0_A1 (1u << 9) #define PIN_PA10B_TC0_A1 10 /**< \brief TC0 signal: A1 on PA10 mux B */ #define MUX_PA10B_TC0_A1 1 #define PINMUX_PA10B_TC0_A1 ((PIN_PA10B_TC0_A1 << 16) | MUX_PA10B_TC0_A1) #define GPIO_PA10B_TC0_A1 (1u << 10) #define PIN_PB11D_TC0_A2 43 /**< \brief TC0 signal: A2 on PB11 mux D */ #define MUX_PB11D_TC0_A2 3 #define PINMUX_PB11D_TC0_A2 ((PIN_PB11D_TC0_A2 << 16) | MUX_PB11D_TC0_A2) #define GPIO_PB11D_TC0_A2 (1u << 11) #define PIN_PA12B_TC0_A2 12 /**< \brief TC0 signal: A2 on PA12 mux B */ #define MUX_PA12B_TC0_A2 1 #define PINMUX_PA12B_TC0_A2 ((PIN_PA12B_TC0_A2 << 16) | MUX_PA12B_TC0_A2) #define GPIO_PA12B_TC0_A2 (1u << 12) #define PIN_PB08D_TC0_B0 40 /**< \brief TC0 signal: B0 on PB08 mux D */ #define MUX_PB08D_TC0_B0 3 #define PINMUX_PB08D_TC0_B0 ((PIN_PB08D_TC0_B0 << 16) | MUX_PB08D_TC0_B0) #define GPIO_PB08D_TC0_B0 (1u << 8) #define PIN_PA09B_TC0_B0 9 /**< \brief TC0 signal: B0 on PA09 mux B */ #define MUX_PA09B_TC0_B0 1 #define PINMUX_PA09B_TC0_B0 ((PIN_PA09B_TC0_B0 << 16) | MUX_PA09B_TC0_B0) #define GPIO_PA09B_TC0_B0 (1u << 9) #define PIN_PB10D_TC0_B1 42 /**< \brief TC0 signal: B1 on PB10 mux D */ #define MUX_PB10D_TC0_B1 3 #define PINMUX_PB10D_TC0_B1 ((PIN_PB10D_TC0_B1 << 16) | MUX_PB10D_TC0_B1) #define GPIO_PB10D_TC0_B1 (1u << 10) #define PIN_PA11B_TC0_B1 11 /**< \brief TC0 signal: B1 on PA11 mux B */ #define MUX_PA11B_TC0_B1 1 #define PINMUX_PA11B_TC0_B1 ((PIN_PA11B_TC0_B1 << 16) | MUX_PA11B_TC0_B1) #define GPIO_PA11B_TC0_B1 (1u << 11) #define PIN_PB12D_TC0_B2 44 /**< \brief TC0 signal: B2 on PB12 mux D */ #define MUX_PB12D_TC0_B2 3 #define PINMUX_PB12D_TC0_B2 ((PIN_PB12D_TC0_B2 << 16) | MUX_PB12D_TC0_B2) #define GPIO_PB12D_TC0_B2 (1u << 12) #define PIN_PA13B_TC0_B2 13 /**< \brief TC0 signal: B2 on PA13 mux B */ #define MUX_PA13B_TC0_B2 1 #define PINMUX_PA13B_TC0_B2 ((PIN_PA13B_TC0_B2 << 16) | MUX_PA13B_TC0_B2) #define GPIO_PA13B_TC0_B2 (1u << 13) #define PIN_PB13D_TC0_CLK0 45 /**< \brief TC0 signal: CLK0 on PB13 mux D */ #define MUX_PB13D_TC0_CLK0 3 #define PINMUX_PB13D_TC0_CLK0 ((PIN_PB13D_TC0_CLK0 << 16) | MUX_PB13D_TC0_CLK0) #define GPIO_PB13D_TC0_CLK0 (1u << 13) #define PIN_PA14B_TC0_CLK0 14 /**< \brief TC0 signal: CLK0 on PA14 mux B */ #define MUX_PA14B_TC0_CLK0 1 #define PINMUX_PA14B_TC0_CLK0 ((PIN_PA14B_TC0_CLK0 << 16) | MUX_PA14B_TC0_CLK0) #define GPIO_PA14B_TC0_CLK0 (1u << 14) #define PIN_PB14D_TC0_CLK1 46 /**< \brief TC0 signal: CLK1 on PB14 mux D */ #define MUX_PB14D_TC0_CLK1 3 #define PINMUX_PB14D_TC0_CLK1 ((PIN_PB14D_TC0_CLK1 << 16) | MUX_PB14D_TC0_CLK1) #define GPIO_PB14D_TC0_CLK1 (1u << 14) #define PIN_PA15B_TC0_CLK1 15 /**< \brief TC0 signal: CLK1 on PA15 mux B */ #define MUX_PA15B_TC0_CLK1 1 #define PINMUX_PA15B_TC0_CLK1 ((PIN_PA15B_TC0_CLK1 << 16) | MUX_PA15B_TC0_CLK1) #define GPIO_PA15B_TC0_CLK1 (1u << 15) #define PIN_PB15D_TC0_CLK2 47 /**< \brief TC0 signal: CLK2 on PB15 mux D */ #define MUX_PB15D_TC0_CLK2 3 #define PINMUX_PB15D_TC0_CLK2 ((PIN_PB15D_TC0_CLK2 << 16) | MUX_PB15D_TC0_CLK2) #define GPIO_PB15D_TC0_CLK2 (1u << 15) #define PIN_PA16B_TC0_CLK2 16 /**< \brief TC0 signal: CLK2 on PA16 mux B */ #define MUX_PA16B_TC0_CLK2 1 #define PINMUX_PA16B_TC0_CLK2 ((PIN_PA16B_TC0_CLK2 << 16) | MUX_PA16B_TC0_CLK2) #define GPIO_PA16B_TC0_CLK2 (1u << 16) /* ========== GPIO definition for USART0 peripheral ========== */ #define PIN_PA04B_USART0_CLK 4 /**< \brief USART0 signal: CLK on PA04 mux B */ #define MUX_PA04B_USART0_CLK 1 #define PINMUX_PA04B_USART0_CLK ((PIN_PA04B_USART0_CLK << 16) | MUX_PA04B_USART0_CLK) #define GPIO_PA04B_USART0_CLK (1u << 4) #define PIN_PA10A_USART0_CLK 10 /**< \brief USART0 signal: CLK on PA10 mux A */ #define MUX_PA10A_USART0_CLK 0 #define PINMUX_PA10A_USART0_CLK ((PIN_PA10A_USART0_CLK << 16) | MUX_PA10A_USART0_CLK) #define GPIO_PA10A_USART0_CLK (1u << 10) #define PIN_PB13A_USART0_CLK 45 /**< \brief USART0 signal: CLK on PB13 mux A */ #define MUX_PB13A_USART0_CLK 0 #define PINMUX_PB13A_USART0_CLK ((PIN_PB13A_USART0_CLK << 16) | MUX_PB13A_USART0_CLK) #define GPIO_PB13A_USART0_CLK (1u << 13) #define PIN_PA09A_USART0_CTS 9 /**< \brief USART0 signal: CTS on PA09 mux A */ #define MUX_PA09A_USART0_CTS 0 #define PINMUX_PA09A_USART0_CTS ((PIN_PA09A_USART0_CTS << 16) | MUX_PA09A_USART0_CTS) #define GPIO_PA09A_USART0_CTS (1u << 9) #define PIN_PB11A_USART0_CTS 43 /**< \brief USART0 signal: CTS on PB11 mux A */ #define MUX_PB11A_USART0_CTS 0 #define PINMUX_PB11A_USART0_CTS ((PIN_PB11A_USART0_CTS << 16) | MUX_PB11A_USART0_CTS) #define GPIO_PB11A_USART0_CTS (1u << 11) #define PIN_PA06B_USART0_RTS 6 /**< \brief USART0 signal: RTS on PA06 mux B */ #define MUX_PA06B_USART0_RTS 1 #define PINMUX_PA06B_USART0_RTS ((PIN_PA06B_USART0_RTS << 16) | MUX_PA06B_USART0_RTS) #define GPIO_PA06B_USART0_RTS (1u << 6) #define PIN_PA08A_USART0_RTS 8 /**< \brief USART0 signal: RTS on PA08 mux A */ #define MUX_PA08A_USART0_RTS 0 #define PINMUX_PA08A_USART0_RTS ((PIN_PA08A_USART0_RTS << 16) | MUX_PA08A_USART0_RTS) #define GPIO_PA08A_USART0_RTS (1u << 8) #define PIN_PB12A_USART0_RTS 44 /**< \brief USART0 signal: RTS on PB12 mux A */ #define MUX_PB12A_USART0_RTS 0 #define PINMUX_PB12A_USART0_RTS ((PIN_PB12A_USART0_RTS << 16) | MUX_PB12A_USART0_RTS) #define GPIO_PB12A_USART0_RTS (1u << 12) #define PIN_PA05B_USART0_RXD 5 /**< \brief USART0 signal: RXD on PA05 mux B */ #define MUX_PA05B_USART0_RXD 1 #define PINMUX_PA05B_USART0_RXD ((PIN_PA05B_USART0_RXD << 16) | MUX_PA05B_USART0_RXD) #define GPIO_PA05B_USART0_RXD (1u << 5) #define PIN_PB00B_USART0_RXD 32 /**< \brief USART0 signal: RXD on PB00 mux B */ #define MUX_PB00B_USART0_RXD 1 #define PINMUX_PB00B_USART0_RXD ((PIN_PB00B_USART0_RXD << 16) | MUX_PB00B_USART0_RXD) #define GPIO_PB00B_USART0_RXD (1u << 0) #define PIN_PA11A_USART0_RXD 11 /**< \brief USART0 signal: RXD on PA11 mux A */ #define MUX_PA11A_USART0_RXD 0 #define PINMUX_PA11A_USART0_RXD ((PIN_PA11A_USART0_RXD << 16) | MUX_PA11A_USART0_RXD) #define GPIO_PA11A_USART0_RXD (1u << 11) #define PIN_PB14A_USART0_RXD 46 /**< \brief USART0 signal: RXD on PB14 mux A */ #define MUX_PB14A_USART0_RXD 0 #define PINMUX_PB14A_USART0_RXD ((PIN_PB14A_USART0_RXD << 16) | MUX_PB14A_USART0_RXD) #define GPIO_PB14A_USART0_RXD (1u << 14) #define PIN_PA07B_USART0_TXD 7 /**< \brief USART0 signal: TXD on PA07 mux B */ #define MUX_PA07B_USART0_TXD 1 #define PINMUX_PA07B_USART0_TXD ((PIN_PA07B_USART0_TXD << 16) | MUX_PA07B_USART0_TXD) #define GPIO_PA07B_USART0_TXD (1u << 7) #define PIN_PB01B_USART0_TXD 33 /**< \brief USART0 signal: TXD on PB01 mux B */ #define MUX_PB01B_USART0_TXD 1 #define PINMUX_PB01B_USART0_TXD ((PIN_PB01B_USART0_TXD << 16) | MUX_PB01B_USART0_TXD) #define GPIO_PB01B_USART0_TXD (1u << 1) #define PIN_PA12A_USART0_TXD 12 /**< \brief USART0 signal: TXD on PA12 mux A */ #define MUX_PA12A_USART0_TXD 0 #define PINMUX_PA12A_USART0_TXD ((PIN_PA12A_USART0_TXD << 16) | MUX_PA12A_USART0_TXD) #define GPIO_PA12A_USART0_TXD (1u << 12) #define PIN_PB15A_USART0_TXD 47 /**< \brief USART0 signal: TXD on PB15 mux A */ #define MUX_PB15A_USART0_TXD 0 #define PINMUX_PB15A_USART0_TXD ((PIN_PB15A_USART0_TXD << 16) | MUX_PB15A_USART0_TXD) #define GPIO_PB15A_USART0_TXD (1u << 15) /* ========== GPIO definition for USART1 peripheral ========== */ #define PIN_PB03B_USART1_CLK 35 /**< \brief USART1 signal: CLK on PB03 mux B */ #define MUX_PB03B_USART1_CLK 1 #define PINMUX_PB03B_USART1_CLK ((PIN_PB03B_USART1_CLK << 16) | MUX_PB03B_USART1_CLK) #define GPIO_PB03B_USART1_CLK (1u << 3) #define PIN_PA14A_USART1_CLK 14 /**< \brief USART1 signal: CLK on PA14 mux A */ #define MUX_PA14A_USART1_CLK 0 #define PINMUX_PA14A_USART1_CLK ((PIN_PA14A_USART1_CLK << 16) | MUX_PA14A_USART1_CLK) #define GPIO_PA14A_USART1_CLK (1u << 14) #define PIN_PA21B_USART1_CTS 21 /**< \brief USART1 signal: CTS on PA21 mux B */ #define MUX_PA21B_USART1_CTS 1 #define PINMUX_PA21B_USART1_CTS ((PIN_PA21B_USART1_CTS << 16) | MUX_PA21B_USART1_CTS) #define GPIO_PA21B_USART1_CTS (1u << 21) #define PIN_PB02B_USART1_RTS 34 /**< \brief USART1 signal: RTS on PB02 mux B */ #define MUX_PB02B_USART1_RTS 1 #define PINMUX_PB02B_USART1_RTS ((PIN_PB02B_USART1_RTS << 16) | MUX_PB02B_USART1_RTS) #define GPIO_PB02B_USART1_RTS (1u << 2) #define PIN_PA13A_USART1_RTS 13 /**< \brief USART1 signal: RTS on PA13 mux A */ #define MUX_PA13A_USART1_RTS 0 #define PINMUX_PA13A_USART1_RTS ((PIN_PA13A_USART1_RTS << 16) | MUX_PA13A_USART1_RTS) #define GPIO_PA13A_USART1_RTS (1u << 13) #define PIN_PB04B_USART1_RXD 36 /**< \brief USART1 signal: RXD on PB04 mux B */ #define MUX_PB04B_USART1_RXD 1 #define PINMUX_PB04B_USART1_RXD ((PIN_PB04B_USART1_RXD << 16) | MUX_PB04B_USART1_RXD) #define GPIO_PB04B_USART1_RXD (1u << 4) #define PIN_PA15A_USART1_RXD 15 /**< \brief USART1 signal: RXD on PA15 mux A */ #define MUX_PA15A_USART1_RXD 0 #define PINMUX_PA15A_USART1_RXD ((PIN_PA15A_USART1_RXD << 16) | MUX_PA15A_USART1_RXD) #define GPIO_PA15A_USART1_RXD (1u << 15) #define PIN_PB05B_USART1_TXD 37 /**< \brief USART1 signal: TXD on PB05 mux B */ #define MUX_PB05B_USART1_TXD 1 #define PINMUX_PB05B_USART1_TXD ((PIN_PB05B_USART1_TXD << 16) | MUX_PB05B_USART1_TXD) #define GPIO_PB05B_USART1_TXD (1u << 5) #define PIN_PA16A_USART1_TXD 16 /**< \brief USART1 signal: TXD on PA16 mux A */ #define MUX_PA16A_USART1_TXD 0 #define PINMUX_PA16A_USART1_TXD ((PIN_PA16A_USART1_TXD << 16) | MUX_PA16A_USART1_TXD) #define GPIO_PA16A_USART1_TXD (1u << 16) /* ========== GPIO definition for USART2 peripheral ========== */ #define PIN_PA18A_USART2_CLK 18 /**< \brief USART2 signal: CLK on PA18 mux A */ #define MUX_PA18A_USART2_CLK 0 #define PINMUX_PA18A_USART2_CLK ((PIN_PA18A_USART2_CLK << 16) | MUX_PA18A_USART2_CLK) #define GPIO_PA18A_USART2_CLK (1u << 18) #define PIN_PA22B_USART2_CTS 22 /**< \brief USART2 signal: CTS on PA22 mux B */ #define MUX_PA22B_USART2_CTS 1 #define PINMUX_PA22B_USART2_CTS ((PIN_PA22B_USART2_CTS << 16) | MUX_PA22B_USART2_CTS) #define GPIO_PA22B_USART2_CTS (1u << 22) #define PIN_PA17A_USART2_RTS 17 /**< \brief USART2 signal: RTS on PA17 mux A */ #define MUX_PA17A_USART2_RTS 0 #define PINMUX_PA17A_USART2_RTS ((PIN_PA17A_USART2_RTS << 16) | MUX_PA17A_USART2_RTS) #define GPIO_PA17A_USART2_RTS (1u << 17) #define PIN_PA25B_USART2_RXD 25 /**< \brief USART2 signal: RXD on PA25 mux B */ #define MUX_PA25B_USART2_RXD 1 #define PINMUX_PA25B_USART2_RXD ((PIN_PA25B_USART2_RXD << 16) | MUX_PA25B_USART2_RXD) #define GPIO_PA25B_USART2_RXD (1u << 25) #define PIN_PA19A_USART2_RXD 19 /**< \brief USART2 signal: RXD on PA19 mux A */ #define MUX_PA19A_USART2_RXD 0 #define PINMUX_PA19A_USART2_RXD ((PIN_PA19A_USART2_RXD << 16) | MUX_PA19A_USART2_RXD) #define GPIO_PA19A_USART2_RXD (1u << 19) #define PIN_PA26B_USART2_TXD 26 /**< \brief USART2 signal: TXD on PA26 mux B */ #define MUX_PA26B_USART2_TXD 1 #define PINMUX_PA26B_USART2_TXD ((PIN_PA26B_USART2_TXD << 16) | MUX_PA26B_USART2_TXD) #define GPIO_PA26B_USART2_TXD (1u << 26) #define PIN_PA20A_USART2_TXD 20 /**< \brief USART2 signal: TXD on PA20 mux A */ #define MUX_PA20A_USART2_TXD 0 #define PINMUX_PA20A_USART2_TXD ((PIN_PA20A_USART2_TXD << 16) | MUX_PA20A_USART2_TXD) #define GPIO_PA20A_USART2_TXD (1u << 20) /* ========== GPIO definition for USART3 peripheral ========== */ #define PIN_PA29E_USART3_CLK 29 /**< \brief USART3 signal: CLK on PA29 mux E */ #define MUX_PA29E_USART3_CLK 4 #define PINMUX_PA29E_USART3_CLK ((PIN_PA29E_USART3_CLK << 16) | MUX_PA29E_USART3_CLK) #define GPIO_PA29E_USART3_CLK (1u << 29) #define PIN_PB08A_USART3_CLK 40 /**< \brief USART3 signal: CLK on PB08 mux A */ #define MUX_PB08A_USART3_CLK 0 #define PINMUX_PB08A_USART3_CLK ((PIN_PB08A_USART3_CLK << 16) | MUX_PB08A_USART3_CLK) #define GPIO_PB08A_USART3_CLK (1u << 8) #define PIN_PA28E_USART3_CTS 28 /**< \brief USART3 signal: CTS on PA28 mux E */ #define MUX_PA28E_USART3_CTS 4 #define PINMUX_PA28E_USART3_CTS ((PIN_PA28E_USART3_CTS << 16) | MUX_PA28E_USART3_CTS) #define GPIO_PA28E_USART3_CTS (1u << 28) #define PIN_PB07A_USART3_CTS 39 /**< \brief USART3 signal: CTS on PB07 mux A */ #define MUX_PB07A_USART3_CTS 0 #define PINMUX_PB07A_USART3_CTS ((PIN_PB07A_USART3_CTS << 16) | MUX_PB07A_USART3_CTS) #define GPIO_PB07A_USART3_CTS (1u << 7) #define PIN_PA27E_USART3_RTS 27 /**< \brief USART3 signal: RTS on PA27 mux E */ #define MUX_PA27E_USART3_RTS 4 #define PINMUX_PA27E_USART3_RTS ((PIN_PA27E_USART3_RTS << 16) | MUX_PA27E_USART3_RTS) #define GPIO_PA27E_USART3_RTS (1u << 27) #define PIN_PB06A_USART3_RTS 38 /**< \brief USART3 signal: RTS on PB06 mux A */ #define MUX_PB06A_USART3_RTS 0 #define PINMUX_PB06A_USART3_RTS ((PIN_PB06A_USART3_RTS << 16) | MUX_PB06A_USART3_RTS) #define GPIO_PB06A_USART3_RTS (1u << 6) #define PIN_PA30E_USART3_RXD 30 /**< \brief USART3 signal: RXD on PA30 mux E */ #define MUX_PA30E_USART3_RXD 4 #define PINMUX_PA30E_USART3_RXD ((PIN_PA30E_USART3_RXD << 16) | MUX_PA30E_USART3_RXD) #define GPIO_PA30E_USART3_RXD (1u << 30) #define PIN_PB09A_USART3_RXD 41 /**< \brief USART3 signal: RXD on PB09 mux A */ #define MUX_PB09A_USART3_RXD 0 #define PINMUX_PB09A_USART3_RXD ((PIN_PB09A_USART3_RXD << 16) | MUX_PB09A_USART3_RXD) #define GPIO_PB09A_USART3_RXD (1u << 9) #define PIN_PA31E_USART3_TXD 31 /**< \brief USART3 signal: TXD on PA31 mux E */ #define MUX_PA31E_USART3_TXD 4 #define PINMUX_PA31E_USART3_TXD ((PIN_PA31E_USART3_TXD << 16) | MUX_PA31E_USART3_TXD) #define GPIO_PA31E_USART3_TXD (1u << 31) #define PIN_PB10A_USART3_TXD 42 /**< \brief USART3 signal: TXD on PB10 mux A */ #define MUX_PB10A_USART3_TXD 0 #define PINMUX_PB10A_USART3_TXD ((PIN_PB10A_USART3_TXD << 16) | MUX_PB10A_USART3_TXD) #define GPIO_PB10A_USART3_TXD (1u << 10) /* ========== GPIO definition for ADCIFE peripheral ========== */ #define PIN_PA04A_ADCIFE_AD0 4 /**< \brief ADCIFE signal: AD0 on PA04 mux A */ #define MUX_PA04A_ADCIFE_AD0 0 #define PINMUX_PA04A_ADCIFE_AD0 ((PIN_PA04A_ADCIFE_AD0 << 16) | MUX_PA04A_ADCIFE_AD0) #define GPIO_PA04A_ADCIFE_AD0 (1u << 4) #define PIN_PA05A_ADCIFE_AD1 5 /**< \brief ADCIFE signal: AD1 on PA05 mux A */ #define MUX_PA05A_ADCIFE_AD1 0 #define PINMUX_PA05A_ADCIFE_AD1 ((PIN_PA05A_ADCIFE_AD1 << 16) | MUX_PA05A_ADCIFE_AD1) #define GPIO_PA05A_ADCIFE_AD1 (1u << 5) #define PIN_PA07A_ADCIFE_AD2 7 /**< \brief ADCIFE signal: AD2 on PA07 mux A */ #define MUX_PA07A_ADCIFE_AD2 0 #define PINMUX_PA07A_ADCIFE_AD2 ((PIN_PA07A_ADCIFE_AD2 << 16) | MUX_PA07A_ADCIFE_AD2) #define GPIO_PA07A_ADCIFE_AD2 (1u << 7) #define PIN_PB02A_ADCIFE_AD3 34 /**< \brief ADCIFE signal: AD3 on PB02 mux A */ #define MUX_PB02A_ADCIFE_AD3 0 #define PINMUX_PB02A_ADCIFE_AD3 ((PIN_PB02A_ADCIFE_AD3 << 16) | MUX_PB02A_ADCIFE_AD3) #define GPIO_PB02A_ADCIFE_AD3 (1u << 2) #define PIN_PB03A_ADCIFE_AD4 35 /**< \brief ADCIFE signal: AD4 on PB03 mux A */ #define MUX_PB03A_ADCIFE_AD4 0 #define PINMUX_PB03A_ADCIFE_AD4 ((PIN_PB03A_ADCIFE_AD4 << 16) | MUX_PB03A_ADCIFE_AD4) #define GPIO_PB03A_ADCIFE_AD4 (1u << 3) #define PIN_PB04A_ADCIFE_AD5 36 /**< \brief ADCIFE signal: AD5 on PB04 mux A */ #define MUX_PB04A_ADCIFE_AD5 0 #define PINMUX_PB04A_ADCIFE_AD5 ((PIN_PB04A_ADCIFE_AD5 << 16) | MUX_PB04A_ADCIFE_AD5) #define GPIO_PB04A_ADCIFE_AD5 (1u << 4) #define PIN_PB05A_ADCIFE_AD6 37 /**< \brief ADCIFE signal: AD6 on PB05 mux A */ #define MUX_PB05A_ADCIFE_AD6 0 #define PINMUX_PB05A_ADCIFE_AD6 ((PIN_PB05A_ADCIFE_AD6 << 16) | MUX_PB05A_ADCIFE_AD6) #define GPIO_PB05A_ADCIFE_AD6 (1u << 5) #define PIN_PA05E_ADCIFE_TRIGGER 5 /**< \brief ADCIFE signal: TRIGGER on PA05 mux E */ #define MUX_PA05E_ADCIFE_TRIGGER 4 #define PINMUX_PA05E_ADCIFE_TRIGGER ((PIN_PA05E_ADCIFE_TRIGGER << 16) | MUX_PA05E_ADCIFE_TRIGGER) #define GPIO_PA05E_ADCIFE_TRIGGER (1u << 5) /* ========== GPIO definition for DACC peripheral ========== */ #define PIN_PB04E_DACC_EXT_TRIG0 36 /**< \brief DACC signal: EXT_TRIG0 on PB04 mux E */ #define MUX_PB04E_DACC_EXT_TRIG0 4 #define PINMUX_PB04E_DACC_EXT_TRIG0 ((PIN_PB04E_DACC_EXT_TRIG0 << 16) | MUX_PB04E_DACC_EXT_TRIG0) #define GPIO_PB04E_DACC_EXT_TRIG0 (1u << 4) #define PIN_PA06A_DACC_VOUT 6 /**< \brief DACC signal: VOUT on PA06 mux A */ #define MUX_PA06A_DACC_VOUT 0 #define PINMUX_PA06A_DACC_VOUT ((PIN_PA06A_DACC_VOUT << 16) | MUX_PA06A_DACC_VOUT) #define GPIO_PA06A_DACC_VOUT (1u << 6) /* ========== GPIO definition for ACIFC peripheral ========== */ #define PIN_PA06E_ACIFC_ACAN0 6 /**< \brief ACIFC signal: ACAN0 on PA06 mux E */ #define MUX_PA06E_ACIFC_ACAN0 4 #define PINMUX_PA06E_ACIFC_ACAN0 ((PIN_PA06E_ACIFC_ACAN0 << 16) | MUX_PA06E_ACIFC_ACAN0) #define GPIO_PA06E_ACIFC_ACAN0 (1u << 6) #define PIN_PA07E_ACIFC_ACAP0 7 /**< \brief ACIFC signal: ACAP0 on PA07 mux E */ #define MUX_PA07E_ACIFC_ACAP0 4 #define PINMUX_PA07E_ACIFC_ACAP0 ((PIN_PA07E_ACIFC_ACAP0 << 16) | MUX_PA07E_ACIFC_ACAP0) #define GPIO_PA07E_ACIFC_ACAP0 (1u << 7) #define PIN_PB02E_ACIFC_ACBN0 34 /**< \brief ACIFC signal: ACBN0 on PB02 mux E */ #define MUX_PB02E_ACIFC_ACBN0 4 #define PINMUX_PB02E_ACIFC_ACBN0 ((PIN_PB02E_ACIFC_ACBN0 << 16) | MUX_PB02E_ACIFC_ACBN0) #define GPIO_PB02E_ACIFC_ACBN0 (1u << 2) #define PIN_PB03E_ACIFC_ACBP0 35 /**< \brief ACIFC signal: ACBP0 on PB03 mux E */ #define MUX_PB03E_ACIFC_ACBP0 4 #define PINMUX_PB03E_ACIFC_ACBP0 ((PIN_PB03E_ACIFC_ACBP0 << 16) | MUX_PB03E_ACIFC_ACBP0) #define GPIO_PB03E_ACIFC_ACBP0 (1u << 3) /* ========== GPIO definition for GLOC peripheral ========== */ #define PIN_PA06D_GLOC_IN0 6 /**< \brief GLOC signal: IN0 on PA06 mux D */ #define MUX_PA06D_GLOC_IN0 3 #define PINMUX_PA06D_GLOC_IN0 ((PIN_PA06D_GLOC_IN0 << 16) | MUX_PA06D_GLOC_IN0) #define GPIO_PA06D_GLOC_IN0 (1u << 6) #define PIN_PA20D_GLOC_IN0 20 /**< \brief GLOC signal: IN0 on PA20 mux D */ #define MUX_PA20D_GLOC_IN0 3 #define PINMUX_PA20D_GLOC_IN0 ((PIN_PA20D_GLOC_IN0 << 16) | MUX_PA20D_GLOC_IN0) #define GPIO_PA20D_GLOC_IN0 (1u << 20) #define PIN_PA04D_GLOC_IN1 4 /**< \brief GLOC signal: IN1 on PA04 mux D */ #define MUX_PA04D_GLOC_IN1 3 #define PINMUX_PA04D_GLOC_IN1 ((PIN_PA04D_GLOC_IN1 << 16) | MUX_PA04D_GLOC_IN1) #define GPIO_PA04D_GLOC_IN1 (1u << 4) #define PIN_PA21D_GLOC_IN1 21 /**< \brief GLOC signal: IN1 on PA21 mux D */ #define MUX_PA21D_GLOC_IN1 3 #define PINMUX_PA21D_GLOC_IN1 ((PIN_PA21D_GLOC_IN1 << 16) | MUX_PA21D_GLOC_IN1) #define GPIO_PA21D_GLOC_IN1 (1u << 21) #define PIN_PA05D_GLOC_IN2 5 /**< \brief GLOC signal: IN2 on PA05 mux D */ #define MUX_PA05D_GLOC_IN2 3 #define PINMUX_PA05D_GLOC_IN2 ((PIN_PA05D_GLOC_IN2 << 16) | MUX_PA05D_GLOC_IN2) #define GPIO_PA05D_GLOC_IN2 (1u << 5) #define PIN_PA22D_GLOC_IN2 22 /**< \brief GLOC signal: IN2 on PA22 mux D */ #define MUX_PA22D_GLOC_IN2 3 #define PINMUX_PA22D_GLOC_IN2 ((PIN_PA22D_GLOC_IN2 << 16) | MUX_PA22D_GLOC_IN2) #define GPIO_PA22D_GLOC_IN2 (1u << 22) #define PIN_PA07D_GLOC_IN3 7 /**< \brief GLOC signal: IN3 on PA07 mux D */ #define MUX_PA07D_GLOC_IN3 3 #define PINMUX_PA07D_GLOC_IN3 ((PIN_PA07D_GLOC_IN3 << 16) | MUX_PA07D_GLOC_IN3) #define GPIO_PA07D_GLOC_IN3 (1u << 7) #define PIN_PA23D_GLOC_IN3 23 /**< \brief GLOC signal: IN3 on PA23 mux D */ #define MUX_PA23D_GLOC_IN3 3 #define PINMUX_PA23D_GLOC_IN3 ((PIN_PA23D_GLOC_IN3 << 16) | MUX_PA23D_GLOC_IN3) #define GPIO_PA23D_GLOC_IN3 (1u << 23) #define PIN_PA27D_GLOC_IN4 27 /**< \brief GLOC signal: IN4 on PA27 mux D */ #define MUX_PA27D_GLOC_IN4 3 #define PINMUX_PA27D_GLOC_IN4 ((PIN_PA27D_GLOC_IN4 << 16) | MUX_PA27D_GLOC_IN4) #define GPIO_PA27D_GLOC_IN4 (1u << 27) #define PIN_PB06C_GLOC_IN4 38 /**< \brief GLOC signal: IN4 on PB06 mux C */ #define MUX_PB06C_GLOC_IN4 2 #define PINMUX_PB06C_GLOC_IN4 ((PIN_PB06C_GLOC_IN4 << 16) | MUX_PB06C_GLOC_IN4) #define GPIO_PB06C_GLOC_IN4 (1u << 6) #define PIN_PA28D_GLOC_IN5 28 /**< \brief GLOC signal: IN5 on PA28 mux D */ #define MUX_PA28D_GLOC_IN5 3 #define PINMUX_PA28D_GLOC_IN5 ((PIN_PA28D_GLOC_IN5 << 16) | MUX_PA28D_GLOC_IN5) #define GPIO_PA28D_GLOC_IN5 (1u << 28) #define PIN_PB07C_GLOC_IN5 39 /**< \brief GLOC signal: IN5 on PB07 mux C */ #define MUX_PB07C_GLOC_IN5 2 #define PINMUX_PB07C_GLOC_IN5 ((PIN_PB07C_GLOC_IN5 << 16) | MUX_PB07C_GLOC_IN5) #define GPIO_PB07C_GLOC_IN5 (1u << 7) #define PIN_PA29D_GLOC_IN6 29 /**< \brief GLOC signal: IN6 on PA29 mux D */ #define MUX_PA29D_GLOC_IN6 3 #define PINMUX_PA29D_GLOC_IN6 ((PIN_PA29D_GLOC_IN6 << 16) | MUX_PA29D_GLOC_IN6) #define GPIO_PA29D_GLOC_IN6 (1u << 29) #define PIN_PB08C_GLOC_IN6 40 /**< \brief GLOC signal: IN6 on PB08 mux C */ #define MUX_PB08C_GLOC_IN6 2 #define PINMUX_PB08C_GLOC_IN6 ((PIN_PB08C_GLOC_IN6 << 16) | MUX_PB08C_GLOC_IN6) #define GPIO_PB08C_GLOC_IN6 (1u << 8) #define PIN_PA30D_GLOC_IN7 30 /**< \brief GLOC signal: IN7 on PA30 mux D */ #define MUX_PA30D_GLOC_IN7 3 #define PINMUX_PA30D_GLOC_IN7 ((PIN_PA30D_GLOC_IN7 << 16) | MUX_PA30D_GLOC_IN7) #define GPIO_PA30D_GLOC_IN7 (1u << 30) #define PIN_PB09C_GLOC_IN7 41 /**< \brief GLOC signal: IN7 on PB09 mux C */ #define MUX_PB09C_GLOC_IN7 2 #define PINMUX_PB09C_GLOC_IN7 ((PIN_PB09C_GLOC_IN7 << 16) | MUX_PB09C_GLOC_IN7) #define GPIO_PB09C_GLOC_IN7 (1u << 9) #define PIN_PA08D_GLOC_OUT0 8 /**< \brief GLOC signal: OUT0 on PA08 mux D */ #define MUX_PA08D_GLOC_OUT0 3 #define PINMUX_PA08D_GLOC_OUT0 ((PIN_PA08D_GLOC_OUT0 << 16) | MUX_PA08D_GLOC_OUT0) #define GPIO_PA08D_GLOC_OUT0 (1u << 8) #define PIN_PA24D_GLOC_OUT0 24 /**< \brief GLOC signal: OUT0 on PA24 mux D */ #define MUX_PA24D_GLOC_OUT0 3 #define PINMUX_PA24D_GLOC_OUT0 ((PIN_PA24D_GLOC_OUT0 << 16) | MUX_PA24D_GLOC_OUT0) #define GPIO_PA24D_GLOC_OUT0 (1u << 24) #define PIN_PA31D_GLOC_OUT1 31 /**< \brief GLOC signal: OUT1 on PA31 mux D */ #define MUX_PA31D_GLOC_OUT1 3 #define PINMUX_PA31D_GLOC_OUT1 ((PIN_PA31D_GLOC_OUT1 << 16) | MUX_PA31D_GLOC_OUT1) #define GPIO_PA31D_GLOC_OUT1 (1u << 31) #define PIN_PB10C_GLOC_OUT1 42 /**< \brief GLOC signal: OUT1 on PB10 mux C */ #define MUX_PB10C_GLOC_OUT1 2 #define PINMUX_PB10C_GLOC_OUT1 ((PIN_PB10C_GLOC_OUT1 << 16) | MUX_PB10C_GLOC_OUT1) #define GPIO_PB10C_GLOC_OUT1 (1u << 10) /* ========== GPIO definition for ABDACB peripheral ========== */ #define PIN_PA31C_ABDACB_CLK 31 /**< \brief ABDACB signal: CLK on PA31 mux C */ #define MUX_PA31C_ABDACB_CLK 2 #define PINMUX_PA31C_ABDACB_CLK ((PIN_PA31C_ABDACB_CLK << 16) | MUX_PA31C_ABDACB_CLK) #define GPIO_PA31C_ABDACB_CLK (1u << 31) #define PIN_PA27C_ABDACB_DAC0 27 /**< \brief ABDACB signal: DAC0 on PA27 mux C */ #define MUX_PA27C_ABDACB_DAC0 2 #define PINMUX_PA27C_ABDACB_DAC0 ((PIN_PA27C_ABDACB_DAC0 << 16) | MUX_PA27C_ABDACB_DAC0) #define GPIO_PA27C_ABDACB_DAC0 (1u << 27) #define PIN_PB02C_ABDACB_DAC0 34 /**< \brief ABDACB signal: DAC0 on PB02 mux C */ #define MUX_PB02C_ABDACB_DAC0 2 #define PINMUX_PB02C_ABDACB_DAC0 ((PIN_PB02C_ABDACB_DAC0 << 16) | MUX_PB02C_ABDACB_DAC0) #define GPIO_PB02C_ABDACB_DAC0 (1u << 2) #define PIN_PA17B_ABDACB_DAC0 17 /**< \brief ABDACB signal: DAC0 on PA17 mux B */ #define MUX_PA17B_ABDACB_DAC0 1 #define PINMUX_PA17B_ABDACB_DAC0 ((PIN_PA17B_ABDACB_DAC0 << 16) | MUX_PA17B_ABDACB_DAC0) #define GPIO_PA17B_ABDACB_DAC0 (1u << 17) #define PIN_PA29C_ABDACB_DAC1 29 /**< \brief ABDACB signal: DAC1 on PA29 mux C */ #define MUX_PA29C_ABDACB_DAC1 2 #define PINMUX_PA29C_ABDACB_DAC1 ((PIN_PA29C_ABDACB_DAC1 << 16) | MUX_PA29C_ABDACB_DAC1) #define GPIO_PA29C_ABDACB_DAC1 (1u << 29) #define PIN_PB04C_ABDACB_DAC1 36 /**< \brief ABDACB signal: DAC1 on PB04 mux C */ #define MUX_PB04C_ABDACB_DAC1 2 #define PINMUX_PB04C_ABDACB_DAC1 ((PIN_PB04C_ABDACB_DAC1 << 16) | MUX_PB04C_ABDACB_DAC1) #define GPIO_PB04C_ABDACB_DAC1 (1u << 4) #define PIN_PA19B_ABDACB_DAC1 19 /**< \brief ABDACB signal: DAC1 on PA19 mux B */ #define MUX_PA19B_ABDACB_DAC1 1 #define PINMUX_PA19B_ABDACB_DAC1 ((PIN_PA19B_ABDACB_DAC1 << 16) | MUX_PA19B_ABDACB_DAC1) #define GPIO_PA19B_ABDACB_DAC1 (1u << 19) #define PIN_PA28C_ABDACB_DACN0 28 /**< \brief ABDACB signal: DACN0 on PA28 mux C */ #define MUX_PA28C_ABDACB_DACN0 2 #define PINMUX_PA28C_ABDACB_DACN0 ((PIN_PA28C_ABDACB_DACN0 << 16) | MUX_PA28C_ABDACB_DACN0) #define GPIO_PA28C_ABDACB_DACN0 (1u << 28) #define PIN_PB03C_ABDACB_DACN0 35 /**< \brief ABDACB signal: DACN0 on PB03 mux C */ #define MUX_PB03C_ABDACB_DACN0 2 #define PINMUX_PB03C_ABDACB_DACN0 ((PIN_PB03C_ABDACB_DACN0 << 16) | MUX_PB03C_ABDACB_DACN0) #define GPIO_PB03C_ABDACB_DACN0 (1u << 3) #define PIN_PA18B_ABDACB_DACN0 18 /**< \brief ABDACB signal: DACN0 on PA18 mux B */ #define MUX_PA18B_ABDACB_DACN0 1 #define PINMUX_PA18B_ABDACB_DACN0 ((PIN_PA18B_ABDACB_DACN0 << 16) | MUX_PA18B_ABDACB_DACN0) #define GPIO_PA18B_ABDACB_DACN0 (1u << 18) #define PIN_PA30C_ABDACB_DACN1 30 /**< \brief ABDACB signal: DACN1 on PA30 mux C */ #define MUX_PA30C_ABDACB_DACN1 2 #define PINMUX_PA30C_ABDACB_DACN1 ((PIN_PA30C_ABDACB_DACN1 << 16) | MUX_PA30C_ABDACB_DACN1) #define GPIO_PA30C_ABDACB_DACN1 (1u << 30) #define PIN_PB05C_ABDACB_DACN1 37 /**< \brief ABDACB signal: DACN1 on PB05 mux C */ #define MUX_PB05C_ABDACB_DACN1 2 #define PINMUX_PB05C_ABDACB_DACN1 ((PIN_PB05C_ABDACB_DACN1 << 16) | MUX_PB05C_ABDACB_DACN1) #define GPIO_PB05C_ABDACB_DACN1 (1u << 5) #define PIN_PA20B_ABDACB_DACN1 20 /**< \brief ABDACB signal: DACN1 on PA20 mux B */ #define MUX_PA20B_ABDACB_DACN1 1 #define PINMUX_PA20B_ABDACB_DACN1 ((PIN_PA20B_ABDACB_DACN1 << 16) | MUX_PA20B_ABDACB_DACN1) #define GPIO_PA20B_ABDACB_DACN1 (1u << 20) /* ========== GPIO definition for PARC peripheral ========== */ #define PIN_PA17D_PARC_PCCK 17 /**< \brief PARC signal: PCCK on PA17 mux D */ #define MUX_PA17D_PARC_PCCK 3 #define PINMUX_PA17D_PARC_PCCK ((PIN_PA17D_PARC_PCCK << 16) | MUX_PA17D_PARC_PCCK) #define GPIO_PA17D_PARC_PCCK (1u << 17) #define PIN_PA09D_PARC_PCDATA0 9 /**< \brief PARC signal: PCDATA0 on PA09 mux D */ #define MUX_PA09D_PARC_PCDATA0 3 #define PINMUX_PA09D_PARC_PCDATA0 ((PIN_PA09D_PARC_PCDATA0 << 16) | MUX_PA09D_PARC_PCDATA0) #define GPIO_PA09D_PARC_PCDATA0 (1u << 9) #define PIN_PA10D_PARC_PCDATA1 10 /**< \brief PARC signal: PCDATA1 on PA10 mux D */ #define MUX_PA10D_PARC_PCDATA1 3 #define PINMUX_PA10D_PARC_PCDATA1 ((PIN_PA10D_PARC_PCDATA1 << 16) | MUX_PA10D_PARC_PCDATA1) #define GPIO_PA10D_PARC_PCDATA1 (1u << 10) #define PIN_PA11D_PARC_PCDATA2 11 /**< \brief PARC signal: PCDATA2 on PA11 mux D */ #define MUX_PA11D_PARC_PCDATA2 3 #define PINMUX_PA11D_PARC_PCDATA2 ((PIN_PA11D_PARC_PCDATA2 << 16) | MUX_PA11D_PARC_PCDATA2) #define GPIO_PA11D_PARC_PCDATA2 (1u << 11) #define PIN_PA12D_PARC_PCDATA3 12 /**< \brief PARC signal: PCDATA3 on PA12 mux D */ #define MUX_PA12D_PARC_PCDATA3 3 #define PINMUX_PA12D_PARC_PCDATA3 ((PIN_PA12D_PARC_PCDATA3 << 16) | MUX_PA12D_PARC_PCDATA3) #define GPIO_PA12D_PARC_PCDATA3 (1u << 12) #define PIN_PA13D_PARC_PCDATA4 13 /**< \brief PARC signal: PCDATA4 on PA13 mux D */ #define MUX_PA13D_PARC_PCDATA4 3 #define PINMUX_PA13D_PARC_PCDATA4 ((PIN_PA13D_PARC_PCDATA4 << 16) | MUX_PA13D_PARC_PCDATA4) #define GPIO_PA13D_PARC_PCDATA4 (1u << 13) #define PIN_PA14D_PARC_PCDATA5 14 /**< \brief PARC signal: PCDATA5 on PA14 mux D */ #define MUX_PA14D_PARC_PCDATA5 3 #define PINMUX_PA14D_PARC_PCDATA5 ((PIN_PA14D_PARC_PCDATA5 << 16) | MUX_PA14D_PARC_PCDATA5) #define GPIO_PA14D_PARC_PCDATA5 (1u << 14) #define PIN_PA15D_PARC_PCDATA6 15 /**< \brief PARC signal: PCDATA6 on PA15 mux D */ #define MUX_PA15D_PARC_PCDATA6 3 #define PINMUX_PA15D_PARC_PCDATA6 ((PIN_PA15D_PARC_PCDATA6 << 16) | MUX_PA15D_PARC_PCDATA6) #define GPIO_PA15D_PARC_PCDATA6 (1u << 15) #define PIN_PA16D_PARC_PCDATA7 16 /**< \brief PARC signal: PCDATA7 on PA16 mux D */ #define MUX_PA16D_PARC_PCDATA7 3 #define PINMUX_PA16D_PARC_PCDATA7 ((PIN_PA16D_PARC_PCDATA7 << 16) | MUX_PA16D_PARC_PCDATA7) #define GPIO_PA16D_PARC_PCDATA7 (1u << 16) #define PIN_PA18D_PARC_PCEN1 18 /**< \brief PARC signal: PCEN1 on PA18 mux D */ #define MUX_PA18D_PARC_PCEN1 3 #define PINMUX_PA18D_PARC_PCEN1 ((PIN_PA18D_PARC_PCEN1 << 16) | MUX_PA18D_PARC_PCEN1) #define GPIO_PA18D_PARC_PCEN1 (1u << 18) #define PIN_PA19D_PARC_PCEN2 19 /**< \brief PARC signal: PCEN2 on PA19 mux D */ #define MUX_PA19D_PARC_PCEN2 3 #define PINMUX_PA19D_PARC_PCEN2 ((PIN_PA19D_PARC_PCEN2 << 16) | MUX_PA19D_PARC_PCEN2) #define GPIO_PA19D_PARC_PCEN2 (1u << 19) /* ========== GPIO definition for CATB peripheral ========== */ #define PIN_PA02G_CATB_DIS 2 /**< \brief CATB signal: DIS on PA02 mux G */ #define MUX_PA02G_CATB_DIS 6 #define PINMUX_PA02G_CATB_DIS ((PIN_PA02G_CATB_DIS << 16) | MUX_PA02G_CATB_DIS) #define GPIO_PA02G_CATB_DIS (1u << 2) #define PIN_PA12G_CATB_DIS 12 /**< \brief CATB signal: DIS on PA12 mux G */ #define MUX_PA12G_CATB_DIS 6 #define PINMUX_PA12G_CATB_DIS ((PIN_PA12G_CATB_DIS << 16) | MUX_PA12G_CATB_DIS) #define GPIO_PA12G_CATB_DIS (1u << 12) #define PIN_PA23G_CATB_DIS 23 /**< \brief CATB signal: DIS on PA23 mux G */ #define MUX_PA23G_CATB_DIS 6 #define PINMUX_PA23G_CATB_DIS ((PIN_PA23G_CATB_DIS << 16) | MUX_PA23G_CATB_DIS) #define GPIO_PA23G_CATB_DIS (1u << 23) #define PIN_PA31G_CATB_DIS 31 /**< \brief CATB signal: DIS on PA31 mux G */ #define MUX_PA31G_CATB_DIS 6 #define PINMUX_PA31G_CATB_DIS ((PIN_PA31G_CATB_DIS << 16) | MUX_PA31G_CATB_DIS) #define GPIO_PA31G_CATB_DIS (1u << 31) #define PIN_PB03G_CATB_DIS 35 /**< \brief CATB signal: DIS on PB03 mux G */ #define MUX_PB03G_CATB_DIS 6 #define PINMUX_PB03G_CATB_DIS ((PIN_PB03G_CATB_DIS << 16) | MUX_PB03G_CATB_DIS) #define GPIO_PB03G_CATB_DIS (1u << 3) #define PIN_PB12G_CATB_DIS 44 /**< \brief CATB signal: DIS on PB12 mux G */ #define MUX_PB12G_CATB_DIS 6 #define PINMUX_PB12G_CATB_DIS ((PIN_PB12G_CATB_DIS << 16) | MUX_PB12G_CATB_DIS) #define GPIO_PB12G_CATB_DIS (1u << 12) #define PIN_PA04G_CATB_SENSE0 4 /**< \brief CATB signal: SENSE0 on PA04 mux G */ #define MUX_PA04G_CATB_SENSE0 6 #define PINMUX_PA04G_CATB_SENSE0 ((PIN_PA04G_CATB_SENSE0 << 16) | MUX_PA04G_CATB_SENSE0) #define GPIO_PA04G_CATB_SENSE0 (1u << 4) #define PIN_PA27G_CATB_SENSE0 27 /**< \brief CATB signal: SENSE0 on PA27 mux G */ #define MUX_PA27G_CATB_SENSE0 6 #define PINMUX_PA27G_CATB_SENSE0 ((PIN_PA27G_CATB_SENSE0 << 16) | MUX_PA27G_CATB_SENSE0) #define GPIO_PA27G_CATB_SENSE0 (1u << 27) #define PIN_PB13G_CATB_SENSE0 45 /**< \brief CATB signal: SENSE0 on PB13 mux G */ #define MUX_PB13G_CATB_SENSE0 6 #define PINMUX_PB13G_CATB_SENSE0 ((PIN_PB13G_CATB_SENSE0 << 16) | MUX_PB13G_CATB_SENSE0) #define GPIO_PB13G_CATB_SENSE0 (1u << 13) #define PIN_PA05G_CATB_SENSE1 5 /**< \brief CATB signal: SENSE1 on PA05 mux G */ #define MUX_PA05G_CATB_SENSE1 6 #define PINMUX_PA05G_CATB_SENSE1 ((PIN_PA05G_CATB_SENSE1 << 16) | MUX_PA05G_CATB_SENSE1) #define GPIO_PA05G_CATB_SENSE1 (1u << 5) #define PIN_PA28G_CATB_SENSE1 28 /**< \brief CATB signal: SENSE1 on PA28 mux G */ #define MUX_PA28G_CATB_SENSE1 6 #define PINMUX_PA28G_CATB_SENSE1 ((PIN_PA28G_CATB_SENSE1 << 16) | MUX_PA28G_CATB_SENSE1) #define GPIO_PA28G_CATB_SENSE1 (1u << 28) #define PIN_PB14G_CATB_SENSE1 46 /**< \brief CATB signal: SENSE1 on PB14 mux G */ #define MUX_PB14G_CATB_SENSE1 6 #define PINMUX_PB14G_CATB_SENSE1 ((PIN_PB14G_CATB_SENSE1 << 16) | MUX_PB14G_CATB_SENSE1) #define GPIO_PB14G_CATB_SENSE1 (1u << 14) #define PIN_PA06G_CATB_SENSE2 6 /**< \brief CATB signal: SENSE2 on PA06 mux G */ #define MUX_PA06G_CATB_SENSE2 6 #define PINMUX_PA06G_CATB_SENSE2 ((PIN_PA06G_CATB_SENSE2 << 16) | MUX_PA06G_CATB_SENSE2) #define GPIO_PA06G_CATB_SENSE2 (1u << 6) #define PIN_PA29G_CATB_SENSE2 29 /**< \brief CATB signal: SENSE2 on PA29 mux G */ #define MUX_PA29G_CATB_SENSE2 6 #define PINMUX_PA29G_CATB_SENSE2 ((PIN_PA29G_CATB_SENSE2 << 16) | MUX_PA29G_CATB_SENSE2) #define GPIO_PA29G_CATB_SENSE2 (1u << 29) #define PIN_PB15G_CATB_SENSE2 47 /**< \brief CATB signal: SENSE2 on PB15 mux G */ #define MUX_PB15G_CATB_SENSE2 6 #define PINMUX_PB15G_CATB_SENSE2 ((PIN_PB15G_CATB_SENSE2 << 16) | MUX_PB15G_CATB_SENSE2) #define GPIO_PB15G_CATB_SENSE2 (1u << 15) #define PIN_PA07G_CATB_SENSE3 7 /**< \brief CATB signal: SENSE3 on PA07 mux G */ #define MUX_PA07G_CATB_SENSE3 6 #define PINMUX_PA07G_CATB_SENSE3 ((PIN_PA07G_CATB_SENSE3 << 16) | MUX_PA07G_CATB_SENSE3) #define GPIO_PA07G_CATB_SENSE3 (1u << 7) #define PIN_PA30G_CATB_SENSE3 30 /**< \brief CATB signal: SENSE3 on PA30 mux G */ #define MUX_PA30G_CATB_SENSE3 6 #define PINMUX_PA30G_CATB_SENSE3 ((PIN_PA30G_CATB_SENSE3 << 16) | MUX_PA30G_CATB_SENSE3) #define GPIO_PA30G_CATB_SENSE3 (1u << 30) #define PIN_PA08G_CATB_SENSE4 8 /**< \brief CATB signal: SENSE4 on PA08 mux G */ #define MUX_PA08G_CATB_SENSE4 6 #define PINMUX_PA08G_CATB_SENSE4 ((PIN_PA08G_CATB_SENSE4 << 16) | MUX_PA08G_CATB_SENSE4) #define GPIO_PA08G_CATB_SENSE4 (1u << 8) #define PIN_PA09G_CATB_SENSE5 9 /**< \brief CATB signal: SENSE5 on PA09 mux G */ #define MUX_PA09G_CATB_SENSE5 6 #define PINMUX_PA09G_CATB_SENSE5 ((PIN_PA09G_CATB_SENSE5 << 16) | MUX_PA09G_CATB_SENSE5) #define GPIO_PA09G_CATB_SENSE5 (1u << 9) #define PIN_PA10G_CATB_SENSE6 10 /**< \brief CATB signal: SENSE6 on PA10 mux G */ #define MUX_PA10G_CATB_SENSE6 6 #define PINMUX_PA10G_CATB_SENSE6 ((PIN_PA10G_CATB_SENSE6 << 16) | MUX_PA10G_CATB_SENSE6) #define GPIO_PA10G_CATB_SENSE6 (1u << 10) #define PIN_PA11G_CATB_SENSE7 11 /**< \brief CATB signal: SENSE7 on PA11 mux G */ #define MUX_PA11G_CATB_SENSE7 6 #define PINMUX_PA11G_CATB_SENSE7 ((PIN_PA11G_CATB_SENSE7 << 16) | MUX_PA11G_CATB_SENSE7) #define GPIO_PA11G_CATB_SENSE7 (1u << 11) #define PIN_PA13G_CATB_SENSE8 13 /**< \brief CATB signal: SENSE8 on PA13 mux G */ #define MUX_PA13G_CATB_SENSE8 6 #define PINMUX_PA13G_CATB_SENSE8 ((PIN_PA13G_CATB_SENSE8 << 16) | MUX_PA13G_CATB_SENSE8) #define GPIO_PA13G_CATB_SENSE8 (1u << 13) #define PIN_PA14G_CATB_SENSE9 14 /**< \brief CATB signal: SENSE9 on PA14 mux G */ #define MUX_PA14G_CATB_SENSE9 6 #define PINMUX_PA14G_CATB_SENSE9 ((PIN_PA14G_CATB_SENSE9 << 16) | MUX_PA14G_CATB_SENSE9) #define GPIO_PA14G_CATB_SENSE9 (1u << 14) #define PIN_PA15G_CATB_SENSE10 15 /**< \brief CATB signal: SENSE10 on PA15 mux G */ #define MUX_PA15G_CATB_SENSE10 6 #define PINMUX_PA15G_CATB_SENSE10 ((PIN_PA15G_CATB_SENSE10 << 16) | MUX_PA15G_CATB_SENSE10) #define GPIO_PA15G_CATB_SENSE10 (1u << 15) #define PIN_PA16G_CATB_SENSE11 16 /**< \brief CATB signal: SENSE11 on PA16 mux G */ #define MUX_PA16G_CATB_SENSE11 6 #define PINMUX_PA16G_CATB_SENSE11 ((PIN_PA16G_CATB_SENSE11 << 16) | MUX_PA16G_CATB_SENSE11) #define GPIO_PA16G_CATB_SENSE11 (1u << 16) #define PIN_PA17G_CATB_SENSE12 17 /**< \brief CATB signal: SENSE12 on PA17 mux G */ #define MUX_PA17G_CATB_SENSE12 6 #define PINMUX_PA17G_CATB_SENSE12 ((PIN_PA17G_CATB_SENSE12 << 16) | MUX_PA17G_CATB_SENSE12) #define GPIO_PA17G_CATB_SENSE12 (1u << 17) #define PIN_PA18G_CATB_SENSE13 18 /**< \brief CATB signal: SENSE13 on PA18 mux G */ #define MUX_PA18G_CATB_SENSE13 6 #define PINMUX_PA18G_CATB_SENSE13 ((PIN_PA18G_CATB_SENSE13 << 16) | MUX_PA18G_CATB_SENSE13) #define GPIO_PA18G_CATB_SENSE13 (1u << 18) #define PIN_PA19G_CATB_SENSE14 19 /**< \brief CATB signal: SENSE14 on PA19 mux G */ #define MUX_PA19G_CATB_SENSE14 6 #define PINMUX_PA19G_CATB_SENSE14 ((PIN_PA19G_CATB_SENSE14 << 16) | MUX_PA19G_CATB_SENSE14) #define GPIO_PA19G_CATB_SENSE14 (1u << 19) #define PIN_PA20G_CATB_SENSE15 20 /**< \brief CATB signal: SENSE15 on PA20 mux G */ #define MUX_PA20G_CATB_SENSE15 6 #define PINMUX_PA20G_CATB_SENSE15 ((PIN_PA20G_CATB_SENSE15 << 16) | MUX_PA20G_CATB_SENSE15) #define GPIO_PA20G_CATB_SENSE15 (1u << 20) #define PIN_PA21G_CATB_SENSE16 21 /**< \brief CATB signal: SENSE16 on PA21 mux G */ #define MUX_PA21G_CATB_SENSE16 6 #define PINMUX_PA21G_CATB_SENSE16 ((PIN_PA21G_CATB_SENSE16 << 16) | MUX_PA21G_CATB_SENSE16) #define GPIO_PA21G_CATB_SENSE16 (1u << 21) #define PIN_PA22G_CATB_SENSE17 22 /**< \brief CATB signal: SENSE17 on PA22 mux G */ #define MUX_PA22G_CATB_SENSE17 6 #define PINMUX_PA22G_CATB_SENSE17 ((PIN_PA22G_CATB_SENSE17 << 16) | MUX_PA22G_CATB_SENSE17) #define GPIO_PA22G_CATB_SENSE17 (1u << 22) #define PIN_PA24G_CATB_SENSE18 24 /**< \brief CATB signal: SENSE18 on PA24 mux G */ #define MUX_PA24G_CATB_SENSE18 6 #define PINMUX_PA24G_CATB_SENSE18 ((PIN_PA24G_CATB_SENSE18 << 16) | MUX_PA24G_CATB_SENSE18) #define GPIO_PA24G_CATB_SENSE18 (1u << 24) #define PIN_PA25G_CATB_SENSE19 25 /**< \brief CATB signal: SENSE19 on PA25 mux G */ #define MUX_PA25G_CATB_SENSE19 6 #define PINMUX_PA25G_CATB_SENSE19 ((PIN_PA25G_CATB_SENSE19 << 16) | MUX_PA25G_CATB_SENSE19) #define GPIO_PA25G_CATB_SENSE19 (1u << 25) #define PIN_PA26G_CATB_SENSE20 26 /**< \brief CATB signal: SENSE20 on PA26 mux G */ #define MUX_PA26G_CATB_SENSE20 6 #define PINMUX_PA26G_CATB_SENSE20 ((PIN_PA26G_CATB_SENSE20 << 16) | MUX_PA26G_CATB_SENSE20) #define GPIO_PA26G_CATB_SENSE20 (1u << 26) #define PIN_PB00G_CATB_SENSE21 32 /**< \brief CATB signal: SENSE21 on PB00 mux G */ #define MUX_PB00G_CATB_SENSE21 6 #define PINMUX_PB00G_CATB_SENSE21 ((PIN_PB00G_CATB_SENSE21 << 16) | MUX_PB00G_CATB_SENSE21) #define GPIO_PB00G_CATB_SENSE21 (1u << 0) #define PIN_PB01G_CATB_SENSE22 33 /**< \brief CATB signal: SENSE22 on PB01 mux G */ #define MUX_PB01G_CATB_SENSE22 6 #define PINMUX_PB01G_CATB_SENSE22 ((PIN_PB01G_CATB_SENSE22 << 16) | MUX_PB01G_CATB_SENSE22) #define GPIO_PB01G_CATB_SENSE22 (1u << 1) #define PIN_PB02G_CATB_SENSE23 34 /**< \brief CATB signal: SENSE23 on PB02 mux G */ #define MUX_PB02G_CATB_SENSE23 6 #define PINMUX_PB02G_CATB_SENSE23 ((PIN_PB02G_CATB_SENSE23 << 16) | MUX_PB02G_CATB_SENSE23) #define GPIO_PB02G_CATB_SENSE23 (1u << 2) #define PIN_PB04G_CATB_SENSE24 36 /**< \brief CATB signal: SENSE24 on PB04 mux G */ #define MUX_PB04G_CATB_SENSE24 6 #define PINMUX_PB04G_CATB_SENSE24 ((PIN_PB04G_CATB_SENSE24 << 16) | MUX_PB04G_CATB_SENSE24) #define GPIO_PB04G_CATB_SENSE24 (1u << 4) #define PIN_PB05G_CATB_SENSE25 37 /**< \brief CATB signal: SENSE25 on PB05 mux G */ #define MUX_PB05G_CATB_SENSE25 6 #define PINMUX_PB05G_CATB_SENSE25 ((PIN_PB05G_CATB_SENSE25 << 16) | MUX_PB05G_CATB_SENSE25) #define GPIO_PB05G_CATB_SENSE25 (1u << 5) #define PIN_PB06G_CATB_SENSE26 38 /**< \brief CATB signal: SENSE26 on PB06 mux G */ #define MUX_PB06G_CATB_SENSE26 6 #define PINMUX_PB06G_CATB_SENSE26 ((PIN_PB06G_CATB_SENSE26 << 16) | MUX_PB06G_CATB_SENSE26) #define GPIO_PB06G_CATB_SENSE26 (1u << 6) #define PIN_PB07G_CATB_SENSE27 39 /**< \brief CATB signal: SENSE27 on PB07 mux G */ #define MUX_PB07G_CATB_SENSE27 6 #define PINMUX_PB07G_CATB_SENSE27 ((PIN_PB07G_CATB_SENSE27 << 16) | MUX_PB07G_CATB_SENSE27) #define GPIO_PB07G_CATB_SENSE27 (1u << 7) #define PIN_PB08G_CATB_SENSE28 40 /**< \brief CATB signal: SENSE28 on PB08 mux G */ #define MUX_PB08G_CATB_SENSE28 6 #define PINMUX_PB08G_CATB_SENSE28 ((PIN_PB08G_CATB_SENSE28 << 16) | MUX_PB08G_CATB_SENSE28) #define GPIO_PB08G_CATB_SENSE28 (1u << 8) #define PIN_PB09G_CATB_SENSE29 41 /**< \brief CATB signal: SENSE29 on PB09 mux G */ #define MUX_PB09G_CATB_SENSE29 6 #define PINMUX_PB09G_CATB_SENSE29 ((PIN_PB09G_CATB_SENSE29 << 16) | MUX_PB09G_CATB_SENSE29) #define GPIO_PB09G_CATB_SENSE29 (1u << 9) #define PIN_PB10G_CATB_SENSE30 42 /**< \brief CATB signal: SENSE30 on PB10 mux G */ #define MUX_PB10G_CATB_SENSE30 6 #define PINMUX_PB10G_CATB_SENSE30 ((PIN_PB10G_CATB_SENSE30 << 16) | MUX_PB10G_CATB_SENSE30) #define GPIO_PB10G_CATB_SENSE30 (1u << 10) #define PIN_PB11G_CATB_SENSE31 43 /**< \brief CATB signal: SENSE31 on PB11 mux G */ #define MUX_PB11G_CATB_SENSE31 6 #define PINMUX_PB11G_CATB_SENSE31 ((PIN_PB11G_CATB_SENSE31 << 16) | MUX_PB11G_CATB_SENSE31) #define GPIO_PB11G_CATB_SENSE31 (1u << 11) /* ========== GPIO definition for USBC peripheral ========== */ #define PIN_PA25A_USBC_DM 25 /**< \brief USBC signal: DM on PA25 mux A */ #define MUX_PA25A_USBC_DM 0 #define PINMUX_PA25A_USBC_DM ((PIN_PA25A_USBC_DM << 16) | MUX_PA25A_USBC_DM) #define GPIO_PA25A_USBC_DM (1u << 25) #define PIN_PA26A_USBC_DP 26 /**< \brief USBC signal: DP on PA26 mux A */ #define MUX_PA26A_USBC_DP 0 #define PINMUX_PA26A_USBC_DP ((PIN_PA26A_USBC_DP << 16) | MUX_PA26A_USBC_DP) #define GPIO_PA26A_USBC_DP (1u << 26) /* ========== GPIO definition for PEVC peripheral ========== */ #define PIN_PA08C_PEVC_PAD_EVT0 8 /**< \brief PEVC signal: PAD_EVT0 on PA08 mux C */ #define MUX_PA08C_PEVC_PAD_EVT0 2 #define PINMUX_PA08C_PEVC_PAD_EVT0 ((PIN_PA08C_PEVC_PAD_EVT0 << 16) | MUX_PA08C_PEVC_PAD_EVT0) #define GPIO_PA08C_PEVC_PAD_EVT0 (1u << 8) #define PIN_PB12C_PEVC_PAD_EVT0 44 /**< \brief PEVC signal: PAD_EVT0 on PB12 mux C */ #define MUX_PB12C_PEVC_PAD_EVT0 2 #define PINMUX_PB12C_PEVC_PAD_EVT0 ((PIN_PB12C_PEVC_PAD_EVT0 << 16) | MUX_PB12C_PEVC_PAD_EVT0) #define GPIO_PB12C_PEVC_PAD_EVT0 (1u << 12) #define PIN_PA09C_PEVC_PAD_EVT1 9 /**< \brief PEVC signal: PAD_EVT1 on PA09 mux C */ #define MUX_PA09C_PEVC_PAD_EVT1 2 #define PINMUX_PA09C_PEVC_PAD_EVT1 ((PIN_PA09C_PEVC_PAD_EVT1 << 16) | MUX_PA09C_PEVC_PAD_EVT1) #define GPIO_PA09C_PEVC_PAD_EVT1 (1u << 9) #define PIN_PB13C_PEVC_PAD_EVT1 45 /**< \brief PEVC signal: PAD_EVT1 on PB13 mux C */ #define MUX_PB13C_PEVC_PAD_EVT1 2 #define PINMUX_PB13C_PEVC_PAD_EVT1 ((PIN_PB13C_PEVC_PAD_EVT1 << 16) | MUX_PB13C_PEVC_PAD_EVT1) #define GPIO_PB13C_PEVC_PAD_EVT1 (1u << 13) #define PIN_PA10C_PEVC_PAD_EVT2 10 /**< \brief PEVC signal: PAD_EVT2 on PA10 mux C */ #define MUX_PA10C_PEVC_PAD_EVT2 2 #define PINMUX_PA10C_PEVC_PAD_EVT2 ((PIN_PA10C_PEVC_PAD_EVT2 << 16) | MUX_PA10C_PEVC_PAD_EVT2) #define GPIO_PA10C_PEVC_PAD_EVT2 (1u << 10) #define PIN_PB09B_PEVC_PAD_EVT2 41 /**< \brief PEVC signal: PAD_EVT2 on PB09 mux B */ #define MUX_PB09B_PEVC_PAD_EVT2 1 #define PINMUX_PB09B_PEVC_PAD_EVT2 ((PIN_PB09B_PEVC_PAD_EVT2 << 16) | MUX_PB09B_PEVC_PAD_EVT2) #define GPIO_PB09B_PEVC_PAD_EVT2 (1u << 9) #define PIN_PA11C_PEVC_PAD_EVT3 11 /**< \brief PEVC signal: PAD_EVT3 on PA11 mux C */ #define MUX_PA11C_PEVC_PAD_EVT3 2 #define PINMUX_PA11C_PEVC_PAD_EVT3 ((PIN_PA11C_PEVC_PAD_EVT3 << 16) | MUX_PA11C_PEVC_PAD_EVT3) #define GPIO_PA11C_PEVC_PAD_EVT3 (1u << 11) #define PIN_PB10B_PEVC_PAD_EVT3 42 /**< \brief PEVC signal: PAD_EVT3 on PB10 mux B */ #define MUX_PB10B_PEVC_PAD_EVT3 1 #define PINMUX_PB10B_PEVC_PAD_EVT3 ((PIN_PB10B_PEVC_PAD_EVT3 << 16) | MUX_PB10B_PEVC_PAD_EVT3) #define GPIO_PB10B_PEVC_PAD_EVT3 (1u << 10) /* ========== GPIO definition for SCIF peripheral ========== */ #define PIN_PA19E_SCIF_GCLK0 19 /**< \brief SCIF signal: GCLK0 on PA19 mux E */ #define MUX_PA19E_SCIF_GCLK0 4 #define PINMUX_PA19E_SCIF_GCLK0 ((PIN_PA19E_SCIF_GCLK0 << 16) | MUX_PA19E_SCIF_GCLK0) #define GPIO_PA19E_SCIF_GCLK0 (1u << 19) #define PIN_PB10E_SCIF_GCLK0 42 /**< \brief SCIF signal: GCLK0 on PB10 mux E */ #define MUX_PB10E_SCIF_GCLK0 4 #define PINMUX_PB10E_SCIF_GCLK0 ((PIN_PB10E_SCIF_GCLK0 << 16) | MUX_PB10E_SCIF_GCLK0) #define GPIO_PB10E_SCIF_GCLK0 (1u << 10) #define PIN_PA02A_SCIF_GCLK0 2 /**< \brief SCIF signal: GCLK0 on PA02 mux A */ #define MUX_PA02A_SCIF_GCLK0 0 #define PINMUX_PA02A_SCIF_GCLK0 ((PIN_PA02A_SCIF_GCLK0 << 16) | MUX_PA02A_SCIF_GCLK0) #define GPIO_PA02A_SCIF_GCLK0 (1u << 2) #define PIN_PA20E_SCIF_GCLK1 20 /**< \brief SCIF signal: GCLK1 on PA20 mux E */ #define MUX_PA20E_SCIF_GCLK1 4 #define PINMUX_PA20E_SCIF_GCLK1 ((PIN_PA20E_SCIF_GCLK1 << 16) | MUX_PA20E_SCIF_GCLK1) #define GPIO_PA20E_SCIF_GCLK1 (1u << 20) #define PIN_PB11E_SCIF_GCLK1 43 /**< \brief SCIF signal: GCLK1 on PB11 mux E */ #define MUX_PB11E_SCIF_GCLK1 4 #define PINMUX_PB11E_SCIF_GCLK1 ((PIN_PB11E_SCIF_GCLK1 << 16) | MUX_PB11E_SCIF_GCLK1) #define GPIO_PB11E_SCIF_GCLK1 (1u << 11) #define PIN_PB12E_SCIF_GCLK2 44 /**< \brief SCIF signal: GCLK2 on PB12 mux E */ #define MUX_PB12E_SCIF_GCLK2 4 #define PINMUX_PB12E_SCIF_GCLK2 ((PIN_PB12E_SCIF_GCLK2 << 16) | MUX_PB12E_SCIF_GCLK2) #define GPIO_PB12E_SCIF_GCLK2 (1u << 12) #define PIN_PB13E_SCIF_GCLK3 45 /**< \brief SCIF signal: GCLK3 on PB13 mux E */ #define MUX_PB13E_SCIF_GCLK3 4 #define PINMUX_PB13E_SCIF_GCLK3 ((PIN_PB13E_SCIF_GCLK3 << 16) | MUX_PB13E_SCIF_GCLK3) #define GPIO_PB13E_SCIF_GCLK3 (1u << 13) #define PIN_PA23E_SCIF_GCLK_IN0 23 /**< \brief SCIF signal: GCLK_IN0 on PA23 mux E */ #define MUX_PA23E_SCIF_GCLK_IN0 4 #define PINMUX_PA23E_SCIF_GCLK_IN0 ((PIN_PA23E_SCIF_GCLK_IN0 << 16) | MUX_PA23E_SCIF_GCLK_IN0) #define GPIO_PA23E_SCIF_GCLK_IN0 (1u << 23) #define PIN_PB14E_SCIF_GCLK_IN0 46 /**< \brief SCIF signal: GCLK_IN0 on PB14 mux E */ #define MUX_PB14E_SCIF_GCLK_IN0 4 #define PINMUX_PB14E_SCIF_GCLK_IN0 ((PIN_PB14E_SCIF_GCLK_IN0 << 16) | MUX_PB14E_SCIF_GCLK_IN0) #define GPIO_PB14E_SCIF_GCLK_IN0 (1u << 14) #define PIN_PA24E_SCIF_GCLK_IN1 24 /**< \brief SCIF signal: GCLK_IN1 on PA24 mux E */ #define MUX_PA24E_SCIF_GCLK_IN1 4 #define PINMUX_PA24E_SCIF_GCLK_IN1 ((PIN_PA24E_SCIF_GCLK_IN1 << 16) | MUX_PA24E_SCIF_GCLK_IN1) #define GPIO_PA24E_SCIF_GCLK_IN1 (1u << 24) #define PIN_PB15E_SCIF_GCLK_IN1 47 /**< \brief SCIF signal: GCLK_IN1 on PB15 mux E */ #define MUX_PB15E_SCIF_GCLK_IN1 4 #define PINMUX_PB15E_SCIF_GCLK_IN1 ((PIN_PB15E_SCIF_GCLK_IN1 << 16) | MUX_PB15E_SCIF_GCLK_IN1) #define GPIO_PB15E_SCIF_GCLK_IN1 (1u << 15) /* ========== GPIO definition for EIC peripheral ========== */ #define PIN_PB01C_EIC_EXTINT0 33 /**< \brief EIC signal: EXTINT0 on PB01 mux C */ #define MUX_PB01C_EIC_EXTINT0 2 #define PINMUX_PB01C_EIC_EXTINT0 ((PIN_PB01C_EIC_EXTINT0 << 16) | MUX_PB01C_EIC_EXTINT0) #define GPIO_PB01C_EIC_EXTINT0 (1u << 1) #define PIN_PA06C_EIC_EXTINT1 6 /**< \brief EIC signal: EXTINT1 on PA06 mux C */ #define MUX_PA06C_EIC_EXTINT1 2 #define PINMUX_PA06C_EIC_EXTINT1 ((PIN_PA06C_EIC_EXTINT1 << 16) | MUX_PA06C_EIC_EXTINT1) #define GPIO_PA06C_EIC_EXTINT1 (1u << 6) #define PIN_PA16C_EIC_EXTINT1 16 /**< \brief EIC signal: EXTINT1 on PA16 mux C */ #define MUX_PA16C_EIC_EXTINT1 2 #define PINMUX_PA16C_EIC_EXTINT1 ((PIN_PA16C_EIC_EXTINT1 << 16) | MUX_PA16C_EIC_EXTINT1) #define GPIO_PA16C_EIC_EXTINT1 (1u << 16) #define PIN_PA04C_EIC_EXTINT2 4 /**< \brief EIC signal: EXTINT2 on PA04 mux C */ #define MUX_PA04C_EIC_EXTINT2 2 #define PINMUX_PA04C_EIC_EXTINT2 ((PIN_PA04C_EIC_EXTINT2 << 16) | MUX_PA04C_EIC_EXTINT2) #define GPIO_PA04C_EIC_EXTINT2 (1u << 4) #define PIN_PA17C_EIC_EXTINT2 17 /**< \brief EIC signal: EXTINT2 on PA17 mux C */ #define MUX_PA17C_EIC_EXTINT2 2 #define PINMUX_PA17C_EIC_EXTINT2 ((PIN_PA17C_EIC_EXTINT2 << 16) | MUX_PA17C_EIC_EXTINT2) #define GPIO_PA17C_EIC_EXTINT2 (1u << 17) #define PIN_PA05C_EIC_EXTINT3 5 /**< \brief EIC signal: EXTINT3 on PA05 mux C */ #define MUX_PA05C_EIC_EXTINT3 2 #define PINMUX_PA05C_EIC_EXTINT3 ((PIN_PA05C_EIC_EXTINT3 << 16) | MUX_PA05C_EIC_EXTINT3) #define GPIO_PA05C_EIC_EXTINT3 (1u << 5) #define PIN_PA18C_EIC_EXTINT3 18 /**< \brief EIC signal: EXTINT3 on PA18 mux C */ #define MUX_PA18C_EIC_EXTINT3 2 #define PINMUX_PA18C_EIC_EXTINT3 ((PIN_PA18C_EIC_EXTINT3 << 16) | MUX_PA18C_EIC_EXTINT3) #define GPIO_PA18C_EIC_EXTINT3 (1u << 18) #define PIN_PA07C_EIC_EXTINT4 7 /**< \brief EIC signal: EXTINT4 on PA07 mux C */ #define MUX_PA07C_EIC_EXTINT4 2 #define PINMUX_PA07C_EIC_EXTINT4 ((PIN_PA07C_EIC_EXTINT4 << 16) | MUX_PA07C_EIC_EXTINT4) #define GPIO_PA07C_EIC_EXTINT4 (1u << 7) #define PIN_PA19C_EIC_EXTINT4 19 /**< \brief EIC signal: EXTINT4 on PA19 mux C */ #define MUX_PA19C_EIC_EXTINT4 2 #define PINMUX_PA19C_EIC_EXTINT4 ((PIN_PA19C_EIC_EXTINT4 << 16) | MUX_PA19C_EIC_EXTINT4) #define GPIO_PA19C_EIC_EXTINT4 (1u << 19) #define PIN_PA20C_EIC_EXTINT5 20 /**< \brief EIC signal: EXTINT5 on PA20 mux C */ #define MUX_PA20C_EIC_EXTINT5 2 #define PINMUX_PA20C_EIC_EXTINT5 ((PIN_PA20C_EIC_EXTINT5 << 16) | MUX_PA20C_EIC_EXTINT5) #define GPIO_PA20C_EIC_EXTINT5 (1u << 20) #define PIN_PA21C_EIC_EXTINT6 21 /**< \brief EIC signal: EXTINT6 on PA21 mux C */ #define MUX_PA21C_EIC_EXTINT6 2 #define PINMUX_PA21C_EIC_EXTINT6 ((PIN_PA21C_EIC_EXTINT6 << 16) | MUX_PA21C_EIC_EXTINT6) #define GPIO_PA21C_EIC_EXTINT6 (1u << 21) #define PIN_PA22C_EIC_EXTINT7 22 /**< \brief EIC signal: EXTINT7 on PA22 mux C */ #define MUX_PA22C_EIC_EXTINT7 2 #define PINMUX_PA22C_EIC_EXTINT7 ((PIN_PA22C_EIC_EXTINT7 << 16) | MUX_PA22C_EIC_EXTINT7) #define GPIO_PA22C_EIC_EXTINT7 (1u << 22) #define PIN_PA23C_EIC_EXTINT8 23 /**< \brief EIC signal: EXTINT8 on PA23 mux C */ #define MUX_PA23C_EIC_EXTINT8 2 #define PINMUX_PA23C_EIC_EXTINT8 ((PIN_PA23C_EIC_EXTINT8 << 16) | MUX_PA23C_EIC_EXTINT8) #define GPIO_PA23C_EIC_EXTINT8 (1u << 23) #endif /* _SAM4LS4B_PIO_ */
{ "pile_set_name": "Github" }
Relationship between molecular structure and electron targets in the electroreduction of benzocarbazolediones and anilinenaphthoquinones. Experimental and theoretical study. We report the synthesis and voltamperometric reduction of 5H-benzo[b]carbazole-6,11-dione (BCD) and its 2-R-substituted derivatives (R = -OMe, -Me, -COMe, -CF(3)). The electrochemical behavior of BCDs was compared to that of the 2-[(R-phenyl)amine]-1,4-naphthalenediones (PANs) previously studied. Like PANs, BCDs exhibit two reduction waves in acetonitrile. The first reduction step for the BCDs represents formation of the radical anion, and the half-wave potential (E(1/2)) values for this step are less negative than for that of the PANs. The second reduction wave, corresponding to the formation of dianion hydroquinone, has E(1/2) values that shift to more negative potentials. A good linear Hammett-Zuman (E(1/2) vs sigma(p)) relationship, similar to that for the PAN series, was also obtained for the BCDs. However, unlike the PANs, in the BCDs, the first reduction wave was more susceptible to the effect of the substituent groups than was the second wave, suggesting that the ordering of the two successive one-electron reductions in BCDs is opposite that in PANs. This is explained by the fact that the electron delocalizations in the two systems are different; in the case of BCDs there is an extra aromatic indole ring, which resists loss of its aromatic character. The electronic structures of BCD compounds were, therefore, investigated within the framework of the density functional theory, using the B3LYP hybrid functional with a double zeta split valence basis set. Our theoretical calculations show that the O(1).H-N hydrogen bond, analogous to that previously described for the PAN series, is not observed in the BCDs. Laplacians of the critical points (nabla(2)rho) and the natural charges for the C-O bonds indicate that the first reduction wave for the BCDs corresponds to the C(4)-O(2) carbonyl, while in the PAN series the first one-electron transfer occurred at the C(1)-O(1) carbonyl. Natural bond orbital analysis showed that, in all the BCDs, the lowest unoccupied molecular orbital (LUMO) is located at C(4), whereas for the PANs, the LUMO is found at C(1). The good correlation between the LUMO energy values and the E(1/2) potentials (wave I) established that the first one-electron addition takes place at the LUMO. Analysis of the molecular geometry confirmed that, in both series of compounds, the effect of the substituent groups is mainly on the C(4)-O(2) carbonyl. These results explain the fact that reduction of the C(4)-O(2) carbonyl (voltammetric wave II in the PANs and voltammetric wave I in the BCDs) is more susceptible to the effect of the substituent groups than is reduction of the C(1)-O(1) carbonyl (wave I in the PANs and wave II in the BCDs).
{ "pile_set_name": "PubMed Abstracts" }
1. Technical Field This application generally relates to computer data storage, and more particularly to a cache used with computer data storage. 2. Description of Related Art Computer systems may include different resources used by one or more host processors. Resources and host processors in a computer system may be interconnected by one or more communication connections. These resources may include, for example, data storage devices such as the Symmetrix™ family of data storage systems manufactured by EMC Corporation. These data storage systems may be coupled to one or more host processors and provide storage services to each host processor. An example data storage system may include one or more data storage devices, such as those of the Symmetrix™ family, that are connected together and may be used to provide common data storage for one or more host processors in a computer system. A host processor may perform a variety of data processing tasks and operations using the data storage system. For example, a host processor may perform basic system I/O operations in connection with data requests, such as data read and write operations and also administrative tasks, such as data backup and mirroring operations. Host processor systems may store and retrieve data using a storage device containing a plurality of host interface units, disk drives, and disk interface units. Such storage devices are provided, for example, by EMC Corporation of Hopkinton, Mass. and disclosed in U.S. Pat. No. 5,206,939 to Yanai et al., U.S. Pat. No. 5,778,394 to Galtzur et al., U.S. Pat. No. 5,845,147 to Vishlitzky et al., and U.S. Pat. No. 5,857,208 to Ofek. The host systems access the storage device through a plurality of channels provided therewith. Host systems provide data and access control information through the channels to the storage device and storage device provides data to the host systems also through the channels. The host systems do not address the disk drives of the storage device directly, but rather, access what appears to the host systems as a plurality of logical disk units. The logical disk units may or may nor correspond to the actual disk drives. Allowing multiple host systems to access the single storage device unit allows the host systems to share data stored therein. Performance of a storage system may be improved by using a cache. In the case of a disk drive system, the cache may be implemented using a block of semiconductor memory that has a relatively lower data access time than the disk drive. Data that is accessed is advantageously moved from the disk drives to the cache so that the second and subsequent accesses to the data may be made to the cache rather than to the disk drives. Data that has not been accessed recently may be removed from the cache to make room for new data. Often such cache accesses are transparent to the host system requesting the data. Data may be stored in a cache in order to increase efficiency. However, there can be a cost associated with performing cache management operations, such as storing and retrieving data from the cache, in particular if the cache is locked for exclusive access in a particular implementation. One technique for implementing a cache is to store the data in blocks and link each of the blocks together in a doubly linked ring list referred to herein as a replacement queue. Each block of the replacement queue represents a block of data from a logical disk unit. The blocks or slots are placed in the doubly linked ring list in the order in which they are retrieved from the disk. A pointer may point to the block that was most recently added to the list. Thus, when a new block is to be added to the cache within the replacement queue, the structure of the replacement queue, in combination with the head pointer, may be used to determine the oldest block in the replacement queue that is to be removed to make room for the new block. An implementation of the replacement queue may use both a “head” pointer and a “tail” pointer identifying, respectively, the beginning and end of the replacement queue. The “tail” may determine the oldest block or slot in the replacement queue. Two such pointers may be used in an replacement queue arrangement as it may be desirable in accordance with cache management schemes in which some data may remain permanently in the cache and the “oldest” and “newest” data may not be adjacent to one another. Cache management techniques are described, for example, in issued U.S. Pat. No. 5,381,539, Jan. 10, 1995, entitled “System and Method for Dynamically Controlling Cache Management”, Yanai et al., assigned to EMC Corporation of Hopkinton, Mass., which is herein incorporated by reference, in which a data storage system has a cache controlled by parameters including: (a) a minimum number of data storage elements which must be retrieved and stored in cache memory and used by the system before the cache management system recognizes a sequential data access in progress; (b) the maximum number of tracks or data records which the cache management system is to prefetch ahead; and (c) the maximum number of sequential data elements to be stored in cache before the memory containing the previously used tracks or data records are reused or recycled and new data written to these locations. The cache memory is in a least-recently used circular configuration in which the cache management system overwrites or recycles the oldest or least recently used memory location. The cache manager provides monitoring and dynamic adjustment of the foregoing parameters. Described in issued U.S. Pat. No. 5,592,432, Jan. 7, 1997, entitled “Cache Management System Using Time Stamping for Replacement Queue”, Vishlitzky et al., which is herein incorporated by reference, is a system that includes a cache directory listing data elements in a cache memory and a cache manager memory including a replacement queue and data structures. A cache manager determines which data element should be removed or replaced in the cache memory based on the elapsed time the data element has been in the memory. If the elapsed time is less than a predetermined threshold, the data element will be maintained in the same location in the replacement queue saving a number of cache management operations. The predetermined threshold is established as the average fall through time (FTT) of prior data elements in the memory. A modified least-recently-used replacement procedure uses time stamps indicating real or relative time when a non-write-pending data element was promoted to the tail of the replacement queue, the most-recently used position. Also disclosed is another embodiment in which the number of times the data element is accessed while in the memory is compared to a fixed number. If the data element has been accessed more than the fixed number, it is placed at the tail of the replacement queue ensuring a longer period for the data element in the memory. Described in U.S. Pat. No. 5,206,939, Apr. 27, 1993, entitled “System and Method for Disk Mapping and Retrieval”, Yanai et al, which is herein incorporated by reference, is a device-by-device cache index/directory used in disk mapping and data retrieval. An embodiment using the foregoing queue may have a drawback in that an exclusive access policy may be enforced using an “expensive” locking mechanism in connection with the queue as a shared resource such that only one process may access and manipulate the queue at a time. Additionally, in connection with performing queue management operations, for example, such as adding elements, the complexity of the queue structure may make it difficult to allow more than one process to manipulate to the data structure at any time. One way to enforce this one-at-a-time access is to use a locking technique that allows a process exclusive access to the queue. However, when multiple processors may need to use the cache, then the exclusive access policy may become a bottleneck. An embodiment having a complex cache management scheme may also have increased traffic within a system. Accordingly, the number of times that a cache lock operation is performed may also increase. Thus, it may be desirous and advantageous to have a cache management scheme which is efficient and flexible minimizing the costs associated with accessing a cache.
{ "pile_set_name": "USPTO Backgrounds" }
IN THE COURT OF CRIMINAL APPEALS OF TEXAS NO. WR-79,045-01 EX PARTE PAUL DOUGLAS GATES, Applicant ON APPLICATION FOR A WRIT OF HABEAS CORPUS CAUSE NO. F-1045830-L IN CRIMINAL DISTRICT COURT NO. 5 FROM DALLAS COUNTY Per curiam. O R D E R Pursuant to the provisions of Article 11.07 of the Texas Code of Criminal Procedure, the clerk of the trial court transmitted to this Court this application for a writ of habeas corpus. Ex parte Young, 418 S.W.2d 824, 826 (Tex. Crim. App. 1967). Applicant was convicted of aggravated robbery and sentenced to forty-five years' imprisonment. The Fifth Court of Appeals affirmed his conviction. Gates v. State, No. 05-11-00404-CR (Tex. App.--Dallas 2011, no pet.). Applicant contends that appellate counsel failed to timely inform him that his conviction had been affirmed and that he could file a pro se petition for discretionary review (PDR). Applicant has alleged facts that, if true, might entitle him to relief. Strickland v. Washington, 466 U.S. 668 (1984); Ex parte Wilson, 956 S.W.2d 25 (Tex. Crim. App. 1997). The trial court concluded that appellate counsel was not ineffective and recommended that we dismiss this application under Article 11.07, § 4 of the Code of Criminal Procedure. (1) We believe that the record should be further developed. The trial court shall order appellate counsel to respond to Applicant's claim and state whether he filed a compliance letter, Tex. R. App. P. 48.4, and he timely informed Applicant that his conviction had been affirmed and that he could file a pro se PDR. The trial court shall also order an authorized person at the Correctional Institutions Division of the Texas Department of Criminal Justice to respond and state whether Applicant received correspondence from appellate counsel between March 9 and April 15, 2012. The trial court may use any means set out in Tex. Code Crim. Proc. art. 11.07, § 3(d). If the trial court elects to hold a hearing, it shall determine whether Applicant is indigent. If Applicant is indigent and wishes to be represented by counsel, the trial court shall appoint an attorney to represent Applicant at the hearing. Tex. Code Crim. Proc. art. 26.04. The trial court shall make further findings of fact and conclusions of law as to whether appellate counsel timely informed Applicant that his conviction had been affirmed and that he had a right to file a pro se PDR. If the trial court finds that appellate counsel did so, the trial court shall also make findings and conclusions as to when, if at all, Applicant received appellate counsel's letter. The trial court shall also make any other findings of fact and conclusions of law that it deems relevant and appropriate to the disposition of Applicant's claim for habeas corpus relief. This application will be held in abeyance until the trial court has resolved the fact issues. The issues shall be resolved within 90 days of this order. A supplemental transcript containing all affidavits and interrogatories or the transcription of the court reporter's notes from any hearing or deposition, along with the trial court's supplemental findings of fact and conclusions of law, shall be forwarded to this Court within 120 days of the date of this order. Any extensions of time shall be obtained from this Court. Filed: February 27, 2013 Do not publish 1. This is not a subsequent application under Article 11.07, § 4. It is an initial application and does not challenge the conviction or sentence. Ex parte Torres, 943 S.W.2d 469, 474 (Tex. Crim. App. 1997).
{ "pile_set_name": "FreeLaw" }
Q: Django Admin :: HTML Input In Django's admin panel: how do I add a form field that users can add unescaped HTML into? A: Use a standard TextField, the data gets saved unescaped. However, by default any data that is outputted in a template is automatically escaped. You can circumvent this by either disable autoescaping (bad idea!) by using the safe filter.
{ "pile_set_name": "StackExchange" }
High completeness of the brest stroke registry evidenced by analysis of sources and capture-recapture method. Population-based stroke registries are necessary to evaluate the precise burden of stroke. The methodology used in the Brest Stroke Registry and an estimation of its completeness are described. 'Hot pursuit' as well as 'cold pursuit' were used, and five sources of identification were included: emergency wards, brain imaging, practitioners, death certificates and hospital-based electronic research. Ascertainment for each case was certified by a neurologist. Inclusion criteria were: (1) age >15 years; (2) a stroke defined by WHO criteria or all neurological deficits lasting at least 1 h. Completeness was estimated using capture-recapture method. For 2008, 2009 and 2010, 851, 898, 823 patients were collected, respectively. The number of sources of identification per patient was as follows: one source: 30.8, 24.1 and 18.7%; two sources: 54.5, 42.9 and 31.0%; three sources: 13.4, 30.1 and 46%; four sources: 1.3, 3.0 and 3.8%. Capture-recapture analysis showed data completeness over 90%. Standardized cumulative first-ever stroke incidence using a world standard population was 87 in 2008, 87 in 2009 and 84 in 2010. Case ascertainment by a neurologist, numerous sources, as well as 'hot' and 'cold' pursuit can provide a reliably large data set suitable for further epidemiological studies.
{ "pile_set_name": "PubMed Abstracts" }
Wonderfully Made Wonderfully Made This Scripture passage is on my mind a lot as I talk with people about ways to build new healthy habits in the new year. The human body is an amazing gift from God. Sometimes, it can be easy to dwell on the things we don’t like about our physical bodies, and harder to be grateful for all that our bodies can do. The human body is amazing vessel for us to serve God and the people in our lives; to be his hands and feet in the world. We can develop healthy habits to honor our body any time of the year. Here are 5 simple ways get started: Move More – Prolonged periods of sitting can cause tightnesses in the back, legs, hips and shoulders. When we work at a computer, setting the alarm to remind us to get up and move every hour or so is invigorating! Moving our joints throughout the day and praising God for our ability to do so is a healthy practice. Mobilize the neck, shoulders, thoracic spine (middle back), elbows, wrists, fingers, hips, knees, ankles. Include your family in this fun activity. Use Safe Technique – If we have a physical job, or enjoy physical hobbies, we should be careful how we move, reach, bend, lift, carry and stand with a load. We can use a hip hinge, for example, when we pick up something heavy off the floor, rather than shifting forward overloading our knees. Packing our shoulders and carrying heavy loads close to the body helps prevent harming the low back. Flow 5 Minutes Every Day – 5 Minutes of gentle moving and stretching, and pairing this with our daily prayer time, is a great way get blood and nutrients flowing into your muscles and joints to prepare us mentally and physically for all that God is asking us to do that day. Have Good Posture When Standing and Sitting – It is recommended to stand upright and align the ears, shoulders, hips, knees and ankles for good posture to help prevent tightness, asymmetries, pain and injury. This also improves breathing capacity and heart function. When sitting, think ‘heart up to heaven’ with an upward chest instead of hunching forward over a phone or computer. A posture correction can also be a ‘God pause’ that reminds us to offer up a little prayer thanking God for the many blessings in our day. Practice Getting Up and Down Off the Floor – This skill is vital to independent living and helps prevent falls. We can enlist the help of a movement coach or medical professional to safely practice this skill to build strength and confidence in our bodies. Let us pray to the Holy Spirit for help in developing healthy habits, practicing good self-care and for a spirit of gratefulness for being wonderfully made in His image and likeness. Originally published in the Catholic Times, Jan. 31, 2016. About our Author: LoriCrock is a wife and mother, St. Joseph-Plain City parishioner, strength coach, writer and SoulCore Rosary prayer/exercise leader in Columbus, Ohio. Praying the Rosary and reflecting on the wisdom of the saints strengthens Lori on her faith journey. Lori is online at holyandhealthycatholic.com. Lori recently has started hosting “Holy and Healthy Minute” a new feature on St. Gabriel Catholic Radio AM820.
{ "pile_set_name": "Pile-CC" }
Government funding for the Port Hawkesbury Paper mill violated free trade laws, a U.S. congressman says. NewPage shut the plant down in 2011, citing economic conditions. It left 1,000 people out of work. The province eventually stepped in to help it re-open under a different owner. Nova Scotia spent $124 million to do so. Maine Congressman Michael Michaud complained that violated free-trade law. The Office of the U.S. Trade Representative has begun an investigation. Maine has a number of paper mills, including one owned by New Page, the company that shut down the mill outside Port Hawkesbury. Michaud argues the government money gave Cape Breton an unfair advantage. 'Not grounds for a trade dispute' Tina Thibeau of the Nova Scotia Department of Economic Development said the U.S. Trade Representative then raised the issue with the Canadian government: "Nova Scotia explained how its support is fully consistent with Canada's international trade obligations and the success of the Port Hawkesbury mill is not grounds for a trade dispute," she said. Thibeau said the province expects that will be the end of the matter. But a spokesperson for the Office of the U.S Trade Representative said it appears the province's funding maintained a capacity that otherwise would not exist. It feels the money resulted in significant commercial harm to U.S. industry and the paper market. It may ask for trade-remedy action.
{ "pile_set_name": "OpenWebText2" }
Innovating the traditional Crochet silhouette, Toms creates a square netting for a breathable walking experience. The colorful floral pattern takes over the main build of the shoe and partners up perfect with the sunny weather. Brighten up your wardrobe today with Toms Square Floral Crochet ($61). Phone Orders 702-463-3322 or info@featurelv.com. International Shipping available.
{ "pile_set_name": "Pile-CC" }
Chondroprotective Effects of Hyaluronic Acid-Chitosan Nanoparticles Containing Plasmid DNA Encoding Cytokine Response Modifier A in a Rat Knee Osteoarthritis Model. Interleukin (IL)-1β plays an essential role in the pathophysiology of osteoarthritis (OA). Cytokine response modifier A (CrmA) can prevent the generation of active IL-1β. This study aimed to explore the chondroprotective effects of hyaluronic acid-chitosan nanoparticles containing plasmid DNA encoding CrmA (HA/CS-CrmA) in a rat OA model. HA/CS-CrmA nanoparticles were synthesized through the complex coacervation of cationic polymers. The characteristics, toxicity, and transfection of the nanoparticles were investigated. Furthermore, the potential effects of HA/CS-CrmA nanoparticles were evaluated via a rat anterior cruciate ligament transection (ACLT) model of OA. Cartilage damage and synovial inflammation were assessed by safranin O/fast green and hematoxylin and eosin staining. Type II collagen in cartilage was measured by immunohistochemistry, and the expression levels of IL-1β, matrix metalloproteinase (MMP)-3, and MMP-13 in synovial tissue were detected by western blot. The HA/CS-CrmA nanoparticles, which effectively entrapped plasmid DNA, showed an adequate size (100-300 nm) and a regular spherical shape. The nanoparticles safely transfected synoviocytes and released plasmid DNA in a sustained manner over 3 weeks. Additionally, HA/CS-CrmA nanoparticles significantly inhibited cartilage damage, synovial inflammation, and the loss of type II collagen induced by ACLT. The expression levels of IL-1β, MMP-3, and MMP-13 in synovial tissue were dramatically down-regulated by HA/CS-CrmA nanoparticles. These results suggested that HA/CS-CrmA nanoparticles could attenuate cartilage destruction and protect against early OA by inhibiting synovial inflammation via inhibition of IL-1β generation.
{ "pile_set_name": "PubMed Abstracts" }
I jumped on your map last night with three of the UCC guys just cuz we were on and there was four of us. We got sweaty- kind of doesn't count since those guys run circles around me (and I don't have any gameplay to show you either) but I do have some feedback for you if you want to make some tweaks before Monday's official test. 2 things we all noticed and commented on: 1- when you're looking top mid, especially from around the damage boost side of the map- really bad frame rate drop. From my own experience I know that even little pieces of glass and Windows can kill ur frames. It's really distracting when you are fighting someone in top mid from that side. I know you have worked hard to create your aesthetic but if you put some time into simplifying the top middle tower I think it would go a really long way towards gameplay. 2- there are a number of little places on the map where you can fall and die that are super frustrating. I'm all for the boundaries of the map being death-falls and I'm all for a well labeled death pit or two but there were a couple areas where you would miss a jump and die and the only way to know that was to miss the jump. Considering how narrow the paths are already I would put some floors in there. If I am in a battle and I push in to clean up and I fall down to some lower level where I cannot finish my kill or help my teammate until I can find my way back up THAT is punishment enough- I think. The map encourages a lot of level changes and jumps and crazy **** so I just think you should let people jump around on the interior of the map without the fear of dying. 3- I would have to show you were but there is a kill volume that overlaps a ramp just a little. My dude ripped my face and then crouched in a ramp to get shields and just died! I got a trade out of it haha. Ok positives: Fighting in and out of and around teleporter is ****ing beautiful. There are some great areas right off spawn where you can lay shots on all the upper levels without over exposing yourself- but it's tough to finish kills on your own and that dynamic makes it lovely for 2v2. The gameplay is great imo just need to keep fine tuning. I thought fuel rod was brilliant esp compared to rocks. Was devastating with damage boost and that will lead to some sick meta of losing the battle for fuel rod and then needing to rally so they don't also get damage boost. Over all I think it's still a tad busy. I think there is a fair amount of detail that is not necessary to sell your aesthetic. Everyone was really impressed with how the map looked so you have no worries there. It might be time to be a little less precious with your baby and just give it a buzz cut. Read More ...
{ "pile_set_name": "OpenWebText2" }
Hi Drew, what are your regulations about a specific member who is getting a reputation for ripping off other members by non-payment on purchases? I don't want to start mudslinging any names but it seems to be something this one member in particular is doing out here in BC. I am aware it is buyer beware but if it is the same person over and over to other members of the forum?? Let me know when you can, thanks: Darryl Hello Drew, I'm new here and I wanted to introduce myself, but it's impossible for me to post, it does not work. What should I do? Excuse me for my English, I use Google translator. Kindest regards Serge The new CAC site had a free "forum listings" section that I thought you might like to know about. Two photos and a video can be included with the listing. The CAC gets decent traffic and may generate some traffic for you. (I'm not an owner or anything, just a member.)
{ "pile_set_name": "Pile-CC" }
WASHINGTON — The congressional special election in Ohio is down to the wire. With 100 percent of precincts reporting Tuesday night, the candidates were separated by 1,754 votes, making the race too close to call, NBC News projected. Republican Troy Balderson had 50 percent, or 101,574 votes, while Democrat Danny O'Connor had 49 percent, or 99,820 votes. But more than 3,400 provisional votes and 5,048 outstanding absentee ballots — nearly quadruple the margin — remained to be counted. State law bars boards of elections from counting those ballots until the 11th day after an election. Tune in to NBCNews.com at 12 p.m. ET to watch “Way Too Early." Steve Kornacki and guests will break down Tuesday’s special election in Ohio and discuss how voters are feeling ahead of the midterms. The race could be headed to a recount, since state law triggers one if the candidates are within half a percent of each other after the final results are certified, which must take place no later than Aug. 24. Still, that didn't stop Republicans from claiming victory Tuesday, including President Donald Trump, who endorsed Balderson and campaigned for him in the district on Saturday. In a tweet, Trump took credit for Balderson's razor-thin lead, even though the last Republican to represent the district won it by 36 percentage points less than two years ago, and Trump himself won it by 11 points. When I decided to go to Ohio for Troy Balderson, he was down in early voting 64 to 36. That was not good. After my speech on Saturday night, there was a big turn for the better. Now Troy wins a great victory during a very tough time of the year for voting. He will win BIG in Nov. — Donald J. Trump (@realDonaldTrump) August 8, 2018 Speaking to supporters, Balderson thanked Trump and Vice President Mike Pence for stumping for him in the home stretch, and vowed to "do everything I can to keep America great again" while representing the district in Washington. He also got a last-minute boost from Ohio Gov. John Kasich, a Republican Trump critic who used to represent the district and was initially hesitant to back Balderson. O'Connor, meanwhile, did not concede the contest on Tuesday night, but touted how close it was. "In a race that the pundits said we had no chance even being in, you proved them wrong," he told supporters. Rep. Ben Ray Luján, D-N.M., who leads House Democrats' campaign arm, touted the neck-and-neck vote as a positive sign for his party's hopes of winning the House in November. "This district should have been a slam dunk for the GOP, and the fact that we are still counting ballots is an ominous sign for their prospects in November," he said in a statement. Both parties see the election as a test of Trump's strength and as a potential bellwether of the Democrats' chances of picking up the 23 seats they need to flip the House. Balderson and O'Connor will face off again in a November rematch to compete for a full term in Congress, since Tuesday's election was just to fill the remainder of the term of Rep. Pat Tiberi, who resigned to take a private sector job. In an interview with MSNBC's "Morning Joe" Wednesday morning, O’Connor reiterated that the race was still too close to call and said he is excited to keep campaigning through November. "The margin is 1,700 votes. We have 8,000 votes yet to be counted," he said. "And we have an election in November. The fight continues. We'll be out there campaigning, we're not resting because people are counting on us to get it done for them." Since last year, Republican groups have spent more than $40 million on TV ads to defend just a handful of congressional seats in their own turf in special elections. And even as the GOP claimed victory, the Congressional Leadership Fund, a major conservative super PAC aligned with Speaker Paul Ryan, issued a warning to other Republican candidates. "While we won tonight, this remains a very tough political environment and moving forward," said the fund's executive director, Cory Bliss. "Any Republican running for Congress getting vastly outraised by an opponent needs to start raising more money." Republicans have won five out of seven competitive House and Senate special elections this cycle, but it's come at a price. In Ohio, the biggest spender has been CLF, which has run $2.7 million in TV ads, according to Advertising Analytics. By contrast, Balderson's campaign itself has spent only $515,000 on TV. O’Connor's campaign, meanwhile, has spent $2.3 million on ads, which have likely had a bigger impact than the super PACs, thanks to discounted rates available only to candidates. All told, five of the biggest GOP outside groups — the Republican National Committee, the party's official House and Senate campaign arms, plus the Congressional and Senate Leadership Fund super PACs — spent $36.95 million on TV ads in the seven special elections before Ohio, according to Advertising Analytics. And they dropped close to $5 million more in Tuesday's race. That's compared to just $11.5 million from their five Democratic counterparts, who have had to spend less since their candidates have been able to raise more money on their own and needed less help. Meanwhile, in a Michigan Democratic gubernatorial primary, Gretchen Whitmer easily defeated Abdul El-Sayed, a Bernie Sanders-backed candidate who was seeking to become the first Muslim governor in the country, the AP projected. And in Missouri, voters appear on track to vote down a Right to Work law that the Republican-controlled state legislature passed last year, but which unions challenged by putting it on Tuesday's ballot as a referendum.
{ "pile_set_name": "OpenWebText2" }
Jazoon TechDays 2017: Artificial Intelligence meets Developers Jazoon is one of the premier conferences in Switzerland attracting developers, product managers and decision-makers of the software industry in and around Switzerland. For our autumn 2017 session scheduled for the 27.10.2017 in Zurich, we want to bring the topic of artificial intelligence and machine learning closer to the software development community. Our main goal is to bridge the gap between the state-of-the-art (in terms of research and available services) and what is actually being shipped today in software products. The conference is tailor-made for developers, but we also look forward to creating awareness among decision-makers and other stakeholders about the possibilities AI / machine learning techniques can offer. We already have an exciting lineup of speakers who will talk about some of the most prominent tools (such as Google TensorFlow, IBM Watson Developer Cloud, SAP Leonardo Machine Learning, DeepLearning4J) and hottest technologies (chatbots, deeplearning, voice assistants, IoT) in today's market. Also, hands-on workshops are planned for the 26.10.2017. Conditions of participation: For a charge / Public Organized by: Keynode AG
{ "pile_set_name": "Pile-CC" }
Q: Logical error: Unable to determine the cause of segmentation fault for (i = (routeVector.size () - 1); i >= 0; i--) { cout << "Connected to -> " << routeVector[i].exitPoint; for (j = (routeVector.size () - 1); j >= 0; j--) { if (routeVector[i].selectedBranchesVector.size() > 0) { cout << "\n: routeVector[i].selectedBranchesVector[0].connectedExitPoint" << routeVector[i].selectedBranchesVector[0].connectedExitPoint; ******cout << "\nrouteVector[j].exitPoint:" << routeVector[j].exitPoint; if (routeVector[i].selectedBranchesVector[0].connectedExitPoint == routeVector[j].exitPoint) { cout << "Connected to -> " << routeVector[i].selectedBranchesVector[0].connectedExitPoint; } } } } The stared line is giving me a segmentation fault, I fail to understand why. If the "routeVector" had nothing in "selectedBranchesVector", it wouldn't have even reached the inside if. What can be the cause of the said problem? EDIT 1: To make the problem more clear, I printed out the two conditions of the statement and the error is shown on the stared line. The structures are: typedef struct branch { unsigned int distance; int connectedExitPoint; } branch; typedef struct route { int exitPoint; vector <branch> selectedBranchesVector; } route; vector <route> routeVector; A: This is dependent on the type of i and j - if i and j are unsigned, the above loops will loop back around quite happily - which is probably what is going on - print the indexes and you'll see...
{ "pile_set_name": "StackExchange" }
/// Copyright (c) 2012 Ecma International. All rights reserved. /// Ecma International makes this code available under the terms and conditions set /// forth on http://hg.ecmascript.org/tests/test262/raw-file/tip/LICENSE (the /// "Use Terms"). Any redistribution of this code must retain the above /// copyright and this notice and otherwise comply with the Use Terms. /** * @path ch08/8.7/8.7.2/8.7.2-3-s.js * @description Strict Mode - TypeError is thrown if LeftHandSide is a reference to a non-writable data property * @onlyStrict */ function testcase() { "use strict"; var _8_7_2_3 = {}; Object.defineProperty(_8_7_2_3, "b", { writable: false }); try { _8_7_2_3.b = 11; return false; } catch (e) { return e instanceof TypeError; } } runTestCase(testcase);
{ "pile_set_name": "Github" }
Making a Water Filter Fifth graders draw a plan that they think will clean the sludge in a jar. Students construct the treatment system they designed, take a bottle of sludge to the system and try it out, writing down what happened.
{ "pile_set_name": "Pile-CC" }
Vancouver Island Compassion Club president receives absolute discharge. On 5 July 2002, the BC Provincial Court released written reasons for sentencing in R v Lucas. The president of the Vancouver Island Compassion Club had been arrested and charged with possession for the purpose of tracking after police searched the club and his home and seized less than three kilograms of marijuana.
{ "pile_set_name": "PubMed Abstracts" }
Lindsay Lohan talks drugs, booze, rehab, sex By Alan Duke, CNN Updated 1:50 PM ET, Mon May 6, 2013 Photos: Lohan in trouble9 photos Lindsay Lohan in trouble – Lohan poses for a mug shot on Tuesday, March 20, after accepting 90 days in a "locked in" drug rehab facility for misdemeanor charges. Her six years of legal troubles trace back to two drunken driving arrests in 2007 and include other incidents in which she was behind the wheel. Hide Caption 1 of 9 Photos: Lohan in trouble9 photos Lindsay Lohan in trouble – Lindsay Lohan appears in court with her attorneys Anthony Falangetti, left, and Mark Heller in Los Angeles on Monday, March 18. She entered pleas of no contest on two misdemeanor charges relating to a traffic accident last summer, and she did not challenge the finding that she violated her shoplifting probation with those convictions. Hide Caption 2 of 9 Photos: Lohan in trouble9 photos Lindsay Lohan in trouble – Lohan's mug shot from July 2007 for driving under the influence. Hide Caption 3 of 9 Photos: Lohan in trouble9 photos Lindsay Lohan in trouble – Lindsay Lohan attends her probation hearing at the Airport Courthouse in March 2012 in Los Angeles. Superior Court Judge Stephanie Sautner decided to take Lohan off probation from a 2007 drunken driving case and said that she will no longer have to meet with a probation officer or appear in court on her 2011 shoplifting case, as long as she obeys all laws through May 2014. Lindsay Lohan in trouble – Lohan's mug shot from October 2011 after she was arrested for probation violations. She was released after posting $100,000 bail. Hide Caption 6 of 9 Photos: Lohan in trouble9 photos Lindsay Lohan in trouble – Lohan is led away in handcuffs at her probation progress report hearing at the Airport Courthouse in October 2011. Hide Caption 7 of 9 Photos: Lohan in trouble9 photos Lindsay Lohan in trouble – Lohan cries next to her lawyer Shawn Chapman Holley as she is sentenced to 90 days in jail by Judge Marsha Revel during her hearing at the Beverly Hills Courthouse in July 2010. Lohan violated her probation in two 2007 drunk driving cases. Hide Caption 8 of 9 Photos: Lohan in trouble9 photos Lindsay Lohan in trouble – Lohan poses for a booking photo after being arrested on DUI charges at Lynwood Jail in November 2007. Lohan voluntarily reported to the facility to serve her minimum 24-hour jail sentence that was part of a plea bargain for two DUI charges. Hide Caption 9 of 9 Story highlights Lindsay Lohan talks to Piers Morgan just before going into rehab "I've never been a junkie," the actress says After 250 days in rehab, another trip "is pointless," Lohan says But it's not "a bad thing for me to be away with myself for three months," she says Just days before checking into court-ordered rehab last week, the actress spoke extensively to Piers Morgan in an article for London's Daily Mail newspaper, which published it in this Sunday's edition. Lohan, who turns 27 in two months, told Morgan, host of CNN's "Piers Morgan Live" she's never been "a huge drinker" and despite rumors, failed drug tests and a drug possession arrest, she's only used cocaine "maybe four or five times in my life." She's spent more than 250 days in rehab and another trip "is pointless," she said in the Daily Mail story. Instead, she should be allowed to "go abroad to different countries and work with children." Porn star dodges Lohan's f-bombs Just Watched 2011: Lohan walks judicial red carpet Lohan's life and career ran off the rails starting in her disastrous year of 2007 when she was twice convicted of drunken driving, once for cocaine use, made three trips to rehab and served an 84-minute jail stay. Her arrests were "totally irresponsible -- a stupid mistake," she said. "And from then on, the press were on me all the time," Lohan said. "It was the first time I'd taken drugs. I was out in a club with people I shouldn't have been with, and took cocaine, and got in the car. It was so stupid." Her first rehab visit was not because of drugs or alcohol but to help her deal with the trauma she experienced making a movie, she told Morgan. She voluntary checked into the Wonderland Center in Los Angeles while she was shooting "I Know Who Killed Me" in January 2007. "I was having really bad nightmares, and the movie was pretty traumatizing," Lohan said. "So I stayed in a facility so I could get some sleep and talk about it with someone the next day, because it was overwhelming. But I would leave every day and just sleep there at night. I liked that. It was kind of like having my own live-in therapist, because I was having crazy nightmares and I was having AA meetings on set and stuff. It really helped." Lohan: The good teenager She had been drinking for less than a year at that point, Lohan said. She stayed away from alcohol after her first hangover experience at 17, when her mother made her "sleep with vomit still on me so I'd understand how it felt," she said. "I was too scared!" She was a good teenager, she said. "My friends and I would actually pretend to be drunk," she said. "And it was more fun. I never rebelled against my parents -- I worked hard, I was responsible and I didn't go to high-school parties." She doesn't consider herself to be an alcoholic -- "I've never woken up in the morning and had a drink" -- but "when I was younger, I was definitely going out too much and I was drinking too much." Lohan: A rehab expert Lohan considers herself an expert on rehab facilities. "I've been court-ordered to do it six times," she said. "I could write the book on rehab. Constantly sending me to rehab is pointless. The first few times I was court-ordered to rehab, it was like a joke, like killing time." Morgan interviewed her before the confusion erupted over which rehab facility she would enter. After arriving at one -- which California officials said was unlicensed -- she left for the Betty Ford Clinic, where she spent her last and longest rehab stay. "I look at it as a good thing," she said about this rehab visit. "I can come back afterwards and be fully focused on work. But I think there are other things I could do instead of going to a rehab center that would benefit me more. The best thing they could do for me would be to make me go abroad to different countries and work with children." Lohan: Clean and sober If she is not a drug user -- she tells Morgan she smoked "some pot" a year ago -- or an alcoholic, then why would she need rehab, Morgan asked. "This is where it gets hard for me to explain," she said. "I don't think there's anything wrong with people taking time to just be by themselves. I think people want to see me do that. They will keep saying the same things about me if I don't. I don't think it will be a bad thing for me to be away with myself for three months." Although now confessing to Morgan that she used drugs a year ago, she told Matt Lauer on NBC's "Today" show a year ago that that she was "clean and sober" then for "a long time." Although she was once arrested for cocaine possession and later sent to rehab when she violated probation by testing positive for the drug, Lohan said she rarely used it since "I don't like it." Cocaine: Not her favorite drug "It reminds me of my dad," she said. "I took it four times in a period from about the age of 20 to 23, and I got caught twice." She's not "a junkie," she said. "It's the truth. I've never taken heroin either, never injected myself with anything, never done LSD. Those things all scare me." Her drugs of choice are "pot, obviously, and Ecstasy," she said. "I liked that (Ecstasy) better than the others." Morgan reports Lohan then giggled. Lohan: Not a junkie Lohan has previously acknowledged having a drug problem, though. She posted this Twitter message in September 2010 just before entering the Betty Ford Clinic for three months: "Substance abuse is a disease, which unfortunately doesn't go away over night. I am working hard to overcome it and am taking positive steps." Lohan claimed to Morgan that she's just misunderstood. The constant online tabloid reports of late-night partying, which sometimes results in legal issues, don't show the real person. "I've never been a junkie, and never will be," she said. "I just like going out late to clubs with friends and listening to music. Always have done. It's not that unusual for girls of 26!" Heath Ledger's advice She slowed down on her drinking on the advice of an actor, Lohan said. "Heath Ledger told me to give it up for a year because he'd just done that, and so I did, and it wasn't a problem for me," she said. Ledger was 28 when he died from a prescription drug overdose in January 2008, a year after Lohan's first rehab visit. Lindsay prefers men Lohan also talked to Morgan about her sexuality -- she's straight despite a past relationship with a woman. "I like boys," she said. "I know I'm straight," she said. "I have made out with girls before, and I had a relationship with a girl. But I think I needed to experience that and I think I was looking for something different." "I like being in a relationship with a guy," Lohan said. "But there's something just different about it with a woman. When I was with Samantha, I didn't want to leave, because I didn't want to be alone. It was very toxic." Dad 'creates chaos' About her father, Michael Lohan: "He won't change," she said. "I just think there comes a point where you just kind of have to accept what it is. "Whenever I do try to bring him back into my life, he creates chaos for me and uses it to his advantage. He's been really good and then really crazy my whole life." Hollywood friends While she blames the Los Angeles lifestyle for steering her off course, she does point to two Hollywood women who have helped her. "Meryl Streep was nice," Lohan said. "She just advised me on my acting and what I needed to do differently, and she told me I needed to go back to live with my mum for a while." She couldn't move back to New York because at the time, her probation requirements, which including regular drug testing, restricted her to California -- "the worst possible place I could be," she said. "Jamie Lee Curtis was very kind to me, too," she said. "She also told me to listen to good advice and to get rid of the hangers-on." Stay tuned Will you see another story about Lindsay Lohan's substance abuse and legal troubles before she's scheduled to get out of rehab in early August? What could happen in the Betty Ford Clinic, a well-respected refuge for those needing to get their lives back on track? Lohan was accused of assaulting a Ford staff member during her last stay in December 2010, although the investigation was suspended on December 24 after the staffer drops charges against Lohan. Just weeks after her release from there, she was again involved in controversy for stealing a necklace from a jewelry store. It was that shoplifting conviction that put her on the road to her current rehab visit.
{ "pile_set_name": "Pile-CC" }
Australia’s capital cities offer vastly different experiences and environments for both overseas visitors and locals travelling interstate. Airbnb has pulled together a list of the most luxurious listings to ensure your experience the best the city has to offer. Here are the top three in each capital city around Australia – enjoy. Sydney - Hiilani Motor Yacht, Elizabeth Bay. Hiilani is a classic 95 foot motor yacht with classic exterior styling and a richly appointed interior. Claimed to have been previously owned by Shirley Temple, this massive boat can sleep nine people and accommodate up to 45 guests cocktail-style. Sydney - Hiilani Motor Yacht, Elizabeth Bay. The yacht comes fully staffed with a captain, deck hand and host for the duration of the charter which can start from most wharves in Sydney Habour. Sydney - Hiilani Motor Yacht, Elizabeth Bay. The Hiilani costs guests $9500 per night, with a minimum stay of one night. Sydney - Gaelforce, Newport. This six bedroom, three bathroom house looks over the stunning Pittwater estuary, and exclusive hideaway for many of Sydney's rich and famous. accommodates 12 people. Sydney - Gaelforce, Newport. Accommodating up to 12 people, the lavish waterfront property has its own private jetty, boat house and swimming pool. Sydney - Gaelforce, Newport. Gaelforce costs guests $5000 per night, with a minimum stay of one week. Sydney - The Seinna, Point Piper. Point Piper is considered a prestigious Sydney location, offering some of the city's finest views Sydney Harbour including the Sydney Harbour Bridge. Sydney - The Seinna, Point Piper. The Sienna boasts contemporary luxurious interiors and furnishings across its three bedrooms, two bathrooms which easily accommodates six people. Sydney - The Seinna, Point Piper. The apartment costs guests $3957 per night, with a minimum stay of one week. Melbourne - Toorak Manor, Toorak. Situated right in the heart of Toorak, one of Melbourne's most upmarket suburbs, Toorak Manor oozes sophisticated with its opulent decor and manicured gardens. Melbourne - Toorak Manor, Toorak. With five large bedrooms, six bathroom, it is suited to a party of 10 or less. Its large heated pool, city skyline views, welcome hamper makes it feel like a hotel rather than a rental. Melbourne - Toorak Manor, Toorak. Toorak Manor costs guests $2677 per night, with a minimum stay of one week. Melbourne - Chesterfield Avenue, Malvern. Reminiscent of an iconic European villa, Chesterfield Ave offers state of the art luxurious living, accommodating eight people. Melbourne - Chesterfield Avenue, Malvern. With limestone and marble finishes, an elevator, pool and terrace, this property is ensures guest can enjoy a comfortable stay, while being treated to all the trimmings. Melbourne - Chesterfield Avenue, Malvern. It costs guests $1530 per night, with a minimum stay of one week. Melbourne - Tree Tops, Kew. In one of Melbourne’s premier riverside locales is this stunning 60’s style property. Melbourne - Tree Tops, Kew. With walls of windows to look out over the spectacular bushland surroundings and a clever multi-level floor plan, this five bedroom house can comfortably fit ten people. Melbourne - Tree Tops, Kew. Tree Tops costs guests $1147 per night, with a minimum stay of one week. Brisbane - Rancho del Cielo, Carbrook. This insane property, just 30 minutes from the city's CBD, has so many facilities that you won't know where to start. From the tournament sized pool table, sauna, modern gymnasium, tennis court, putting green and the exhilarating heated lap pool, it has something for everyone. Brisbane - Rancho del Cielo, Carbrook. Accommodating as many as 12 people, Rancho del Cielo is the perfect venue to stay at with family and friends while visiting Brisbane. Brisbane - Rancho del Cielo, Carbrook. The house costs $1175 per night, with a minimum stay of one night. Brisbane - The G20 pad, Brisbane. This inner-city apartment in the Oaks Felix Hotel building has magnificent river views, as well as access to resort facilities including a pool, spa, sauna and gym. Brisbane - The G20 pad, Brisbane. Centrally located 'the golden triangle' of Brisbane's financial and high end entertainment/shopping districts, as many as four visitors can access some of the best experience the city has to offer. Brisbane - The G20 pad, Brisbane. This G20 pad costs $756 per night, with a minimum four nights stay. Brisbane - Inner city luxury, Kangaroo Point. This modernised classic Queenslander-style house has two self contained levels, to cater for groups, families or those looking to book a small place in area. Brisbane - Inner city luxury, Kangaroo Point. With enough space to accommodate for 15 people, this massive home is great for visitors looking for a place with a central location, loads of space and all the required features. Brisbane - Inner city luxury, Kangaroo Point. This home costs guests $587 per night, with a minimum stay of two nights. Perth - The family home, Swanbourne. This large coastal home is a family paradise with a pool and trampoline for the kids, and a great outdoor entertaining for the adults. Perth - The family home, Swanbourne. Accommodating for up to nine people, this renovated 1930s home is a short walk to the beach and nearby public transport. Perth - The family home, Swanbourne. It costs guests $979 per night, with a minimum stay of six nights. Perth - Giorgi built home, City Beach. This Giorgi built home offers panoramic views of the coastline and Rottnest Island for up to six people. Perth - Giorgi built home, City Beach. The resort-style apartment has all the features you'd expect of a contemporary retreat. From a games room with pool table, table tennis and large azure blue lap pool featuring an infinity edge. Perth - Giorgi built home, City Beach. This newly built home costs guests $783 per night, with a minimum stay of one week. Perth - Brewer St City Stay, Perth. This is a purpose built B&B rental is available for use for groups up to 12 people. It has two live-in hosts, who provide warm hospitality and complementary continental breakfast. Perth - Brewer St City Stay, Perth. Its intimate and casual atmosphere provides exclusivity in the heart of the business, cultural and shopping districts of Perth. Perth - Brewer St City Stay, Perth. This city stay costs guests $623 per night, with a minimum stay of one night. Adelaide - The Manor Estate, Kangarilla. This five bedroom, four bathroom grand manor accommodates 12 people nestled in the Mclaren Vale valley - the perfect classic country setting. Adelaide - The Manor Estate, Kangarilla. With a complimentary continental breakfast hamper and a private butler, this property is the ultimate way to get the 'country experience'. Adelaide - The Manor Estate, Kangarilla. The manor costs guests $1093 per night, with a minimum stay of one night. Adelaide - The executive townhouse, Adelaide. This executive townhouse is on perimeter of Clipsal 500 track - the ultimate position for any car-racing fan. Adelaide - The executive townhouse, Adelaide. Accommodating up to six people, this multi-storey townhouse has a balcony, roomy central courtyard and comfortable facilities. Adelaide - The executive townhouse, Adelaide. The townhouse costs guests $940 per night, with a minimum stay of one night. Adelaide - Old House, Picadilly. This heritage-listed, self contained mansion sleeps a whooping 16+ people. Adelaide - Old House, Picadilly. Situated on a 54 hectare bushland block, groups can find endless pleasure in the exclusive English gardens, visit the beautiful outdoor chapel area or kick back in the sun and listen to the songs of the native wildlife. Adelaide - Old House, Picadilly. Old House costs guests $940 per night, with a minimum stay of one night. Canberra - Paris-inspired terrace, Dickson. This two bedroom terrace, artistically styled and inspired by Paris, just minutes from the heart of Canberra is decorated with environmentally conscience, recycled products. Canberra - Paris-inspired terrace, Dickson. This eco-friendly apartment accommodates as many as five people. Canberra - Paris-inspired terrace, Dickson. The terrace costs guests $235 per night, with a minimum one night stay. Canberra - Kyoto Terrace, Dickson. This Japanese-styled apartment has spacious living areas, a private courtyard and secure parking for up to five people. Canberra - Kyoto Terrace, Dickson. Close to local eateries and public transport, guests can explore surrounding areas with provided bicycles and helmets. Canberra - Kyoto Terrace, Dickson. The terrace costs guests $235 per night, with a minimum stay of one night. Canberra - Manhattan, Canberra. Manhattan is a luxury apartment in a five-star hotel, located in the heart of Canberra. Beautifully decorated with designer furniture and modern, it accommodates up to four people. Canberra - Manhattan, Canberra. Located across from the Casino and within walking distance to all major attractions, visitors can experience the best of what Canberra has to offer. Canberra - Manhattan, Canberra. Manhattan costs guests $235 per night, with a minimum stay of one night. Hobart - The waterfront, Sandy Bay. Just ten minutes from Salamanca, this property is an ideal base to explore Hobart or watch the annual Sydney to Hobart yacht race. Hobart - The waterfont, Sandy Bay. This three bedroom, one bathroom cliff-side home accommodates five people. Hobart - The waterfont, Sandy Bay. The waterfront property costs guests $600 per night, with a minimum stay of four nights. Hobart - Arthouse Salamanca, Battery Point. This heritage listed property is moments away from Hobart's thriving waterfront, blending maritime history, art and design in a light-filled modern space. Hobart - Arthouse Salamanca, Battery Point. As well as views to the River Derwent, this house has convict-cut sandstone walls - one of which happens to be the oldest sea wall in Australia - and accommodates four guests. Hobart - Arthouse Salamanca, Battery Point. The Arthouse costs guests $548 per night, with a minimum two nights stay. Hobart - Belton House, South Hobart. Belton House is made up of three quaint, self-contained apartments in South Hobart, called Hedge Cottage, The View and The Studio. Hobart - Belton House, South Hobart The cosy decor and comfortable setting will make visitors feel at home. The entire house accommodates up to 15 people. Hobart - Belton House, South Hobart Belton House costs guests $540 per night, with a minimum stay of two nights. Darwin - Frances Bay retreat, Darwin. This two bedroom, two bathroom apartment overlooks Frances Bay and nearby national park. Darwin - Frances Bay retreat, Darwin. As many as three guests staying in the apartment will also have access to the pool and gym in complex. Darwin - Frances Bay retreat, Darwin. It costs guests $470 per night, with a minimum stay of one night. Darwin - Luxury Condo, Darwin. Accommodating six people, with the option of adding two more, this spacious condo is a comfortable walk to the Darwin Convention Centre and vibrant new Waterfront Precinct. Darwin - Luxury Condo, Darwin. With stunning views, swimming pool and gymnasium, guests will have many activities to chose from during their stay. Darwin - Luxury Condo, Darwin. The condo costs guests $388 per night, with a minimum night stay of four nights. Darwin - Beachlife Sea Spray, Darwin. With harbour views and a huge balcony with an outdoor setting and BBQ, this 3.5 bedroom apartment in the CBD perfectly accommodates up to eight people. Darwin - Beachlife Sea Spray, Darwin. Walking distance to cafes, bars, restaurants, the Darwin Waterfront, guests can enjoy the tropical city of Darwin day or night. Darwin - Beachlife Sea Spray, Darwin. Beachlife costs guests $388 per night, with a minimum stay of four nights. Business Insider Emails & Alerts Site highlights each day to your inbox. Email Address Join Follow Business Insider Australia on Facebook, Twitter, LinkedIn, and Instagram.
{ "pile_set_name": "OpenWebText2" }
If you suck on a tit the movie gets an R rating. If you hack the tit off with an axe it will be PG. -Jack Nicholson I believe in the brotherhood of man, all men, but I don't believe in brotherhood with anybody who doesn't want brotherhood with me. I believe in treating people right, but I'm not going to waste my time trying to treat somebody right who doesn't know how to return the treatment. -Malcolm X This American system of ours, call it Americanism, call it capitalism, call it what you will, gives each and every one of us a great opportunity if we only seize it with both hands and make the most of it. - Al Capone Retire? I'm going to stay in show business until I'm the only one left. - George Burns at age 90 The problem with people who have no vices is that generally you can be pretty sure they're going to have some pretty annoying virtues. - Elizabeth Taylor If a man is called to be a streetsweeper, he should sweep streets even as Michaelangelo painted, or Beethoven composed music, or Shakespeare wrote poetry. He should sweep streets so well that all the hosts of heaven and earth will pause to say, here lived a great streetsweeper that did his job well. - Martin Luther King I have a heart and I have feelings. I feel that when you do that to me, it's not nice. - Michael Jackson Give me a museum and I'll fill it. -Pablo Picasso But I refuse to believe that I am a better actor than myself. - Jim Carrey It's kind of fun to do the impossible. - Walt Disney If you're going through hell, keep going. -Walt Disney Every man wishes to be wise, and they who cannot be wise are almost always cunning. -Samuel Jackson Information is not knowledge. Knowledge is not wisdom. Wisdom is not truth. Truth is not beauty. Beauty is not love. Love is not music. Music is the Best. - Frank Zappa The attraction of being wild is living on the edge, living up to the reputations of the people you've been following or emulating. People are always talking about how wild and exciting they were, but the key word is 'were', because there's a long list of dead, famous people. - Christian Slater You can see our respect for women by the fact that we have pledged to pay working women, even though they don't have to work. - Taliban Information Minister Amir Kan Muttaqi I wanted revenge; I wanted to dance on the graves of a few people who made me unhappy. It's a pretty infantile way to go through life - I'll show them - but I've done it, and I've got more than I ever dreamed of. - Anthony Hopkins More Funny Sayings... Cocaine is God's way of saying you're making too much money. - Robin Williams Anyone who can walk to the welfare office can walk to work. - Al Capone It's better to live one day as a lion, than a hundred as a sheep. -Benito Mussollini A lot of people are afraid to say what they want. That's why they don't get what they want. - Madonna I wish people could acheive what they think would bring them happiness in order for them to realize that that's not what happiness really is. - Alanis Morisette The key to immortallity, is living a life which is worth to be remembered. Bruce Lee I myself have never been able to find out precisely what feminism is; I only know that people call me a feminist whenever I express sentiments that differentiate me from a doormat or a prostitute. - Rebecca West What luck for rulers that men do not think. - Adolf Hitler Hollywood is a place where they'll pay you 50,000 dollars for a kiss and 50 cents for your soul. - Marilyn Monroe Some say the blacker the berry, the sweeter the juice; I say the darker the flesh then the deeper the roots. - Tupac Shakur I used to live in a room full of mirrors; all I could see was me. I take my spirit and I crash my mirrors, now the whole world is here for me to see. - Jimi Hendrix One man with courage is a majority. - Thomas Jefferson No one knows my ability the way I do. I am pushing against it all the time. -John Steinbeck I'm still the little southern girl from the wrong side of the tracks who really didn't feel like she belonged. -Faye Dunaway. I say I'm Jimi Hendrix, Jim Morrison, Janis Joplin all wrapped up into one. If I die early ... I'll be just like those guys. -Dennis Rodman. I'm not smart enough to lie. - Ronald Reagan I am not in the closet. I am not coming out of the closet. I am not gay. - Oprah Winfrey I don't want people to know what I'm actually like. It's not good for an actor. - Jack Nicholson, 1993 The Funny Sayings on this site are the property of their respective creators and we don't claim any copyright for them. We've made efforts to use the quotes correctly, and under the guises of public domain/fair use. If you know of any funny sayings on our cards that are in breach of copyright, please email us and tell us why, then we will remove them. R. E. Shay: Luck Quotes Depend on the rabbit's foot if you will, but remember it didn't work for the rabbit. Laurence J. Peter: Luck Quotes Don't believe in miracles - depend on them.
{ "pile_set_name": "Pile-CC" }
Stretchable Nanolasing from Hybrid Quadrupole Plasmons. This paper reports a robust and stretchable nanolaser platform that can preserve its high mode quality by exploiting hybrid quadrupole plasmons as an optical feedback mechanism. Increasing the size of metal nanoparticles in an array can introduce ultrasharp lattice plasmon resonances with out-of-plane charge oscillations that are tolerant to lateral strain. By patterning these nanoparticles onto an elastomeric slab surrounded by liquid gain, we realized reversible, tunable nanolasing with high strain sensitivity and no hysteresis. Our semiquantum modeling demonstrates that lasing build-up occurs at the hybrid quadrupole electromagnetic hot spots, which provides a route toward mechanical modulation of light-matter interactions on the nanoscale.
{ "pile_set_name": "PubMed Abstracts" }
Plasmacytoma-like posttransplant lymphoproliferative disorder following orthotopic liver transplantation: a case report. Posttransplant lymphoproliferative disorders (PTLDs) are among the most serious and potentially fatal complications of both stem-cell and solid-organ transplantation. Most monomorphic PTLDs are of B-cell origin and frequently associated with Epstein-Barr virus (EBV) infection in the setting of pharmacological immunosuppression posttransplantation. The majority of monomorphic PTLDs commonly resemble diffuse large B-cell or Burkitt's lymphoma; plasmacytoma-like PTLDs are very rare. We report a case of plasmacytoma-like PTLD arising in the allograft in a 66-year-old male diagnosed 2 months following an orthotopic liver transplant for alcohol-related end-stage liver disease. The liver biopsy revealed marked infiltration of atypical plasma cells with lambda light chain restriction and positivity for EBV by in situ hybridization confirming the diagnosis. Also noted was a remarkable increase of tissue eosinophils. Reduction of immunosuppression led to improvement in his clinical condition, and also resolution of the hepatic lesions and abdominal lymphadenopathy noted on imaging studies. While a few cases of plasmacytoma-like PTLDs have been described in literature, to our knowledge, this is the first reported case of early onset plasmacytoma-like PTLD in a liver transplant recipient occurring in the allograft with associated lymphadenopathy having distinct histopathologic features including tissue eosinophilia. Timely recognition of such an entity is critical in order to initiate early and appropriate intervention.
{ "pile_set_name": "PubMed Abstracts" }
Q: Cannot invoke an expression whose type lacks a call signature. Type 'typeof ""' has no compatible call signatures React TypeScript I'm trying to convert three scripts from Javascript to TypeScript. The scripts can be found in this gist. I do however have one error left that I can't get rid of. Please note that this is my first React and TypeScript project so I can easily have missed something obvious. I'm using .tsx files and TypeScript 2.1. In the file: GoogleApiComponent.tsx import * as cache from './ScriptCache' ... componentWillMount() { this.scriptCache = cache({ <--Error TS2349 here google: GoogleApi({ apiKey: apiKey, libraries: libraries }) }); } Gives me this error: Cannot invoke an expression whose type lacks a call signature. Type 'typeof "ScriptCache"' has no compatible call signatures. ScriptCache.tsx looks like this: let counter = 0; let scriptMap = new Map(); export const ScriptCache = (function (global: any) { return function ScriptCache(scripts: any) { const Cache: any = {} ... A: Looks like you're import is not correct :) Please try to import it like this import cache from './ScriptCache'. If you just used the code from the gist the cache is also exported as default. If this does not work, try import { ScriptCache as cache } from './ScriptCache'. You do not need the as syntax. This is just so you don't have to change the variable names.
{ "pile_set_name": "StackExchange" }
The present invention is directed to a carton tester and in particular to a centrifugal carton tester for testing carrier style paperboard cartons of the type used in the beverage industry. Beverages such as soft drinks and beer are typically sold in bottles or cans which are packaged in carriers in lots of six, eight or twelve bottles or cans to a carrier. The collective weight of these bottles or cans in a carrier when combined with adverse conditions such as a wetting of the carrier and/or rough handling of the carrier can result in a failure of the carrier. Failure of a carrier in the handle region can result in the dropping of the entire carrier. Failure of other portions of a carrier can result in the release of one or more bottles or cans from the carrier. Accordingly, it is important to test such carriers to determine their failure points under various adverse conditions and to make sure the carriers are manufactured to certain standards. The centrifugal force tester of the present invention has been developed to measure the force required to produce failure in a package designed to hold and support a relatively heavy product. It is primarily designed to test the carriers commonly used in the soft drink and beer beverage markets to carry multiple units of bottled or canned beverages. It is contemplated that the centrifugal force carton tester can be used (1) to establish minimum standards for cartons (2) to monitor carton quality at the point of manufacture; and (3) to evaluate performance levels of cartons exposed to adverse environmental conditions such as refrigeration in storage or exposure to rain on open delivery trucks. The weight of a package is that force exerted by gravity on the mass of the carton and its contents. Obviously for any package to be usable it must be able to support (or hold) a force equal to its own weight. In addition it must be able to withstand additional forces created during normal handling or abuse. An example of an additional force is the force developed due to the angular acceleration of the package when a person walks and carries a carton with the normal swinging of the arms. The total maximum force so generated is limited to about twice the package weight. Another force is the force generated when a package is taken from a height and lowered to a carrying position. The force on the carton at the end of this action again exceeds the package weight. This force is more difficult to predict but it is estimated to be up to two to three times the package weight. The weight of a package is the force created by gravity on the mass of the carton and its contents. Mathematically, weight can be expressed by the following equation: EQU W=mg where, W=weight of package PA1 m=mass of carton and its contents PA1 g=acceleration of gravity=32 ft/sec.sup.2 PA1 F=force PA1 m=mass PA1 a=acceleration PA1 F.sub.f =Force to Failure PA1 m=mass of carton PA1 a.sub.f =angular acceleration at failure EQU a.sub.f =V.sup.2 /r (II) PA1 v=peripheral velocity of the carton at failure PA1 r=radius from the axis of rotation to the bottom of the carton, and, PA1 V=(RPS).multidot.C PA1 RPS=Revolutions per Second at time of failure PA1 C=Circumference along the outside perimeter of the carton This weight equation is a specific application of the general equation for force from physics: EQU F=ma where, In designing the tester of the present invention, it was decided to use the force created by angular acceleration when an object is rotated in a circular motion tethered to the axis of rotation. A force gauge is inserted in the tether between the axis of rotation and the carton being tested. The rate of rotation is increased with time causing a continuing increase in the angular acceleration until the carton fails. The failure force of the carton can be read directly from the force gauge or calculated indirectly from the angular acceleration, the radius of the tether from the axis to the bottom of the test carton, and the velocity of rotation at the time of failure. Therefore, at the time of failure: EQU F.sub.f =m.multidot.a.sub.f (I) where where, where, For practical purposes the preferred method is the use of a force gauge which can be read and recorded directly after the test is completed.
{ "pile_set_name": "USPTO Backgrounds" }
1. Introduction {#sec1} =============== According to the commentary on the 2008 WHO classification of lymphoid tumors, follicular lymphoma *in situ* (FLIS) refers to lymph nodes with a background of hyperplastic germinal centres harbouring distinct areas with Bcl-2 overexpression in centroblasts and centrocytes \[[@B1]\]. In FLIS, there is a B-cell population with immunophenotypic and genotypic features of follicular lymphoma; however, these B-cells are exclusively localised to germinal centres in morphologically reactive lymph nodes \[[@B2]\]. FLIS was first recognised in 2002 \[[@B3]\]; however, it is not presently clear cut whether this condition is a precursor to full blown follicular lymphoma (FL) \[[@B4]\]. In a series of 34 cases of FLIS identified by Jegalian et al., six had prior or concurrent FL and five had FLIS composite with another lymphoma. Of patients with negative staging at diagnosis and available followup (twenty-one patients), only one developed FL \[[@B5]\]. We present a case recently diagnosed in a middle-aged African lady which to our knowledge is the first reported occurrence in the West African subregion of the world. 2. Case Report {#sec2} ============== A 48-year-old civil servant presented with axillary lymphadenopathy of insidious onset, discovered on routine mammography. The lymph node was excised and sent for histological analysis. She had neither clinically obvious enlarged lymph nodes elsewhere nor a previous history of lymphadenopathy. Histological examination was done with the aid of immunohistochemistry. The predominant abnormality on H&E examination was a reactive change characterised by follicular hyperplasia, sinus histiocytosis, and expansion of the interfollicular T-cell zones with increased numbers of inter-follicular dendritic cells associated with patchy aggregates of melanophages. These features were considered indicative of a dermatopathic lymphadenopathy by some of the consultant pathologists. However, some others disagreed and felt there was some subtle evidence of lymphoma. This resulted in the use of immunohistochemistry. Immunohistochemistry done in our laboratory showed CD20 positivity in B-cell areas of the lymph node and follicular germinal centres which were CD10 and Bcl-2 positive. Due to our limited immunohistochemistry experience and the few immunohistochemistry panels at our disposal, the blocks were sent to the Department of Cellular Pathology in Queen\'s Hospital, Rom Valley Way, Romford, Essex, UK. Their analysis revealed secondary follicles with germinal centres that were variably colonised by small CD10 and Bcl-6 positive cells that also overexpressed Bcl-2. The involved follicles had a low proliferation fraction as determined by Ki67 immunohistochemistry. S100 stained the increased numbers of interfollicular dendritic cells (see [Figure 1](#fig1){ref-type="fig"}). These features indicated an intrafollicular neoplasia/*in situ* follicular lymphoma. 3. Discussion {#sec3} ============= Follicular lymphoma (FL) is the second most common non Hodgkin lymphoma (NHL) in the Western world \[[@B6]\]. It has an average incidence of 2.6 per 100,000 and median age in the 6th decade \[[@B6]\] and is slightly more common amongst females \[[@B7]\]. In FLIS, the enlarged lymph nodes are usually incidental findings, and the patient has no generalised lymphadenopathy \[[@B4]\]. However, there may be a coexisting FL in the same lymph node or in other nodes as has been reported in a few cases \[[@B5], [@B8]\]. In the index patient, the lymph nodes were discovered on routine mammography. In the series of lymph nodes affected by *in situ* follicular lymphoma analysed by Jegalian et al. \[[@B5]\], they found a majority of females (56%) and a peak age of occurrence between the fifth and sixth decades. This report corresponds with the clinical profile of our index patient who is female and aged 48 years. Follicular lymphoma is a mature B-cell neoplasm thought to be derived from follicular centre B lymphocytes. The lymphoid cells express the immunophenotypic markers associated with germinal centre B-cells, including CD10 and Bcl-6 \[[@B9]\]. In FL, the *Bcl-2* gene on chromosome 18 is merged with the immunoglobulin heavy gene locus on chromosome 14 (t 14:18) (q32;q21) \[[@B2]\]. This results in constitutive activation of the *Bcl-2* gene which is antiapoptotic and leads to accumulation of follicular centre B-cells which may otherwise have died through apoptosis. Bcl-2 is not expressed in normal follicle centre cells. Inappropriate expression of the *Bcl-2* oncogene has long been believed to be the initial event in malignant transformation to FL \[[@B9]\]. Immunohistochemical staining for Bcl-2 protein also provides a very useful tool for distinguishing between reactive and neoplastic lymphoid follicles as normal germinal centres almost never express Bcl-2 protein \[[@B10], [@B11]\]. To diagnose FLIS, the following criteria are used \[[@B4], [@B5], [@B8], [@B12]\]: preserved nodal architecture with open sinuses and preserved paracortical regions. On H&E sections, the follicles appear to be reactive. Immunohistochemistry shows follicles positive for CD10, Bcl-6, and CD20. Bcl-2 positive germinal centre cells are confined to the germinal centres of the follicles, do not replace the entire follicle centre, and are not seen in the interfollicular regions or elsewhere in the lymph node. The involved follicles also have a lower proliferation rate with ki67 than the adjacent reactive follicles. Molecular studies, for example, fluorescence *in situ* hybridization analysis for t(14:18), are only necessary for cases in which immunohistochemistry findings are ambiguous  \[[@B12]\]. In the index case, the immunohistochemistry results were not ambiguous and diagnosis of FLIS was made without FISH. FLIS has been reported in association with other conditions such as nonlymphoid malignancies and Crohn\'s disease \[[@B12]\]. In these reports, the FLIS was an incidental finding. FLIS may transform to follicular lymphoma. In the case series reviewed by Jegalian et al. \[[@B5]\], one out of thirty-four patients reviewed eventually developed follicular lymphoma at the same site. Bonzheim et al. \[[@B2]\] have, however, proposed a clonal evolution from FLIS to manifest follicular lymphoma. This finding has not been supported by other studies with long-term follow-up of patients already diagnosed with FLIS \[[@B3], [@B5]\]. The index patient, a year after this diagnosis, is presently on followup and has not presented with symptoms or signs of a follicular lymphoma. *In situ* FL needs to be differentiated from cases of partial involvement of a lymph node by a follicular lymphoma (PFL). In PFL, the architecture of the lymph node is altered when compared to the preserved architecture for FLIS. Also, in FLIS, the germinal centres stain strongly for Bcl-2 and CD10, while in PFL these markers show variable intensity \[[@B5]\]. Other criteria adopted by a panel of experts during the workshop on "early lesions in lymphoid neoplasms" organised by the European Association of Hematopathology in Uppsala, Sweden (2010) include the following: the follicular size is normal in FLIS while being expanded in PFL, the follicles are widely scattered in FLIS while they are grouped together in PFL, the follicular cuff is intact in FLIS while it is attenuated in PFL, and FLIS is composed of almost pure centrocytes while PFL is composed of centrocytes with few centroblasts \[[@B13]\]. 4. Conclusion {#sec4} ============= This report highlights a hitherto unreported entity in the West African subregion of the world and highlights the need for immunohistochemistry in the diagnosis of lymph node pathology---a resource which is very limited in this environment. Learning Points {#sec5} =============== FLIS is a rare entity.This is the first case reported in this subregion.Immunohistochemistry is very relevant in lymph node pathology---a resource which is scarcely available in this environment. The authors declare that there is no conflict of interests. Orah Nnamdi Obumneme carried out the literature research and prepared the draft paper. Akinde Ralph interpreted the H&E sections. Igbokwe Uche interpreted the immunohistochemistry. Irurhe Nicholas did the mammography. Banjo Adekunbiola edited the final paper. ![(a and b) H&E showing intact lymph node architecture, sinus histiocytosis, and patchy aggregates of melanophages ((a) ×10, (b) ×40). (c and d): Bcl-6 marking the follicular centre cells ((c) ×10, (d) ×40). (e and f): CD10 marking follicular centre cells ((e) ×10, (f) ×40). (g and h) Bcl-2 staining the cells within the germinal centres strongly ((a) ×10, (b) ×40). (i) Low Ki67 intensity. (j) Patchy S100 staining of interfollicular dendritic cells.](CRIM.PATHOLOGY2013-481937.001){#fig1} [^1]: Academic Editors: A. Rajput and A. N. Walker
{ "pile_set_name": "PubMed Central" }
const help = (): void => { console.log(` bottender line <command> <action> [options] `); }; export default help;
{ "pile_set_name": "Github" }
Podocarpus steyermarkii Podocarpus steyermarkii is a species of conifer in the family Podocarpaceae. It is found only in Venezuela. References Conifer Specialist Group 1998. Podocarpus steyermarkii. 2006 IUCN Red List of Threatened Species. Downloaded on 10 July 2007. steyermarkii Category:Least concern plants Category:Taxonomy articles created by Polbot
{ "pile_set_name": "Wikipedia (en)" }
Q: Trouble inserting dates into Oracle 11g Database I'm getting a missing comma error message which I can't seem to fix. My code is below. CREATE TABLE Customers ( C_Id int NOT NULL PRIMARY KEY, DOB date Age int, FirstName varchar(255), LastName varchar(255), City varchar(255), MemberSince int ); INSERT INTO Customers VALUES (C_Id.nextval,'TO_DATE( '02-DEC-1977', 'DD-MON-YYYY' )',37,'Joseph','Smith','Minneapolis',2004); A: This looks problematic to me: 'TO_DATE( '02-DEC-1977', 'DD-MON-YYYY' )' Try unquoting the TO_DATE like this: TO_DATE( '02-DEC-1977', 'DD-MON-YYYY' ) You might also need to create the sequence first: CREATE SEQUENCE C_Id MINVALUE 1 MAXVALUE 999999999999999999999999999 START WITH 1 INCREMENT BY 1 CACHE 20; CREATE TABLE Customers ( C_Id int NOT NULL PRIMARY KEY, DOB date, Age int, FirstName varchar(255), LastName varchar(255), City varchar(255), MemberSince int ); INSERT INTO Customers VALUES (C_Id.nextval,TO_DATE( '02-DEC-1977', 'DD-MON-YYYY' ),37,'Joseph','Smith','Minneapolis',2004);
{ "pile_set_name": "StackExchange" }
BUDAPEST, Hungary (AFP) — Hungarian Prime Minister Viktor Orban, one of Europe’s most controversial leaders, looks set to win a third consecutive term in office in elections on Sunday, despite a galvanized opposition tapping into voters’ discontent. The strongman nationalist’s Fidesz party enjoys opinion poll leads of between 20 and 30 percentage points over its closest rivals Jobbik, a far-right party led by Gabor Vona that has been moving towards the center, and the leftist Socialists with their candidate Gergely Karacsony. Opposition hopes of an upset are pinned on a potential surge in turnout due to simmering displeasure with the 54-year-old premier, in power since 2010. Get The Times of Israel's Daily Edition by email and never miss our top stories Free Sign Up A mainly first-past-the-post election system that was designed by Fidesz favors it over the fragmented opposition parties, but polls show around 40 % of the eight-million-strong electorate are undecided. Polls also show a slight majority of Hungarians favor a change in government, while civil groups have urged nationwide tactical voting to foil Fidesz candidates. “There is anger in the air, and danger for Orban if people turned off by politics in recent years vote en masse,” an analyst with Policy Solutions, Andras Biro-Nagy, told AFP. A clear win for Fidesz is still widely seen as probable and would cement Orban’s plan, declared in 2014, to mold ex-communist Hungary (population 9.8 million) into an “illiberal” state. It would also keep Orban at the forefront of the deepening division between the European Union’s western and eastern members. Since the 2015 migration crisis, Orban has cast himself as a defender of national sovereignty and “Christian Europe” against the “globalist elite.” His tough anti-immigration stance and verbal onslaughts against “Brussels bureaucrats” have gained him followers in central Europe, especially nearby Poland as well as far-right circles in western Europe and beyond. Brussels has hit back by suing Budapest over its refusal to join the EU refugee resettlement plan, as well as laws targeting civil society groups and a university linked to the Hungarian-born US Jewish liberal billionaire George Soros. If Fidesz loses on Sunday, “an internationalist government” backed by Soros, whom Orban accuses of orchestrating mass migration, will turn Hungary into a “country of immigrants,” the prime minister said last week. An Orban win on the other hand will see his rhetoric turn “increasingly confrontational,” an analyst with Political Capital, Edit Zgut, told AFP. “And Orban will likely become an even stronger point of reference for European radical-right forces,” she said. During the election campaign Orban has stepped up his long-running attacks on the Hungarian-born Soros which have included media blitzes called xenophobic and even anti-Semitic by detractors. Fidesz posters show the 87-year-old Jewish financier with opposition leaders brandishing wire-cutters ready to take down anti-migrant border fences Orban erected in 2015. Last month, the Hungarian government unveiled a tougher version of its package of planned laws targeting Soros-funded NGOs. As in the original version of the law drafted last month, a tax of 25 percent would be levied on foreign funding given to organizations considered to be “supporting” illegal immigration. The latest version would see NGOs having to undergo a “check” by the security services before being authorized to operate. “If NGOs refuse to apply for this permission, or if it’s refused, a fine will be levied, and if the violation continues, they could be banned from operating,” government spokesman Bence Tuzson told reporters on Tuesday. This particular measure would need a two-thirds majority in parliament Since 1979, the Jewish Hungarian-born Soros has plowed tens of billions of dollars into his Open Society Foundations (OSF), which in turn fund civil society groups around the world. In Hungary the money has helped organizations helping refugees — of whom there are few in Hungary — as well as poor people and minorities to get access to health care and education. Soros, whose money helped fund a young Orban’s studies and helped his Fidesz party get off the ground, rejects the accusations, calling them “distortions and outright lies.” Since sweeping into power with a two-thirds majority eight years ago, Orban has transformed Hungary, overhauling its state institutions and constitution. In recent years, his government’s tax policies have benefited an expanding upper middle class while the economy, powered by German car-makers and EU budget transfers, has been picking up. “We need four more years in power to make our achievements irreversible,” Orban said in November. But critics at home and abroad, including in Brussels and Washington, claim that Orban’s reforms have eroded democratic institutions like the judiciary and the press, and that his clampdown on civil groups apes tactics used by Russian President Vladimir Putin, a regular visitor to Budapest. “Hungary is drifting away from Europe toward the Russian sphere of influence,” the Socialists’ Karacsony told AFP. Last month Orban pledged to take “moral, political and legal retribution” against opponents after the election, an apparent threat that alarmed opposition parties. While the Fidesz election campaign, anchored by the slogan “For us, Hungary is first!” has focused solely on high-pitched warnings about Muslim and African migrants, Orban himself has shunned debate with rivals and appeared in public only at carefully choreographed events. His aura of invincibility has been shaken though by a wave of recent corruption scandals involving close allies and family members that have heightened unpredictability about Sunday’s result. After a bruising campaign, analysts say Fidesz is now unlikely to secure a third consecutive two-thirds majority in the 199-seat assembly, but would only lose an absolute majority if turnout tops 70 percent. “Whoever does not vote Sunday is voting for Orban,” said Jobbik’s Vona.
{ "pile_set_name": "OpenWebText2" }
Postgraduate training program for the diagnosis and follow-up of cancer: experience of the University of Oviedo, Spain. In anticipation of the expected worldwide increase in cancer deaths, the University of Oviedo in 1987 launched a two-year-long doctorate program entitled "Training Programme for the Diagnosis and Follow up of Cancer." The course was organized in three modules, General Basis, Methods, and Applications. Doctoral candidates acquired experience in these areas by means of theoretical lessons, practical work, and seminars with required preparation of special projects. From 1987 to 1990, 30 doctoral candidates completed the program. Some developed impressive projects and doctoral theses on aspects of cancer in the course of the program, which was offered twice, in 1987-88 and in 1988-89.
{ "pile_set_name": "PubMed Abstracts" }
Q: how to extends and override array methods in typescript now I want to implement an array proxy. here's my code class ArrayProxy<T> extends Array<T> { constructor(data: T[]) { super(...data); } push(...items: T[]): number { var res = super.push(...items); console.log("push invoked!"); // some code to do extra operation. return res; } } var foo = new ArrayProxy(["aa","bb"]); foo.push("cc"); it seems that my override push methods was not invoked. and the foo variable is instance of Array other than ArrayProxy. my typescript version:2.3.2 tsconfig.json { "compilerOptions": { "emitDecoratorMetadata": true, "experimentalDecorators": true, "moduleResolution": "classic", "target": "es5", "module": "system", "outFile": "js/test.js" } } MyTest i looked for some solution but failed. class MyNewArray<T> extends Array<T> { getFirst() { return this[0]; } } var myArray = new MyNewArray<string>(); myArray.push("First Element"); console.log(myArray.getFirst()); // "First Element" from David Sherret but i got error. Uncaught (in promise) Error: myArray.getFirst is not a function Evaluating http://localhost:8080/application/test/application/ts/bind_test Loading application/ts/bind_test at Object.execute (test.js:1733) at j (system.js:4) at E (system.js:4) at O (system.js:4) at system.js:5 update it works when i add Object.setPrototypeOf(this, ArrayProxy.prototype); after the super call in ArrayProxy's constructor. thanks to @Aluan Haddad. A: Subclassing built-ins is currently broken. It is also extremely dangerous because when the code execute in es2015 compliant environments it will fail for functions like Map. Use composition and avoid these techniques. See here for reference: https://github.com/Microsoft/TypeScript-wiki/blob/master/Breaking-Changes.md#extending-built-ins-like-error-array-and-map-may-no-longer-work
{ "pile_set_name": "StackExchange" }
Q: can't rebuild solution after entering a pre-build command line I have just upgraded my visual studio to the 2015 edition. I have a solution with just two project. I can rebuild the solution and run the code fine. However I have an issue when I enter a parameter in the Properties > Build Events > Pre-build event command line. I have simply entered the following in the text box, /MTEST When I try to rebuild the solution I get the error message "The command "/MTEST" exited with code 9009". static void Main(string[] args) { if (args.Length == 0) NormalMonring(); else { for (int i = 0; i < args.Length - 1; i++) { switch(args[i].ToUpper()) { case "/AUTO": //code case "/MTEST": // code break; } } } } I have done something similar to this before and not had any issues don't understand what is happening? A: Pre-build event command line is meant for running command line programs before the build. Like if you have something that generates code that you will then build. If you are looking to pass that value to your console application when you debug it then you can set it in Debug->Start Options->Command line arguments.
{ "pile_set_name": "StackExchange" }
Q: How exactly does the Web spell work? A player in my group plays a Wizard who favors terrain controlling spells. One such spell that he uses is Web. Up to this point he would cast Web and it would spread on the ground, with it's effects as normal. Now after reading the spell myslf, I'm not so certain if it's supposed to work that way. The first paragraph states that the webs must be mounted between solid anchors: Web creates a many-layered mass of strong, sticky strands. These strands trap those caught in them. The strands are similar to spiderwebs but far larger and tougher. These masses must be anchored to two or more solid and diametrically opposed points or else the web collapses upon itself and disappears. I read this as two trees, or two pillars, etc, and not just spread on the ground. It says without these anchors the web just collapses and disappears. However, it also says that it effects a range of a 20 ft radius. Having it spread horizontally across the ground to me seems counter to the nature of it having to be anchored. But then does it spread vertically? The wording on this is very confusing and I'd like a second opinion before I do or do not return to my player and inform him he may or may not have been using Web incorrectly. A: All Area of Effect Spells are Three-Dimensional Unless Otherwise Specified Note the use of the phrase many-layered in the Web description. All areas of effect in 3.PF are fully three-dimensional unless, such as in the Blade Barrier spell, a different area is specified. Web does not specify that it isn't three-dimensional and as such takes up the entire space of its area between the two anchor points. As far as that not making physical sense...friend, it's Pathfinder. This is pretty high on the 'making physical sense' scale. Rules don't translate well to physics. A: You are correct, the Web needs to be anchored between walls, pillars, a floor and ceiling, etc. It can't be cast "out in the open" and it doesn't cover the floor like a rug. (It covers the entire radius, so it's effective against flying folks). A: Web does not work in the open, per se. If cast on a group in the open, it will exist between them, but not outside that group, per the description. In an enclosed space, however, it creates a stable mass. In a tunnel, it typically fills the tunnel for the effect diameter's length, in other words, 40' of tunnel up to about 10' wide and tall. in a crevass or ravine, it will create a sphere, chopped at the walls, but may have open space above and below. in a large, but not tall, room, like a 60x90' throne room with a 20' ceiling, it will create a roughly 30' diameter cylinder of web, stretched floor to ceiling. in a collonade more than 40' tall, it will create column width lines of web connecting all pillars within the radius of effect; if the effect is centered at waist height, this happens with a 20' or taller ceiling. If the outer walls are beyond the radius, then no connection to them happens. A generous GM might allow an angled "opposed" position, but that violates the intent.
{ "pile_set_name": "StackExchange" }
Dreamkiller Dreamkiller is a dark fantasy first-person shooter where the player takes on the role of Alice Drake, a psychologist with the ability to enter the minds of her patients to fight the monsters appearing in their dreams. The game is developed by Mindware Studios and published by Aspyr for Microsoft Windows. Gameplay The gameplay is heavily based on Painkiller. The player progresses through various levels, battling hordes of monsters. There are different weapons for the player to use, from a fire spell to a minigun. The action takes place in dreams, so locations are all based on a person's personal phobia: a zoo infested with spiders, an arctic area full of sunken ships, a factory-like place filled with living machinery, a hospital, a twisted forest, and more. Each level is preceded by a comic-like cutscene, and is usually culminated with a battle against a boss, which is an enforced version of an enemy previously encountered. The game has its own achievement system. Plot Alice Drake is a very special psychologist, who enters her patients' dreams and battles their fears, which take forms of insane monsters. As the game progresses, she is confused by the fact that the number of her patients suddenly increases, and their fears becomes more and more insane, usually manifesting and creating phobia suddenly, without a proper medical history. As she clears the minds of her patients, she learns of an evil entity, the Dream Devourer, that feeds on human dreams, corrupting them and bringing insanity. Eventually, she is forced to battle in her own mind, where she finds a way to locate the entity. In order to put an end to insanity it brought to the real world, she enters the Dream Devourer's domain and slays it. Reception Dreamkiller received an aggregated rating of 47 on Metacritic, indicating a "generally unfavorable" response with the highest rating being 70/100. GameSpot gave the game a 5/10, praising its level and enemy design but criticizing the gameplay for not being engaging. IGN gave the game a lower score of 4.2/10, criticizing it for being "tedious and repetitive". References Category:2009 video games Category:Dark fantasy video games Category:First-person shooters Category:Video games developed in the Czech Republic Category:Video games featuring female protagonists Category:Video games about dreams Category:Fictional characters with dream manipulation abilities Category:Windows games Category:Windows-only games Category:Cancelled Xbox 360 games
{ "pile_set_name": "Wikipedia (en)" }
Guy Chichester Guy Chichester (February 11, 1935 – February 8, 2009) was a founding member of the Clamshell Alliance, an anti-nuclear group that led protests against Seabrook Station Nuclear Power Plant in the 1970s, which led to a broader environmental movement. Though the Seabrook power plant was eventually built, a planned second reactor at the site was cancelled. Several acts of protest at Seabrook, including one large demonstration that resulted in nearly 1,500 arrests, contributed to a turn public opinion against nuclear power in the USA in the 1970s. Then Governor Meldrim Thomson, a vocal supporter of the Seabrook plant, was defeated for re-election in 1978, in large part because of voter dissatisfaction over the rising cost of plant construction. A few years before the Seabrook protests, Chichester helped rally opposition to a plan by Aristotle Onassis to build an oil refinery on Great Bay in Durham, New Hampshire. He helped establish the national Green Party. Chichester was also a local organizer for George McGovern's 1972 presidential campaign. Chichester was born and raised on Long Island, New York. He was a carpenter by trade. See also Anti-nuclear movement in the United States Anti-nuclear protests in the United States Paul Gunter References External links Right or wrong, Seabrook foe stood up Category:1935 births Category:2009 deaths Category:American anti–nuclear power activists Category:Nonviolence advocates
{ "pile_set_name": "Wikipedia (en)" }
Q: What is proper way to stream media with Spring MVC I have a controller method that simply streams bytes for media (images, css, js, etc.) to the client. I first tried something like this: @RequestMapping(value="/path/to/media/**", method=RequestMethod.GET) @ResponseBody public byte[] getMedia(HttpServletRequest request) throws IOException { //logic for getting path to media on server return Files.readAllBytes(Paths.get(serverPathToMedia)); } I originally tested this in Firefox, and it all seemed to work fine. However, I then tried it in Chrome, and then found that none of the images work. So, I then changed it to something like this: @RequestMapping(value="/path/to/media/**", method=RequestMethod.GET) public ResponseEntity<byte[]> getMedia(HttpServletRequest request) throws IOException { //logic for getting path to media on server byte[] bytes = Files.readAllBytes(Paths.get(serverPathToMedia)); //logic for setting some header values like Content-Type and Content-Length return new ResponseEntity<byte[]>(bytes, headers, HttpStatus.OK); } This gave the same results as before. I saw in the developer tools that my response headers were coming down as expected, but still no image bytes Next I tried something like this: @RequestMapping(value="/path/to/media/**", method=RequestMethod.GET) public void getMedia(HttpServletRequest request, HttpServletResponse response) throws IOException { //logic for getting path to media on server byte[] bytes = Files.readAllBytes(Paths.get(serverPathToMedia)); response.getOutputStream().write(bytes); } Without even setting any response headers, this works in Firefox and Chrome. Now, while I can just do it this last way since it works, this doesn't seem like the correct Spring MVC way. I want to know why the first two things I tried didn't work, as they seem more correct. Also, is there something I didn't try that would actually be the right way to do this? A: Your last approach is pretty much the way to go about it. The only change that I can suggest is to not keep the entire content file to be streamed in memory, instead to stream out the content with buffering - IOUtils from Apache commons can do this for you.
{ "pile_set_name": "StackExchange" }
Pennsylvania, Connecticut, Delaware, Minnesota and Massachusetts rounded out the top six states with the highest average amount of undergraduate student debt: Recent grads in these states carry over $31,500 on average. The report, published annually, breaks down both the percentage of students carrying undergraduate student loan debt, and the average amount each graduate owed in every state (with the exception of North Dakota, where there was insufficient data). TICAS's report used the most up-to-date data based on the Class of 2016. Students in the Northeast have the heaviest burdens. Nearly 75 percent of college graduates in New Hampshire have outstanding student loans and they owe an average of $36,367 — that's the highest rate in the country, according to the Institute for College Access and Success's 12th Annual Student Debt report . Student loan debt in the U.S. now totals more than $1.5 trillion , but students in some states are getting hit harder than others. It makes sense that the Northeast states are carrying higher student loan debt, according to Adam Minksy a lawyer specializing in student loan law. "Certain states have less robust, affordable state education systems," Minsky tells CNBC Make It. States like California and Florida have major state universities that are both affordable and prestigious, so many students end up going to these institutions and taking on less debt, Minsky says. However, states such as New Hampshire and Massachusetts host Ivy League schools — including Dartmouth College and Harvard University — as well as private universities that may be less affordable. And while several Ivy League schools offer generous financial aid packages, other elite, expensive private universities don't always offer the same level of support. Utah has the lowest average rate of student loan debt in the U.S., $19.975, and the state's most popular colleges are public schools with in-state tuition of less than $6,000: Utah State University, Weber State University and Utah Valley University. New Mexico, California, Arizona, Nevada and Florida round out the states with the lowest levels of student loan debt, all with average levels under $25,000. This is well below the average debt of $32,731 owed by graduates of the Class of 2016. More and more, high school students and their families are getting very practical when it comes to picking a college. "I was told by everyone to go to the best school you can get into, even if it's more expensive, it will be a good investment," Minsky says. "Now we're starting to see a shift toward making responsible financial choices about college." Don't miss: A 28-year-old went on a game show to pay off $41,000 in student loans—and won $24,000 Like this story? Subscribe to CNBC Make It on YouTube!
{ "pile_set_name": "OpenWebText2" }
Sony Xperia Ion Review: Punching Above Its Weight Class 0 Short Version: It’s been a long time since Sony released a smartphone in the U.S. market that had a chance of hitting it off with customers — too many of their recent releases have either been meant for niche markets (the Xperia Play 4G) or were expensive and unlocked (nearly all of these things). That said, they’re looking to give it another go with the new Xperia ion, and it certainly looks like it could go all the way. It’s the company’s first LTE-enabled phone to land in the United States, it packs a much touted camera, and it’ll only set AT&T customers back $99. What’s not to like? Read on for all the juicy details. Features: 4.6-inch 720p Reality Display and Mobile Bravia engine Runs Android 2.3.7 Gingerbread 1.5GHz dual-core Snapdragon S3 processor 1GB of RAM 16GB of onboard storage, can take up to an additional 32GB microSD card NFC 12MP rear-facing camera (records video in 1080p) with Exmor R sensor 1.3MP front-facing camera Runs on AT&T’s 4G LTE and HSPA+ networks MSRP: $99 with a two-year contract, available June 24 Pros: Rock-solid camera Impressive 4.6-inch display Aggressive price point Cons: Why does this thing run Gingerbread? Finicky capacitive Android buttons Peculiar button placement on the Ion’s side puts form ahead of function Long Version Hardware & Design: Looking at the Ion dead-on doesn’t leave you with much of an impression — the Ion’s face is clad in black, and is dominated by the 4.6-inch Reality Display. A terribly small speaker grill is nestled right along the device’s top edge, and a row of small capacitive Android buttons (more on them later) sit just above the Sony logo on the Ion’s chin. In short, it’s not much of a looker from the front, and it lacks the quirky characteristics (think the color palette of the Xperia U and the nifty transparent sliver of the Xperia P) that helped some of its recent predecessors stand out in a crowd. Lack of style isn’t my only issue with the device’s face; that row of capacitive buttons took quite a bit of getting used to. I’m not sure if it’s just because I have weird thumbs or what, but it can be a real struggle at times to register a touch on those buttons. They’re rather small (which doesn’t help things at all), and it often takes a more concerted press than one would expect to make things work the way they should. It may seem like a minor thing to get worked up over, but the effect is cumulative — having to touch the same button two or three times to make the device bend to my will for a few days isn’t too taxing, but it could make for some real headaches for people who actually take a chance and buy the thing. Things get a little better upon turning the device over, which reveals a similarly understated design. Strangely though, I think this is where the Ion actually shines a bit. A handsome dark metal backplate (that’s sadly prone to attracting smudges) takes up most of the Ion’s rear end and is bound on the top and bottom by a pair of removable plastic caps that hide both a microSD and a micro-SIM slot. The only bit of branding back there is the iconic green Sony orb plopped right above the Xperia logo, and I frankly like it that way. The other thing to note about the Xperia’s back is that it gently curves to fit your hand, something that helps hide its 11.68mm waistline. That curve coupled with that metallic backplate imbues the Ion with a sturdy, comforting feel in spite of the fact that it weighs in at only 4.9 ounces. That said, I take some issue with the way Sony crafted the sides of the device — the edges were designed in such a way that the power, volume, and camera buttons are mounted at an angle. The buttons themselves aren’t any harder to physically press, but their angled placement means they’re not quite where your fingers expect them to be. This is especially prominent when trying to use the two-stage camera shutter button — my finger naturally gravitates to the highest point on the edge of the device, which often tricks me into applying pressure exactly where the shutter button isn’t. Again, it may seem like a minor thing to get worked up over (and users may get used to it in time even if I didn’t), but it’s annoying to see how Sony’s sense of aesthetics have made it slightly more difficult to use the phone the way I want to. Software: Gingerbread, I wish Sony knew how to quit you. Perhaps I’m a bit jaded — after having used an Ice Cream Sandwich device as my daily driver for the past few months, going back to a lightly-tweaked take on Android 2.3.7 Gingerbread for nearly a week didn’t seem like a tempting proposition. Sony maintains that the device will gets its Ice Cream Sandwich update in due course (the Xperia S just got its own ICS update a few days ago), but really — it’s the middle of 2012 and Ice Cream Sandwich first hit the scene toward the end of last year. It may just be one of the pitfalls that needs to be dealt with when mid-range devices are concerned, but I can’t quite shake the feeling that a solid handset isn’t quite living up to its potential because of Sony’s decision on this front. Anyway, I’m not going to get too caught up in pondering the sort of device the Ion might have been, and Sony has done their part to try and freshen up this stale cookie. Longtime readers may know that I’m no great fan of what manufacturers do to the stock Android experience, but Sony thankfully hasn’t gone too crazy with their custom UI — save for a few particularly heinous widgets (Timescape and the large, love-em-or-hate-em Tools widgets in particular) I actually found myself enjoying some of what Sony came up with. The app launcher in particular seemed nice and clean, with apps being arranged on multiple horizontal scrolling pages a la Ice Cream Sandwich. What made the whole thing even better was the fact that Sony didn’t completely load the device up with bloatware or plugs for their myriad media services — Sony only preloaded a few apps and at least some of them are rather useful. Sony’s LiveWare manager app for instance is a scaled down version of Tasker, which prompts user-defined apps to spring to life when accessories like headphones or power cables are connected to the Ion. And just like clockwork, Sony’s Timescape social app makes yet another appearance here. The app pulls in tweets, Foursquare check-ins, Facebook status updates, and LinkedIn updates into a vertical stream of social information that’s at the same time visually striking and super smooth to scroll through. Just do yourself a favor and stay away from the fugly widget. Of course, since AT&T is selling this thing, you can expect the full complement of carrier bloatware apps to round out the package. All the usual suspects are present and accounted for (I’m looking at you especially, Yellow Pages), but to my great relief, tapping a small grid icon in the bottom right corner of the app launcher lets you delete most of them quickly and without prejudice. Kudos to Sony for making that process dead-simple. Camera: One of the Ion’s biggest claims to fame is its 12-megapixel rear-facing camera, which makes the device second only to HTC’s Titan II for the title of “beefiest cameraphone” on AT&T’s store shelves. Thankfully, I’m pleased to report that Sony’s claims aren’t just marketing fluff — this is one of the nicer smartphone cameras I’ve used in quite a while. But first, let’s address some of the mechanical bits. Holding down the two-stage shutter button while the phone is locked lets users jump straight into the camera app while the device is locked, which sounds great except for one thing — by default the camera app is set to snap a picture as soon as someone uses the shutter button to unlock it. That’s right, it just takes a picture as soon as the phone wakes up, which means that you’ll have no clue how well you’ve framed the shot or if the camera focused on the right subject until it’s too late. Thankfully all that requires is a quick settings tweak, and the rest of the camera experience is quite solid. The process of auto-focusing and actually snapping a photo was awfully quick — just under three seconds to focus, shoot, and return to standby mode. Once inside the camera app proper, users can select from a number of different scene modes (though the default scene recognition mode is smart enough to accurately handle most situations) and shoot panoramas to boot, but there isn’t much in the way of manual controls outside exposure and metering settings. Of course, all that would mean nothing if the photos didn’t turn out well. Fortunately, colors were bright and vibrant, though perhaps to the point of being slightly over-saturated at times (more on that in a moment). Low-light performance wasn’t too shabby either, but the Ion’s Exmor R sensor isn’t a miracle worker — there was still quite a bit of grain present in shots taken in darker locales. C’est la vie. The Ion can also record 1080p video at 30fps, and results were generally passable — test recordings generally displayed plenty of detail, and additional features like image stabilization and the ability to light up the LED flash came in quite handy. The process isn’t entirely flawless though, as the camera tends to take a few extra moments getting into focus when you’re ready to begin shooting and the image stabilization can occasionally be hit or miss. Now, about that over-saturation issue I was talking about — it’s not entirely the camera’s fault. It’s worth noting that the images look extra vivid on the device itself thanks in part to Sony’s use of their Mobile Bravia engine, and that their level of vibrance will vary once you move those photos onto other devices. And speaking of which… Display: Since the Ion is the first Sony smartphone I’ve worked with in a while, I wasn’t quite sure what to expect from its 4.6-inch, 720p Reality Display. As such, seeing the bright, crisp display come to life for the first time was actually a bit of a surprise — sure, it lacks the deep blacks seen on AMOLED displays but the LCD panel Sony’s using is no slouch (especially since at 342 ppi it beats the Galaxy S III and the iPhone 4S at the pixel density game). The display’s viewing angles are actually quite good, though prepare for the colors to wash out a bit the further you move away from dead center. The screen’s performance in daylight seemed respectable at best. Since Sony doesn’t include an option to automatically set screen brightness, you’ll have to manage that yourself should you decide to venture into the outside world, and the screen tends to get overwhelmed unless brightness is cranked up full blast. As I’ve mentioned before, Sony’s Mobile Bravia engine plays a significant role in how images and video appear on that sizable screen. With the Bravia option on (note: it’s on by default) colors were vibrant and vivid to the point of being slightly lurid at times — this was especially apparent in one of my test videos, where the Xperia ion tended to make a stage lit mostly in blue take on a notably purple cast. It wasn’t necessarily a bad change (I actually think it gave the video some cinematic flair), but not everyone may enjoy the effects engine has. In addition to pumping up colors, the Bravia engine also sharpens the image, leading to the double-edged sword of slightly crisper images and video versus the potential annoyance of seeing more jaggies. Occasionally nuclear colors aside, I think leaving the Bravia engine on is generally a plus; it adds a bit of pop to the viewing experience, and it’s simple enough to shut down if it gets to be too much. For a closer look at the difference, take a look at this image — the left side is a screenshot of a photo I took with the Bravia Engine off, and the right is a screenshot of same image with the Bravia Engine on (click to enlarge). Performance: The Ion’s spec sheet would’ve been considered top-tier just last year, but my how times have changed since then. We’ve since entered the age of the quad-core chipset (even though most of them don’t end up on U.S. soil), but the 1.5GHz dual-core Snapdragon S3 processor nestled inside the Ion’s curved frame still has plenty of game. The device seemed plenty responsive when put to the usual gamut of daily tasks — swiping between menus was buttery smooth, as was pulling down the notification drawer and scrolling through my innumerable contacts. Similarly, I had no trouble at all watching Top Gear reruns on Netflix or building obtuse structures in Minecraft Pocket Edition. If you want to break things down numerically, the Ion managed to squeeze out an average Quadrant score of 2872, which roundly put to shame my trusty Galaxy Nexus (average: 1812). It’s still a long ways off from HTC’s ostensibly mid-range One S (generally around 4-5000 depending on the circumstances), but the Ion certainly has enough horsepower to be a daily driver for all but the most demanding users. In terms of network performance, I’m loath to admit that I couldn’t latch onto an LTE signal in my particular corner of New Jersey (a problem that I imagine isn’t unique to me considering AT&T’s LTE network is only live in 41 cities), but I managed to pull down an average of 7.3 Mbps down and 1.3 Mbps up. It doesn’t sound great, but the Ion actually performed slightly ahead of other AT&T devices — namely an iPhone 4S and an unlocked Galaxy Nexus — I tested alongside it. Though one of the Xperia Ion’s main draws is going to be that nifty camera, Sony is positioning it as more than just a media creator — it’s also a media hub. As you might expect from a company that launched the working group behind it, the Ion is DLNA certified, and it was a snap to get it linked up with my DLNA-compatible LG smart television and media server. From there, I was able to fire up the included Connected Devices app and sling my media onto the big screen. Streaming videos from my media server proved to be a breeze too, and it didn’t take long before Plex was serving up (dorky) content to the Ion. If you’ve got a micro-HDMI-to-HDMI cable handy, you can also connect the Ion directly to your television at which point something very interesting happens. Once the connection is in place, the Xperia swaps its stock launcher for an upscaled version meant to be displayed on a television, allowing users to fire up apps and pore through media on the phone. Provided you’ve got an HDMI-CEC (or SIMPLINK, or Viera Link, or whatever) compatible television, you’ll also be able to control the Ion with your television remote. The ability to take any compatible television and effectively turn it into a smart television set certainly has its appeal, and while it’s gimmicky and it’s fun, it’s hardly the kind of thing I’d want to use for any extended period of time. When it comes to sound, the Ion is actually sort of a mixed bag. Call quality was generally very clear, but even with the volume cranked all the way up, I still had trouble hearing the person on the other end of the line. The same goes for the Ion’s main rear-mounted speaker — for a device that’s so centered around media, you would think that Sony would have bothered to pop a better speaker in the thing. Even at maximum volume (which, again, doesn’t seem that loud) the speaker produces sound with muddy middles and almost non-existent lows. I’ll admit that I can’t be too surprised as it’s relatively rare to get an unabashedly good speaker in a smartphone, but I was a tad disappointed nonetheless. Battery: For better or worse (I usually lean toward the latter), Sony has opted to seal the Ion’s 1900 mAh battery under that black metallic plate I’m so fond of. Though the road warriors among you may miss the ability to swap out spare batteries as needed, the Ion does a fine job of chugging along throughout the day. Since I started using the Ion as my go-to phone earlier this week, I’ve averaged about eight to nine hours of consistent use each day — checking my email, firing off text messages, watching the same clip of a tap dancing Broadway starlet over and and over — you know, my usual routine. If you’re not the sort to check your phone at every possible moment, you can expect to squeeze closer to 13 hours out of the thing before needing to juice up again. If you’re planning to binge on some video content though, expect that figure to plummet to roughly six hours, and that’s if you’re mighty careful with all the rest of your settings. Head-To-Head With The HTC One S And iPhone 4S: Conclusion: For all of the Ion’s foibles (and there are quite a few), there’s still plenty to like here. The Xperia Ion definitely leans to the more premium end of the mid-range spectrum, and it tries valiantly to punch above its weight with features like its solid camera, media functionality, and great display. Its price tag too makes a pretty compelling statement — there are far worse things you could get for $99. Ah, but the real question is whether or not it’s worth your money. I was originally going to say that if you’re in the position where you really can’t justify spending an extra $100 on a top-of-the-line smartphone, then the Ion will do in a pinch. Now that I’ve thought about it a bit more, that’s selling the Ion a bit short. Despite how harsh I may have been with some of my comments, I really do think the Ion is a good phone. The problem here is that like with many mid-range phones, the Ion straddles that very fine line between “good” and “great,” and it doesn’t seem to have quite enough oomph to push it over the edge. Strangely enough, this may well change down the line — with a few minor tweaks and perhaps a helping of Ice Cream Sandwich, the Xperia Ion may eventually grow to become a must-buy, but it’s not quite there yet.
{ "pile_set_name": "Pile-CC" }
UberResearch's Seed Round UberResearch provides organizations with a cloud-based platform, tools and data to award, manage, analyze and report on the funding of scientific research. They have a view of its grant data, peer org…
{ "pile_set_name": "Pile-CC" }
EP 63 The Allied Mom Force!! Konohamaru is eager to guard the village but is quickly discouraged by the adults who tell him to just go about his day as usual, but Konohamaru suspects that an enemy might be planning to attack the village.
{ "pile_set_name": "OpenWebText2" }
The Christian includes, he does not close the door to anyone, even if this provokes resistance. He who excludes, because he believes himself to be better, generates conflicts and divisions, and does not consider the fact that “we shall all stand before the judgment seat of God.” That was the message of Pope Francis during Thursday morning’s Mass at Casa Santa Marta. In the Letter to the Romans, St. Paul exhorts us not to judge and not to despise our brothers, because, the pope said, this leads to excluding them from “our little group,” to being selective, and this is not Christian.” Christ, in fact, “with his sacrifice on Calvary” unites and includes “all men in salvation.” In the Gospel, publicans and sinners draw near to Jesus – “that is, the excluded, all those that were outside,” – and “the Pharisees and the scribes complained”: “The attitude of the Scribes and the Pharisees is the same, they exclude. [They say,] ‘We are the perfect, we follow the law. These people are sinners, they are publicans’; and the attitude of Jesus is to include. There are two paths in life: the path exclusion of persons from our community and the path of inclusion. The first can be little but is the root of all wars: all calamities, all wars, begin with an exclusion. One is excluded from the international community, but also from families, from friends – How many fights there are! – and the path that makes us see Jesus and teaches us Jesus is quite another, it is contrary to the other: to include.” “It is not easy to include the people,” Pope Francis said, “because there is resistance, there is that selective attitude.” For this reason, Jesus tells two parables: the parable of the lost sheep, and the parable of the woman and the lost coin. Both the shepherd and the woman will do anything to find what they have lost, and when they find it, they are full of joy: “They are full of joy because they have found what was lost and they go to their neighbours, their friends, because they are so happy: ‘I found, I included.’ This is the ‘including’ of God, against the exclusion of those who judge, who drive away people, persons: ‘No, no to this, no to that, no to that…’; and a little of circle of friends is created, which is their environment. It is a dialectic between exclusion and inclusion. God has included us all in salvation, all! This is the beginning. We with our weaknesses, with our sins, with our envy, jealousies, we all have this attitude of excluding which – as I said – can end in wars.” Jesus, the pope said, acts like his Father, who sent him to save us; “He seeks to include us,” “to be a family.” “We think a little bit, and at least – at least! – we do our little part, we never judge: ‘But this one has acted in this way…’ But God knows: it is his life, but I don’t exclude him from my heart, from my prayer, from my greeting, from my smile, and if the occasion arises I say a good word to him. Never excluding, we have no right! And how Paul finishes the Letter: ‘We shall all stand before the judgment seat of God . . . then each of us shall give an account of himself to God.’ If I exclude I will one day stand before the judgment seat of God, I will have to give an account of myself to God. Let us ask the grace of being men and women who always include, always, always! in the measure of healthy prudence, but always. Not closing the doors to anyone, always with an open heart: ‘It pleases me, it displeases me,’ but the heart is open. May the Lord grant us this grace.”
{ "pile_set_name": "OpenWebText2" }