text
stringlengths 0
6.48M
| meta
dict |
---|---|
////////////////////////////////////////////////////////////////////////////////
/// DISCLAIMER
///
/// Copyright 2014-2020 ArangoDB GmbH, Cologne, Germany
/// Copyright 2004-2014 triAGENS GmbH, Cologne, Germany
///
/// Licensed under the Apache License, Version 2.0 (the "License");
/// you may not use this file except in compliance with the License.
/// You may obtain a copy of the License at
///
/// http://www.apache.org/licenses/LICENSE-2.0
///
/// Unless required by applicable law or agreed to in writing, software
/// distributed under the License is distributed on an "AS IS" BASIS,
/// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
/// See the License for the specific language governing permissions and
/// limitations under the License.
///
/// Copyright holder is ArangoDB GmbH, Cologne, Germany
///
/// @author Simon Grätzer
////////////////////////////////////////////////////////////////////////////////
#ifndef ARANGOD_AQL_CLUSTER_QUERY_H
#define ARANGOD_AQL_CLUSTER_QUERY_H 1
#include "Aql/Query.h"
#include "Cluster/ClusterTypes.h"
#include "Futures/Future.h"
namespace arangodb {
namespace aql {
// additonally contains TraversalEngines
class ClusterQuery final : public arangodb::aql::Query {
public:
/// Used to construct a full query
ClusterQuery(std::shared_ptr<arangodb::transaction::Context> const& ctx,
QueryOptions&& options);
~ClusterQuery();
traverser::GraphEngineList const& traversers() const {
return _traversers;
}
void prepareClusterQuery(arangodb::velocypack::Slice querySlice,
arangodb::velocypack::Slice collections,
arangodb::velocypack::Slice variables,
arangodb::velocypack::Slice snippets,
arangodb::velocypack::Slice traversals,
arangodb::velocypack::Builder& answer,
arangodb::QueryAnalyzerRevisions const& analyzersRevision);
arangodb::futures::Future<Result> finalizeClusterQuery(int errorCode);
private:
/// @brief first one should be the local one
arangodb::traverser::GraphEngineList _traversers;
};
} // namespace aql
} // namespace arangodb
#endif // ARANGOD_AQL_CLUSTER_QUERY_H
| {
"pile_set_name": "Github"
} |
Q:
Detecting Specific PWM Signal Without Programming (Only Electronics Components)
I want to detect a specific PWM signal by electronic circuit components i.e. transistors, opamps, capacitors.
update:
I want to build simple ID system. I want to detect specific PWM signal for example 65% with 5% resolution at 1kHz. If 65% PWM signal comes as an input I want to make output circuit on. Other than 65% with 5% accuracy, I want to make output circuit off(low).
A:
You need a low pass filter follwed by a window comparator.
Here is a low pass filter:
This will greatly attenuate the 1 kHz pulse frequency leaving mostly its average value. The rolloff frequency of a single 10 kΩ 1 µF low pass filter is 16 Hz. The PWM frequency is about 63 times higher, so will be attenuated by about 63. Two of these in series will attenuate by the square of that, or by about a factor of 4000. For 5 V PWM in, the ripple should be less than 2 mV out.
To get a signal that indicates this smoothed output is between 60% and 70% of the supply, use two comparators to compare it to 60% and 70% of the supply. A resistor divider chain can make these reference signals:
Feed OUT and 70% into one comparator, and OUT and 60% into the other. A little hysteresis on each comparator is in order. You want it to be more than the remaining ripple on OUT at a minimum. Maybe 10 mV would be good.
Now you only need the appropriate logic gate to take the two comparator signals and make a single signal that indicates OUT is between the two thresholds. What kind of gate depends on what polarity you connected the inputs of the compartors with. For example, if OUT goes into the + input of both comparators, then you want a XOR gate. The output will be high when the outputs of the two comparators differ, which only happens when OUT is in between the 60% and 70% reference levels.
| {
"pile_set_name": "StackExchange"
} |
TEXAS COURT OF APPEALS, THIRD DISTRICT, AT AUSTIN
NO. 03-11-00268-CV
Trinity Riverchase, LP; Trinity Riverchase, GP, LLC;
Trinity Riverchase Homes, LLC; Araceli Lopez; Emilio de la Cruz;
Kerry S. Boykin; Candace Klockman; Emilio Narro; Matthew Williams;
Sylvia Rogers; Stephen Rogers; Luis Munoz; Imelda Hernandez;
Cherie Smith; Timothy Long; Rahea Reed; Misruthie Martinez;
Roberto Martinez; Cynthia Lee; Ginger Yount; Wayne Scott;
Marilyn Scott; Amador Perez; et al., Appellants
v.
Bastrop Appraisal Review Board; Bastrop County; Bastrop Independent School District;
Bastrop County Emergency Service District #2; et al., Appellees
FROM THE DISTRICT COURT OF BASTROP COUNTY, 335TH JUDICIAL DISTRICT
NO. 27,161, HONORABLE REVA TOWSLEE-CORBETT, JUDGE PRESIDING
MEMORANDUM OPINION
Counsel for appellants Trinity Riverchase, LP; Trinity Riverchase, GP, LLC;
Trinity Riverchase Homes, LLC; Araceli Lopez; Emilio de la Cruz; Kerry S. Boykin;
Candace Klockman; Emilio Narro; Matthew Williams; Sylvia Rogers; Stephen Rogers;
Luis Munoz; Imelda Hernandez; Cherie Smith; Timothy Long; Rahea Reed; Misruthie Martinez;
Roberto Martinez; Cynthia Lee; Ginger Yount; Wayne Scott; Marilyn Scott; Amador Perez; et al.,
and counsel for appellees Bastrop Appraisal Review Board; Bastrop County; Bastrop Independent
School District; and Bastrop County Emergency Service District #2; et al. have filed an
“Agreed/Joint Motion to Lift the Abatement and to Set Aside the Trial Court’s Judgment Without
Regard to the Merits and Remand the Case to the Trial Court for Rendition of Judgment,” permitting
them to enter an agreed judgment in the trial court in accordance with the parties’ settlement
agreement.
Accordingly, we grant the motion, lift the abatement, reinstate the appeal, set aside
the trial court’s judgment without regard to the merits, and remand the cause to the trial court for
further proceedings. See Tex. R. App. P. 42.1(a)(2)(b).
Jeff Rose, Justice
Before Chief Justice Jones, Justices Pemberton and Rose
Vacated and Remanded on Joint Motion
Filed: April 20, 2012
2
| {
"pile_set_name": "FreeLaw"
} |
MSM finally notices threats against politicians (sort of) *UPDATED*
From the moment Gov. Walker squared off against the public sector unions in Wisconsin, conservatives noticed something interesting: The mainstream media, which was all aflutter about politician safety after a paranoid schizophrenic aimed a gun at a Democratic Senator, wounding her and killing a heroic Republican judge), showed remarkable restraint in reporting about threats against a Republican governor and Republican senators. Indeed, the MSM’s restraint was so great, it failed to do any reporting at all.
Do you think of Republicans and the Tea Party as dangerous, violent extremists?
Do you think the Wisconsin protests over GOP Governor Scott Walker’s move to strip public sector employees of collective bargaining were peaceful?
Do you scoff at the right wing notion that mainstream media like the New York Times, the TV networks and NPR have a liberal media bias against the conservatives?
If you answered ‘yes’ to all three of those questions, then let me ask you one more…
Why isn’t the mainstream media talking about the death threats against Republican politicians in Wisconsin?
[snip]
Burying the death threat story is a clear example of intellectual dishonesty and journalistic bias.
Don’t take my word for it, though. Look into the story of death threats in Wisconsin yourself and see who has been covering the story and who hasn’t. Try for a moment to see this story from the perspective of those who you may disagree with on policy and ask yourself how this looks to them. Can you blame them for feeling that way? Then take a few seconds and read those questions I asked you at the beginning of this article.
And then ask why progressives shouldn’t expect more from our media — and ourselves — than we expect from our political adversaries.
I don’t respect Stranahan’s political beliefs, which are antithetical to mine, but I certainly respect his personal integrity and his honesty.
I’m happy to report that one news reporter, perhaps influenced by Stranahan’s post, finally realized the error of her ways and focused on the threats to conservative politicians. So it is that, today, the SF Chronicle has a front page story entitled “Threats directed at any state GOP.”
Isn’t that great? The Chron is reporting about threats against California conservatives.
Okay, I confess. I’m leading you down the primrose path. What the headline really says is “Threats directed at any state GOP ‘turncoats.’” In other words, the other threats against the GOP that the Chron seems willing to acknowledge are those coming from other members of the GOP.
But should California’s Republican politicians start barricading themselves in their houses and traveling with guards to protect themselves from their fellow party members? Are they having their outlines drawn in chalk on the sidewalk, their home addresses published, their children threatened? Well, not really. What’s actually happening is that California state GOP people are hearing from the grassroots that, if they don’t pay attention to calls for true conservatism, they won’t be reelected! How’s that for a front-page-worthy threat? Those crazy Tea Partiers know how to play mean and dirty.
I’m beginning to understand the threat algorithm in the MSM: Eight years of vile threats and imaginings against George Bush — ignore. Insane shoots Senator he’s been stalking for four years — blame Tea Partiers. Progressives and public union members threaten Wisconsin conservatives with death — ignore. Tea Partiers warn that they won’t reelect wobbly GOP members — phrase so vaguely on newspaper front page that it looks to the casual reader as if Tea Partiers are ready to kill their own.
Being a member of the Progressive MSM means you never actually have to think. How relaxing.
UPDATE II: When I wrote the above, I said that the SF Chron article was written to imply that Tea Party activists were actually violent. At the time, I didn’t have proof. Now I do. As reliably as a stopped clock, one of my liberal facebook friends wrote that the California GOP was made up of “thugs” who “beat the crap” out of people.
Share this:
I think this is the best part of what Mr. Stranahan said: “And then ask why progressives shouldn’t expect more from our media…” He said “our media.” He actually admitted it. This guy is either drowning in integrity or he made a little slip there. Either way, Hee!
MacG
The Reason this is not reported may be found in a letter to the editor of our local Pacific Sun:
“I believe in keeping one’s point short and sweet. In Mr. Fransen’s recent letter [“Hey, We’re ALL Appalled at Images of Former President Bush,” March 11] responding to my past letters about the Tea Party’s use of violent rhetoric in regards to progressives, he could have easily and honestly done this by just saying, “Neither I nor the Tea Party would ever condone the shooting of Gabrielle Giffords. But (secretly) we’re not complaining either”.
the last two sentences reveal the filter which they view the TEA Party – therefore we are not worthy of their time.
Writing this blog is a labor of love. However, if you'd like to donate money for my efforts, please feel free to do so: | {
"pile_set_name": "Pile-CC"
} |
Football is getting more high tech than ever this season, as the NFL has partnered with Microsoft to create the Sideline Viewing System. This system will allow players and coaches to digitally study the other team using Microsoft Surface tablets, a tactic which was previously done using printed photographs.
The use of Surfaces on the sidelines marks a shift in NFL regulations: this is the first time it is legal for teams to use electronic devices during a game. They were deployed for the first time at last night's Hall of Fame Game exhibition between the New York Giants and Buffalo Bills. NFL spokesperson Brian McCarthy told SFGate, "We think it's an opportunity to use technology to improve the game on the field."
The league itself will own and operate the tablets, providing each team with 25 total tablets for every game: 13 for the sidelines and 12 for the coaches' box. The NFL was careful to prevent any form of cheating with this new technology. The tablets are locked in a cabinet between games, they cannot view video, and they do not have Internet access. They will also keep the printers for traditional images on the sidelines, just in case.
Printed photos took 20 to 30 seconds to get to coaches, and were generally black and white and low resolution, whereas the Surface will only take about four seconds. Additionally, the new system will allow coaches to arrange up to four photos at once, to draw on the photos, and to bookmark them for future plays.
The $400 million partnership is just one of a few other high tech features being added to the league this season. Referees can now wirelessly speak to one another and they will be able to use the wireless headsets to speak to the NFL officials in New York who control instant replay reviews. Coaches will also given Bose headsets, a major step up.
Finally, both refs and players will being wearing tracking chips for location during some games. The players' radio-frequency identification transmitters will mark everywhere they roam on the field and be able to keep track of their performance. (Think of it as an all-star FitBit.) Made by Zebra Technologies, the transmitters will track location, speed and distance, and use that to churn out real-time data, giving statisticians a whole new level of numbers to crunch.
This article is from the archive of our partner The Wire.
We want to hear what you think about this article. Submit a letter to the editor or write to letters@theatlantic.com. | {
"pile_set_name": "Pile-CC"
} |
Cute Love Quotes Hate
Love Me for Who I AM Quotes
see more & bigger sizeThank You For Loving Me Quotes For Him. QuotesGram Added: November 6, 2012 | Image size: 480x360px | Source: love me for who i am quotes love me or
Cute Friendship Quotes for Guys
see more & bigger sizecute best friend quotes for a guy posted on Saturday, September 21st Picture Quotes , Love Picture Quotes , Relationships Picture Quotes Cute Quotes Tumblr for Him About Life for Her About Frinds For Girls
Complicated Love Quotes for Him
Anime Love Quotes for Him
see more & bigger size Quotes About Love Sad Love Quotes For Her From Him The Heart Tumblr 30+ Heart Touching I Miss You Quotes funny love quotes for him from the heart MEMEs
Love Effort Quotes
see more & bigger sizeQuotes on Pinterest | Ignorance Quotes, Attraction Quotes and Quotes Psalm 22(Taken from the translation--- Todays New International Jumbled notes Life quotes.: 100 days of Happiness: Day 1
Tough Love Quotes for Teenagers
see more & bigger sizetough times picture quotes inspirational quotes for difficult times in Himym Quotes About Heartbreak. QuotesGram quotes for teenagers to abide by love quotes for high
Forever My Love Quotes
see more & bigger size love you baby forever i love you forever baby i love you baby forever My moms and my favorite book and one of my all time favorite quotes swear I will You are more than I could have ever dreamed of and
Falling in Love Quotes for Him
see more & bigger size are-falling-in-love-sweet-love-quotes-for-him-with-picture-275x310.jpg Falling Love Quotes For Him Falling a Heartbreaker |
Love Her Quotes for Instagram
see more & bigger size posts this quote from ‘Grey’s Anatomy’ on her Instagram account Love Her Quotes For Instagram. QuotesGram cute instagram quotes Google Search
Love Me Quotes for Him
see more & bigger sizeImage Love Quote: Tumblr Pictures Love Quotes To laugh often and love much…to appreciate beauty, to find the best will forever keep loving you! | {
"pile_set_name": "Pile-CC"
} |
A grease spell covers a solid surface with a layer of slippery grease. Any creature in the area when the spell is cast must make a successful Reflex save or fall. This save is repeated on your turn each round that the creature remains within the area. A creature can walk within or through the area of grease at half normal speed with a DC 10 Balance check. Failure means it can’t move that round (and must then make a Reflex save or fall), while failure by 5 or more means it falls (see the Balance skill for details).
The spell can also be used to create a greasy coating on an item. Material objects not in use are always affected by this spell, while an object wielded or employed by a creature receives a Reflexsaving throw to avoid the effect. If the initial saving throw fails, the creature immediately drops the item. A saving throw must be made in each round that the creature attempts to pick up or use the greased item. A creature wearing greased armor or clothing gains a +10 circumstance bonus on Escape Artist checks and on grapple checks made to resist or escape a grapple or to escape a pin. | {
"pile_set_name": "Pile-CC"
} |
As the value and use of information continues to increase, individuals and businesses seek additional ways to process and store information. One option available to users is information handling systems. An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, information handling systems may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated. The variations in information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications. In addition, information handling systems may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.
Information handling systems (such as computer workstations, desktop computers and portable computers), often employ low power states and storage techniques that limit the amount of power consumed by the systems during periods of inactivity while maintaining the operating state (e.g., loaded applications and data) of the system. One example of such a technique is a reduced power state known as “suspend” (alternatively “sleep” or “standby”). During one type of conventional suspend state (i.e., Advanced Configuration and Power Interface “ACPI” S3 power state), information (e.g., data and instructions) required to maintain the last working operating state of the information handling system is maintained in powered dynamic random access volatile memory (DRAM). While in such a suspend state, power to other unneeded circuitry of the system is cut off until the machine is woken up again for use, at which time power is restored to the other components of the system and the saved operating state information maintained in the powered memory used to restore the information handling system to its last working operating state. Using this conventional suspend technique, power is consumed by the powered memory at all times while the system is in the suspend state. Additionally, some types of information handling systems, such as servers, do not currently support S3 (suspend to RAM) state.
Another type of conventional low power technique commonly refers to “hibernation” copies all information (e.g., data and instructions) required to maintain the last operating state of the information handling system from powered DRAM memory to a non-volatile storage disk so that power to the powered memory of the information handling system may be cut off together with power to the other system components during the hibernation state (ACPI S4 state). Saving information to a storage disk during the low power S4 hibernation state requires less power than storing this information in powered DRAM during the low power S3 suspend state. However, saving information to non-volatile storage disk during S4 hibernation state requires additional time for entering and recovering from the hibernation state, making these operations slower. Using such a hibernation technique also requires a disk drive to spin up and then be read to restore the last working state data to DRAM when restoring a system from a very low power state. This process can be very slow, as copying and restarting can take a relatively long time, especially for large DRAM systems like servers. To help speed recovery from S4 hibernation state, all working state DRAM contents (OS, applications and data) may be stored in fast non-volatile storage. Saving recovery data to flash memory of a solid state drive (SSD) during hibernation may be employed to further speed recovery from the suspend state, but requires a lot of additional storage space on the SSD to be allocated for this purpose, which increases storage expense for the system.
An SSD controller cannot write over an unerased flash memory block. Erasing cells on solid state flash memory to prepare put a flash memory block in a state that allows writing is several orders of magnitude slower than the act of writing to the flash memory block. Therefore, SSD controllers typically reserve about 20% to 50% of the total capacity of an enterprise SSD for “data garbage collection” (i.e., for accumulation of data that is no longer to be saved). At any given time, this reserved data garbage collection space is either already erased (i.e., making writing of new data fast) or is in the process of being erased. It does not contain any saved data. In this way, the reserved data garbage collection space eliminates the need for a write operation to go through an erase cycle before its data can be written to the SSD. | {
"pile_set_name": "USPTO Backgrounds"
} |
American Spaces Impact Video Challenge Winners
In fall 2017, the Office of American Spaces invited all types of American Spaces to make a 90-second video to visually communicate how they make an impact in their missions. Judges included experts in digital communication and Office of American Spaces staff. The winners …of $3,000, $2,000 and $1,000 in extra support funding per region (SCA and NEA combined) are below. Scroll down for information about the contest. Thank you to all the nearly 50 American Spaces who participated!
American Spaces Impact Video Challenge
The Office of American Spaces is looking for visual stories that demonstrate how American Spaces are making an impact in their cities, countries or regions. The impact could be, for example, on an individual, the community, a particular issue, U.S. relations with the country, or the country itself. The video should tell your story in 90 seconds or less. The Office of American Spaces is offering awards of $3,000, $2,000 and $1,000 for the top three videos in each region, and we have extended the deadline for the contest until September 30, 2017. The awards will be added to FY 2018 American Spaces Support Fund allocations, so you will have plenty of time to obligate those funds.
This challenge is in keeping with the efforts of the Office of American Spaces to better evaluate the impact of American Spaces. In addition, to bring the video contest more closely in line with techniques taught in American Spaces training courses about using social media to market American Spaces, we ask that you post this video on your own Facebook or other social media platform and then post the link to the video in the American Spaces Community Forum. As a way to involve your community, you could challenge your patrons/visitors to make the video and you choose the best one to post.
The Office of American Spaces will use these videos in activities aimed at demonstrating and explaining to various internal and external audiences the value of the work that goes on every day in American Spaces around the world. | {
"pile_set_name": "Pile-CC"
} |
Q:
Why is my django file submission not posting?
I am busy building a conference website application where is is necessary to be able to upload articles. These articles should also be able to assigned to reviewers to get downloaded and scored. My problem comes with the uploading of the files. I am not sure what I am doing wrong, but I think my form is submitting the incorrect data since it doesn't run through the 'if form.is_valid:' part. I am still a beginner at this. I have watched multiple tutorials.
This is what my model.py file looks like:
from django.db import models
from time import time
def get_upload_file_name(instance, filename):
return "uploaded_files/%s_%s" % (str(time()).replace('.','_'), filename)
class Article(models.Model):
title = models.CharField(max_length=50)
abstract = models.TextField()
pub_date = models.DateTimeField('Date published')
ffile = models.FileField(upload_to=get_upload_file_name)
def __str__(self):
return "%s" % (self.title)
This is my admin.py file:
from django.contrib import admin
from .models import Article
admin.site.register(Article)
This is my forms.py file:
from django import forms
from .models import Article
class ArticleForm(forms.ModelForm):
class Meta:
model = Article
fields = ('title','abstract','pub_date','ffile')
This is my views.py file:
from django.shortcuts import render, render_to_response
from django.http import HttpResponseRedirect
from .forms import ArticleForm
def upload_article(request):
if request.method == 'POST':
form = ArticleForm(request.POST, request.FILES)
if form.is_valid():
instance = ArticleForm(file_field=request.FILES[''])
form.save()
instance.save()
return HttpResponseRedirect('/articles/')
else:
form = ArticleForm()
return render_to_response('submit/form.html', {'form' : form})
And then my HTML template:
{% extends 'base.html' %}
{% block content %}
<form method="post" action="../upload/" enctype="multipart/form-data"> {% csrf_token %}
{{form.as_p}}
<input type="submit" value="Submit" />
</form>
{% endblock %}
There is no problems with my urls.. Can someone please help me. Or at least suggest a third party app that might make this easier?
I can post normal forms that is not uploading files, but I just can't seem to get this one.
A:
Ok, so I found the solution to the posting problem.
models.py
from django.db import models
from django.forms import ModelForm
from time import time
# Function to determine where to place uploaded documents
# Taken from youtube tutorial: https://www.youtube.com/watch?v=b43JIn-OGZU&index=15&list=PLxxA5z-8B2xk4szCgFmgonNcCboyNneMD
def get_upload_file_name(instance, filename):
# return a string: folder_name/time-of-upload + seperated by underscore + filename
# Example: media_files/15-10-2015_Submission1
return "uploaded_files/%s_%s" % (str(time()).replace('.','_'), filename)
class Document(models.Model):
file = models.FileField( blank=False, null=True)
title = models.CharField(max_length=200, default=None)
def __str__(self):
return "%s" % self.title
class DocumentForm(ModelForm):
class Meta:
model = Document
fields = ['title', 'file']
forms.py
from django import forms
from .models import Document
class UploadFileForm(forms.ModelForm):
title = forms.CharField(max_length=200)
file = forms.FileField(
label = 'Select a file',
help_text = 'maximum file size: 50mb',
allow_empty_file=False
)
views.py
#@login_required
def upload_file(request):
# Handle file upload
if request.POST:
form = DocumentForm(request.POST, request.FILES)
#print(request.POST['title'], ' ', request.POST['file'])
# print(request.FILES['file'])
if form.is_valid():
#newdoc = Document(title = request.FILES['title'])
form.save()
# Redirect to the document list after POST
# return HttpResponseRedirect(reverse('submissions.views.upload_file'))
return HttpResponseRedirect('/success/')
else:
form = DocumentForm() #A empty, unbound form
args = {}
args.update(csrf(request))
args['form'] = form
return render_to_response('submissions/submission.html', args, context_instance=RequestContext(request))
So one of the problems was that I had to create a FileField in the model as weel as in the form.
| {
"pile_set_name": "StackExchange"
} |
Play of the day: Giant cricketer smashes into boy
When seven-foot tall Pakistani cricketer Mohammad Irfan went charging down the ground to save a boundary, the last thing he would have expected was a small child to jump out from the crowd and crash into him.
But that is the bizarre incident that occurred in a T20 international between Pakistan and South Africa last weekend, when 7ft 1in Irfan saved the boundary, despite skittling into the boy, who quickly dusted himself off and then sprinted away in a hurry.
Exactly what the kid was doing messing around on the field is unknown, but the mental scars of smashing into a modern day giant should prevent him from doing it again in the future. | {
"pile_set_name": "Pile-CC"
} |
Govt didn’t trust FARC intermediary: WikiLeaks
The future of Colombia Reports is under threat. The country's largest independent news website needs your help. Please become our patron.
Former President Alvaro Uribe‘s administration didn’t have faith in the government sanctioned interlocutor with the FARC, Alvaro Leyva, a WikiLeaks cable has shown.
The cable, dated October 6, 2006, relays how Uribe’s Director of Communications Jorge Mario Eastman told the then-U.S. Ambassador William B. Wood that Leyva was difficult to work with as it was not possible to determine whether he was transmitting a message from the FARC or operating on his own account.
Due to this lack of “reliable, discreet interlocutors,” the government was forced into a position whereby they had to carry out talks with the guerrilla group through the media, Eastman stated.
He added that this greatly diminished the chance of successful negotiations.
Leyva was a presidential candidate in 2006 though he withdrew his candidacy 20 days prior to the elections. He campaigned on the back of a promise that he could end Colombia’s conflict within a six month period.
According to the cable, Leyva met with Uribe three times from August until October 2006 to discuss ways to begin negotiations with the FARC and advocated the creation of a demilitarized “encounter zone,” not dissimilar to the one created under the presidency of Andres Pastrana in December 1998.
However, Leyva’s success was limited and his role as an intermediary never reached a level of prominence. In light Eastman’s comments, this unsurprising. | {
"pile_set_name": "Pile-CC"
} |
Neighand: Neighborhood Handling library
Version 0.2, June 2007.
Nicolas Brodu <nicolas.brodu@free.fr>
Presentation:
-------------
The goal of this library is to find 3D neighbors efficiently. It stores the
position of objects in 3D. The user can then ask what are the neighbor objects
for any given point, within a radius. You may either ask for all the objects
or only the K-nearest neighbors. This problem of finding neighbors is also
known as a locality query, or a neighborhood search.
This library has been designed for performance and ease of use. It consists
of various query methods adapted to dynamic environments where the objects
may move. These methods are explained in the article "Query Sphere Indexing
for Neighborhood Requests".
A short tutorial is presented below, followed by the full API documentation.
Organisation:
-------------
- The "src" subdirectory contains the sources. You may copy the content
wherever you wish, it is self-contained (it uses only the standard C and C++
libraries). Each source file contains a description of what it does, and the
functions are well documented. See below for the file list.
- The "tests" subdirectory contains example programs and a Makefile. These are
not meant to be tutorials, but rather useful tools. However, learning how to
use the library from them is possible too. See below for the file list.
- The file "QuerySphereIndexing.pdf" is a copy of the aforementioned article.
It explains the rationale of the library.
Usage (project setup):
----------------------
- Copy the src/ directory anywhere in your include path
- Include the "neighand.h" file where you need it.
- That's all. The library is header-only, no link is required.
Usage (Programming):
--------------------
- Check that your compiler supports partial template specializations.
The library was tested with g++ 3.4 and g++ 4.1.2 on Debian/Linux.
- Include the "neighand.h" file. Use the neighand namespace if you wish.
- Define one NeighborhoodHandler object with the parameters you need. The
possible template and function arguments are explained below.
- Use the "insert" method to insert objects in the region of interest, the
"update" method to move them, and the "remove" method to remove them if
needed.
- You may then either:
- Find the neighbors of a given point, either all of them or only the
K-nearest ones. The "findNeighbors", "findNearestNeighbors", and
"findNearestNeighbor" methods are what you need then.
- Provide a functor or a callback, that will be called on all the neighbors
found around a given center. The "applyToNeighbors" method is what you
need in this case.
- Please look at the API below for other useful functions. In particular,
you may find the "squaredDistance" method handy for cyclic worlds.
Tutorial:
---------
struct Agent {
int number; // put your fields and methods here
ObjectProxy<Agent>* proxy; // handy reference, this Agent ID
};
...
// Define a non-cyclic world with a 16x16x16 discretization
typedef NeighborhoodHandler<Agent,4,4,4,false,false,false> NH;
// Make to world cover the region of interest from 0 to 100 in each dimension
NH nh(0,0,0,6.25);
// Insert a few objects
...
agent1.proxy = nh.insert(x1, y1, z1, &agent1, ProxiedObjectRemapper<Agent>());
agent2.proxy = nh.insert(x2, y2, z2, &agent2, ProxiedObjectRemapper<Agent>());
...
// Find all objects within distance d from the point at (x,y,z)
vector<Agent*> neighbors;
nh.findNeighbors(x, y, z, d, neighbors);
// Find the closest object from agent1 (but not itself), within d max. distance
NearestNeighbor<Agent> neighbor;
nh.findNearestNeighbor(agent1.proxy, d, &neighbor);
cout << "The nearest neighbor of agent1 is the agent number " << neighbor.object->number << endl;
cout << "It is at d^2=" << neighbor.squaredDistance << " away from agent1" << endl;
API documentation (see also neighand.h for details):
----------------------------------------------------
- Template arguments:
UserObject: The user type, like Agent in the tutorial
exp2div(x/y/z): The power-of-two for the number of cells in each dimension.
Ex: 4 => 16 cells
wrap(X/Y/Z): Whether the world is cyclic or not in each dimension.
layerZ: Ignored, reserved for a future extension
_Allocator: A C++ allocator for getting memory. Defaults to the standard
allocator.
template <typename UserObject, int exp2divx, int exp2divy, int exp2divz, bool wrapX, bool wrapY, bool wrapZ, bool layerZ = false, class _Allocator = std::allocator<ObjectProxy<UserObject> > > NeighborhoodHandler
- Constructor:
min(x|y|z): The corner of the region of interest in world coordinates.
It is especially important in case there is no wrapping
along at least one direction.
cellSize: The edge size of the cubic cells (the same for each
direction). Thus, for non-cyclic worlds,
min[xyz] + cellSize * 2^exp2div[xyz] is the corner with
maximum coordinate for the region of interest.
objectInitCapacity: Initial capacity in number of objects. Memory is reserved
to hold that max amount of objects, and will be increased
if necessary. Use this parameter to avoid run-time memory
allocation on further inserts if you know in advance how
many objects will be stored at most in the database.
precompFile: The name of a binary file that can be used to cache the
precomputations from one run to the other. Default is empty,
so the precomputations are not cached. This should be a
valid file name. Valid files are read, invalid files are
overwritten by a valid one. The file is ONLY used for
initialization, and not accessed anymore after the
constructor returns.
NeighborhoodHandler(float minx, float miny, float minz, float cellSize, uint32_t objectInitCapacity = 1024, const char* precompFile = "")
- Inserting an object
x/y/z: The position of the object
object: A pointer to the object
remapperFunctor: A functor with the (UserObject*, ObjectProxy<UserObject>*)
signature. It is called when a user object is given a new
proxy. See the rationale in neighand.h and why this leads to
important optimizations.
Return: A proxy = a key identifier for this object
template<typename RemapperFunctor> ObjectProxy<UserObject>* insert(float x, float y, float z, UserObject* object, RemapperFunctor remapperFunctor)
- Removing an object
proxy: The proxy of the object to remove
remapperFunctor: See the insert function
template<typename RemapperFunctor> void remove(ObjectProxy<UserObject>* proxy, RemapperFunctor remapperFunctor)
- Updating the position of an object
proxy: The proxy of the object to move
x/y/z: The new position of the object
void update(ObjectProxy<UserObject>* proxy, float x, float y, float z)
- Finding all the neighbors of a given point
x/y/z: The query center
d: The maximum distance to look for neighbors
p: An object proxy used as the query center. In that case the object
itself is excluded from the neighbors. Call the function with
p->x,p->y,p->z if you wish to include this object.
neighbors: A vector of object pointers filled with the neighbors that are
found. Note: The neighbors distances are not provided here simply
because thay are not always computed, and perhaps not necessary
as well in the user application. Use the squaredDistance function
(see below) if you need it.
void findNeighbors(float x, float y, float z, float d, std::vector<UserObject*>& neighbors)
void findNeighbors(ObjectProxy<UserObject>* p, float d, std::vector<UserObject*>& neighbors)
- Finding (at most) the K nearest neighbors of a given point
x/y/z: The query center
d: The maximum distance to look for neighbors
K: The maximum number of neighbors to return.
p: An object proxy used as the query center. See findNeighbors.
neighbor: A vector or an array of objects that holds the neighbors that were
found. The distances are provided in addition to the objects
because they were necessarily already computed.
Return: The number of objects that were found, in case an array was
provided. Use the vector size() method otherwise.
void findNearestNeighbors(float x, float y, float z, float d, std::vector<NearestNeighbor<UserObject> >& neighbor, unsigned int K)
void findNearestNeighbors(ObjectProxy<UserObject>* p, float d, std::vector<NearestNeighbor<UserObject> >& neighbor, unsigned int K)
int findNearestNeighbors(float x, float y, float z, float d, NearestNeighbor<UserObject>* neighbor, unsigned int K)
int findNearestNeighbors(ObjectProxy<UserObject>* p, float d, NearestNeighbor<UserObject>* neighbor, unsigned int K)
- Finding the nearest neighbor of a given point
x/y/z: The query center
d: The maximum distance to look for the neighbor
p: An object proxy used as the query center. See findNeighbors.
neighbor: A pointer to an object for holding the neighbor that is found
together with its squared distance to the query center.
Return: 1 if a neighbor was found, 0 otherwise.
int findNearestNeighbor(float x, float y, float z, float d, NearestNeighbor<UserObject>* neighbor)
int findNearestNeighbor(ObjectProxy<UserObject>* p, float d, NearestNeighbor<UserObject>* neighbor)
- Applying a functor to all the objects in the viciny of a given point
x/y/z: The query center
d: The maximum distance to look for neighbors
f: The functor or callback to call on each neighbor
p: An object proxy used as the query center. See findNeighbors.
Return: The functor object (which might have an internal state, useful for ex.
to count the number of neighbors).
template<typename Functor> Functor applyToNeighbors(ObjectProxy<UserObject>* p, float d, Functor f)
template<typename Functor> Functor applyToNeighbors(float x, float y, float z, FloatType d, Functor f)
typedef void (*Callback)(UserObject* object, void* userData);
void applyToNeighbors(ObjectProxy<UserObject>* p, float d, Callback f, void* userData)
void applyToNeighbors(float x, float y, float z, float d, Callback f, void* userData)
- Applying a functor to all the objects whatever their position
f: The functor or callback to call on each object
Return: The functor object
template<typename Functor> Functor applyToAll(Functor f)
void applyToAll(Callback f, void* userData)
- Compute the squared distance from point differences
dx/dy/dz: The difference between the points along each dimension: x2-x1, etc.
Return: Simply dx*dx+dy*dy+dz*dz when there is no wrapping. However when a
dimension is wrapping it is taken into account, so you'll probably
find this function very convenient in wrapping worlds.
float squaredDistance(float dx, float dy, float dz)
- Get/Set the query method and method auto-detection parameters
method: One of Auto, Sphere, Cube, NonEmpty, or Brute. See the article for
what this means. The default is Auto, that will try to select the best
method for you, but you may force one of them is the Auto detection
does not give the best results (some user applications are better
suited to some methods).
weight: Additional weight factors to help the auto-detection routine. For
example your architecture may be advantageous to the Brute-force
method and in that case give it a weight <1.0
Return: The current method and weights
void setQueryMethod(QueryMethod method); QueryMethod getQueryMethod()
void setWeightSphere(float weight); float getWeightSphere()
void setWeightCube(float weight); float getWeightCube()
void setWeightNonEmpty(float weight); float getWeightNonEmpty()
void setWeightBrute(float weight); float getWeightBrute()
- Get the automatic selection routine estimated cost factors
x/y/z: The query center
d: The maximum distance to look for neighbors
factorX: Will hold the estimated cost of the method X on return
Return: The method that would be chosen by the automatic selection routine in
this situation. If you don't like this choice then you may weight the
methods using the setWeight functions.
QueryMethod getAutoFactors(float x, float y, float z, float d, float& factorSphere, float& factorCube, float& factorNonEmpty, float& factorBrute)
QueryMethod getAutoFactorsClosest(float x, float y, float z, float d, int N, float& factorSphere, float& factorCube, float& factorNonEmpty, float& factorBrute)
- Get statistics (only available if NEIGHAND_SELECT_METHOD_STAT is defined)
These counters are incremented each time the corresponding method is used.
uint32_t statSphere, statCube, statNonEmpty, statBrute;
void resetStat();
Source files:
-------------
neighand.h: The main header file and the only one you need to include
neighand_structures.hpp: Declare the types like ObjectProxy, QueryMethod, etc.
neighand_apply.hpp: Main query routine, applies a functor to neighbors
neighand_apply_all.hpp: Implements the corresponding function
neighand_apply_checkdist.hpp: Subroutine for neighand_apply.hpp
neighand_apply_processlines_cond.hpp: Subroutine, conditional object inclusion
neighand_apply_processlines_uncond.hpp: Unconditional object inclusion
neighand_closest.hpp: Similar to neighand_apply but for K nearest neighbors
neighand_closest_processlines.hpp: Subroutine for neighand_closest.hpp
neighand.hpp: Implements the other declarations of the main header
neighand_helpers.hpp: Common utilities to all wrapping cases
neighand_wraphelper_ffff.hpp: Specialized routines for the no wrapping case
neighand_wraphelper_tttf.hpp: Specialized routines for the all-wrapping case
neighand_wraphelper_ttff.hpp: Specialized routines for wrapping along X and Y
Test files:
-----------
consistencyTest.cpp: Checks that the library gives correct results. It's
probably a good idea to call this test at least once for
each set of compilation options you're using.
perfTest.cpp: Used to generate the histograms in the article. Might be useful
too to get an idea how the automatic selection routine performs
on your system, though you should instead really call the
getAutoFactors for a representative case of your application
distknn.cpp: Used to generate the plot in the article
lq.c/lq.h: Locality query routine from the OpenSteer project. Similar to the
Cube query method in the non-wrapping case.
lq.c.diff: Change from the OpenSteer version so as to make lq.c compile
independently. Also contains a bug correction not yet in the
OpenSteer CVS, as of 07 June 07.
libkdtree++: Slighly patched 0.2.1 version of the library providing
a kd-tree C++ implementation with an interface similar to
the STL.
libkdtree++-0.2.1.diff: The exact changes operated on the library
kdtree++: Symbolic link, so the kdtree++ library is "installed" here.
KDLQConsistencyTest.cpp: Checks that the kd-tree and the lq bin-lattice files
work as intended.
Makefile: Instructions for compiling the test programs, and in particular the
compiler optimization options (default is -O3). Can also run the
consistency and performance tests automatically for all wrapping
cases, just type "make consistencyTest" for example.
History:
--------
v0.2:
- Added support for directly calling the different query methods (sphere
indexing, bin-lattice cube, non-empty cell list, brute-force).
- Improved the algorithm for automatically selecting the best method.
- API improvements and modifications.
- Made the library compatible with user-defined memory allocators.
- Made the library compatible with the aliasing rule.
- Removed support for separate CPP specialization. That feature was a
maintenance nightmare and it was (and still is) simpler to just specialize
the templates in the user project CPP files anyway.
v0.1:
- Initial public release
Happy hacking!
Nicolas Brodu, 2007
Code released according to the GNU LGPL, v2 or above.
| {
"pile_set_name": "Github"
} |
kitykat
Activity
Reviews by kitykat
I am 9 days post op after undergoing breast reduction in the UK. I went for a 32H to a 32D (ish) could be DD. They look small to me but that's because they were massive. I love my new look I can't believe it when I see my profile. I am 5ft 4 and weigh 145 lbs. I had 800g removed form my right...
READ MORE
Recent comments from kitykat
Well it's one month tomorrow and is all going well. I can't complain about the care I have received. I have seen the cosmetic surgery nurse 4 times and the consultant just once, but I see her again next week. I am back at work after...
READ COMMENT
Thank you. I am lucky as I think we caught the infection really early. The only sign was a very occasional strange and very brief odour. There was no ooze or inflammation. High dose antbiotics have sorted it hopefully (made me sick...
READ COMMENT
Hi TS. I am feeling ok but couldn't go back to work just yet. I could have gone to a meeting if it was important but not back to work completely. I have just been back to the hospital and have a wound infection so have been started on...
READ COMMENT
Good luck to you, I am 47, and was a 32H until 9 days ag. I weight 145lb. I had 800g taken from the right and 852 from the left. I think I am now a 32D as the 32DD bras I bought are too big. They look TINY! But only in comparison to the...
READ COMMENT
I had my surgery on 2nd Oct this year. I am 47, 142lbs and was a 32H. I am at present very pleased. I get the dressings off today and can't wait. My advice, keep busy pre-op, I didn't have a minute and so didn't worry. Good luck, you...
READ COMMENT | {
"pile_set_name": "Pile-CC"
} |
Limitations of diagnostic precision and predictive utility in the individual case: a challenge for forensic practice.
Knowledge of group tendencies may not assist accurate predictions in the individual case. This has importance for forensic decision making and for the assessment tools routinely applied in forensic evaluations. In this article, we applied Monte Carlo methods to examine diagnostic agreement with different levels of inter-rater agreement given the distributional characteristics of PCL-R scores. Diagnostic agreement and score agreement were substantially less than expected. In addition, we examined the confidence intervals associated with individual predictions of violent recidivism. On the basis of empirical findings, statistical theory, and logic, we conclude that predictions of future offending cannot be achieved in the individual case with any degree of confidence. We discuss the problems identified in relation to the PCL-R in terms of the broader relevance to all instruments used in forensic decision making. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
Return object as parameter for nHibernate entity
I'm writing a solution where the data entities are passed to clients using datasets through a WCF service, with nHibernate as ORM.
My predecessor has written some translator classes, converting datasets to entities and vice versa. In most cases he's declared the return object as a parameter for the object.
For example:
Public Shared Function CreateEntity(ByVal ds As DataSetObject, ByVal entity As EntityObject) As EntityObject
Dim row As ds.EntityObjectRow = ds.EntityObject(0)
entity.Id = row.Id
// Etc.
Return entity
End Function
While I want to do it like:
Public Shared Function CreateEntity(ByVal ds As DataSetObject) As EntityObject
Dim row As ds.EntityObjectRow = ds.EntityObject(0)
Dim entity As New EntityObject
entity.Id = row.Id
// Etc.
Return entity
End Function
He's not with the company anymore, so I can't ask him why he's done it this way. Hence my question here. Is there some performance gain, or traceablity thing with nHibernate by using the first implementation rather than the latter?
When at the university I was always told not to pass the return object to the method, unless there was a very specific reason for it.
Please advice. :)
A:
From the information you gave there is no problem to create the object to return from inside the method and not receive it from outside.
The only reason I can see for this is that maybe he passes the entity as a parameter with its ID already defined and doesn't change it inside, because the dataset could not know the entity's ID. But I guess that's not the case. So in my opinion go ahead and do the way you propose.
| {
"pile_set_name": "StackExchange"
} |
<application xmlns="http://xmlns.jcp.org/xml/ns/javaee"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://xmlns.jcp.org/xml/ns/javaee http://xmlns.jcp.org/xml/ns/javaee/application_7.xsd"
version="7">
<module>
<java>JPAAppClient.jar</java>
</module>
</application> | {
"pile_set_name": "Github"
} |
7 Wonders (board game)
7 Wonders is a board game created by Antoine Bauza in 2010 and originally published by Repos Production in Belgium. 7 Wonders is a card drafting game that is played using three decks of cards featuring depictions of ancient civilizations, military conflicts and commercial activity. The game is highly regarded, being one of the highest rated games on the board game discussion website BoardGameGeek. 7 Wonders has won a total of more than 30 gaming awards, including the inaugural Kennerspiel des Jahres connoisseurs' award in 2011. The game has been cited by leading designers as one of the most influential board games of the last decade.
Gameplay
7 Wonders is a dedicated deck card game that features ancient civilizations. At the start of the game, each player randomly receives a gameboard called a 'Wonder board'. Each board depicts one of Antipater of Sidon's original Seven Wonders of the Ancient World. Players place cards representing various materials and structures around their Wonder boards. The boards are double-sided; the wonders on side A are generally easier to build, while those on side B grant more interesting benefits.
7 Wonders is played over three ages, known in the game as Ages I, II and III, each using its own decks of cards. In each age, seven cards are randomly dealt to each player. The game uses a card-drafting mechanic in which, once per turn, each player selects a card to play from his or her hand, then passes the remaining cards (face-down) to the next player. This process is repeated until five out of the seven cards have been played. At this point, each player must choose to play one of his remaining two cards and discard the other.
Each age card represents a structure, and playing a card is referred to as building a structure. To build a structure, a player must first pay the construction cost, in coins or in one or more of the seven resource types, then lay it down by his or her Wonder board. A player lacking the resources available may pay his direct neighbors to use their resources, normally at two coins per resource, if available.
Instead of building a structure, a player may choose either to discard an Age card to earn three coins from the bank or to use the card to build a stage of his or her wonder. The Wonder boards have from two to four stages, shown at the bottom of the board. To build a wonder stage, a player must pay the resource cost listed on the stage, then put an age card underneath the wonder board in the appropriate place.
There are seven types of Age cards, representing different types of structures, which are determined by the color of their background:
Red cards (military structures) contain 'shield' symbols; these are added together to give a player's military strength, which is used in conflict resolution at the end of each age.
Yellow cards (commercial structures) have several effects: they can grant coins, resources and/or victory points or decrease the cost of buying resources from neighbors.
Green cards (scientific structures): each card has one of three symbols. Combinations of the symbols are worth victory points.
Blue cards (civic structures [mistranslated as 'civilian' in the game rules]): all grant a fixed number of victory points.
Brown cards (raw materials) provide one or two of the four raw material resources used in the game (wood, ore, clay brick and stone).
Grey cards (manufactured goods) provide one of the three manufactured goods used in the game (glass, papyrus and textiles).
Purple cards (guilds) generally grant victory points based on the structures a player and/or his neighbors have built.
Brown and grey cards only appear in the Age I and II decks; purple cards only appear in the Age III deck.
At the end of each age, military conflicts are resolved between neighbors. This is done by comparing the number of shield symbols on the players' red cards, and awarding victory points accordingly. Once all three decks have been played, players tally their scores in all the different developed areas (civil, scientific, commercial, etc.) The player with the most victory points wins.
In the base game, there are seven means of obtaining victory points:
Military victories – 1 point for each victory (having the most shields) during the first age, 3 for the second age and 5 for the third age. Each defeat makes a player lose 1 victory point regardless of the age.
Gold coins – One point for every 3 coins a player possesses at the end of the game.
Wonder stages – Many of the wonder stages grant a fixed number of victory points.
Civic structures (blue cards) – Each structure grants a fixed number of victory points.
Commercial Structures (yellow cards) – Age III commercial structures grant victory points based on certain structures a player has built.
Guilds (purple cards) – The guilds provide several means of gaining victory points, most of which are based on the types of structure a player and/or his neighbors have built.
Scientific structures (green cards) – Each green card has a symbol on it – tablet, compass or gear. One card of a type grants one victory point, but two cards grant four; the number of points granted is equal to the number of symbols possessed squared. Additionally, each set of tablet, compass and gear possessed is worth 7 points.
Expansions
7 Wonders: Leaders (2011)
This expansion introduces the white-backed leader cards, which can be recruited to aid a player's city. The 36 leader cards are based on real historical figures, some of which are well-known, such as Caesar and Midas, others less so. There is a brief biography of each leader in the rulebook.
Playing with the Leaders expansion changes the game mechanic, as the second thing done in the game after choosing a Wonder board is to choose leaders. Four leader cards are dealt to each player, and the cards are drafted. At the start of each Age, players may recruit one leader, paying its coin cost and putting it into play. To compensate for this extra expense, with the Leaders expansion, players start with six coins instead of three. As with the Age cards, instead of recruiting a leader, a player may choose to discard the card to gain three coins or build a Wonder stage with it.
The leaders grant various abilities, including additional means of gaining victory points, resources or coins, resource cost reductions, commerce benefits, additional shields and scientific symbols. For example, the 'Caesar' card grants two shields and 'Midas' grants one extra victory point per three coins held at the end of the game.
The expansion comes with four additional guild cards and one extra Wonder board – the Colosseum of Rome, which, appropriately enough, grants abilities related to the new leader cards.
7 Wonders: Cities (August 2012)
The Cities expansion introduces nine city cards (with a black background) to each of the Age card decks. The number of city cards that are shuffled into each age's deck is equal to the number of players. This means that each age now consists of seven play of cards.
The city cards can have quite an impact on gameplay, as many of them are more powerful but expensive versions of existing cards; for example, the Age III 'Contingent' card provides five shields as opposed to the three provided by Age III red cards. The cards also introduce some new concepts such as diplomacy, which allows a player to avoid military conflict for one Age, and monetary loss, which forces the player's opponents to either pay coins to the bank or lose victory points if they cannot or will not pay.
The addition of city cards takes the total number of cards playable in each age to 56. This means that eight-player games – or team games with four teams of two – are possible. In the team game, partners are allowed to see each other's cards and discuss which ones to play, and the effect of diplomacy is modified.
The Cities expansion also contains three new guild cards, six leader cards and two Wonder boards: the Hagia Sophia of Byzantium and Al Khazneh of Petra. Many of these new additions have abilities specific to city cards or to the new concepts introduced.
7 Wonders: Wonder Pack (May 2013)
This expansion adds four Wonder boards: Abu Simbel, the Great Wall of China, Stonehenge and the Manneken Pis of Brussels (the makers' home town.) All four offer new abilities.
7 Wonders: Babel (December 2014)
Babel consists of two expansions that can be added separately or together. The first expansion is Tower of Babel, in which players can choose to construct the tower. By discarding a card, players can place a tile on the tower that affects play (for example, taxing the construction of Wonders or granting a monetary bonus for building certain cards) until it is covered by a subsequent tile. Players score points for the number of tiles they play. The second expansion is Great Projects of Babel. A building of a certain color is put into play. Whenever a player plays a card of the same color, they may choose to pay a cost to participate in the building of the Great Project. If the project succeeds, all players who participated get a reward, and non-participants get nothing. If the project fails, participants get nothing and non-participants receive a penalty.
7 Wonders: Leaders Anniversary Pack & Cities Anniversary Pack (2017)
These expansions add new Leaders cards and new Cities cards, with new effects.
7 Wonders: Armada (October 2018)
Armada adds a naval board for each player, and four ships: red, blue, yellow, and green. When playing a card of one of these colors, players may pay an additional cost to advance the corresponding ship along the board. Advancing each ship grants different bonuses: the red ship grants naval strength, which is compared to all players at the end of the Age, not just neighbors; the yellow ship grants money; the blue ship grants victory points; and the green ship allows players to discover islands, which grant extra bonuses.
Promotional wonders
Manneken Pis (Released at SPIEL in October 2010 and later included in the Wonder Pack)
Catan (Released at SPIEL in October 2011)
Siracusa (Released at SPIEL in October 2018; requires Armada)
Promotional leader cards
Stevie (2011) (depicts Stevie Wonder)
Louis (2012) (depicts Louis Armstrong)
Esteban (2012) (depicts designer's newborn son)
Wil (2014) (depicts Wil Wheaton)
Nimrod (2014) (also requires 7 Wonders: Babel)
Spinoff games
7 Wonders: Duel (October 2015)
7 Wonders: Duel is a two player version of 7 Wonders in which players alternate drafting from an overlapping pyramid of cards. A version of the game for iOS and Android was released by Repos Digital in 2019.
7 Wonders: Duel — Pantheon (October 2016)
The expansion to 7 Wonders: Duel added new abilities to the game via a rotating pantheon of gods, as well as two new wonders.
7 Wonders: Duel – Promotional wonders
Messe Essen (2015)
Statue of Liberty (2016)
Stonehenge (2017)
Sagrada Familia (2018)
Honors
2010 Tric Trac Nominee
2011 As d'Or – Jeu de l'Année Nominee
2011 Golden Geek Best Board Game Artwork/Presentation Nominee
2011 Golden Geek Best Card Game Nominee
2011 Golden Geek Best Family Board Game Nominee
2011 Golden Geek Best Innovative Board Game Nominee
2011 Golden Geek Best Party Board Game Nominee
2011 Golden Geek Best Strategy Board Game Nominee
2011 Gouden Ludo Nominee
2011 Gra Roku Game of the Year Nominee
2011 Guldbrikken Best Adult Game Nominee
2011 Hra roku Nominee
2011 International Gamers Awards – General Strategy; Multi-player Nominee
2011 Japan Boardgame Prize Voters' Selection Nominee
2011 JoTa Best Artwork Nominee
2011 JoTa Best Card Game Nominee
2011 JoTa Best Light Board Game Nominee
2011 Juego del Año Tico Nominee
2011 Lucca Games Best Boardgame Nominee
2011 Nederlandse Spellenprijs Nominee
2011 Spiel des Jahres Kennerspiel Game of the Year Nominee
2011 Vuoden Peli Adult Game of the Year Nominee
2011 Boardgames Australia Awards Best International Game Nominee
2012 Boardgames Australia Awards Best International Game Nominee
Awards
2010 Tric Trac d'or (France) , Game of the Year, Winner.
2010 Meeples' Choice Award, Winner.
2011 Kennerspiel des Jahres (Germany), Connoisseur's Game of the Year, Winner.
2011 Deutscher Spiele Preis, Winner.
2011 Les Trois Lys (Québec), Game of the year, Winner
2011 Vuoden Aikuistenpeli (Finland), Adult game of the year, Winner.
2011 Lucca Games (Italy), Miglior gioco di carte (Best card game), Winner.
References
External links
7WonderStats! VPCalculator (Android App)
Category:Board games
Category:Spiel des Jahres winners
Category:Kennerspiel des Jahres winners
Category:Deutscher Spiele Preis winners
Category:Historical board games
Category:Board games introduced in 2010
Category:Dedicated deck card games
Category:Antoine Bauza games | {
"pile_set_name": "Wikipedia (en)"
} |
Q:
How to pick up system location(region) on Chrome for an angular application?
I'm trying to figure out a way to pick up system location/region(e.g: en-GB, en-US) on to the angular application.
I'm looking for an alternative for the below C# line of code.
System.Globalization.RegionInfo.CurrentRegion
I know we can get the browser's current region (eg en-GB, en-US) using navigator.language but this won't help here since I want the system region.
Appreciate any help on this :)
A:
window.navigator.language || window.navigator.userLanguage
| {
"pile_set_name": "StackExchange"
} |
Above the Canyon by Daniel Coshnear
*Featured Image: “Sleeping Fairy Queen” by Anita Driessen
Above the Canyon
by Daniel Coshnear
In my late teens and early twenties, I’d been a hitchhiker, a freight-train hopper, a sleeper in unlocked parked cars and abandoned buildings, a dumpster-diver, a sometimes shoplifter. I needed very little, owned almost nothing, and what I had I did not take care of. Sometimes on the side of a highway, I’d sing like Springsteen: I wish God would send me a sign, send me something I’m afraid to lose. A decade later, God complied.
On the day in question, it so happened, I was singing Woody Guthrie to my four-year-old daughter.
As I went walking I saw a sign thereAnd on the sign, it said: “No Trespassing.” But on the other side it didn’t say nothing. That side was made for you and me.
I found myself in my mid-thirties, with a daughter, a daughter with pumpkin cheeks, and wispy blond hair, not quite as tall as my waist. We trespassed plenty together. I wanted her to feel brave, to believe that the world exists for her discovery. I wanted her to climb fences, literally and metaphorically. It’s ironic, how being reckless makes you feel safe. I was, of course, trying to retrieve old patterns of thinking and feeling. With her help, I was clawing my way back to something familiar.
It was the middle of a hot day in early fall. Me and my girl ventured a mile and a half from home up on Sweetwater Springs Road to a hillside above an abandoned mine, fenced off and presumably dangerous. Far down below were trees and shadows; just beneath our feet red ochre rocks and dust and stubborn patches of thistle, and a surprise, a handmade grave. In place of a headstone was an old-fashioned faucet with rust stains lining the marble basin. Tacked beneath it was a simple placard, black paint on a graying redwood plank read Sharon Ann Simmons with the dates of her birth and death.
Someone had placed stones in a circle on the ground, smooth round rocks from the coast, and among the rocks were scattered memorabilia, blanched by sun and partially dissolved by rain – Mardi Gras beads, plastic flowers, ticket stubs, a toy unicorn with a purple tail. Looking closer I could see that some of the rocks had been painted with nail polish: I miss you baby girl. My heart. So young and beautiful. Sweet angel. I checked the dates again and subtracted – she was not yet seven when she died.
The unusual grave alone on a hillside made the loss of her palpable and unsettling. I’d have preferred to move on to some new adventure, but my daughter, who had seemed either shy or bored when we arrived, became very curious. Behind the faucet she found a couple of dolls and teacups and bracelets.
She examined one doll and then the other. “What is this Dad?”
“A memorial for a girl who died.” I read the name out loud.
My daughter repeated, “Sharon Ann Simmons.”
Neither my wife nor I had stepped inside a church since we were children, and neither of us felt the need to inculcate our child in the faith of our grandparents. Our daughter had never been to a funeral. We didn’t own a television. To my knowledge, our four-year-old girl knew nothing about death or how people show respect for those who’ve passed on.
She put one of the bracelets on her wrist and said, “Can I keep this one?”
Finders keepers had been my motto, but this time I told her no. “These things were left for Sharon Ann from people who loved her,” I said. It seemed evident some people loved her very much.
My daughter asked, “What happened to her?”
“I don’t know.”
“Where is she?”
“Buried, I guess. Maybe here.”
She put the bracelet back in the spot where she’d found it. She folded her hands and bowed her head.
I didn’t know where she could have seen such behavior. “I love Sharon Ann Simmons,” she said solemnly, as if to herself.
I was touched. And puzzled. Was this an instinctual response? Where could this sudden reverence have come from? I was also beginning to feel anxious because I heard voices rising up from the canyon, and though I liked to trespass, in those days I didn’t like to stay too long.
I beckoned my daughter back toward the gap in the fence where we’d come in. She walked very slowly, maintaining her posture of grief.
“Come on, honey,” I said, “we need to get out of here.” I helped her with the fence, freeing the sleeve of her shirt from a stray piece of barbed wire. Then she stopped, one foot in, one foot out.
“How did she die?” She asked again.
“Really, I don’t know.”
“Can we come here again?” she said. “Please?”
Now, was this some kind of formative experience? Perhaps it was her first real awareness of mortality. Human mortality, that is. She’d seen raccoons and squirrels crushed on the road. She’d seen one of her goldfish upside down and bobbing, and that I remembered, was traumatic enough. But this was different. And how did I want her to feel about it? Was it something to be explored or passed over quickly? What should I do with my face, my voice? Surely, I did not want her to emulate the girl who’d died young, even if the girl was well-loved. I appreciated her apparent respectfulness, but was she sad? Did I want her to feel sad? A girl dies long before her rightful time. Hell yes, it’s sad. I could have felt sad, but what I felt was frightened. I did not want to convey fear, though some fear may have been appropriate. For me, life without attachment, and the fear that comes with it, had been somewhat empty. To her question, the best I could manage was a question of my own.
“Maybe, honey. Why do you want to come back?”
“Next time,” my daughter said, “Can we bring a shovel? Next time, can we dig her up?”
Contributors:
Dan Coshnear works at a group home where he runs a regular reading and writing group. He teaches through UC Berkeley Extension. He is the author of two story collections: "Jobs & Other Preoccupations" (Helicon Nine 2001) winner of the Willa Cather Award, and "Occupy & Other Love Stories" (Kelly's Cove Press 2012). In 2015 he won the novella prize from Fiction Fix for Homesick Redux.
Anita Driessen is an illustrator, a storyteller and a painter into tiny worlds. Her layered style of found objects, old letters and whimsical characters invite you in to explore a new world and your own imagination. Overlooking hills and faraway house, Anita lives with her fiancee, her son Micah, and their two cats, Chili and Pepper.
Share this:
Like this:
You might also like
Go ahead and Leave Feedback about this essay for a reply from the author. Cancel reply
Welcome to Memoir Magazine!
An annual print and online literary publication, we are proud to be humans and citizens of the world. It’s a broad category, we know. But life is broad and nobody gets out alive. That’s why we read memoir. Our goal is to cultivate our collective and individual capacity to recognize truth, while creating greater diversity and empathy, by flooding the world with stories that need to be told. Memoir Magazine features artwork, as well as essay, interviews, and book reviews, and aims to support storytellers through publication, education, and advocacy. | {
"pile_set_name": "Pile-CC"
} |
Erysipelothrix rhusiopathiae bacteremia without endocarditis associated with psoas abscess: the first case report in Thailand.
The authors report a patient with a rare manifestation of invasive septic Erysipelothrix rhusiopathiae infection without endocardial involvement. Our patient presented with progressive paraparesis and subacute fever for ten days. He had underlying diabetes mellitus and alcoholic cirrhosis. Magnetic resonance imaging (MRI) of the lumbosacral spine showed a psoas abscess with vertebral osteomyelitis and discitis at level of L23 of the lumbar spine. His blood culture grew E. rhusiopathiae. Transthoracic echocardiography demonstrated normal endocardium. Surgical drainage and debridement with concomitant intravenous antibiotics administration resulted in clinical improvement, including neurological status. MRI showed resolution of the psoas abscess and osteomyelitis. Erysipelothrix infection should be considered as a causative pathogen of musculoskeletal infection in immunocompromised patients. To our knowledge, this is the first case report of psoas abscess caused by E. rhusiopathiae in Thailand. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
In queue,after insertion and deletion , the deleted element also appears in Output.why?
#include<iostream>
#include<string.h>
using namespace std;
class queue
{
int f,r;
int a[5];
public:
queue()
{
f=r=-1;
}
Inserting Elements in Array
void enqueu(int n)
{
if(r==4)
cout<<"Overflow"<<endl;
else
{
r++;
a[r]=n;
}
if(f==-1)
f=0;
}
Deleting Elements from Array
void dequeu()
{
if(f==-1)
cout<<"Underflow"<<endl;
else if(f==4)
f=-1;
else
{
cout<<"The Deleted Element is "<<a[f]<<endl;
f++;
}
}
When i try to show elements of Array.The Element which i deleted also appears.
void show()
// showing array elements
{
for(int i=0;i<5;i++)
cout<<a[i]<<endl;
}
};
int main()
{
queue obj;
int n,num;
I used do while here which will keep on asking whether to insert or delete.
do
{
cout<<"1: Insert Element In Queue"<<" 2: Delete Element "<<" 3:Press 0 to Exit<<endl;
cin>>n;
switch(n)
{
case 1:
{
cout<<"Enter Element to insert"<<endl;
cin>>num;
obj.enqueu(num);
break;
}
case 2:
{
obj.dequeu();
break;
}
}
}
while(n!=0);
obj.show();
return 0;
}
A:
enqueu() and dequeu() look as though how many elements are in the container is determined by members f and r. But your show() ignores them and just prints all five array elements.
| {
"pile_set_name": "StackExchange"
} |
7 + -374609?
9836238
What is -1 plus 1226091131085?
1226091131084
Add together 181669232764 and 297.
181669233061
What is -451185.8 take away -5747?
-445438.8
What is -9117403.7837 less than 160?
9117563.7837
What is -19614567.62 + 18.3?
-19614549.32
Total of 7.5 and -88708149547.
-88708149539.5
What is -18752574 + -13096?
-18765670
Work out 18282797685082 - -2.
18282797685084
What is the difference between -4858258.77 and -0.27126?
4858258.49874
What is 2.0146996 minus 2882.17?
-2880.1553004
What is 240 take away 95317752?
-95317512
Add -7913870203 and -0.042.
-7913870203.042
Work out -2279105601788 - -43.
-2279105601745
Total of 49 and -90998253871.
-90998253822
What is 0.3 less than 118011018015614?
118011018015613.7
Calculate 139618.2031 + -0.1102.
139618.0929
What is the difference between -120 and -6595313.82519?
6595193.82519
What is 20.3 - -0.1334050262?
20.4334050262
What is -2.6702 - 2631.5635694?
-2634.2337694
What is -0.2 - 201844941387?
-201844941387.2
Work out -729 + 86531796565.
86531795836
40426.355 - 1250061
-1209634.645
What is the distance between 97 and 0.11290570252419?
96.88709429747581
What is 4 plus 3331258.43008?
3331262.43008
What is 1292797483900 minus 4?
1292797483896
Work out -46122 - -11846863889.
11846817767
-74934508.84 - -2106
-74932402.84
What is 8727685.26 minus 532150?
8195535.26
Put together -0.100847019 and 1299681.
1299680.899152981
What is 105281 take away 99399410?
-99294129
Calculate 0.5 + -29793101216.
-29793101215.5
Add together 105322 and -673471681.
-673366359
Sum 0.5 and 1306943.4858706.
1306943.9858706
Subtract 4038.11 from 0.7939252.
-4037.3160748
Sum -2191.282724 and 12.1.
-2179.182724
Add together -0.16 and -371215728130.
-371215728130.16
What is the difference between -599662963142 and -3.1?
599662963138.9
0 - -688353100236
688353100236
Work out -2.855391697 + -0.3.
-3.155391697
What is 103623208394 minus -4163?
103623212557
Calculate -49092.222 + -748898.
-797990.222
What is -219111326900 plus -2.413?
-219111326902.413
Add -20875165003 and 63.
-20875164940
Put together -21947569.776 and 0.059.
-21947569.717
Work out 14.23725 - -13336950.
13336964.23725
Total of -1083.67941 and -272490.
-273573.67941
-964 - -2.14531517
-961.85468483
-0.10502098275 - -0.0525
-0.05252098275
Calculate 2589153383 + 7529.
2589160912
What is -0.088107532375 less than -2?
-1.911892467625
What is 0.3 less than 4504103458.7264?
4504103458.4264
Total of -4.9 and 8397820518.
8397820513.1
Total of 78 and 934138060.
934138138
0.37+444214826842
444214826842.37
-6926175123 - 0.176
-6926175123.176
What is -2693 less than 16182932.5?
16185625.5
-1.0814+-3577214984
-3577214985.0814
Work out -3 + -19995549535.
-19995549538
-257663 - -52.691
-257610.309
What is 5.323995039 + 1390?
1395.323995039
What is -6 plus -5013637463115?
-5013637463121
-7.99 - -1575186014
1575186006.01
What is the distance between -4599991127818 and -4?
4599991127814
What is the difference between 30907008428.086 and -5?
30907008433.086
Add 0.0808 and 32904366716.
32904366716.0808
Add together -367001 and -402443750.
-402810751
Calculate 71955 + -829248981.
-829177026
Put together 0.012 and 292429794378.
292429794378.012
25420 + 46623501
46648921
What is 1 minus -122135230556346?
122135230556347
What is the difference between 34.06629 and 85614315?
85614280.93371
Work out -618.7434125082 - 1.
-619.7434125082
2.9081519578 + 17
19.9081519578
What is -0.885 less than -6548.52021?
-6547.63521
Sum 0.59 and -1347302583.
-1347302582.41
Calculate 16884.659 - -198.69.
17083.349
What is -1883897 plus -155.105129?
-1884052.105129
Work out -216476.1489 - -2493.
-213983.1489
What is 1.08201043 minus 3440950?
-3440948.91798957
Add 1458.15272 and 89655.
91113.15272
What is 136730567460 - 0.0896?
136730567459.9104
Total of -0.05 and 244510851402.
244510851401.95
Put together 4 and -49537635801601.
-49537635801597
What is -543393238.85869 - -7?
-543393231.85869
Total of -0.197316624233 and -72.7.
-72.897316624233
What is 129480107964158 less than -0.2?
-129480107964158.2
Calculate 324918 + -6020.2691.
318897.7309
Total of 4312526880691 and 0.1.
4312526880691.1
Put together 12545.0363 and -8.136.
12536.9003
What is 49 - -5891669572.17?
5891669621.17
Subtract -0.796927 from -250840.
-250839.203073
What is the distance between 0.02136364146 and -1.70317?
1.72453364146
What is 0.11558 take away -943584.1?
943584.21558
What is -9310883.58 minus 180380?
-9491263.58
What is 0.058955242532 plus 1.4?
1.458955242532
Work out -13 + -495937126.313.
-495937139.313
What is -3861.87535719 less than 0.2342?
3862.10955719
Sum 13832.4171 and 0.23881.
13832.65591
What is -3 minus -0.0665879579354?
-2.9334120420646
32.118 - 0.4033434
31.7146566
What is -186929273 less than 0.035848?
186929273.035848
Calculate -0.0484 + -1180957950.
-1180957950.0484
What is 0.345 - 13.19330446873?
-12.84830446873
Work out -14.13012 - -42836941.
42836926.86988
Work out 0.01118956 + -26489667.
-26489666.98881044
Put together 0.57738743 and 542.
542.57738743
What is -4003.804 plus -27271977?
-27275980.804
What is the distance between 253517 and -1320092668?
1320346185
Work out 27843.12678134 + 0.12.
27843.24678134
What is 720.65 less than -2705513712?
-2705514432.65
Sum -493069 and 119890872.
119397803
Calculate -4528507581 - -2670.
-4528504911
What is 0.28 + 0.7994385382755?
1.0794385382755
-284763650 - -255
-284763395
What is the difference between 4165 and 3859798987?
3859794822
Work out -225508405381 - -0.4.
-225508405380.6
Calculate 1067080752 - -323.9.
1067081075.9
Work out 322183473 - 468.
322183005
Add together 34.294 and 323376.831.
323411.125
What is 224 minus 0.106468810698?
223.893531189302
Put together -92428794133 and 358.
-92428793775
Add together 231628214189 and -2.
231628214187
Add -169545 and -4384306.
-4553851
Work out 93011754 + 357200.
93368954
-19.819 - 5048953.395
-5048973.214
What is -112932508371610 take away -4?
-112932508371606
Sum 5 and 39982662693674.
39982662693679
Work out -482051271 + -1932.
-482053203
What is -105830205067 + 0.047?
-105830205066.953
What is 32 minus 14750743927?
-14750743895
-1.9+-416543253.6
-416543255.5
Add together -5572.561 and -148830.
-154402.561
Work out 0.1 + -15.7652589979.
-15.6652589979
Calculate 14632343 + -1808082.
12824261
Add 14 and 225.95451618.
239.95451618
What is -17942 minus -2214.8788337?
-15727.1211663
Work out 98543365.54 - -0.107.
98543365.647
What is -7456855 take away -407728?
-7049127
What is -889789.412389 take away 41?
-889830.412389
What is 282757112 + -169.2?
282756942.8
Sum 498105729 and 3.69.
498105732.69
What is -240789945 + 1961?
-240787984
Add together -121 and 2392925847.
2392925726
Calculate 2.377728 - 552592.
-552589.622272
Work out 13948 - 24006.512.
-10058.512
Calculate -230469539.8774 + 5.
-230469534.8774
Calculate 164250554 - -1342993.
165593547
Calculate 24 - 65568901.2.
-65568877.2
What is 297 plus 0.429810748711?
297.429810748711
Sum -153.4 and -175686966.8.
-175687120.2
What is -70650548 less than -652.5?
70649895.5
What is the difference between 131.379071 and -0.2431?
131.622171
What is the distance between -82908.66103 and 312?
83220.66103
86 - -19502506552
19502506638
Sum -9.910792699 and -2.854.
-12.764792699
Add -350309.80056 and 18.
-350291.80056
What is the difference between -28465.1 and -527153518?
527125052.9
What is -4 less than 333956293482?
333956293486
Work out -4990771347 + -47.51.
-4990771394.51
Work out 21463332802 + 143.
21463332945
What is -1348869563 plus -381.294?
-1348869944.294
Put together -95 and -3200814.45751.
-3200909.45751
Add -0.11 and 28102899274.6.
28102899274.49
Add 840225870 and -692444.
839533426
Add 209.9 and -450199992166.
-450199991956.1
What is 3827044 + 241.38?
3827285.38
What is -262.618 take away 8.84675?
-271.46475
Work out -111305806588 - 2.2.
-111305806590.2
0.3 - 4038291025353
-4038291025352.7
What is 33 + -11214015221208?
-11214015221175
Put together 529860155 and 3.1.
529860158.1
Calculate -267.688890609 + -0.6.
-268.288890609
What is the difference between -56315 and -164.79253?
56150.20747
Add 80996577 and 312.4.
80996889.4
Work out -12488701961 - -16.
-12488701945
Calculate -1096870638 - 1199.
-1096871837
What is -582248033808 take away 4.5?
-582248033812.5
Wha | {
"pile_set_name": "DM Mathematics"
} |
block game in description
This is a block destroyer game specially designed for blockgame fans. What you are controlling here is no longer the process after block falling but the course before the block falling. Therefore. you should consider the conditions for quite a few blocks that are coming up instead of only current or next block. To complete this game.
22 challenging kidsafe games for all ages. This award winning game pak will keep you thinking and has something for everyone. test your brain on our strategy games or just waste some time with our matching blockgames. You get: two maze games. 2 tetris-like games. a mahjongg game. strategy games. 4 puzzle games. board games and lots of blockgames. .
Amazing Blocks II is 3D version of the popular Amazing Blocks game. Here the player can use fast but simple logic to arrange different colored blocks of varying shapes into rows. columns or diagonal lines. Once the player has aligned 3 or more blocks they will disappear with some nice graphic effects and sounds. The game is perfectly designed to maintain your interest for hours. .
Amazing Squares is a version of the classic "falling blocks" game. The game boosts two different playmodes. In psycho mode the blocks will be "alive" and move around the screen by them selves. giving you a real challenge. Other features include the ability to save blocks for later. and skin support. The game also contains beautiful CGI rendered graphics and excellent music. .
10 games were included into this package: Draw Game. BlockGame. Bergen and Double Bergen. The Draw Game is one of the easy basic games with dominoes. BlockGame. also known as Block Dominoes. is the simplest of all domino games. and among the most familiar. Sebastopol (or "The Star") is similar to BlockGame in that there is no drawing from the boneyard but there are four open ends rather than two. .
Falling blocks is a simple game which shows blocks of different shapes drop from the top of the screen. You need to climb a tower of blocks as they fall. As the blocks fall they can be rotated or moved horizontally so that every space in the box is filled. Eventually the blocks pile up and reach the top of the screen and the game ends. The more lines that stand incomplete. the higher the blocks above them stack.
Falling blocks is a simple game which shows blocks of different shapes drop from the top of the screen. You need to climb a tower of blocks as they fall. As the blocks fall they can be rotated or moved horizontally so that every space in the box is filled. Eventually the blocks pile up and reach the top of the screen and the game ends. The more lines that stand incomplete. the higher the blocks above them stack.
A very nice tetris-like puzzle game in which you should eliminate blocks of one color. ColorFun features three modes of gaming. customizable number of blocks. game with bombs. jolly sounds and much more. There are many different block sets. You can save your game at any moment. By playing this game you can send your results to the Internet Table!. .
Animate TetBlox is a Tetris-like game with the animated beautiful pictures of nature. you have never seen such a superb blockgame before. There are five game types such as Classic Tetris. Color Tetris etc. You can play with your friend in two-players game which includes three modes: cooperative. combat and race. This game features wonderful graphics. many different blocks skins. three difficulty levels. Playing this game you can send your results to the Internet High Scores table. .
This game was written in Flash CS4 and uses AS3. The object of the game is to demolish the blocks by hitting them with the sphere via the paddle. This game has ten levels. After the fifth level the speed of the sphere increases to make the game more challenging. This game is designed to be embedded directly into a HTML page. .
This is a new version of the classic "falling block" game. In psycho mode the blocks will be "alive" and move around the screen by them selves. giving you a real challenge. Other new features include the ability to save blocks for later. and skin support. The game also contains beautiful CGI rendered graphics and excellent music. .
Word games for one! Download Word Solitaire today and play your choice of 30 different single-player word games. Try the word-based variations of Tri-Peaks. Pyramid and other popular solitaire card games. Or test yourself with solitaire versions of your favorite board games. similar to Scrabble and Boggle. You might even find yourself addicted to one of Word Solitaires exclusive word games like Avalanche. Worm Hole or Walls of Jericho. And who can say no to a quick falling-blocks game inspired by Tetris?. .
Karibino Dominoes Plus is a challenging collection of 20 domino games on PC. With a number of different settings offered. any time! Moreover the game offers a detailed guide. it is easy to play using your mouse and you can access advanced playing tactics suggested by expert domino players! Karibino Dominoes is also a dynamic community of players on the Internet with regularly organized on-line competitions. With a range of rules from All Fives to Chicken Foot through to the famous BlockGame. | {
"pile_set_name": "Pile-CC"
} |
Evaluation of abalone β-glucuronidase substitution in current urine hydrolysis procedures.
This study examined the potential of abalone β-glucuronidase as a viable and cost effective alternative to current hydrolysis procedures using acid, Helix pomatia β-glucuronidase and Escherichia coli β-glucuronidase. Abalone β-glucuronidase successfully hydrolyzed oxazepam-glucuronide and lorazepam-glucuronide within 5% of the spiked control concentration. Benzodiazepines present in authentic urine specimens were within 20% of the concentrations obtained with the current hydrolysis procedure using H. pomatia β-glucuronidase. JWH 018 N-(5-hydroxypentyl) β-d-glucuronide was hydrolyzed within 10% of the control concentration. Authentic urine specimens showed improved glucuronide cleavage using abalone β-glucuronidase with up to an 85% increase of drug concentration, compared with the results obtained using E. coli β-glucuronidase. The JWH 018 and JWH 073 carboxylic acid metabolites also showed increased drug concentrations of up to 24%. Abalone β-glucuronidase was able to completely hydrolyze a morphine-3-glucuronide control, but only 82% of total morphine was hydrolyzed in authentic urine specimens compared with acid hydrolysis results. Hydrolysis of codeine and hydromorphone varied between specimens, suggesting that abalone β-glucuronidase may not be as efficient in hydrolyzing the glucuronide linkages in opioid compounds compared with acid hydrolysis. Abalone β-glucuronidase demonstrates effectiveness as a low cost option for enzyme hydrolysis of benzodiazepines and synthetic cannabinoids. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
What is wrong with my code on calculating area of square/rectangle?
shape = input("Square or Rectangle ? : ")
width = float(input("Enter The Width : "))
if input in shape :
"Square, square"
area = width * width
print ("")
print ("The Area Of The Given Square is" + area)
length = float(input("Enter The Area : "))
area = width * length
print ("")
print ("The Area Of The given Rectangle is ", area)
input("Enter To Exit")
I am new to Python scripting and wanted to make a simple py that calculates the area of a square or rectangle. But when I open it, it asks for the "Square or Rectangle ?" I input Square, then it asks for width and it abruptly closes. Same happens when I put in Rectangle. Again I am a noobie at python and just going off of what I can find. I am not sure on how to frame a question for this to search and find an answer so I resorted to making one.
A:
There are a couple of problems with your code.
1) The condition
if input in shape:
You never defined a variable "input". Furthermore, I'm not real sure why you are checking a condition here anyways. If you're trying to verify that shape is either a rectangle or square consider this code instead:
if shape in ["rectangle", "square"]:
2) The code
"Square, square"
does nothing, and is in fact invalid syntax.
3) The line
print("The area of the given square is" + area)
is invalid string concatenation for the print function. (note you can concatenate this way OUTSIDE of the print function)
Use commas instead.
print("The area of the given square is", area)
| {
"pile_set_name": "StackExchange"
} |
10 Actors Who Turned Down Roles In The Star Wars Franchise
There are few movie franchises in the world that are more popular than Star Wars. The first three movies to actually hit the big screen were so popular that basically every starring actor in those movies saw their careers and their legend grow far beyond what they could have imagined. While most people have lined up to be a part of these films, there are some who have actually been given the chance to appear in one of the now seven films and decided it would be better to turn it down. Sometimes they decided to turn the role down because they felt they weren’t ready, other times they just didn’t feel the role was right for them but whatever the reason, check out the 10 actors who shockingly turned down roles in the Star Wars franchise.
Leonardo DiCaprio
Leo was actually offered the role of Anakin Skywalker but he didn’t feel he was ready for what was such an iconic character. In the end the role went to an unknown who wasn’t particularly ready either. We can’t even imagine how much better the prequels would have been with DiCaprio as a young Vader.
Burt Reynolds
Can you imagine anyone other than Harrison Ford taking on the role of Han Solo. George Lucas did. He offered the part to Burt Reynolds first but thankfully, Reynolds turned the job down. | {
"pile_set_name": "Pile-CC"
} |
import inherits from 'inherits';
import CommandInterceptor from 'diagram-js/lib/command/CommandInterceptor';
import { is } from '../../../util/ModelUtil';
import {
filter,
forEach
} from 'min-dash';
/**
* BPMN specific boundary event behavior
*/
export default function BoundaryEventBehavior(eventBus, modeling) {
CommandInterceptor.call(this, eventBus);
function getBoundaryEvents(element) {
return filter(element.attachers, function(attacher) {
return is(attacher, 'bpmn:BoundaryEvent');
});
}
// remove after connecting to event-based gateway
this.postExecute('connection.create', function(event) {
var source = event.context.source,
target = event.context.target,
boundaryEvents = getBoundaryEvents(target);
if (
is(source, 'bpmn:EventBasedGateway') &&
is(target, 'bpmn:ReceiveTask') &&
boundaryEvents.length > 0
) {
modeling.removeElements(boundaryEvents);
}
});
// remove after replacing connected gateway with event-based gateway
this.postExecute('connection.reconnect', function(event) {
var oldSource = event.context.oldSource,
newSource = event.context.newSource;
if (is(oldSource, 'bpmn:Gateway') &&
is(newSource, 'bpmn:EventBasedGateway')) {
forEach(newSource.outgoing, function(connection) {
var target = connection.target,
attachedboundaryEvents = getBoundaryEvents(target);
if (is(target, 'bpmn:ReceiveTask') &&
attachedboundaryEvents.length > 0) {
modeling.removeElements(attachedboundaryEvents);
}
});
}
});
}
BoundaryEventBehavior.$inject = [
'eventBus',
'modeling'
];
inherits(BoundaryEventBehavior, CommandInterceptor);
| {
"pile_set_name": "Github"
} |
Nikolay Karasyov (rower)
Nikolay Karasyov (; born 1927) is a retired Soviet rower. He competed in the coxless four at the 1956 Olympics, but failed to reach the final. He was the Soviet champion in this event in 1953, 1954 and 1956.
References
Category:1927 births
Category:Possibly living people
Category:Olympic rowers of the Soviet Union
Category:Rowers at the 1956 Summer Olympics
Category:Soviet male rowers | {
"pile_set_name": "Wikipedia (en)"
} |
Hind Horn
"Hind Horn" (Child 17, Roud 28) is a traditional English and Scottish folk ballad.
Synopsis
Hind Horn and the king's daughter Jean fall in love. He gives her a silver wand, and she gives him a diamond ring and tells him when the stones grow pale, he has lost her love. One day, on his travels, he sees it growing pale and sets out for her father's castle. A beggar tells him that the king's daughter is going to marry, and he persuades him to trade clothing. Hind Horn gets to the castle and begs a cup of wine; when the king's daughter gives it to him, he drops the ring in. She asks where he got it, and he told her she gave it to him. She declares she will throw off her fine clothing and beg with him from town to town, and he tells her that his clothing is only a disguise, she will be a great lady.
It was tradition at the time that any beggar who came to the back door of a house to beg from the bride on a wedding day would receive whatever reasonable thing he asked for.
Variants
The popular ballad contains little more than the climax of a tale that is told at much great length in several manuscripts: the English "King Horn", the latest parts of which are thirteenth century; the French romance, Horn et Rymenhild; and the fourteenth-century "Horn Childe and Maiden Rimnild", also English, but closer to the French version.
It appears to contain a stanza from "The Whummil Bore".<ref>Francis James Child, The English and Scottish Popular Ballads, v 1, p 247, Dover Publications, New York 1965</ref>
Several Swedish variants are known, including "Herr Lagman och Herr Thor", from the sixteenth century.
The hero's absence, return, disguised arrival at the wedding feast, and recognition by dropping a ring into the bride's wine cup is a common motif found in both ballads and fairy tales, such as Soria Moria Castle and The Raven.
The magic ring is also found, with the same properties, in the ballad "Bonny Bee Hom".
The ballad was published by William Motherwell in his Minstrelsy: Ancient and Modern (Glasgow, 1827). It was collected in US, South England, Scotland, and Canada.
Recording
This can be found on Bandoggs (now unobtainable) eponymous LP, and Maddy Prior's 1998 CD Flesh & Blood and 1999 live Ballads & Candles''.
See also
Bonny Bee Hom
List of the Child Ballads
The Kitchie-Boy
Young Beichan
References
External links
Hind Horn
Category:Child Ballads
Category:Roud Folk Song Index songs | {
"pile_set_name": "Wikipedia (en)"
} |
Recommended Posts
wlton369 0
wlton369 0
I'm working on an automation for a installer that has QuickTime installer embedded. I am able to automate the first installer. However, with the embedded QuickTime installer, after the QuickTime installer window pops up, I cannot click on any of the buttons non closing the QuickTime installer. I managed to get the handle of the QuickTime installer and it returns 1 when I click on the Next button (but the GUI does not go to the next page and the installation will not be completed). I have tried many ways including WinWait, WinActivate, WinWaitActive, and using Send, ControlSend, also using Class to identify the button etc... but nothing works... Any ideas of what's the problem might be? Below are my code and output.
>Running:(3.3.12.0):C:\Program Files (x86)\AutoIt3\autoit3.exe"C:\Users\user1\Desktop\install.au3"--> Press Ctrl+Alt+Breakto Restart or Ctrl+Breakto Stop
Installer found
<< The Agree checkbox is not checked when the installer starts up>>0<< The Install button is disabled before the Agree checkbox is checked >>0<< The Install button is enabled after the Agree checkbox is checked >>1<< The Install button is clicked >>1<< QuickTime installation starts here...>>1<<$quickTimeNext is clicked:>>1<<$licWindow is shown:>>0x0004046A<<$quickTimeYes is clicked:>>0<<$FolderWinddow is shown:>>0x0004046A<<$quickTimeInstall is clicked:>>0<<$completeWindow is shown:>>0x0004046A<<$quickTimeFinish is shown:>>0<<$quickTimeClose is shown:>>1<< QuickTime installation is completed >>
Installation is completed+>11:36:31 AutoIt3.exe ended.rc:0+>11:36:31 AutoIt3Wrapper Finished.>Exit code:0 Time:54.74
Share this post
Link to post
Share on other sites
JLogan3o13 1,151
JLogan3o13 1,151
What is the product, and does it support command line switches? It is usually much easier to script an install silently rather than trying to manipulate the GUI, especially if it has embedded third party products in it.
√-1 2^3 ∑ π, and it was delicious!
Share this post
Link to post
Share on other sites
wlton369 0
wlton369 0
Thanks JLogan3o13. The reason to use the GUI is that we try to mimic how the user install our software using the installer as much as possible, as we are automating the installer testing at the moment...
I've also tried that once we got the handle of QuickTime installer, it can retrieve the correct title of the QuickTime installer... However, it still stays on the Welcome page after sending the "click on Next button" command. | {
"pile_set_name": "Pile-CC"
} |
Rules of combination that generate climbing fiber tactile receptive fields.
Climbing fiber tactile receptive fields in the anterior lobe of the cat's cerebellum are found to have regularities of shape, independent of their relative position on the cerebellar cortex. The shape regularities can be expressed as rules of combination that generate the receptive field shapes. Both face and paw receptive fields are unions of a certain set of skin areas called compartments. Face receptive fields are generated by taking the union of a seed compartment and another compartment in a binary relation to it, called CF-contiguity. Paw receptive fields are formed in a similar iterative fashion, with the constraint that anatomically equivalent areas be included on all toes involved in the receptive field. This paper specifies rules of combination that both reproduce observed receptive fields and also predict receptive fields that have not yet been observed. Because of the regularities of shape among the climbing fiber tactile receptive fields, the rules of combination can be used to predict ensemble activation in response to tactile stimulation. | {
"pile_set_name": "PubMed Abstracts"
} |
America’s Best Days Are Ahead of Us .… I Think ….
It is simply a matter of a return to remembering who we are. It is a matter of remembering the common ground and rediscovering the core American values upon which our national heritage was founded.
From the very framing of our own Constitution to now, we’ve known that ultimately, ‘all politics are local’.
We’ve known that our personal and collective well-being, if not our national security rests upon the strength of every local community, its ability to be the master of its own destiny, and the opportunity for every citizen to thrive on a level playing field.
All of this of course now competes in the globalized petri dish for economic profitability, environmental quality, and social justice, not to mention military dominance … a petri dish of mind-numbing possibilities, scenarios, and outcomes by which the human experiment ultimately writes its own history.
What does it mean to return to core American values, principles, and practices upon which virtually every facet of our culture finds common ground with their fellow citizens?
At the Institute, we believe it to be fundamentally a return to self-sufficiency, self-determination, self-reliance, creativity, ingenuity, innovation, and entrepreneurship all grounded in responsibility for self, family, neighborhood, community, and country.
These values are neither liberal, nor conservative, libertarian, socialist, or communist. They are core American values owned by no party, especially those at the radical extremes of each.
The essence of core American values can be imagined in many ways.
It can be the simple act of neighbors chatting across the fence about the issues of the day, or meeting to organize a ‘neighborhood watch’ group. It can be ‘local folks’ buying produce from local farmers and patronizing locally owned businesses. Or it can be local businesses contributing financially or providing services free of charge to a community cause that strengthens our civic pride, or contributes to the well-being of those least able to afford such for themselves (e.g. a food pantry or free health clinic).
There are literally thousands of ways to imagine the indicators by which to measure the health of a community as reflected in the collective well-being of each of its citizens.
A return to core American values requires that we also remind ourselves of the lessons learned – both good and bad – from our brightest and darkest moments … harnessing of electricity as one of our brightest, and slavery as one of our darkest.
It requires that civic literacy and civil discourse return to center stage in our homes, businesses, public venues, and educational system.
The polarized if not politically poisoned ether in which we find ourselves treading deeply these days, is hard not to notice.
This is evident not only from simply watching the political news from our nation’s capital, or personally falling victim to an economy that has out-sourced itself to the edge of oblivion, but even in experiencing the heated volatility of sustainable community comprehensive planning meetings of recent months.
The polarized ether is even evident at family gatherings where personal ideologies can often trump harmony among parents, siblings, and extended family.
Verbal and non-verbal posturing and jockeying for ‘ideological supremacy’ by ‘liberals’, ‘conservatives’, and even ‘independents’ leads to a ‘might makes right’ and ‘winner take all’ attitude that simply seems counter-productive to our future.
All too often, “truth” is the first victim in such encounters, especially truth couched in the best-available science that supports and/or refutes one’s pre-ordained conclusions and the ultimate right to claim victory over one’s opponents, …. even if they are family members.
Can we stop what seems to be this ‘win at any cost’ and ‘winner take all’ contest?
Obviously easier said than done, as we all know.
‘Sustainability’ is often one of those “trigger words” that can bring out the best and the worst in those on both sides of this contemporary argument.
As one might guess, I’d suggest it is a perfect ideological ping pong ball for a civil, yet edgy critique and debate around core American values.
Sustainability is one of the premier concepts over which ideological enemies (political, religious, and special interest groups of every flavor) often love to beat each other to a bloody pulp, both figuratively and unfortunately sometimes literally.
Such frames of reference and reaction range from questioning the ‘financial sustainability’ of a community whose costs exceed their revenues, to the venomous claim or denial of ‘sustainability’ being the front for ‘one world government’ as represented by the United Nation’s Agenda 21. This particular frame of reference, whether real or imagined, is rapidly rising as an election year issue.
Sustainability has enjoyed this ‘love-hate favorite’ status for going on roughly 25 years, based on the United Nations Brundtland Commission publishing of the most commonly referenced definition in 1987,
“ …. development which meets the needs of the present without compromising the ability of future generations to meet their own needs.”
This UN based reference was the political compromise between environmental, social, economic, and government interests finding at least some common ground upon which even multi-national corporations could find room to support and market. However, we’ll save ‘greenwashing’ for a later discussion.
Corporate support for this is best evidenced by a stroll through the website of the World Business Council for Sustainable Development <http://www.wbcsd.org/home.aspx >, an international foundation devoted to sustainability-based business education, advocacy, policies, and initiatives across every industrial and business sector.
So, as definitions go, “not bad”, one might say?
On the surface, the Brundtland definition is a nice values-based and ethical statement about maintaining a balance between freedom and responsibility.
It frames a sense of personal freedom tempered by social responsibility for those around us and those who will follow, not unlike the American cliché of ‘leaving the world a better place for our children and grandchildren’, and so-on.
However, it says absolutely nothing about the smorgasbord of principles and practices by which it can and must be achieved when applied to the infinite variety of local to global circumstances in the daily lives of 300 plus million Americans, much less seven (7) billion fellow human dwellers and tens of millions of other species on this ‘3rd rock from the sun’ planet we call Earth.
How can everyone happily ‘go home a winner’ in the battle for ideological truth and supremacy with a definition like that?
Not very easily, based on the deafening, and yet healthy debate around loss of personal freedom and the constitutional right to ‘life, liberty and the pursuit of happiness’, … pitted against civic responsibility in personal, professional, and community life, not to mention national security.
It begs the question of freedom without responsibility, and vice-versa.
It is this nebulous and ubiquitous nature of ‘that definition’ that has been one of sustainability’s own greatest enemies.
It seems to have come to mean everything, and to mean nothing for way too many people.
This brings us back full circle to the home plate of this discussion, and the closing of this initial blog.
For many if not most Americans, if ‘sustainability’ can’t pass the smell and gut-check test of what it means to be American, then it can’t and shouldn’t be supported.
In other words, if it doesn’t naturally square with core American values, principles, and practices, then it winds of smelling like a conspiracy; a left wing socialist ‘one world government’ conspiracy at that.
The politics of ‘our best days are ahead or behind us’ ultimately play out locally for every citizen in the community and region in which they live.
I would argue that if sustainability is not defined, understood, implemented, and measured to be proof of the power of commonly held American values at the local level, then the concept should and shall go into the recycle bin of history.
At the St. Croix Institute for Sustainable Community Development, we believe that, fundamentally, a community is sustainable only to the degree to which it is ‘locally’ self-sufficient in energy, food, water, shelter, clothing, transportation, health care, education, safety/security, employment, and commerce scaled to the equitable needs of all its citizens and within the carrying capacity of native ecosystems over multiple generations. | {
"pile_set_name": "Pile-CC"
} |
I have been lying my entire life. It has gotten me into LOADS of trouble that is now going to be legal trouble once I turn myself in. I finally had to tell my parents that i was a compulsive liar and this is what has happened but even in my telling them i told lies. I know its a process and i cannot expect to be constantly truthful because i have a really hard time telling the truth from the lies. My question is
HOW DO YOU TELL SOMEONE YOU ARE A COMPULSIVE LIAR?
i have friends who i have lied to and i want them to know. I just dont know how to start the conversation. I want them to be aware so that they can challenge me and help me be more honest. I don't want to tell everyone but i just dont even know how to start a conversation. I am looking for people to tell me how they go about telling their loved ones and friends and how they decide who and when to tell!
ADVERTISEMENT
I'm really glad this is the first topic I decided to respond to. First of all, it's not the worst thing in the world; I'm a habitual liar and I used to think it was until I came clean.
I had this conversation with my girlfriend, the first person I ever actually told. I started the conversation by telling her I have a really well kept secret I need to get off my chest, and it was awkward and difficult but it eventually just came out..I can understand how hard it is to come out in word form but if you say it to yourself enough times in the mirror it eventually becomes easier to implement into a conversation with someone else. I also recommend you tell someone you can absolutely trust, make sure you're comfortable with one person knowing before it spreads around; build your assurance about it up.
thank you so much that was so helpful! i actually did this and told my new boyfriend. It was so hard telling the truth and at first after it felt weird and wrong but it felt so great about a day after when i didn't feel like i was hiding it anymore! I really appreciate your help welcome to the forum! | {
"pile_set_name": "Pile-CC"
} |
Why use Belmont Reds?
As a sire breed, the tropically adapted Belmont Red has a unique advantage over British, European and Bos Indicus breeds for use in crossbreeding.
Belmont Reds possess all of the production and beef quality traits of the British and European Bos Taurus breeds, with the added benefits of superior adaptation traits including tick and parasite resistance, heat tolerance and drought resistance, combined with calving ease and small birth weight calves.
Belmont Reds have adaptation traits equal to the Bos Indicus breeds,
with the added advantage of very high fertility including early sexual maturity in both males and females with females able to reconceive at low weights and whilst lactating, in conjunction with the Belmont Reds superior carcass qualities and renowned docile temperament.
Economics
Economically Belmont’s produce an extra gross profit of $24 on grass and $76 on grain per adult compared to Brahmans (CRC Research).
Reputation
Belmont Reds have over 50 years of proven performance testing and are proudly AUSTRALIAN made for AUSTRALIAN conditions. | {
"pile_set_name": "Pile-CC"
} |
Q:
SDL2 project builds on MinGW but not Cygwin using CLion
I'm building a test project using SDL2 and CLion on Windows 10. The project, called HelloSDL is based off this tutorial, and just creates a window and prints "Hello World". I'm using the FindSDL2.cmake and FindSDL2_ttf.cmake scripts from here. My CMakeLists.txt file is as follows:
cmake_minimum_required(VERSION 3.6)
project(HelloSDL)
set(CMAKE_CXX_STANDARD 11)
set(CMAKE_MODULE_PATH ${CMAKE_MODULE_PATH} "${HelloSDL_SOURCE_DIR}/cmake")
set(SDL2_PATH "C:\\SDL\\SDL2-2.0.5\\i686-w64-mingw32" CACHE PATH "The location to search for SDL2")
set(SDL2_TTF_PATH "C:\\SDL\\SDL2_ttf-2.0.14\\i686-w64-mingw32" CACHE PATH "The location to search for SDL2_TTF")
find_package(SDL2 REQUIRED)
include_directories(${SDL2_INCLUDE_DIR})
find_package(SDL2_ttf REQUIRED)
include_directories(${SDL2_TTF_INCLUDE_DIR})
include_directories(include)
set(SOURCE_FILES main.cpp)
add_executable(HelloSDL ${SOURCE_FILES})
target_link_libraries(HelloSDL ${SDL2_LIBRARY} ${SDL2_TTF_LIBRARY})
The project builds and runs perfectly fine under MinGW, however when I try and build it under Cygwin I get linking errors:
CMakeFiles/HelloSDL.dir/main.cpp.o: In function `SDL_main':
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:97: undefined reference to `SDL_Init'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:102: undefined reference to `TTF_Init'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:104: undefined reference to `SDL_Quit'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:109: undefined reference to `SDL_CreateWindow'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:113: undefined reference to `TTF_Quit'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:114: undefined reference to `SDL_Quit'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:117: undefined reference to `SDL_CreateRenderer'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:121: undefined reference to `TTF_Quit'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:122: undefined reference to `SDL_Quit'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:133: undefined reference to `TTF_Quit'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:134: undefined reference to `SDL_Quit'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:140: undefined reference to `SDL_QueryTexture'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:148: undefined reference to `SDL_PollEvent'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:156: undefined reference to `SDL_RenderClear'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:160: undefined reference to `SDL_RenderPresent'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:164: undefined reference to `TTF_Quit'
/cygdrive/c/Users/Kieran/CLionProjects/HelloSDL/main.cpp:165: undefined reference to `SDL_Quit'
I don't have a lot of experience, but to me this indicates that it's not linking against the SDL2 library. I'm confused as to why when the CMake output indicates it found the SDL2 library:
-- Found SDL2: C:/SDL/SDL2-2.0.5/i686-w64-mingw32/lib/libSDL2main.a;C:/SDL/SDL2-2.0.5/i686-w64-mingw32/lib/libSDL2.dll.a
Any help would be appreciated in trying to get it to compile under Cygwin.
A:
First you need to use the Libraries from Cygwin (libSDL2*-devel), not the one you have downloaded for MinGW, and you also need to generate your Makefile with CMake using the MSYS format.
cmake -G "MSYS Makefiles"
| {
"pile_set_name": "StackExchange"
} |
PlayStation still unsure of Morpheus price
In a recent interview with GamesIndustry, president of PlayStation Worldwide Studios, Shuhei Yoshida, discussed Sony’s current inability to set a price for Morpheus. Oculus announced that a full Rift setup would cost $1,500, factoring in the cost of a PC capable of running everything smoothly. This announcement had many clamoring for a response from PlayStation.
Yoshida explains, “We are talking about launching next year, so we don’t typically talk about pricing one year ahead of time.” He cited the PS4 pricing announcement, which was roughly five months before launch. He continues, “It’s not like we’re waiting for Oculus to announce their price. We still have work to do to know exactly the cost of goods and so on.”
The only hint at a price we have so far is that Sony hopes to offer the Morpheus headset for “as low as possibly can be done.” With Morpheus set to be released in the first half of 2016, we might expect to hear a price at the PlayStation Experience this year. No true VR pricing announcements have been made, only estimations. It’s possible that the companies are hoping to undercut the competition. | {
"pile_set_name": "Pile-CC"
} |
(Let me apologize before you start for the length of this blog entry. If it were a magazine article I’d spend hours more trying to edit it to perhaps half its current length. But this is a blog, and the thing about blogs is that they are usually stream of conscience rather than highly thought through and edited. And when I stream my thoughts, well…)
One of my recent postings brought up a reply that essentially says “touch and gestures is old thinking, I want a speech-based user interface”. Ah, wouldn’t we all? Generalized speech recognition is one of the “Holy Grail”‘s of Computer Science. I can still remember one of my friend’s returning from Carnegie Mellon University for a summer break in the mid-1970s and going on about how generalized speech recognition (he’d been working on Hearsay-II) was right around the corner. 35ish years later and we are still not quite there. I still pick on him about it. A couple of years ago I teased Microsoft’s Chief Research Officer (and former CMU professor), Rick Rashid, about this. Rick correctly pointed out that we have come a long way and that speech recognition is now entering widespread, if more targeted, use. So I’m going to talk about the evolution of computer User Interface, where we seem to be with speech, and why speech may never become the primary mode of computer interaction.
When it comes to direct human interaction with computers the way it all started was by taking existing tools and figuring out how to wire them up to the computer. We had typewriters, so by hooking a typewriter to the computer you could input commands and data to it and the computer could print its output. We had oscilloscopes so by hooking one up to the computer we could output more graphical information. We had to create a language you talked to the computer in and those command line (aka command shell) languages became the primary means of interacting with computers in the 1960s, 70s, and 80s. Even today Linux, Windows, MAC OS, etc. all have command line languages and they are often used to perform more esoteric operations on the systems. The nice thing about command line languages is that they are dense and precise. The bad thing is that they are unnatural (requiring wizard-level experts who have trained on and utilized them for years).
These three attributes, density (how much information can be conveyed in a small space), precision (how unambiguous is the information conveyed), and how natural (to the way humans think and work) can be used to evaluate any style of computer interaction. The ideal would be for interactions to be very dense, very precise, and very natural. The reality is that these three attributes work against one another and so all interaction styles are a compromise.
As far back as the 1960s researchers were looking for a more natural style of computer interaction than command lines. And obviously Science Fiction writers were there too. For example in the original Star Trek we see interactive graphic displays, tablet style computers, sensor-based computers (e.g., Tricorder) and computers with full speech recognition. Who can forget Teri Garr’s amazement at seeing a speech controlled typewriter in 1968’s “Assignment: Earth” episode? Yet these were all truly science fiction at the time. Interestingly Star Trek never showed use of a computer mouse, and in the Star Trek Movie “The Voyage Home” when Scotty sees one he has no idea what it is. I find that interesting because the computer mouse was invented in 1963, although most people would never see one until the 1990s.
The command line world wasn’t static and continued to evolve. As video terminals began to replace typewriter-style terminals (or “teletypes”) they evolved from being little more than glass teletypes to being capable of displaying forms for data input and displaying crude graphics for output. Some more human-oriented command languages, such as the Digital Command Language (DCL) appeared. Some command line processors (most notably that of DEC’s TOPS-20) added auto-completion and in-line help, making command lines much easier to use by non-experts. Of all these only Forms altered the basic Density, Precision, Naturalness equation by allowing Task Workers (e.g., order entry clerks) to make use of computers. After all, filling out forms is something that humans have been doing for at least a couple of centuries.
In the 1960s and 1970s Stanford Research Institute’s ARC and Xerox’s PARC continued to work on better ways to interact with computers and produced what we now know as the Graphical User Interface (GUI), based on Windows, Icons, Menus, and Pointers (WIMP). While WIMP is far less dense than command line based systems, it maintains their precision. Density is still important however, which is why keyboard shortcuts were added to Microsoft Windows. But most importantly, WIMP is far more natural to use than command lines due to the desktop paradigm and visual clues it provides. It was GUI/WIMP that allowed computers to fully transition from the realm of computer specialists to “a computer on every desk and in every home”.
Work continued on how to make computers even more natural to use. One of the first big attempts was Pen Computing and Handwriting Recognition, which had its roots in the 1940s (or as far back as 1888 if you want to stretch things). There was a big push to bring this style to the mainstream in the late 1980s and early 1990s, but it failed. High costs, poor handwriting recognition, and other factors kept pen computing from catching on. It wasn’t dense nor precise enough. This style enjoyed a bit of a renaissance in the late 1990s with the introduction of the Palm Pilot which eschewed general handwriting recognition in favor of a stylized pen input technique known as Graffitti. The Palm Pilot was also a limited function device, which allowed it to be well tuned for Pen use. This lead to further use of a Pen (aka Stylus) in many PDAs and Smartphones. However, the more general purpose the platform (e.g., Smartphones or a PC) the more tedious (lack of density) Pen use became. In other words, the use of a Pen as just another pointer in a WIMP system was just not very interesting.
This finally brings us to the user interface paradigm that will dominate this decade, Touch and Gestures (Touch). Touchscreens have been around for many years, at least back to the 70s. But they generally had limited applicability (e.g., the check-in kiosk at the airport). When Apple introduced the iPhone, dropping WIMP and bypassing Pen Computing in favor of a Touch-based UI, it really did change the world. To be fair Microsoft introduced these at the same time, but in a very limited production product known as Surface. So Apple gets the real credit. Touch trades away density and precision to achieve a massive leap in how natural it is for a human to interact with the computer. The tradeoff works really well for content consumption, but is not good for content creation. So WIMP, which is a great content creation paradigm, is likely to live on despite the rise of Touch. The place most users probably notice Touch’s precision problems are when there are a series of links on a web page that are stacked on top of one another. Your finger can’t quite touch the right one (there it is, lack of precision). If you are lucky you can use a gesture to expand and then position the page so you can touch the right link (requiring more operations, which is less dense than WIMP would allow), but sometimes even this doesn’t work. Now expand this to something like trying to draw a schematic, or a blue print, and you can see the problems with Touch and why WIMP will continue to survive. For another example consider how much easier it is to book a complex travel itinerary (tons of navigation and data input) on your PC versus doing the same on your iPad. It is one of the few activities where I feel compelled to put down my iPad and move to my PC. Writing this blog is another. Touch is great for quick high-level navigation to content you want to view. It is painful for performing precise and/or detailed input.
Speech-based user interface research dates back to the 1950s, but took off in the 1970s. You can really split this into Speech output and Speech recognition. As I pointed out earlier, the big joke here is that generalized speech recognition is always right around the corner. And has been for almost 40 years. But speech synthesis output has been commercially successful since 1984’s introduced of DECtalk. DECtalk was a huge hit and 27 years later you can still hear “Perfect Paul” (or “Carlos” as he was known to WBCN listeners, which included so many DECies that most of us forgot the official name), DECtalk’s default voice, from time to time. But what about Speech recognition?
If you own a Windows XP, Windows Vista, or Windows 7 PC then you have built-in speech recognition. Ditto for the last few versions of Office. How many of you know that? How many of you have tried it? How many use it on a regular basis? I’d love if Microsoft would publish the usage statistics, but I already know they would indicate insignificant usage. My father used to call me up and say “hey, I saw a demo of this thing called Dragon that would let me write letters by just talking into the computer”. He did this more than once, and each time I told him he had that capability in Microsoft Word, but to my knowledge he never actually tried it. I did meet a lawyer who threw away her tape recorder and began using Dragon Naturally Speaking for dictation, but I think she was a special case. Frankly, in all the years I’ve heard about speech recognition she is the only layperson (or non-physically challenged person) I’ve met who uses it on such a general and regular basis. More on her situation later. Meanwhile my own attempts to use this feature demonstrated its weakness. It works great until you have to correct something, then its use becomes extremely tedious (lack of precision and density), and complex changes require the use of a pointing device (or better put, you go back to WIMP).
It’s not just that you can do dictation in Microsoft Word or other applications, you can control your Microsoft Windows machine with it. However, I can’t see many people doing this for two reasons. One is speech’s lack of both density and precision. The other is that layering speech on top of a WIMP system makes everything about speech’s lack of density and precision worse. File->Save As->… is just too tedious a command structure to navigate with speech. But the most important indictment of speech as the primary form of computer interaction is that it is far less natural than people assume.
Think about how annoying it is for someone to take a cell phone call in a restaurant. Or why do you suppose that most U.S. Airlines have decided not to install microcells on their planes so you can use your cell phone in flight (and even those with in-flight WiFi are blocking Skype and VOIP services)? And how proper is it for you to whip out your cell phone and take a call in the middle of a meeting? Or think about how hard it is to understand someone in a crowded bar, at a rock concert, in an amusement park, or on a manufacturing floor. Now imagine talking to your computer in those same circumstances. Your co-workers, fellow diners, or seatmates will want to clobber you if you sit around talking to your computer. And you will want to slit your own throat after a few experiences trying to get your computer to understand you in a noisy environment. Speech is a highly flawed communications medium that is made acceptable, in human to human interaction, by a set of compensating mechanisms that don’t exist in a human to computer interaction.
I recently read about a study that showed that in a human to human conversation comprehension rises dramatically when you can see the face of the person you are talking to. Our brains use lip-reading as a way to autocorrect what we are hearing. Now maybe our computers will eventually do that using their cameras, but today they are missing this critical clue. In a human to human interaction body language is also being used as a concurrent secondary communication channel along with speech. Computers don’t currently see this body language, nor could they merge it with the audio stream if they did. In human to human communications the lack of visual cues is what makes an audio conference so much less effective than a video conference, and a video conference so much less effective than an immersive experience like Cisco’s Telepresence system, and Telepresence somewhat less effective than in-person meetings. And when you are sitting in a meeting and need to say something to another participant you don’t speak to them, you slip them a note (or email, instant message, or txt them even though they are sitting next to you).
I use speech recognition on a regular basis in a few limited examples. One of the ones I marvel at is United Airlines’ voice response system (VRP). It is almost flawless. In this regard it proves something we’ve long known. You can do generalized speech recognition (that is, where the system hasn’t been trained to recognize an individual’s voice) on a restricted vocabulary or you can do individualized recognition on a broader vocabulary. For example, getting dictation to work requires that you spend 15 or more minutes training the software to recognize your voice. I imagine that specialized dictation (ala medical or legal) takes longer. United has a limited vocabulary and so it works rather well. My other current usage is Windows Phone 7’s Bing search. I try to use speech recognition with it all the time, and it works maybe 70% of the time. There are two problems. The first is that if there is too much noise (e.g., other conversation) around me then it can’t pick up what I’m saying. The bigger one is that if I say a proper noun it will often not come close to the word I’m trying to search on. Imagine all the weird autocorrect behaviors you’ve seen on steriods. Autocorrect is a great way to think about speech recognition, because after software converts raw sound into words that sounds similar it uses dictionary lookups and grammatical analysis to guess at what the right words are. I suggest a visit to http://damnyouautocorrect.com/ for a humorous (and, warning, sometimes offensive) look at just how off course these techniques can take you.
Let’s get to the bottom line. Speech has horrible precision, poor density, and there are social factors that make it natural in only certain situations.
So what is the future of speech? Well first of all I think the point uses of it will continue to grow dramatically. Things like United Airlines’ VRP. Or the lawyer I mentioned. She used to dictate into a tape recorder then pay a transcription service to transcribe the tape. She would then go back over the transcript and make corrections. The reason that a switch to Dragon Naturally Speaking worked for her is that the correction process took her no more time then did fixing the errors the transcription service introduced. And it was a lot cheaper to have Dragon do the initial transcription than to pay a service. So certainly there are niches where speech recognition will continue to make inroads.
The bigger future for speech is not as a standalone user interface technology but rather part of a full human to humanoid-style of interaction. I can say play or “touch” play to play a video. I can merge sensory inputs, just as humans do, to figure out what is really being communicated. I can use a keyboard and/or pointer when greater precision is required, just as humans grab white boards and other tools when they can’t communicate with words and gestures alone. And I can project output on any display (the same one you use as your TV, your phone, a dedicated monitor, the display panel on your oven, the speakers on your TV or audio components, etc. This is the totality of a Natural User Interface (NUI). Speech doesn’t become truly successful as a user interface paradigm of its own. It shines as part of the NUI that will dominate the next decade.
I really think it will take another 8-10 years for a complete multi-sensor NUI (nee Humanoid UI) to become standard fare, but Microsoft has certainly kicked off the move with the introduction of Kinect. It’s primitive, but its the best prototype of the future of computing that most of us can get our hands on. Soon we’ll be seeing it on PCs, Tablets, and Phones. And a decade from now we’ll all be wondering how we ever lived without it.
2 Responses to Thinking about User Interface paradigms and an eventual “Humanoid UI”
Thank you. I was trying to explain to someone why I keep saying Kinect is the prototype of a revolution in computer interfaces and you just did a much better job of it than I ever could.
FYI, I was born with Cerebral Palsy and have used wheelchairs my entire life as well as having lost all fine motor control in my right arm due to a seizure at age two so I am definitely not the typical person conventional UI designs are based on. Consequently, the prospect of a truly natural user interface that can adapt to me rather than me being forced to find ways of adapting to it is practically nirvana. Well, actually it would be that combined with a robotic assistant that could go anywhere with me (or for me) and act as my arms and legs when there is no other option available. | {
"pile_set_name": "Pile-CC"
} |
Q:
Web SQL insert data into multiple rows
I've tried to insert variables into multiple rows at once in Web SQL database but with all known to me methods I'm getting errors:
("INSERT INTO tab (a,b) VALUES (?,?),(?,?)",[v1,v2,v3,v4])
>> could not prepare statement (1 near ",": syntax error)
("INSERT INTO tab (a,b) VALUES (?,?,?,?)",[v1,v2,v3,v4])
>> could not prepare statement (1 4 values for 2 columns)
("INSERT INTO tab (a,b) VALUES (?,?)",[v1,v2,v3,v4])
>> number of '?' does not match arguments count
Which one is correct for Web SQL and where is my mistake?
A:
As table tab has two columns you can specify only two values to be inserted as a row not 4. Following query will work:
("INSERT INTO tab (a,b) VALUES (?,?)",[v1,v2])
You can execute this query multiple times in a single transaction to add multiple rows to improve performance of overall query and ensure integrity. Hope this helps!!!
| {
"pile_set_name": "StackExchange"
} |
Q:
How does JSX interpolate props for elements with checkbox inputs?
The below JSX works if this.props.stocked returns false or true but why doesn't it work if I just hardcode false in? As in replace it with checked=false
<input
type="checkbox"
checked={this.props.stocked}
/>
A:
checked=false should be checked={false}
If you want to use a JavaScript expression as an attribute value, you have to wrap it in a pair of curly braces, otherwise you'll get a SyntaxError.
Embedded: JSX value should be either an expression or a quoted JSX
text
You can read about it here
| {
"pile_set_name": "StackExchange"
} |
Enlightenment on Sacrifices
by Joseph de Maistre
CHAPTER I. SACRIFICES IN GENERAL
I by no means accept the blasphemous axiom, Human fear first invented
the gods.[Primus in orbe deos fecit timor. This passage,
whose true author is unknown, is to be found amongst the fragments of
Petronius. It is quite at home there.]
On the contrary, I am happy to notice that men, by giving God names
expressing greatness, power, and goodness, by calling him Lord,
Master, Father, and so on, show clearly enough that the idea of
divinity cannot be born of fear. It can be seen also that music, poetry,
dance, in a word all the pleasing arts, have been called on in religious
ceremonies and that the idea of rejoicing was always so closely involved
in the idea of festival that the last became everywhere
synonymous with the first.
Far be it from me, moreover, to believe that the idea of God could have
started with humanity or, in other words, that humanity can be older
than the idea.
It must, however, be confessed, after having made sure that this is
orthodox, that history shows man to be convinced at all times of this
terrible truth, that he lives under the hand of an angry power and
that this power can be appeased only by sacrifice.
At first sight, it is not at all easy to reconcile so apparently
contradictory ideas, but, if they are studied closely, it can easily be
understood how they agree and why the feeling of terror has always
existed side by side with that of joy without the one ever having been
able to destroy the other.
"The gods are good, and we are indebted to them for all the good things
we enjoy: we owe them praise and thanks. But the gods are just and we
are guilty. They must be appeased and we must expiate our sins; and, to
do this, the most effective means is sacrifice."
Such was the ancient belief and such is still, in different forms, the
belief of the whole world. Primitive men, from whom the whole of
humanity has received its fundamental opinions, believed themselves
culpable. All social institutions have been founded on this dogma, so
that men of every age have continually admitted original and universal
degradation and said like us, if less explicitly, our Mothers
conceived us in sin; for there is no Christian dogma that is not
rooted in man's inner nature and in a tradition as old as humanity.
But the root of this debasement, or this reification of man, resides
in sensibility, in life, in short in the soul, so
carefully distinguished by the ancients from the spirit or
intelligence.
Animals have received only a soul; we have been given both
soul and spirit....
The idea of two distinct powers is very ancient, even in the
Church. "Those who have adopted it," said Origen, "do not think that the
words of the apostle the flesh lusteth against the spirit
(Galatians 5:17), should be taken to mean the flesh literally,
but to refer to that soul which is really the soul of the
flesh: for, they say, we have two souls, one good and celestial, the
other inferior and terrestrial: it is of the latter that it has been
said its works are manifest (ibid., 19), and we believe
that this soul of the flesh resides in the blood."[Origen, De
Principiis, Book iii, Chap. iv. 8.]
For the rest, Origen, who was at once the most daring and the most
modest of men in his opinions, did not persist in this problem. The
reader, he said, will form his own opinions. It is, however,
obvious that he had no other explanation for two diametrically opposed
impulses within a single individual.
Indeed, what is this power that opposes the man or, to put it
better, his conscience? What is this power which is not he, or all of
him? Is it material like stone or wood? In this case, it neither
thinks nor feels and consequently cannot be capable of disturbing the
spirit in its workings. I listen with respect and dread to all the
threats made by the flesh, but I want to know what it is ....
Fundamentally, it appears that on this point Holy Scripture is in
complete agreement with ancient and modern philosophy, since it teaches
us "that man is double in his ways[James 1:8.] and that the word of God
is a living sword that pierces to the division of the soul and the
spirit and discerns the thoughts of the heart."[Hebrews 4:12.]
And Saint Augustine, confessing to God the sway that old visions brought
back by dreams still had over his soul, cried out with the most pleasing
simplicity, "Then, Lord, am I myself?"[Confessions, X, xxx.]
No, without doubt, he was not HIMSELF, and no one knew this better than
he, who tells us in the same passage, How much difference there is
between MYSELF and MYSELF; he who so well distinguished the
two powers in man when he cried out again to God: Oh, thou mystic
bread of my soul, spouse of my intelligence, I could not love
you.[Ibid., I, xiii.]
Milton has put some beautiful lines into the mouth of Satan, who howls
of his appalling degradation.* Man also could suitably and wisely speak
them ....
[* "O foul descent! that I who erst contended
With gods to sit the highest, am now constrain'd
Into a beast; and, mix'd with bestial slime,
This essence to incarnate and imbrute,
That to the height of deity aspired!" - Paradise Lost, ix,
163-167.]
I am aware that the doctrine of the two souls was condemned in
ancient times but I do not know if this was by a competent tribunal:
besides, it is enough to understand it. That man is a being resulting
from the union of two souls, that is to say, of two intelligent
constituents of the same nature, one good and the other bad, this is, I
believe, the opinion which should have been condemned and which I also
wholeheartedly condemn. But that the intelligence is the same as
sensation, or that this element, which is also called the vital
principle and which is life, can be something material,
completely devoid of understanding and consciousness, is what I will
never believe, unless I happen to be warned that I am mistaken by the
only power with a legitimate authority over human belief. In this case,
I should not hesitate a moment, and whereas now I have only the
certainty that I am right, then I would have the faith
that I am wrong. If I were to profess other opinions, I would directly
contradict the principles which have dictated the work I am publishing
and which are no less sacred to me.
Whatever view is taken about the duality of man, it is on the animal
power, on life, on the soul (for all these words meant
the same thing in the ancient language), that the malediction
acknowledged by the whole world falls....
Man being thus guilty through his sensuous principle, through his
flesh, through his life, the curse fell on his blood, for blood
was the principle of life, or rather blood was life.[Genesis 9:4-5;
Leviticus 17:11; Deuteronomy 12:23-24.] And it is a remarkable fact that
old Eastern traditions such as these, which had long been forgotten,
have been revived in our own day and upheld by the most distinguished
physiologists. Let us accept the vitality of blood, or rather the
identity of blood and life, as a fact which antiquity never doubted and
which has been acknowledged again today; another opinion as old as the
world itself was that heaven grew angry with the flesh, and
blood could be appeased only by blood. No nation doubted that
there was an expiatory virtue in the spilling of blood. Now neither
reason nor folly could have invented this idea, still less get it
generally accepted. It is rooted in the furthest depths of human nature,
and on this point the whole of history does not show a single dissenting
voice. The entire theory rests on the dogma of substitution. It was
believed (as was and always will be the case) that the innocent could
pay for the guilty; from which it was concluded that, life being
guilty, a less precious life could be offered and accepted in place
of another. Thus the blood of animals was offered, and this
soul, offered for a soul, the ancients called antipsychon,
vicariam animam, as you might say a soul for a soul OR
substitute soul....
It should be noticed that, in sacrifices properly speaking, carnivorous
or nonintelligent or nondomestic animals like deer, snakes, fish, birds
of prey, and so on, were not slaughtered. A]ways, among the animals, the
most valuable for their utility, the gentlest, the most innocent, those
nearest to man by instinct and habit were chosen. Since in the end man
could not be slaughtered to save man, the most human, if I can put it
like that, in the animal world were chosen as victims; and the victim
was always burned wholly or in part, to bear witness that the natural
penalty for crime is the stake and that the substitute flesh was
burned in place of the guilty flesh....
The roots of so extraordinary and so general a belief must go very deep.
If there was nothing true or enigmatic about it, why should God himself
have retained it in the Mosaic law? Where could the ancients have found
the idea of a spiritual regeneration through blood? And why, at all
times and in all places, have men chosen to honor, supplicate, and
placate God by means of a ceremony that reason points out to all and
that feeling rejects? It is absolutely necessary to appeal to some
hidden and very powerful cause.
CHAPTER II. HUMAN SACRIFICES
The doctrine of substitution being universally accepted, it was thought
equally certain that the effectiveness of sacrifices was proportionate
to the consequence of the victims; and this double belief, at bottom
just but vitiated by the force that vitiates all things, gave birth on
all sides to the horrible superstition of human sacrifices. In vain did
reason tell men that they had no rights over their fellows and that they
even testified to this themselves by offering the blood of animals to
atone for that of man; in vain did gentle humanity and natural
compassion reinforce the arguments of reason: in face of this compulsive
dogma, reason remained as powerless as feeling.
One would like to be able to contradict history when it shows us this
abominable custom practiced throughout the world, but, to the shame of
humanity, nothing is more incontestable.... Once again, where did men
take their opinion from? And what truth had they corrupted to reach
their frightful error? It is quite clear, I think, that it all results
from the dogma of substitution, whose truth is beyond dispute and is
ever innate in man (for how could he have acquired it?), but which he
has abused in a deplorable manner: for, accurately speaking, man cannot
take up an error. He can only be ignorant of or abuse the truth, that is
to say, extend it by false induction to a case which is irrelevant to
it.
It seems that two false arguments lead men astray; first, the importance
of the subjects which are to be freed from anathema. It is said, To
save an army, a town, even a great sovereign, what is one man? The
particular characteristics of the two kinds of human victim already
sacrificed under civil law are also considered, and it is said, What
is the life of a criminal or an enemy?
It is very likely that the first human victims were criminals condemned
by the laws, for every nation believed what the Druids believed
according to Caesar,[De bello gallico, vi, 16.] that the
punishment of criminals was highly pleasing to the Divinity. The
ancients believed that every capital crime committed in the state
bound the nation and that the criminal was sacred or
consecrated to the gods till, by the spilling of his blood, he had
unbound both himself and the nation....
Unfortunately, once men were possessed with the principle that the
effectiveness of sacrifices was proportionate to the consequence of the
victims, it was only a short step from the criminal to the enemy.
Every enemy was a criminal, and unfortunately again every
foreigner was an enemy when victims were needed....
It seems that this fatal chain of reasoning explains completely the
universality of so detestable a practice, that it explains it very well,
I insist, in human terms: for I by no means intend to deny (and how
could good sense, however slightly informed, deny it?) the effect of
evil that had corrupted everything.
Evil would have no effect at all on men if it involved them in an
isolated error. This is not even possible, for error is nothing. If
every previous idea was left out of account, and a man proposed to
slaughter another in order to propitiate the gods, the only response
would be to put him to death or lock him up as a madman. Thus it is
always necessary to start from a truth to propagate an error. This is
especially striking if one thinks about paganism which shines with
truths, but all distorted and out of place in such a way that I entirely
agree with that contemporary theosophist who said that idolatry was a
putrefaction. If the subject is examined closely, it can be seen
that, among the most foolish, indecent, and atrocious opinions, among
the most monstrous practices and those most shameful to mankind, there
is not one that we cannot deliver from evil (since we have been
granted the knowledge now to ask for this favor), to show then the
residue of truth, which is divine.
It was thus from the incontestable truths of the degradation of man and
his original unity, from the necessity of reparation, from the
transferability of merits and the substitution of expiatory sufferings
that men were led to the dreadful error of human sufferings....
But we, who blanch with horror at the very idea of human sacrifices and
cannibalism, how can we be at the same time so blind and ungrateful as
not to recognize that we owe these feelings only to the law of
love which watched over our cradle? Not long ago a famous nation,
which had reached the peak of civilization and refinement, dared
formally to suspend this law in a fit of madness of which history gives
no other example: what happened? - in a flash, the mores of the Iroquois
and the Algonquin; the holy laws of humanity crushed underfoot; innocent
blood covering the scaffolds which covered France; men powdering and
curling bloodstained heads; the very mouths of women stained with human
blood.
Here is the natural man! It is not that he does not bear within
him the indestructible seeds of truth and virtue: his birthrights are
imprescriptible; but without divine nurture these seeds will never
germinate or will yield only damaged and unwholesome fruits.
It is time to draw from the most undeniable historical facts a
conclusion which is no less undeniable.
From four centuries' experience, we know that wherever the true God
is not known and served by virtue of an explicit revelation, man will
slaughter man and often eat him.
Lucretius, having told us of the sacrifice of Iphigenia (as a true
story, that is understood, since he had need of it), exclaimed in a
triumphant tone, How many evils can religion spawn!
Alas, he saw only the abuses, just like all his successors, who are much
less excusable than he. He was unaware that the scourge of human
sacrifice, however outrageous it was, was nothing compared to the evils
produced by absolute godlessness. He was unaware or he did not wish to
see that there is not and even cannot be an entirely false religion,
that the religion of all civilized nations, such as it was in the age
when he wrote, was no less the cement of the political structure, and
that, by undermining it, Epicurean doctrines were about to undermine by
the same stroke the old Roman constitution and substitute for it an
atrocious and endless tyranny.
For us, happy possessors of the truth, let us not commit the crime of
disregarding it....
CHAPTER III. THE CHRISTIAN THEORY OF SACRIFICES
What truth is not to be found in paganism?...
How then can we fail to
recognize that paganism could not be mistaken about an idea so universal
and fundamental as that of sacrifice, that is to say, of redemption
by blood? Humanity could not guess at the amount of blood it needed.
What man, left to himself, could suspect the immensity of the fall and
the immensity of the restoring love? Yet every people, by admitting this
fall more or less clearly, has admitted also the need and the nature of
the remedy.
This has been the constant belief of all men. It has been
modified in practice, according to the characteristics of peoples and
religions, but the principle always remains the same. In particular, all
nations are agreed on the wonderful effectiveness of the voluntary
sacrifice of the innocent who dedicates himself to God like a
propitiatory victim. Men have always attached a boundless value to the
submission of the just to sufferings....
As has been said in the
Dialogues, the idea of redemption is universal. At all times and
in all places, men have believed that the innocent could atone for the
guilty, but Christianity has corrected this idea as well as a thousand
others which, even in their unreformed state, had in advance borne the
clearest witness to it. Under the sway of this divine law, the just man
(who never believes himself to be such) still tries to draw near to his
model through suffering.... | {
"pile_set_name": "Pile-CC"
} |
Mobile ux upa
In this talk give at the Usability Experience Professional's Association I look at where the love is between mobile UX and accessibility, discuss how accessibility originates with design not development, and how it fixes the usability problems you never knew you had.
Mobile ux upa
2.
The mobile We’re all disabled on mobile bothcontext physically and mentally Small screens Light / glare Noise Small keyboards / Touch Build in accessibility and you will solve usability issues If you can’t make something accessible go back to the design | {
"pile_set_name": "Pile-CC"
} |
Lycoming College student-faculty research publiched in physics journal
Lycoming College physics majors Brianna Zawadzki '18 and Tom Osborne '18, and Christopher Kulp, Ph.D., professor of physics and chair of the department of astronomy and physics at Lycoming College, co-authored a paper published in prominent academic journal The Physical Review E, in August. | {
"pile_set_name": "Pile-CC"
} |
[ABO blood groups in patients with nephropathies].
280 patients of a centre of nephrology were with regard to their distribution of ABO and rhesus blood groups compared with a control group consisting of 4,089 donors. Female patients with pyelonephritis showed with a probability of error of less than 5% more frequently the blood group A (56.7 vs 41.8%) and more infrequently the blood group 0 (20.0 vs 39.9%). The increase of frequency of female patients of the blood group B with cystic kidneys (30.0 vs 12.6%) reached the significance level of p less than 0.1. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
Why is my iOS Reminders app slow and unstable when invoked by Siri?
I am a longtime user of the iOs "Reminders" app. And I most commonly create new reminders through Siri, for example by saying "Remind me to pay the rent at 6pm."
These Siri requests started taking a slow, long time to actually create the reminder.
I would make the Siri request, and then Siri would say things like "I'm on it," "Wait a moment," etc.
A very long delay would pass. It would take up to 15 seconds before it would act.
Then, it would actually even fail about 15 percent of the time, saying "Sorry, there was a problem with the app."
A side issue that is truly a bug but not the point of this post is that, after the Reminders app was approved in iOS13, my default reminder list appeared totally blank when viewed in the web-based iCloud reminders app. (It was OK (after an initial delay of several days) in actual mobile devices and in the macOS app.)
What caused this slowness problem, and how to fix?
A:
The fix to this problem is due to the fact that the reminders list that it was attempting to add to (... which is the one that was configured in iOS as the "Default reminders list") was a very old and very full list. It was not super full of un-completed reminders, but the number of past COMPLETED reminders was over 8,000.
So, to fix the slowness, I simply created a new reminders list in my iPhone. Then I configured this new reminders list to be the "Default reminders list."
After that point in time, Siri commands to create new reminders work smoothly and quickly. (AND, related to that final bullet, this new reminders list was fully visible, not empty, in the iCloud web app.)
| {
"pile_set_name": "StackExchange"
} |
2017 Spring Parades and Festivals in Huntsville and North Alabama
If you’re looking for fun, you’ve come to the right place! We’ve got all the 2016 Spring parades and festivals in Huntsville & North Alabama in one place. Peruse this list and then make your plans. Fun is in your future.
Community Kite Festival
AshaKiran and the City of Huntsville invite you to the 4th Annual Community Kite Festival. Once again the theme is “Soaring for Social Justice,” and dozens of non-profit organizations will be showcased who who selflessly provide aid to marginalized demographics in our local community. Enjoy a beautiful afternoon filled with kite-flying, scrumptious foods, fellowship and entertainment while learning more about the wide-range of services offered throughout the city of Huntsville.
UCP’s 19th Annual “An Irish Evening”
A charitable way to celebrate St. Patrick’s Day! This annual event features Irish and international food and beverage samples from local vendors (included with ticket purchase), Celtic entertainment, and casual attire (wearin’ of the green is a must!) at The Depot Roundhouse in downtown Huntsville! UCP’s An Irish Evening will again feature live music by Bourbon & Shamrocks, fun and games with the Irish Society of North Alabama, a performance by the Fitness Arts Center Irish step dancers, visits with Irish Wolfhounds Kya & Phoenix, an extensive silent auction, dance tunes with Metropolitan DJ, and more. All proceeds from this annual fundraiser directly benefit UCP client services for more than 1,000 North Alabama families affected by a disability.
40th Annual St. Patrick’s Day Parade
The 40thth annual Huntsville St. Patrick’s Day Parade will be held on Saturday, March 11th at 11:30am in downtown Huntsville! Presented by the Irish Society of North Alabama, this annual tradition is a celebration of Irish culture & heritage in a positive family atmosphere. Check out the Parade Route on the website.
Huntsville Comic & Pop Culture Expo
North Alabama’s biggest comic and pop culture expo…now two days and located in a much larger venue! The theme for the second year is “Level Up!” because like Mario eating a mushroom, everything is getting bigger. The main room will be 24,000 square feet plus several smaller rooms for all kinds of fun. The show will include Cosplay Contests, Kids’ Micro-Con, vendors, Artists/Authors Alley, a silent auction, discussion panels, workshops, special guests, food trucks and more! A portion of the proceeds will benefit Kids To Love, a North Alabama charity meeting the needs of local foster children.
This 10th annual festival just for kids is brought to you by Lowe Mill and Rocket City Mom and is THE place to be on a beautiful Spring weekend. There will be music, food, Nerf battles, kid’s activities around the green, face painting, inflatables, and a scavenger hunt through the Mill. Headlining the event this year are The Happy Racers, a band that creates highly alternative music for kids that will make parent’s actually say, “WOW, this does not suck!”
Advertisement. Content Continues Below.
9th Annual “Battle of the Buffalo” Chicken Wing Festival
Come enjoy the best buffalo wings Huntsville has to offer at Round 9 of Battle of the Buffalo. This buffalo wing festival is hosted by the Theta Pi chapter of the Alpha Tau Omega fraternity from the University of Alabama in Huntsville in honor of brother Paul “Fish” Salmon who passed away from leukemia in 2007 . This annual event donates all proceed to the Russel Hill Cancer Foundation at Clearview Cancer Institute and to our new partner, Hudson Alpha Institute for Biotechnology to both fight cancer and provide cancer patients with comfortable care. This event has raised over $120,000 since the first round in 2009 and has quickly grown to be the southeast’s largest wing festival.
Inaugural Limestone Music Festival
The Inaugural Limestone Music Festival is April 14, 2017 from 7 – 9 p.m. at the Limestone County Event Center. Tickets are $10 and go on sale March 1. Tickets may be purchased from any East Limestone Band Student, at Chick Fil-A in Athens or from The Village Pizza on East Limestone Road. The festival features talented singers, songwriters, musicians and bands from North Alabama. Proceeds from this event go to support the East Limestone Band program, and three percent of profits up to $1000 will be donated to, County for A Cure, in support of the American Cancer Society’s Relay for Life.
Spring Fest in Huntsville
When: April 21 -22, 2017Where: Campus 805, Huntsville (map)Cost: Advance tickets are $25 for one day or $40 for the weekend; Tickets are $30 per day or $50 for the weekend day ofMore Info: Facebook | 256-489-3510 | View Website
Spring Fest brings live music, food and craft beer to the Butler Green between Yellowhammer and Straight to Ale breweries. And this year Spring Fest is expanding. The event will span two evenings, as Muscle Shoals comes to town on Friday night followed by a Saturday focus on the sounds and flavors of Nashville. Artists include: Dylan LeBlanc & The Pollies, John Paul White, The Deslondes, Lilly Hiatt, Great Peacock, Dexateens, and Cory Branan. Best for families with teens.
Bloomin’ Festival
Bloomin’ Festival is a two day juried arts festival attracting thousands of visitors to the beautiful campus of St. Bernard Abbey and Prep School. Located adjacent to the school is the world famous Ave Maria Grotto. The picturesque landscape of stone cut buildings on the grounds of Alabama’s only Abbey provides a backdrop for the out-of-doors show. More than 140 booths are filled with artists demonstrating and exhibiting their work. The festival is the largest fundraiser annually for the operation and maintenance of the school.
Heads N Tails Crawfish Boil
The 7th Annual Heads-N-Tails Crawfish Boil is a FREE family friendly event with face painting, inflatables and other activities to entertain the kids! Crawfish and other yummy food will be available for purchase alongside craft beer tastings and your favorite beverages. And what crawfish boil would be complete without Zydeco music? Experience Louisiana vibes with performances by Mambo Gris Gris from 3-6PM and Roux du Bayou from 6-9PM.
Paddle The Canal Festival
Teams and individuals paddle their canoes and kayaks down Big Spring Canal in this unique downtown event! Spectators can enjoy music, food trucks, and a festival atmosphere. MaggieMoo’s, House of Kabob, What’s Popp’N and Pearl: Asian Cuisine will be in attendance, and the Talladega Superspeedway Pace Car will be parked in Paddler’s Park. The paddlers’ “race track” starts at the Rotary Plaza, goes around the first fountain, down the canal, down to Thrasher Memorial Fountain and back.
Each spring in the heart of the Rocket City the arts are in full bloom at the Panoply Arts Festival. The Festival celebrates music, dance, theatre, and the visual arts, making Panoply (as defined by Mr. Webster) a “magnificent, impressive array”! Three days of musical and visual arts, children’s activities, and performances – an experience that should be on every family’s Must List! Bring your favorite outdoor seating!
29th Annual St. Ann’s Seafood Festival and Big Fish Car Show
When: April 29 from 10AM-6PMWhere: Annunciation of The Lord Catholic Church in Decatur (map)Cost: FREE; food available for purchase; $10 to participate in car showMore Info: Facebook
This year will mark the 29th anniversary of the St. Ann’s Seafood Festival! This long-standing Decatur event will again be held on the grounds of Annunciation of the Lord Catholic Church at 3910 Spring Ave. in Decatur. The culinary offerings will include seafood gumbo, catfish, shrimp pasta salad and hushpuppies. A selection of pastries and ice-cream will also be available. While the seafood is available in ‘to go’ containers, shaded outdoor seating areas will be available for those who want to dine in, taking advantage of the live music from area bands and allowing time to check out the adjacent Big Fish car show. This will be the second year for the Big Fish car show (10AM-4PM) and will serve to make the Seafood Fest more of a destination event for Decatur and the surrounding areas
MAY
[themify_hr color=”orange” width=”50%” border_width=”2px” ]
WhistleStop Weekend
Come have a toe-tappin, barbeque-eatin’ good time and best of all it’s all for a good cause. Activities include professional, amateur, and kids’ BBQ competitions, music, and the AL Corn Horn Championship! All proceeds benefit EarlyWorks Children’s Museum and educational programs for area children. Be sure to visit the Kid’s Zone, with lots of activities for the kids to enjoy!
Cullman Strawberry Festival
Cullman StrawberryFest features the best strawberries and produce in North Alabama. Along with our outstanding music venue, classic car show, arts and crafts, and scrumptious food vendors, visitors can plan to spend the whole day shopping in the unique stores in our downtown district, dancing to a variety of music playing at the Festhalle or visiting our historic districts via guided tours provided by the Cullman County Museum.
Bridge Street Town Centre’s 2nd Annual Fido Fest
The Bridge Street Town Centre’s 2nd Annual Fido Fest is the Ulti-Mutt day out for people and their dogs! Fido Fest 2017 will benefit the Greater Huntsville Humane Society, a 501(c) 3 organization that is a no-kill shelter dedicated to the humane care of all animals. This family-friendly day includes dog adoptions and a silent auction of whimsical dog houses, a signature dog bed from Orvis and a Heavenly Dog Bed from The Westin Huntsville, with all proceeds benefitting the Humane Society. Other activities include a Fido Marketplace (pet clinics, dog grooming service, boarding facility, obedience training), entertainment (music, balloon artist specializing in dog creations), a dog parade on the walking trail around the lake, a dog photo contest, free giveaways and refreshments.
Babypalooza
The BlueCross BlueShield of Alabama Babypalooza Baby & Maternity Expo will help you connect to all of the wonderful resources, services, and boutiques in your area to help you with the newest member of your family. From health services to childcare centers you will be able to find everything you need under one roof in one day!
Bluegrass, Classic Car and Tractor Jamboree
Spend a fun day outside with bluegrass music at the stage and pavilions! Enjoy a car, truck, and tractor show as well as food vendors, crafts, jam sessions, cloggers and bluegrass bands. Bring your lawn chairs!
SoulStock
SoulStock is an annual outdoor Christian music and worship event in Decatur, Alabama. Completely free for the general public to attend, SoulStock is sponsored by churches, businesses, and individuals mostly in the surrounding communities. The event is a time each year for people to come together listen to great music, celebrate God, and hear the message of Jesus. The ultimate goal of Soulstock is to reach out to all individuals with God’s good news though the ministry of music.
Alabama Jubilee Hot Air Balloon Classic
The Alabama Jubilee Hot-Air Balloon Classic is held annually on Memorial Day weekend in Decatur, Alabama. Each year the Jubilee hosts about 60 local and national hot-air balloons at Point Mallard Park. Public admission is free of charge, and the weekend boasts many fun and exciting activities.
Advertisement
An email you actually want!
Rocket City Mom is a website about raising children in and around Huntsville, Alabama. Started in late 2010 by a local mom and newcomer to Huntsville, Rocket City Mom has grown into a thriving community of local parents and now boasts a staff of four, thirteen regular contributors, and tens of thousands of Tennessee Valley readers making it the #1 Parenting Resource in North Alabama. | {
"pile_set_name": "Pile-CC"
} |
Q:
Get/Use the Select value from a Stored Procedure
I have to use a Stored Procedure - that I cannot change/modify. While it is a bit complicated, it can be simplified to be a SELECT statement i.e. with no RETURN or OUTPUT parameter. For the purpose of this discussion assume it to be something like:
SELECT [URL] as imgPath
FROM [mydatasource].[dbo].[DigitalContent]
I need to execute this Stored Procedure passing in the Row ID (SKU) of each row in a Table.
I use a cursor for this as below:
DECLARE @sku varchar(100)
DECLARE @imgPath varchar(500)
DECLARE c CURSOR FOR
SELECT [SKU]
FROM [mydatasource].[dbo].[PROD_TABLE]
OPEN c
FETCH NEXT FROM c INTO @sku
WHILE @@FETCH_STATUS = 0 BEGIN
EXEC @imgPath = [mydatasource].[dbo].[getImage] @sku
--UPDATE PROD_TABLE SET ImgPath=@imgPath WHERE SKU=@sku
SELECT @imgPath AS ImgPath
FETCH NEXT FROM c INTO @sku
END
CLOSE c
DEALLOCATE c
Unfortunately, the return value @imgPath comes back as 0 i.e. success. This results in 0s being inserted into my PROD_TABLE or dumped on the Console. However, as the getImage Stored Procedure executes, it dumps the correct values of imgPath to the console.
How do I get this correct value (i.e. the result of the SELECT in the Stored Procedure) in the Loop above, so that I can correctly update my PROD_TABLE?
Answer
Thanks to RBarryYoung suggestion, my final code looks like:
DECLARE @sku varchar(100)
DECLARE @imgPath varchar(500)
DECLARE c CURSOR FOR
SELECT [SKU]
FROM [mydatasource].[dbo].[PROD_TABLE]
OPEN c
FETCH NEXT FROM c INTO @sku
WHILE @@FETCH_STATUS = 0 BEGIN
CREATE TABLE #OutData ( imgPath varchar(500) )
INSERT INTO #OutData EXEC [mydatasource].[dbo].[getImage] @sku
--UPDATE PROD_TABLE SET ImgPath=(SELECT * FROM #OutData) WHERE SKU=@sku
SELECT * FROM #OutData
DROP TABLE #OutData
FETCH NEXT FROM c INTO @sku
END
CLOSE c
DEALLOCATE c
The performance may not be the best, but at least it works :-).
A:
First, create a temp table (#OutData) whose definition matches the output dataset being returned by getImage.
Then, change your EXEC .. statement to this:
INSERT INTO #OutData EXEC [mydatasource].[dbo].[getImage] @sku
Response to the question: "Is it possible to insert the Key/Row ID into the Temp Table, that way I will not have to TRUNCATE it after each loop iteration?"
First, as a general rule you shouldn't use TRUNCATE on #temp tables as there are some obscure locking problems with that. If you need to do that, just DROP and CREATE them again (they're optimized for that anyway).
Secondly, you cannot modify the dataset returned by a stored procedure in any way. Of course once its in the #temp table you can do what you want with it. So you could add a KeyId column to #OutData. Then inside the loop make a second #temp table (#TmpData), and use INSERT..EXEC to dump into that table instead. Then INSERT..SELECT into #OutData by selecting from #TmpData, adding your KeyID column. Finally, DROP TABLE #TmpData as the last statement in your loop.
This should perform fairly well.
| {
"pile_set_name": "StackExchange"
} |
Q:
Unit testing J/Link projects in Workbench
I am having some problems setting up the MUnit testing framework for a J/Link project and would be grateful for advice. I do have J/Link working when running or debugging the .nb notebook in workbench, just can't get it going when trying to run or debug the .mt unit test file.
I did the following steps, following the documentation as closely as i can.
I created a fresh J/Link project, right-click the inner project folder and choose New / TestFile, and I get a tree like the following in the package explorer of workbench:
fooProject
+-- javaSource
+-- JRE System Library [1.1]
+-- fooProject
| +-- Java
| +-- Kernel
| | +-- init.m
| +-- fooProject.m
| +-- fooProject.mt <---- this is my unit test file; can't get it going
+-- fooProject.nb <---- this one works well
I put a couple of functions in my .m package file:
(* Mathematica Package *)
(* Created by the Wolfram Workbench Feb 3, 2012 *)
BeginPackage["fooProject`", {"JLink`"}]
(* Exported symbols added here with SymbolName::usage *)
KvpQ::usage = "Tests whether its argument is a KVPair or KVP, that is, a list of two values, the first of which is a string or symbol Key.";
Begin["`Private`"]
(* Implementation of the package *)
SymbolQ[x_Symbol] := True;
SymbolQ[___] := False (* all other cases produce False *);
KvpQ[kvp_List] := (Length@kvp === 2 &&
(StringQ[kvp[[1]]] || SymbolQ[kvp[[1]]]));
KvpQ[___] := False;
End[]
EndPackage[]
Then I open the MUnit Test file, fooProject.mt, do Ctrl+K and choose the test template, and then fill it out:
(* Mathematica Test File *)
Test[
KvpQ[{}]
,
False
,
TestID->"fooProject-20120203-Q0O8P9"
]
Now, following the directions at the wolfram site on J/Link launching, I create the new configuration as directed accepting all defaults. Then when I try to run the unit tests, I get a dialog with the unsettling message:
The selected file is not a Mathematica notebook or scrapbook file.
Please make sure that a file with extension .nb or .mscrapbook
is selected, then try the run again.
This leads me to suspect that MUnit testing just isn't supported for J/Link projects, which would make me sad :( But it's more likely I've just done something silly wrong.
Again, I'd be grateful for any advice or guidance. Thanks.
A:
MUnit testing is surely supported on JLink projects (I used it in JLink projects which also contained Java classes, without problems). In fact, MUnit is all about Mathematica, so you just follow the usual procedure. I actually never bothered to create configurations etc.
I just took your code, created a J/Link project, and run the unit test file as Run As -> Mathematica test (position mouse on any place within a unit test file in the WorkBench editor, then right-click and choose Run-As). Everything was fine.
A:
MUnit will absolutely work for testing Mathematica code in J/Link projects.
The J/Link project does indeed setup some paths and things, and you should be able to go ahead and write MUnit tests that use Mathematica code that calls Java without any trouble.
When I setup your project as you stated here, and then right click on the test and either run or debug as Mathematica test, then it works just fine, no errors dialogs or others.
I think the confusion here is on the role of the launch configuration where you setup the Mathematica and Java pieces. You only need this if you wish to debug (ie set breakpoints and suspend) both Mathematica and the running JVM at the same time, and currently as the message states only scrapbook and notebooks are supported file types for launching in this way.
| {
"pile_set_name": "StackExchange"
} |
1. Field of the Invention
The present invention relates to a method and apparatus for packaging and, more particularly, relates to a method and apparatus for automatically wrapping each of a series of open trays filled with suitable articles in plastic film material.
2. The Prior Art
Automatic wrapping machines have found wide use for packaging articles in a thin, clear, and tough plastic film. A major use of such machines is found in retail food stores, wherein plastic or fiber trays are filled with meat or vegetable products and sealed on all sides by a thin plastic wrap. The wrap contains the contents and protects them against contamination and also facilitates handling and sale of the product. Such wrapping of produce is done at the retail site, where machines are frequently operated by relatively inexperienced personnel. This requires that the machines be simple to use and safe, as well as efficient and quick in operation.
Illustrative of the prior art is U.S. Pat. No. 3,378,990 which discloses a modern, compact semi-automatic wrapping machine. U.S. Pat. No. 3,791,101 discloses placing a film curtain across the path of advance of a package, whereby motion of the package from one support surface to the next wraps the front, bottom, and top of the package in the plastic film for subsequent formation of a lap seam on the rear of the package. U.S. Pat. No. 4,033,089 concerns a wrapping machine in which the tray advances horizontally fully at one level through the machine and a retractable tucker and undersealer device passes beneath the tray to join opposed ends of the film in a lap joint along the bottom of the tray.
Typically, plastic film shrinkage is employed to tightly seal the film about the tray. In accordance with this technique, plastic film is heated, placed about an article, and allowed to cool resulting in the film material shrinking tightly about the article. Such heat shrinking packaging machines are necessarily further complicated by the inclusion of film heating equipment.
The present invention is directed to an automatic wrapping machine adapted to resiliently stretch plastic film material about an article being packaged, thus eliminating heat shrinking mechanisms. The inventive arrangement enables articles to be passed consecutively in seriatim through the machine wrapping stations in an automatic fashion and permits consistent handling of the articles for producing sealably wrapped products, such as in a supermarket. | {
"pile_set_name": "USPTO Backgrounds"
} |
Welcome To The Mytro - tcohen
http://launch.it/launch/mytro
======
jdbiggs
Wow, thanks guys. I didn't expect to see this this morning.
| {
"pile_set_name": "HackerNews"
} |
Percutaneous nephrolithotomy: factors associated with fever after the first postoperative day and systemic inflammatory response syndrome.
Fever after the first postoperative day (POD1) after percutaneous nephrolithotomy (PCNL) is most likely caused by an infection that increases hospital stay and healthcare costs. The aim of this study was to find factors associated with fever after POD1 and systemic inflammatory response syndrome (SIRS). Ninety patients underwent 117 PCNLs. Patient characteristics, stone burden, and pre- and postoperative treatments were analyzed for association with fever (temperature >or=38 degrees C) and SIRS using univariate analysis. In 35% of the patients with fever (temperature >or=38 degrees C), fever was present after POD1. Twelve patients developed signs of SIRS (11.2%). In univariate analysis, significant association was observed between fever after POD1 and previous ipsilateral PCNL (p = 0.022, odds ratio OR = 3.1), and between SIRS and paraplegia (p = 0.005, OR = 10.7) and caliceal stones (p = 0.03, OR = 4.8). Previous ipsilateral PCNL increases the risk of fever after POD1. Paraplegic patients are at risk for developing SIRS after PCNL. | {
"pile_set_name": "PubMed Abstracts"
} |
Coast Guard to BP: Speed it up
WASHINGTON — The Coast Guard has told oil giant BP that its proposed plan for containing the runaway Deepwater Horizon well does not take into account new higher estimates of how much oil is gushing into the Gulf of Mexico and demanded that the company provide a more aggressive plan within 48 hours.
In a letter dated Friday and released Saturday, Coast Guard Rear Adm. James A. Watson also said that BP was taking too much time to ready ships to capture oil spewing from the well.
“You indicate that some of the systems you have planned to deploy may take a month or more to bring online,” Watson, who is the federal on-scene coordinator for the Deepwater Horizon disaster, wrote Doug Suttles, BP’s chief operating officer. “Every effort must be expended to speed up the process.”
The 48-hour deadline is the second the Coast Guard has given BP in the past week and indicates a growing recognition on the part of the Coast Guard that both BP and the Obama administration underestimated for weeks the amount of oil pouring from the well, which began leaking when an April 20 explosion shattered the Deepwater Horizon drilling rig, killing 11 workers. The rig sank two days later, taking a mile of well pipeline with it.
Premium content for only $0.99
For weeks, the Obama administration and BP said the spill was leaking 5,000 barrels a day — about 210,000 gallons. On May 27, a government task force of scientists revised that estimate to a minimum of 12,000 to 25,000 barrels a day, and possibly much more. Then on Thursday, the government doubled those estimates to between 20,000 and 50,000 barrels a day, saying those, too, may understate the size of the leak because a decision to shear off the well’s riser pipe to add a “top hat” containment device may have unleashed more oil.
The intervention by the Coast Guard comes as the oil continues to spread across the Gulf. Alabama advised residents not to swim in areas near the Florida border and in the Mississippi Sound. An access route to the Inter-Coastal Waterway, the Pensacola Pass, was closed Saturday evening during flood tide until further notice to keep oil from entering the bay. And tar-ball fields detected in the Gulf appear to be headed toward the Florida Straits.
Watson said the new estimates were the reason for the new deadline, saying the plan Suttles outlined was only “consistent with previous flow rate estimates.”
“Because those estimates have now been revised ... it is clear that additional capacity is urgently needed,” he said.
BP said it would respond to Watson’s letter “as soon as possible.”
The White House was asked Saturday what action it would take if BP doesn’t speed up its efforts on containment.
“This isn’t open for discussion,” a senior administration official said. “BP must do better to plan a more aggressive response. In the same way we pushed for a second relief well, additional redundancy, more transparency, paying for the berms, etc. ... we will push them to find better answers to contain the oil.”
The official, who asked not be named as a matter of policy, said the letter to BP was “a unanimous Obama team decision.”
BP and Coast Guard representatives have been meeting throughout the week, Coast Guard officials have said, to refine the plan, which Suttles outlined in a letter to Watson dated Wednesday — before the new flow rate estimates were released.
In his letter, Suttles said the plan had been outlined on Tuesday to Interior Secretary Ken Salazar and Energy Secretary Steven Chu. “No objections were raised,” he wrote.
Under that proposal, BP described two phases — a temporary one involving three recovery ships and a jerry-rigged system combining the “top hat” containment device with hoses already in place from the “top kill” procedure that failed to stanch the well last month, and a more permanent one that involves construction of two new risers from the well that would be serviced by two large recovery ships that are en route to the site now.
BP said that the temporary phase would bring the amount of oil captured to 20,000 to 28,000 barrels a day by the end of this week. Most of that oil would be recovered by the Discoverer Enterprise drilling ship, which has been collecting around its stated 15,000-barrels-per-day capacity through the “top hat” but that Coast Guard officials believe can be pushed to 18,000 barrels a day.
The remaining 5,000 to 10,000 barrels per day would be taken up by a second vessel, the Q4000 drilling platform, which would burn the oil in a rarely used, if not unprecedented, procedure. BP Vice President Kent Wells said Friday that burning could begin as soon as Monday.
The burning idea has provoked some experts to raise questions about the health and environmental effects of the process. | {
"pile_set_name": "Pile-CC"
} |
Q:
Number Theory in a Choice-less World
I was reading this article on the axiom of choice (AC) and it mentions that a growing number of people are moving into school of thought that considers AC unacceptable due to its lack of constructive proofs. A discussion with Mariano Suárez-Alvarez clarified that this rejection of AC only occurs when it makes sense.
This got me thinking. What are some examples of theorems in number theory that require the axiom of choice or its equivalents (ie Zorn's lemma) for its proof?
Note: Someone mentioned to me that Fermat's Last Theorem requires AC. Can someone verify this?
A:
If we take a narrow enough view of number theory, AC can in principle be dispensed with. Take a sentence $\varphi$ of (first-order) Peano Arithmetic, and let $\varphi'$ be the usual translation of $\varphi$ into the language of set theory. If $\varphi'$ is provable in ZFC, then $\varphi'$ is provable in ZF.
There is a substantial extension of this result called the Shoenfield Absoluteness Theorem.
Remark: The result could be viewed as an argument for the acceptability of AC. For even if AC is as a matter of fact false, it cannot lead to false elementary assertions about the integers, unless ZF already does. Thus even if one has philosophical doubts about it, one can freely use it to prove number-theoretic assertions.
A:
This really depends on "what is number theory" for you. If you only think of statements about natural numbers then I cannot, for the life of me, come up with a good example of the axiom of choice hiding inside.
Things like Wilson's theorem, or Euclid's proof of the infinitude of prime numbers require no choice at all. Recall that ZF proves the consistency of PA, so things which are provable directly from PA do not require the axiom of choice.
On the other hand, modern number theory is a lot more than that. It is a tangled web of algebra and analysis which goes on to use heavy machinery from modern mathematics. We talk about ideals, about algebraic closures, we talk about $p$-adic fields and we talk about representation theory.
Many of those require the axiom of choice, perhaps we can then limit the choice we use if we are interested in things which "live" inside or around $\mathbb C$, but we would still have to use some portion like dependent choice and ultrafilter lemma.
A:
My experience, which is among the group of people who are working on automorphic forms, Galois representations, and their interrelations, is that no-one cares about whether or not AC is invoked. I think for some, this is simply because they genuinely don't care. For others (such as myself), it is because AC is a convenient tool for setting up certain frameworks, but they don't believe that it is truly necessary when applied to number theory. (For reasons somewhat related to Asaf Karagila's answer, I guess: there is a sense that all the rings/schemes/etc. that appear are of an essentially finitistic and constructive nature, and so one doesn't need choice to work with them --- although no-one can be bothered to actually build everything up constructively, so, as I said, AC is a convenient formal tool.)
On a somewhat related note:
My sense is that most number theorists, at least in the areas I am familiar with, argue with second order logic on the integers, rather than just first order logic, i.e. they are happy to quanitfy over subsets of the naturals and so on. And they are really working with the actual natural numbers, not just an arbitrary system satisfying PA. So it's not immediately clear as to whether results (such as FLT) which are proved for the natural numbers are actually true for any model of PA. But, as with the use (or not) of AC, it can be hard to tell, because people aren't typically concerned with this issue, and so don't phrase their arguments (even to themselves) in such as way as to make it easily discernible what axiomatic framework they are working in. (I think many have the view that "God made integers ...".) One example of this is the question of determining exactly what axiom strength is really needed to prove FLT. As far as I know, this is not yet definitively resolved.
| {
"pile_set_name": "StackExchange"
} |
Peter Schimke
Peter Schimke (date of birth unknown) was an American piano player, songwriter, composer, session musician and producer. Growing up in a musical environment, Schimke started performing live in his early teens.
Career
Schimke was born in Minneapolis, Minnesota. After sitting in on vocals, keyboards and drums with bands throughout his teens, Schimke's first professional gig was with the New Psychenauts and went on as the lead singer of the Swingin' Combo; both bands formed part of the early Minneapolis rock scene that launched The Replacements and Hüsker Dü. Simultaneously, Schimke began composing for prominent Minneapolis theater companies. At about the same time, he played his first professional rock gig on keyboard with blues harmonica legend Charlie Musselwhite at the Blue Max on Maui. While living in New York, Peter performed at a steady Monday night gig at the Dean Street Café with Craig Bailey of the Ray Charles Band.
Schimke toured, performed and/or recorded with many artists, such as Billy Preston, Sam Moore, Iffy, Likehell, Art Farmer, Tom Harrell, Fareed Haque, Mark Murphy, Frank Morgan, David Friedman, Jose Neto, Mike Gordon, Gregoire Maret (Pat Metheny), Danny Gottlieb, Mark Egan, Emil Richards, Pete Escovedo (Latin Orchestra), Steve Wilson, members of the Wynton Marsalis group (Wes Anderson, Lincoln Goines, Rodney Whitaker), Charlie Persip Big Band, Bill Perkins, Tino D'Geraldo, Jackie Ryan (Ronnie Scott's in London), Julee Cruise of "Twin Peaks" (Warner Brothers American Tour and London Palladium), Billy Peterson, Estaire Godinez, El Buho, Jeff Sipes, Victor Wooten, Rita Coolidge, Tony Joe White, Gonzalo Lasheras.
At the time of his passing, Schimke was working on a solo album.
Discography
Dave Sletten: Black Moon (1994)
Mark Murphy: Latin Porter (2000)
DJ Free / Soulfood: Spiritual Massage (2002)
Soulfood: Serenity (2002)
Soulfood: Shaman's Way (2002)
Soulfood: Latino Groove (2002)
Brent Lewis / Soulfood: Yoga Rhythm (2002)
Soulfood: Yoga Dream (2003)
DJ Free / Soulfood: Celestial Meditations (2003)
Irv Williams: That's All (2004)
That Band: Springsteel (2004)
Moodfood and Jadoo with Sevara: Sensan (2005)
Irv Williams: Dedicated to You (2005)
DJ Free / Soulfood: Mystic Canyons (2005)
Moodfood: Ice (2005)
Enrique Toussaint: Comunidad (2006)
DJ Free / Brent Lewis / Soulfood: Yoga Groove (2006)
Irv Williams & Peter Schimke: Duo (2006)
Dean Evenson: Spa Rhythms (2006)
Ron Cohen / DJ Free / Soulfood: Cafe Santa Fe (2006)
Soulfood: Tantric Chill (2006)
Soulfood: Power Yoga (2006)
Marcos Casals & Peter Schimke: Santander / Minneapolis (2007)
Irv Williams: Finality (2007)
Soulfood: Spascapes (2007)
Chris Morrissey Quartet: The Morning World (2008)
Power Music / Soulfood: Buddha Chill (2008)
Holly Long: Leaving Kansas (2008)
Chris Morrissey: Morning World (2009)
Estaire Godinez Band: This Time (2010)
Irv Williams: Duke's Mixture (2011)
Mark Murphy: The Latin Porter
Stuart D’Rozario: Songs About Now
James Curry: A Brand New Suit
Varietals: Volume 1
Iffy: Biota Bondo
for references see cduniverse.com or allmusic.com
Filmography
Legends Rock, live TV show (2004)
The Funkytown Movie, music documentary (2012)
References
External links
Peter Schimke, McNally Smith College of Music
Official Artist Website
Peter Schimke at AQ
Discography at cduniverse.com
Category:Year of birth missing (living people)
Category:Musicians from Minneapolis
Category:Living people
Category:Songwriters from Minnesota
Category:American male pianists
Category:21st-century American pianists
Category:21st-century male musicians | {
"pile_set_name": "Wikipedia (en)"
} |
Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
In Texas, many people claim it's Austin but I feel El Paso is the one that's out of place. Austin feels more like the "cool kid" that everyone wants to be like while El Paso is more like the outcast nobody wants to follow.
Well when you're about 600+ miles away from ever other major city in the state . . .
There is more of what I would think a Eastern seaboard feel would be , although I have never been there. But with the large ships and seafaring atmosphere is unlike anywhere else in Minnesota.
My husband, son and I went to Duluth when some Tall Ships came for the first time ever about 10-15 years ago. It was something. They had such a huge turnout they were overwhelmed. We waited 4 hours to see them. They come every summer since then.
Biloxi, Mississippi and Mobile, Alabama feel very different the rest of their states. Particularly the presence of Biloxi as a modern casino resort area in a state seen as very conservative and traditional and old-timey. Also many people don't even think of Mississippi and Alabama as coastal states and forgot their shoreline there.
In Texas, many people claim it's Austin but I feel El Paso is the one that's out of place. Austin feels more like the "cool kid" that everyone wants to be like while El Paso is more like the outcast nobody wants to follow.
In a lot of ways, I feel El Paso is the most Texan of the major cities, or stereotypical Texan.
In a lot of ways, I feel El Paso is the most Texan of the major cities, or stereotypical Texan.
El Paso feels more like the stereotypical Texas portrayed in the media, with a desert background and cowboys. Whereas Fort Worth is more representative of the state as a whole. El Paso, IMO, feels more like a New Mexico city than the other major Texas cities.
El Paso feels more like the stereotypical Texas portrayed in the media, with a desert background and cowboys. Whereas Fort Worth is more representative of the state as a whole. El Paso, IMO, feels more like a New Mexico city than the other major Texas cities.
Exactly.
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.
Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com. | {
"pile_set_name": "Pile-CC"
} |
You are here
Automatic detection of event factuality in Italian
Federico Nanni will present the work he has done on event factuality detection in Italian news during his 2-month internship in the HLT group.
The internship aims at implementing a system for the detection of the polarity of an event (positive or negative), the certainty of an event (certain, probable or possible) and the relative time of an event (FUTURE or NON-FUTURE). These three aspects describe the factuality of an event, i.e. the fact that an event is factual, counter-factual or non factual. In order to detect these aspects of the factuality of an event he has used a method based on machine learning.He will present the corpus used for the experiments, the method and the features used and the results obtained.
During the seminar he will also introduce his PhD research. His research deals with a methodological analysis of the issues that arise when using born digital documents, especially websites, as primary sources; in particular his purpose is to better understand how the processes of finding, selecting and analyzing sources change when dealing with “born-digital” ones. The case study of his research is a historical reconstruction of the online presence of Italian universities. | {
"pile_set_name": "Pile-CC"
} |
The Art of Shaving
The Art of Shaving is a men’s skin care and shaving company that focuses on luxurious ingredients and traditional techniques. Their impeccable shaving oils, creams, soaps, cleansers, and moisturizers allow for the closest, easiest shave of your life.
Shaving Products
The Art of Shaving’s 4-step shaving procedure includes the badger hair shaving brush, pre-shave oil, shaving cream, and aftershave balm. These steps have been tried and tested on all skin and beard types, and remove burns and bumps from the equation.
Pre Shave
For the cleanest shave, you need to first prepare the skin, and the Art of Shaving Pre Shave Oil is the first key. Olive and castor oils soften facial hair, protects down to the follicles against razor burn and ingrown hairs, and lubricates the skin for a close shave. We’re happy to introduce the Middle Eastern-inspired Oud Pre Shave Oil. Oud is a gorgeous essence made from the agarwood tree which harmonizes with your skin to build a natural, amber-like scent.
Shaving Cream
Without question, our Sandalwood Shaving Cream is among our most popular items. Sandalwood is an incredible essential oil, with anti-inflammatory and disinfecting properties, highly prized qualities for shaving products. Made from the Indian sandalwood tree, the oil’s scent is masculine, woody, and warm and imparts a soft but long-lasting scent. Our shaving creams come in lemon, lavender, and ocean kelp, as well as Art of Shaving Unscented Shaving Cream. Not only will you get an impeccably close shave with all of our shaving creams, but the lather made from coconut oil and glycerin will keep your skin soft and supple long after the shave. This is best shaving cream for sensitive skin, we’re sure of it.
Shaving Soap
For the traditionalist, shaving soap offers a close wet-shave experience. Either during or immediately after a shower, use a wet badger shaving brush to lather the shaving soap bowl. Apply to your face and shave with the grain. If you’re looking for a perfectly close shave, apply another layer of soap lather and shave across the grain. We offer varieties like lemon, unscented, and sandalwood shaving soap, as well as refills for the handsome, handcrafted teak bowls they rest in.
After Shave
The final step of shaving is often overlooked, when in fact it’s a highly important part of any shaving experience. If you have normal-to-oily skin, The Art of Shaving recommends using their After-Shave Lotion, which imparts a light and fast-absorbing. If you’re a dry skin sufferer, use the After-Shave Balm in sandalwood, lemon, lavender, Oud, and unscented varieties. With a touch of grapeseed oil in the formula, you’ll find your face replenished and rehydrated.
The Art of Shaving Kits
Whether you’re seeking a deep and earthy musk, a burst of citrus, a dusting of florals, or an unscented product, Art of Shaving kits offer superb quality and variety for every shaving experience. Our Art of Shaving Travel Kits provides one week of facial fundamentals like pre-shave oil, shaving cream, after-shave balm, and a trial-sized badger shaving brush. The Mid-Sized Kit comes in travel-friendly packaging. For the daily user, the Sandalwood Full Size Kit With Genuine Badger Brush is the perfect purchase. Lather, shave, and moisturize without fear of ingrown hairs, razor burn, or nicks. The Mid-Sized and Full Size Kit come with a genuine, handcrafted badger shaving brush.
Skin Care
If you’ve suffered from regular ingrown hairs, razor bumps, and dry skin after shaving, the solution is the Power Brush. Simply moisten your face, apply the Art of Shaving Pre Shave Gel, and lather with the Power Brush for 1-2 minutes. The Power Brush is also an incredible tool to exfoliate, and can be used with your favorite facial cleanser. Be sure to purchase refills when the bristles start to warp, in order to keep a clean, refreshed face. For a deep, tingly feeling, our best face cleanser is the Peppermint Facial Wash. We all know that shaving takes a lot out of your skin’s natural hydration, so reinfuse it with chamomile and aloe extract. Use in combination with your favorite daily moisturizer for smoother, hydrated skin.
Moisturizers
If we had to pick, we’d choose the Eucalyptus SPF 15 Daily Facial Moisturizer as our favorite The non-greasy formula provides UV protection, as well as cooling eucalyptus and calming chamomile essential oils. Your post-shave skin will thank you for it, and your future self will thank you for the protection and hydration! Perhaps the weather has dried out your skin, or you’re still reeling from a sunburn. Maybe you just suffer from dry skin and need a bit more hydration. Let the Overnight Balm--with lavender and roman chamomile extracts--give you the protection your sensitive skin needs. With its alcohol-free formula, this moisturizer is chock full of shea butter, olive oil, and jojoba oil which nourish and revitalize your skin overnight.
Beard Care
You deserve a product that keeps beard hair soft, manageable, and moisturized, and regular shampoo just isn’t enough. With the Art of Shaving’s Peppermint Beard Wash, peppermint wakes your beard follicles up, while olive oil and jojoba seed oil encourage a full lather that rinses impurities away from all types of beards and facial hair. | {
"pile_set_name": "Pile-CC"
} |
The present invention relates to a display sign base. More particularly, it relates to a sign base designed to accommodate changeable messages in multiple support and signage configurations.
Various types of signage systems are known in the art. These signage systems range from signs permanently attached to support structures permanently fixed at a display location, for example, street signs; to signs permanently attached to moveable support structures, for example, real estate signs; to moveable supports with interchangeable signs. The supports can include embedded posts, spiked rods that penetrate the ground, and various portable bases. The portable bases include metal or plastic tube frames, hollow structures capable of being filled with sand or water for stability, and various other configurations.
A problem common to most prior portable bases is that the bases are generally designed to accommodated only a single support and signage configuration. Additionally, many of the prior portable bases are designed with a low profile to occupy a minimum space. As a result, the bases are out of view and often pose a tripping hazard to pedestrians passing by the signs. Other bases are provided with a higher profile, however, the higher profile often results in a less stable base susceptible to wind and the like.
Accordingly, there is a need for a portable sign base which provides a stable support for multiple signage and support configurations.
The present invention relates to a base for supporting variable signage. The base includes a support surface with front and back planar surfaces extending therefrom. Opposed side surfaces, preferably having a trapezoidal profile, extend between the front and back planar surfaces. Each planar surface includes at least two opposed channels adapted to receive and support a changeable signage against the planar surface. At least one signage support receptacle is formed integral with the base. The signage support receptacles are preferably configured to support various sign supports including rods, polls, square tubing and the like. | {
"pile_set_name": "USPTO Backgrounds"
} |
Harry T. Creswell
Harry Thornton Creswell (December 10, 1850 – December 29, 1914) was an American lawyer and state senator.
Biography
He was born in Eutaw, Alabama in 1850. Creswell's father was David Creswell, a judge, and his mother was Gertrude Creswell. He was educated at the Greene Springs School in Hale County. After that, Creswell was educated in law. In 1870, he moved from Louisiana to San Francisco. Four year later, Creswell moved to Belmont, Nevada and became admitted to the bar in Nevada. It was then that his career began. Creswell was elected District Attorney of Nye County that same year and his term ended in 1876. On November 7, 1876, Creswell was elected member of the Nevada Senate as a Democrat. He represented Nye County in the Senate and his term started the following day. Creswell served in two regular sessions and his term ended in November 1880. After that, he moved to Lander County and Creswell served as District Attorney of that county from 1880 to 1887. He was candidate for district judge of Nevada, but was not elected.
At the end of the 1880s, Creswell moved to San Francisco and continued with practicing law. He was admitted to the bar in California in 1888. In 1890, Creswell was a candidate for City and County Attorney of San Francisco, but he was defeated. During the next elections in 1892, however, he was elected to that office. Creswell served as City and County Attorney between 1893 and 1898. That office entailed membership to the Board of City Hall Commissioners. Back then, the San Francisco City Hall was being constructed and Creswell insisted on the use of materials from California to build the city hall. Creswell resigned in his last term to become a member of the law firm "Garber, Creswell & Garber", that was founded in 1897. He kept working there until Judge Garber died, after which he worked independently. In the aftermath of the 1906 San Francisco earthquake, Creswell was appointed member of the Committee of Fifty, that was called into existence by the Mayor of San Francisco.
In July 1906, he was appointed member of the Police Commission of San Francisco by Mayor Eugene Schmitz, but resigned during his term, in March 1907, to work as a civil lawyer. In 1912, Creswell was a delegate from California to the Democratic National Convention of that year. At the Convention, he was a member of the Credentials Committee as well. Creswell died in San Francisco on December 29, 1914 at the age of 64. He was married to Lucy Crittenden Nesbitt and they got two children, Harry and Gertrude. Also, Creswell had been a member of the Pacific-Union Club and the Southern Club of San Francisco.
References
Category:1850 births
Category:1914 deaths
Category:Alabama lawyers
Category:California Democrats
Category:City attorneys
Category:District attorneys in Nevada
Category:Nevada Democrats
Category:Nevada state senators
Category:People from Nye County, Nevada
Category:San Francisco Bay Area politicians
Category:19th-century American politicians | {
"pile_set_name": "Wikipedia (en)"
} |
Arup Kumar Khan
Arup Kumar Khan is an Indian politician. He was elected as MLA of Onda Vidhan Sabha Constituency in 2011 and 2016 in West Bengal Legislative Assembly. He is an All India Trinamool Congress politician.
References
Category:Year of birth missing (living people)
Category:All India Trinamool Congress politicians
Category:Bengali politicians
Category:Members of the West Bengal Legislative Assembly
Category:Living people | {
"pile_set_name": "Wikipedia (en)"
} |
Soukous
Soukous (from French secousse, "shock, jolt, jerk") is a genre of dance music from the Congo Basin. It derived from Congolese rumba in the 1960s and gained popularity in the 1980s in France. Although often used by journalists as a synonym for Congolese rumba, both the music and dance associated with soukous differ from more traditional rumba, especially in its higher tempo, longer dance sequences. Notable performers of the genre include African Fiesta, Papa Wemba and Pépé Kallé.
History
1960s
In the 1950s and 1960s, some artists who had performed in the bands of Franco Luambo and Grand Kalle formed their own groups. Tabu Ley Rochereau and Dr. Nico Kasanda formed African Fiesta and transformed their music further by fusing Congolese folk music with soul music, as well as Caribbean and Latin beats and instrumentation. They were joined by Papa Wemba and Sam Mangwana, and classics like Afrika Mokili Mobimba made them one of Africa's most prominent bands. Congolese "rumba" eventually evolved into soukous. Tabu Ley Rochereau and Dr Nico Kasanda are considered the pioneers of modern soukous. Other greats of this period include Koffi Olomide, Tshala Muana and Wenge Musica.
While the rumba influenced bands such as Lipua-Lipua, Veve, TP OK Jazz and Bella Bella, younger Congolese musicians looked for ways to reduce that influence and play a faster paced soukous inspired by rock n roll. A group of students called Zaiko Langa Langa came together in 1969 around founding vocalist Papa Wemba. Pepe Kalle, a protégé of Grand Kalle, created the band Empire Bakuba together with Papy Tex and they too became popular.
East Africa in the 1970s
Soukous now spread across Africa and became an influence on virtually all the styles of modern African popular music including highlife, palm-wine music, taarab and makossa. As political conditions in Zaire, as the Democratic Republic of Congo was known then, deteriorated in the 1970s, some groups made their way to Tanzania and Kenya. By the mid-seventies, several Congolese groups were playing soukous at Kenyan night clubs. The lively cavacha, a dance craze that swept East and Central Africa during the seventies, was popularized through recordings of bands such as Zaiko Langa Langa and Orchestra Shama Shama, influencing Kenyan musicians. This rhythm, played on the snare drum or hi-hat, quickly became a hallmark of the Congolese sound in Nairobi and is frequently used by many of the regional bands. Several of Nairobi's renowned Swahili rumba bands formed around Tanzanian groups like Simba Wanyika and their offshoots, Les Wanyika and Super Wanyika Stars.
In the late 1970s Virgin records produced LPs from the Tanzanian-Congolese Orchestra Makassy and the Kenya-based Super Mazembe. One of the tracks from this album was the Swahili song Shauri Yako ("it's your problem"), which became a hit in Kenya, Tanzania and Uganda. Les Mangelepa was another influential Congolese group that moved to Kenya and became extremely popular throughout East Africa. About this same time, the Nairobi-based Congolese vocalist Samba Mapangala and his band Orchestra Virunga, released the LP Malako, which became one of the pioneering releases of the newly emerging world music scene in Europe. The musical style of the East Africa-based Congolese bands gradually incorporated new elements, including Kenyan benga music, and spawned what is sometimes called the "Swahili sound" or "Congolese sound".
1980s and the Paris scene
Soukous became popular in London and Paris in the 1980s. A few more musicians left Kinshasa to work around central and east Africa before settling in either the UK or France. The basic line-up for a soukous band included three or four guitars, bass guitar, drums, brass, vocals, and some of them having over 20 musicians. Lyrics were often in Lingala and occasionally in French. In the late 1980s and 1990s, Parisian studios were used by many soukous stars, and the music became heavily reliant on synthesizers and other electronic instruments. Some artists continued to record for the Congolese market, but others abandoned the demands of the Kinshasa public and set out to pursue new audiences. Some, like Paris-based Papa Wemba maintained two bands, Viva La Musica for soukous, and a group including French session players for international pop.
Kanda Bongo Man, another Paris-based artist, pioneered fast, short tracks suitable for play on dance floors everywhere and popularly known as kwassa kwassa after the dance moves popularized by his and other artists' music videos. This music appealed to Africans and to new audiences as well. Artists like Diblo Dibala, Jeannot Bel Musumbu, Mbilia Bel, Yondo Sister, Tinderwet, Loketo, Rigo Star, Madilu System, Soukous Stars and veterans like Pepe Kalle and Koffi Olomide followed suit. Soon Paris became home to talented studio musicians who recorded for the African and Caribbean markets and filled out bands for occasional tours.
In the 1980s, the fast tempo zouk style popularized by the French Antilles band Kassav' became popular across much of Paris and French Africa. In the 1980s and early 1990s, a fast-paced style of soukous known as kwassa kwassa, named after a popular dance, was popular. Today, soukous mixes the kwasa kwasa with zouk and Congolese rumba. A style called ndombolo, also named after a dance, is currently popular.
Ndombolo
The fast soukous music currently dominating dance floors in central, eastern and western Africa is called soukous ndombolo, performed by Dany Engobo, Awilo Longomba, Aurlus Mabele, Mav Cacharel, Koffi Olomide and groups like Extra Musica and Wenge Musica among others.
The hip-swinging dance of the fast paced soukous ndombolo has come under criticism on claims that it is obscene. There have been attempts to ban it in Mali, Cameroon and Kenya. After an attempt to ban it from state radio and television in the Democratic Republic of the Congo in 2000, it became even more popular. In February 2005, ndombolo music videos in the DR Congo were censored for indecency, and video clips by Koffi Olomide, JB M'Piana and Werrason were banned from the airwaves.
See also
List of Soukous musicians
Sebene
Music of the Democratic Republic of the Congo
Musicians from the Democratic Republic of the Congo
Calypso
Marrabenta
References
Bibliography
External links
The Sound of Sunshine: How soukous saved my life
Rare recording (1961) of rural finger style Soukous guitarist Pierre Gwa with home made guitar
GuitOp81's Soukous Guitar site | {
"pile_set_name": "Wikipedia (en)"
} |
Dual fluorescence resonance energy transfer assay between tunable upconversion nanoparticles and controlled gold nanoparticles for the simultaneous detection of Pb²⁺ and Hg²⁺.
In this work, we presented a novel dual fluorescence resonance energy transfer (FRET) system for the simultaneous detection of Pb(2+) and Hg(2+). This system employed two color upconversion nanoparticles (UCNPs) as the donors, and controlled gold nanoparticles (AuNPs) as the acceptors. The two donor-acceptor pairs were fabricated by hybridizing the aptamers and their corresponding complementary DNA. Thus, the green and red upconversion fluorescence could be quenched because of a good overlap between the UCNPs fluorescence emission and the AuNPs absorption spectrum. In the presence of Pb(2+) and Hg(2+), the aptamers preferred to bind to their corresponding analytes and formed a G-quadruplexes structure for Pb(2+) and the hairpin-like structure for Hg(2+). As a result, the dual FRET was disrupted, and the green and red upconversion fluorescence was restored. Under optimized experimental conditions, the relative fluorescence intensity increased as the metal ion concentrations were increased, allowing for the quantification of Pb(2+) and Hg(2+). The relationships between the fluorescence intensity and plotting logarithms of ion concentrations were linear in the range from 0.1 to 100 nM for Pb(2+) and 0.5 to 500 nM for Hg(2+), and the detection limits of Pb(2+) and Hg(2+) were 50 pM and 150 pM, respectively. As a practical application, the aptasensor was used to monitor Pb(2+) and Hg(2+) levels in naturally contaminated samples and human serum samples. Ultimately, this type of dual FRET could be used to detect other metal ions or contaminants in food safety analysis and environment monitoring. | {
"pile_set_name": "PubMed Abstracts"
} |
"People thought that these laws were good for mass" (zonder "the") is beter, denk ik. Met "the", hebben we "of something" nodig. "... these laws were good for the mass of stars" of "were good for the mass of metals" of "were good for the mass of materials subjected to high temperatures." etc. | {
"pile_set_name": "Pile-CC"
} |
Site-directed antibody immobilization using a protein A-gold binding domain fusion protein for enhanced SPR immunosensing.
We have implemented a novel strategy for the oriented immobilization of antibodies onto a gold surface based on the use of a fusion protein, the protein A-gold binding domain (PAG). PAG consists of a gold binding peptide (GBP) coupled to the immunoglobulin-binding domains of staphylococcal protein A. This fusion protein provides an easy and fast oriented immobilization of antibodies preserving its native structure, while leaving the antigen binding sites (Fab) freely exposed. Using this immobilization strategy, we have demonstrated the performance of the immunosensing of the human Growth Hormone by SPR. A limit of detection of 90 ng mL(-1) was obtained with an inter-chip variability lower than 7%. The comparison of this method with other strategies for the direct immobilization of antibodies over gold surfaces has showed the enhanced sensitivity provided by the PAG approach. | {
"pile_set_name": "PubMed Abstracts"
} |
1. Field of the Invention
The present invention relates to systems and methods for transmitting digital signals in ATSC applications, particularly signals using layered modulations.
2. Description of the Related Art
Digital signal communication systems have been used in various fields, including digital TV signal transmission, either terrestrial or satellite. As the various digital signal communication systems and services evolve, there is a burgeoning demand for increased data throughput and added services. However, it is more difficult to implement either improvement in old systems and new services when it is necessary to replace existing legacy hardware, such as transmitters and receivers. New systems and services are advantaged when they can utilize existing legacy hardware. In the realm of wireless communications, this principle is further highlighted by the limited availability of electromagnetic spectrum. Thus, it is not possible (or at least not practical) to merely transmit enhanced or additional data at a new frequency.
The conventional method of increasing spectral capacity is to move to a higher-order modulation, such as from quadrature phase shift keying (QPSK) to eight phase shift keying (8PSK) or sixteen quadrature amplitude modulation (16QAM). Unfortunately, QPSK receivers cannot demodulate conventional 8PSK or 16QAM signals. As a result, legacy customers with QPSK receivers must upgrade their receivers in order to continue to receive any signals transmitted with an 8PSK or 16QAM modulation.
It is advantageous for systems and methods of transmitting signals to accommodate enhanced and increased data throughput without requiring additional frequency. In addition, it is advantageous for enhanced and increased throughput signals for new receivers to be backwards compatible with legacy receivers. There is further an advantage for systems and methods which allow transmission signals to be upgraded from a source separate from the legacy transmitter.
It has been proposed that a layered modulation signal, transmitting non-coherently (asynchronously) both upper and lower layer signals, can be employed to meet these needs. Such layered modulation systems allow higher information throughput with backwards compatibility. Even when backward compatibility is not required (such as with an entirely new system), layered modulation can still be advantageous because it requires a TWTA peak power significantly lower than that for a conventional 8PSK or 16QAM modulation format for a given throughput.
The Advanced Television Systems Committee, Inc., is an international, non-profit organization developing voluntary standards for digital television. The ATSC member organizations represent the broadcast, broadcast equipment, motion picture, consumer electronics, computer, cable, satellite, and semiconductor industries. The ATSC works to coordinate television standards among different communications media focusing on digital television, interactive systems, and broadband multimedia communications. ATSC also develops digital television implementation strategies and present educational seminars on the ATSC standards. ATSC Digital TV Standards include digital high definition television (HDTV), standard definition television (SDTV), data broadcasting, multichannel surround-sound audio, and satellite direct-to-home broadcasting.
For example, the terrestrial ATSC describes the characteristics of an RF/transmission subsystem, which is referred to as the VSB subsystem, of the Digital Television Standard. The VSB subsystem offers two modes: a terrestrial broadcast mode (8 VSB), and a high data rate mode (16 VSB). See “ATSC Standard: Digital Television Standard, Revision B with Amendments 1 and 2”, The Advanced Television Systems Committee, May 19, 2003, which is incorporated by reference herein. In the ATSC standard for digital television and many other communications standards, the allocated frequency bandwidth cannot be increased. Given the stipulated ATSC modulation and coding techniques, the information throughput for ATSC is fixed over the channel bandwidth of 6 MHz.
Accordingly, there is a need for systems and methods that expand capacity of the allocated ATSC frequency bandwidth. As discussed hereafter, the present invention meets these needs. | {
"pile_set_name": "USPTO Backgrounds"
} |
Abstract
Food allergy, other adverse immune responses to foods, inflammatory bowel disease, and eosinophilic esophagitis have become increasingly common in the last 30 years. It has been proposed in the “hygiene hypothesis” that dysregulated immune responses to environmental microbial stimuli may modify the balance between tolerance and sensitization in some patients. Of the pattern recognition receptors that respond to microbial signals, toll-like receptors (TLRs) represent the most investigated group. The relationship between allergy and TLR activation is currently at the frontier of immunology research. Although TLR2 is abundant in the mucosal environment, little is known about the complex relationship between bystander TLR2 activation by the commensal microflora and the processing of oral antigens. This review focuses on recent advances in our understanding of the relationship between TLR2 and oral tolerance, with an emphasis on regulatory T cells, eosinophils, B cells, IgA, intestinal regulation, and commensal microbes.
1. Introduction
The human intestine is a dynamic environment and host to a myriad of bacteria. It is unclear how these commensals regulate immunologic responses to food antigens, but there is mounting evidence that the microbiological environment of the intestine has a profound influence on oral tolerance [1–5]. In addition to the commensals and pathogens residing in the intestine, food products are often contaminated by a wide array of bacteria and fungi. It is likely that contaminating organisms can shape oral tolerance to foods.
While all microbial pattern recognition receptors (PRRs) are likely to have some relationship to food tolerance and allergen processing, TLR2 may be of unique importance due to its expression by intestinal epithelial cells (IECs) and dendritic cells (DCs) in the intestinal environment. Moreover, a majority of commensal bacteria are Gram-positive and thereby have a high capacity for activation of TLR2 [6, 7].
TLR2 is important in identifying bacterial [8] and fungal wall components [9], but it must first combine as a heterodimer with TLR1 or TLR6. The TLR1/2 heterodimer responds to triacyl lipopeptides, while the TLR2/6 heterodimer responds to diacyl lipopeptides and peptidoglycan [10]. Both heterodimers of TLR2 signal through the MyD88-dependent pathway leading to transcriptional activation of NF-κB [11, 12]. TLR2 is expressed by a wide range of cells relevant to mucosal immunity and tolerance including IECs, DCs, T cells, and B cells [13]. While the activation of these TLR2-mediated inflammatory responses is adaptive in the context of pathogenic infection, we are in the early days of understanding how this axis impacts oral tolerance to foods and commensal bacteria. Regulation of IEC permeability [14, 15] and the enteric nervous system [16] both rely on TLR2. Furthermore, although the mechanisms are controversial, several studies report exacerbation of inflammatory bowel disease in the absence of TLR2 [15, 17]. This suggests a critical role for TLR2 in regulating the intestinal microenvironment and local inflammation.
A definitive role for TLR2 expression and activation in the orchestration of tolerance to food antigens has not been characterised. However, growing evidence points to TLR2 as an important factor directing the immunological balance between tolerance and active immune responses to allergens.
2. TLR2 Expression and Relationship to Allergy
TLR2 polymorphisms have been associated with deficits in immune regulation such as inflammatory bowel disease, allergic asthma, and atopic disease [18–21]. Notably, a recent study by Nawijn et al. demonstrated that intranasal TLR2 activation concurrent with aerosolized allergen promoted the expansion of allergen-specific regulatory T cells (Tregs) and accordingly suppressed asthma in mice [22]. This is consistent with an earlier observation that sublingual TLR2 agonist therapy concurrent with allergen exposure can abrogate airway hyperresponsiveness in mice [23]. A multitude of studies demonstrate that TLR2 stimulation with systemic or mucosal administration of synthetic agonists can prevent antigen presenting cells from eliciting a -polarized response, thereby reducing IgE antibodies and allergenicity in murine asthma models [24–27]. While it is apparent that the delivery of TLR2 agonists via a mucosal route can protect against airway disease in mice, the impacts of TLR2 activation on the processing and tolerance to foods have yet to be characterized. Interestingly, many common foods such as processed meats, chocolate, yoghurt, and cheese contain TLR2 activators [28].
IECs in both the small and large intestine express TLR2, although the distribution and localisation of TLR2 (luminal versus apical) within the cell may vary [29]. In addition, this receptor is expressed by multiple traditional immune effector cells, as described above, often in both intracellular and extracellular compartments. IECs are bathed in an environment replete with TLR2 agonists, such that these cells are probably calibrated to function amid a constitutive level of activation. Accordingly, in TLR2−/− animals, the IEC tight junctions are compromised [14, 15]. Furthermore, TLR2 stimulation promotes tight junctions [14] that could have implications for food processing and the antigen dosage presented to T cells. Defects in TLR2 are associated with inflammatory bowel disease [15, 17] and inappropriate innate responses to intestinal tissue injury in mice [30]. Conversely, intestinal regulation and Treg levels were unchanged in TLR2−/− mice in a chronic model of inflammatory bowel disease [31]. These divergent results may highlight differential roles of TLR2 in chronic inflammation versus acute inflammatory models such as dextran sodium sulphate (DSS) colitis and the different immune cells and mediators driving these models over their respective timeframes [15, 17].
It stands to reason that, in the absence of TLR2, the resulting leaky epithelium could allow amplified allergen dosing and exacerbated allergic responses. The impact of this increased permeability during the initial antigen tolerizing stage is not known. Interestingly, it has also been suggested that IECs are largely unresponsive to TLR2 stimulation, despite their TLR2 expression [32]. This is believed to be an adaptive mechanism to prevent uncontrolled intestinal inflammation in response to the constant barrage of TLR2 agonists from Gram-positive commensals. Consistent with this, TLR2 expression is higher in IECs of the colon compared to the small intestine where earlier food antigen exposure occurs and oral tolerance is thought to be established.
TLR2 functions both as a heterodimer with TLR1 or TLR6 and also potentially as a homodimer. Pam3CSK4 is a selective ligand for the TLR1/TLR2 heterodimer, while TLR6/TLR1 responds to other ligands such as FSL-1. The distinct role of TLR6 is of particular interest since it is expressed on only selected cell types in the intestine, while TLR1 is much more widely expressed. In a very recent study [33], cells from the intestinal lymphoid tissues activated with anti-CD3 were shown to be more effectively polarized towards and responses by treatment with FSL-1 than with Pam3CSK4. Using a DSS model of colitis, the TLR6 deficient animals were shown to be disease resistant. In parallel studies of human tissues, TLR6 expression was found to be correlated with the levels of RORC mRNA in inflamed intestines of IBD patients. These results could suggest a role for TLR6 in IBD therapy and have potential implications for the development of T cell responses in the context of TLR6 activators. Clearly, the roles of TLR signaling in the context of inflammatory intestinal disease are not limited to the TLR2 molecule alone.
3. TLR2 and Eosinophil Responses
Eosinophils represent an important aspect of chronic allergic disease, and TLR2 may have a key relationship to eosinophils in the mucosal environment within the context of allergy and gastrointestinal inflammation. In animal studies, TLR2 expression and activation were sufficient to facilitate eosinophil recruitment and tissue eosinophilia of the large intestine in the context of experimental colitis [34]. Similarly, eosinophil recruitment to the large intestine and the subsequent chronic inflammatory responses were TLR2-dependent during parasitic Schistosoma mansoni infection in mice [35].
A causal link has not been established, but patients with eosinophilic gastrointestinal diseases experience elevated rates of asthma and allergy with up to 76% of patients testing positive for food allergen skin pricks [36]. IgE class switch recombination and local IgE production are also both significantly higher in patients with eosinophilic esophagitis [37]. By contrast, the mucosal administration of a synthetic TLR2 agonist in the airways reliably reduced eosinophilia of the lungs in murine asthma models [24, 26, 38]. TLR2 stimulation therefore has different outcomes on eosinophil tissue homing depending on the activation site and inflammatory status of the tissue in question. The induction of TLR2-dependent eosinophil homing to the intestine may impact the polarization of antigen responses and ultimately alter allergic inflammation or the ongoing regulation of responses to food and the microflora within this compartment.
4. TLR2 and the Enteric Nervous System
The interplay between the nervous system and the immune system can be critical for homeostasis and effective immunity. This is particularly true in the intestine where the enteric nervous system (ENS) modifies intestinal motility and epithelial barrier function. TLR2 has been shown to be expressed on enteric neurons, glia, and smooth muscle cells of the intestinal wall. TLR2−/− mice demonstrated disrupted ENS architecture as well as intestinal dysmotility that could be corrected by the addition of glial cell line-derived neurotrophic factor (GDNF). The increased susceptibility to DSS colitis exhibited by TLR2−/− mice can be abrogated by treatment with GDNF. Notably, wild type mice depleted of intestinal microbiota had similar defects in the ENS and intestinal motility to mice deficient in TLR2 [16]. It is not yet clear whether the substantial impact of TLR2 deficiency on ENS function is direct or via secondary effects on the microbiota. However, TLR2 has been implicated in the response to nerve injury in other tissues via the action of local macrophages [39], confirming the importance of this receptor to neuronal function regardless of microbial influences.
5. A Relationship between TLR2, Tregs, Microbes, and Tolerance
Oral tolerance can be defined as antigen-specific humoral and cellular hyporesponsiveness following oral antigen exposure [40, 41]. Tolerance is readily induced in mice and humans following oral treatment with food antigen, and food allergy is often considered to result from a failure of oral tolerance mechanisms. The complex process of oral tolerance is known to involve several different cell subsets within the gut associated lymphoid tissues [42], perhaps most notably the Tregs which are required for the induction and maintenance of tolerance to foods [43–46]. Tregs are therefore positioned to profoundly alter the nature of responses to food antigen. Several studies have directly investigated the impact of TLR2 activation on T cell homing and function. Wang et al. demonstrated that TLR2 and MyD88 are necessary for DCs to imprint T cells with intestinal homing markers α4β7 and CCR9 [47]. This homing is pertinent in light of evidence that Treg intestinal homing to the lamina propria is essential for the ongoing maintenance of oral tolerance to foods [44]. Importantly, lamina propria DC subsets were shown to have high expression of TLR2 relative to other lymphatic DC populations [48]. However, among lamina propria DCs, the CD103+ cells, known to be tolerogenic, had lower TLR2 expression compared to other subpopulations. This suggests that TLR2 expression on DCs may not be necessary to drive Treg differentiation.
The expression of Foxp3, associated with Treg development, is abrogated by TLR2 signaling events within the T cell [49]. Similarly, TLR2 activation with the lipopeptide Pam3CSK4 can abrogate the suppressive capacity of Tregs and DCs in vitro [50–52]. Paradoxically, a systemic administration of Pam3CSK4 promoted the expansion of adoptively transferred Tregs in vivo but mitigated their suppressive activity in mice [50]. It may be that the source of Tregs, natural or inducible, impacts the nature and sensitivity of responses to TLR2 stimulation.
It is difficult to reconcile the data above regarding TLR2 abrogation of Treg function, which may be most relevant to oral tolerance induction, with the observation that TLR2 can support the induction of Tregs in the context of commensal microbes; but there is mounting evidence that TLR2 activation by intestinal commensal bacteria can promote local regulatory responses. Microbiota are important for the appropriate maturation of intestinal immunity and this can complicate the interpretation of experimental studies examining the role of bacterial flora in specific immune responses. However, elegant studies with Bacteroides fragilis in mice have shown that Tregs induced by TLR2 activation with the unique bacterial polysaccharide A are necessary for successful intestinal colonization [53, 54]. Similarly, the probiotic Bifidobacterium infantis promotes Tregs and regulatory cytokine production in humans and functions via TLR2 [55]. It was also recently demonstrated that probiotic Bifidobacterium breve induces regulatory IL-10 secreting Tr1 cells via TLR2 stimulation of CD103+ dendritic cells, thereby reducing inflammation in the large intestine [56]. Treatment with Bifidobacterium components or the TLR2 activation of mast cells by Pam3CSK4 has even been reported to suppress IgE-mediated mast cell degranulation in vitro and in vivo [57].
While recent studies show a clear relationship between some commensals and immunologic tolerance, the antigen-specificity of these Treg responses has not been adequately characterized. Moreover, studies exploring commensal Treg induction and the resulting suppression of inflammation tend to examine responses in the colon and cecum, while little attention has been paid to the relationship between commensals and Tregs in the small intestine. The small intestine is an important site of food tolerance induction, and few studies have addressed the role of commensal colonization on food allergy. We do know that commensal bacteria are required for appropriate levels of Tregs to be established in the MLN, and without them oral tolerance is inadequate as shown by studies in germ-free (GF) mice [58]. Furthermore, it has been proposed that the inability of GF mice to establish oral tolerance may be directly related to the failure of these mice to establish adequate T cell populations in the PPs [59]. Several studies have also shown that GF mice display a more -polarized response to oral antigens, resulting in IgE antibody production specific to oral antigen and a failure to be tolerized [60–62]. A recent study by Noval Rivas et al. demonstrated that variations in the murine commensal flora will dictate the balance between oral tolerance and allergy to oral antigen through involvement of Treg populations [5]. The changes in Treg and humoral responses to food antigen in the context of commensals are likely to implicate TLRs, but more directed investigations must be carried out to fully understand the precise role of TLR2 signaling in food tolerance.
6. TLR2 Directs B Cell and IgA Responses
IgA is the most abundant mucosal antibody, with an average of 5 g secreted daily in human feces [63]. IgA occurs both as a monomer in serum and as a dimer bound by the J-chain. The IgA dimers are translocated to the gut lumen and to other mucosal surfaces by the poly-Ig receptor (pIgR) on IECs, where the antibodies participate in the immune exclusion of microbes. The relationship between secreted IgA and food allergy has not been fully elucidated, but patients with selective IgA deficiency demonstrate impaired mucosal immunity and deficits of intestinal regulation that correlate with higher rates of food allergy and inflammatory bowel disease [64, 65]. Further to this, secreted IgA has been correlated with improved tolerance to peanut challenge in allergic patients [66]. Both serum and secreted antigen-specific IgA have been shown to prevent oral anaphylaxis [67] and allergic diarrhea [68] in mice, suggesting that IgA responses can be protective in the context of an oral allergen challenge. Elevated secreted IgA has been documented in mice treated with oral food antigen compared to naïve animals [69], and antigen-specific IgA is detected in the serum of mice upon oral immunotherapy treatment [70]. Thus, it appears likely that robust IgA production is related to protection against allergic responses to food. TLR2 stimulation has well-documented effects on B cell activation and local IgA responses.
Both naïve and activated B cells express TLR2 [71]. Therefore, in addition to activating IECs, DCs, and T cells in the mucosal environment, TLR2 ligands can act directly on B cells. It was recently reported that TLR2 activation of resting murine B cells in concert with CD40L stimulation can dramatically enhance proliferation, class switch recombination, and plasma cell differentiation [72, 73]. Work by Jain et al. has also shown that TLR2 activation of B cells enhanced their ability to respond to CD40 stimulation by T cells upon antigen presentation [73]. Consistent with this, Pam3CSK4 treatment of naïve human peripheral B cells results in production of IL-6 and IL-13 [74], both of which can promote B cell activation and antibody production. Of particular relevance to oral tolerance, TLR2 stimulation of B cells with synthetic lipopeptide resulted in the proliferation of Peyer’s patch B cells and subsequent antibody production in a murine model [71]. Furthermore, stimulation of human B cells with TLR2 agonists promotes IgA production, J chain production, and the expression of intestinal homing markers CCR9 and CCR10 [75]. Prior to the characterization of TLR2, an older study with lipopeptides found that oral administration of Pam3CSK4 (now known to be a TLR2/1 agonist) concurrent with oral antigen promoted significant antigen-specific plasma IgA and secretory fecal IgA responses in a murine model [76]. Finally, expression of the pIgR and transcytosis of IgA dimers across IECs are impaired in the absence of MyD88 signaling [77]. Taken together, these findings identify key roles for TLR2 in regulating B cell maturation, expansion, homing, IgA production, and even IgA secretion.
Evidence points towards B cell activation and IgA production as necessary to contain commensal microbes to the intestinal lumen [78, 79]. The same principle may apply to food antigens, but the antigen-specificity of activated B cells is at issue. Further investigation is necessary to elucidate whether bystander TLR2 activation of intestinal B cells by commensal bacteria or food contaminants is capable of promoting expansion of food-specific B cells and the associated IgA response.
7. Summary
TLR2 is increasingly at the forefront of intestinal immunology investigations. TLR2 stimulation promotes intestinal barrier function, B cell maturation, mucosal homing, and IgA responses (Figure 1). TLR2 activation by some commensal species facilitates Treg differentiation. However, most reports indicate that the direct impact of TLR2 stimulation on Tregs is to suppress their function once induced, and systemic TLR2 activation promotes intestinal homing of eosinophils during intestinal inflammation and impacts enteric nerve function (Figure 1). It is likely that the TLR2-dependent axis of regulation and allergic sensitization is plastic and responsive to changes in TLR2 agonist dosing. Furthermore, the physiological site of activation may be critically important in dictating subsequent responses. For example, constitutive low grade commensal TLR2 stimulation may support tolerance to foods, but a breach in the mucosal barrier and amplified TLR2 agonist dosing may promote local inflammation and sensitization to bystander food antigens. Such a scenario needs to be tested experimentally in order to better understand the relationship between TLR2 and food allergy. Finally, a dedicated comparison between TLR2 activation in the small and large intestine and the subsequent Treg and B cell responses would be extremely important for understanding the implications of TLR2 in food tolerance and allergy. There is a true deficit of small intestine research in this field.
Figure 1: Proposed involvement of TLR2 in oral antigen responses of the intestinal microenvironment. This figure outlines several suggested roles of key intestinal cell types in the regulation of oral tolerance to oral antigens in the context of TLR2 activation.
Unfortunately, the most fundamental question remains unanswered: does TLR2 activation support or disrupt human oral tolerance to food antigens? As described above, a number of lines of evidence suggest that this may be the case, but there is insufficient evidence available to move forward with TLR2 targeted prevention or treatment strategies. With the current interest in host-commensal interactions and the growing importance of food allergy, we are sure to see rapid advancements in this area that will have implications both for allergic disease and for effective oral immunization.
J. L. Round and S. K. Mazmanian, “Inducible Foxp3+ regulatory T-cell development by a commensal bacterium of the intestinal microbiota,” Proceedings of the National Academy of Sciences of the United States of America, vol. 107, no. 27, pp. 12204–12209, 2010.View at Publisher · View at Google Scholar · View at Scopus | {
"pile_set_name": "Pile-CC"
} |
Based on the information reported to CARFAX, this vehicle is worth $1,560 less than the retail book value.
This CARFAX Vehicle History Report is based only on information supplied to CARFAX and available as of 7/16/15 at 1:10:00 PM (EDT). Other information about this vehicle, including problems, may not have been reported to CARFAX. Use this report as one important tool, along with a vehicle inspection and test drive, to make a better decision about your next used car.
Price Calculator™
Adjust the value of this 2001 Hyundai Elantra GLS/GT based on the information available in this report
1) Retail Book Value
2) CARFAX Price Adjustment™
3) Adjusted Retail Value
$
Enter retail book value here
- $1,560
Below retail book value
Begin by entering the retail book value
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
Exceeds Mechanical Limits Title A vehicle with a 5-digit odometer cannot accurately track mileage after 99,999 miles because the odometer rolls over. This title is the result of a seller certifying under the Federal Odometer Act, that the odometer reading EXCEEDS MECHANICAL LIMITS of the odometer.
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
Flood Damage Title States issue flood titles when a vehicle has been in a flood or has received extensive water damage.
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
Manufacturer Recall Automobile manufacturers issue recall notices to inform owners of car defects that have come to the manufacturer's attention. Recalls also suggest improvements that can be made to improve the safety of a particular vehicle. Most manufacturer recalls can be repaired at no cost to you.
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
Basic Warranty Most manufacturers offer a basic warranty for new vehicles. These warranties vary by manufacturer and typically last for a certain amount of time and/or a set number of miles.
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
Salvage Title A Salvage Title is issued on a vehicle damaged to the extent that the cost of repairing the vehicle exceeds approximately 75% of its pre-damage value. This damage threshold may vary by state. Some states treat Junk titles the same as Salvage but the majority use this title to indicate that a vehicle is not road worthy and cannot be titled again in that state. The following eleven States also use Salvage titles to identify stolen vehicles - AZ, FL, GA, IL, MD, MN, NJ, NM, NY, OK and OR.
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
Structural Damage All levels of accidents, from minor to severe, can cause structural damage to a vehicle (i.e., damage to the frame or unibody).
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
Airbag Deployment Occurs when the driver, passenger or side airbag has been used or deployed during a crash or other incident. If an airbag has been deployed, it must be replaced by a qualified technician. Have this car inspected by a mechanic prior to purchase.
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
Rebuilt/Reconstructed Title A Rebuilt/Reconstructed vehicle is a salvage vehicle that has been repaired and restored to operation. These vehicles are often severely damaged before they are rebuilt and refurbished parts are typically used during reconstruction. In most states, an inspection of the vehicle is required before the vehicle is allowed to return to the road.
Hail Damage Title The vehicle sustained major damage due to hail. In most states, hail damage titles are issued when the cost of repairing the vehicle for safe operation exceeds its fair market value.
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
Not Actual Mileage Title When the seller certifies, under the Federal Odometer Act, that the odometer reading does not reflect the vehicle's actual mileage. This may occur because the odometer was tampered with, broken, or replaced.
Rebuilt/Reconstructed Title A Rebuilt/Reconstructed vehicle is a salvage vehicle that has been repaired and restored to operation. These vehicles are often severely damaged before they are rebuilt and refurbished parts are typically used during reconstruction. In most states, an inspection of the vehicle is required before the vehicle is allowed to return to the road.
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
Manufacturer Buyback or Lemon Title A DMV or a state agency marks an official document or issues a Manufacturer Buyback/Lemon title when a vehicle has been repurchased by the manufacturer. Not all states issue manufacturer buyback titles and the specific requirements for a lemon law vehicle varies by state.
$tooltip.getTerm() $tooltip.getText()
Loss Due To Fire Title The vehicle sustained major damage due to fire. In most states, fire damage titles are issued when the cost of repairing the vehicle for safe operation exceeds its fair market value.
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
Junk Title A Junk Title is issued on a vehicle damaged to the extent that the cost of repairing the vehicle exceeds approximately 75% of its pre-damage value. This damage threshold may vary by state. The majority of states use this title to indicate that a vehicle is not road worthy and cannot be titled again. Some states treat Junk titles the same as Salvage.
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
Total Loss An insurance or fleet company declares a vehicle a total loss when a claim exceeds approximately 75% of its pre-damage value or if the vehicle is stolen and not recovered. This damage threshold varies by company. These companies typically take possession and obtain the title. Not all total loss vehicles result in a DMV-reported branded title, like a Salvage or Junk title. See the glossary for more information.
$tooltip.getTerm() $tooltip.getText()
$tooltip.getTerm() $tooltip.getText()
Dismantled Title The vehicle sustained major damage to one or more major component parts and the cost of repairing the vehicle for safe operation exceeds its fair market value. When a Dismantled title is issued, the vehicle may be used only for parts or scrap metal. It cannot be re-titled or returned to the road.
Description: ON CERTAIN PASSENGER VEHICLES, THE REAR BRAKE TUBES PASS BEHIND THE FRONT SUSPENSION CROSSMEMBER. TWO STEERING GEARBOX MOUNTING BRACKETS ARE WELDED TO THE CROSSMEMBER. ON VEHICLES EQUIPPED WITH AN ANTILOCK BRAKE SYSTEM (ABS), THE REAR BRAKE TUBES COULD CONTACT BOTH STEERING GEARBOX MOUNTING FLUID LEAKAGE COULD RESULT IN REDUCED BRAKING CAPABILITY INCREASING THE RISK OF A CRASH. THE LEFT MOUNTING BRACKET. CONTACT BETWEEN THE REAR BRAKE TUBES AND THE STEERING BRACKETS COULD CAUSE WEAR AND CORROSION THAT COULD RESULT IN BRAKE FLUID LEAKAGE.
FLUID LEAKAGE COULD RESULT IN REDUCED BRAKING CAPABILITY INCREASING THE RISK OF A CRASH.
Remedy: DEALERS WILL REPOSITION THE REAR BRAKE TUBES SO THEY DO NOT CONTACT THE MOUNTING BRACKETS, INSTALL BRAKE TUBE CLIPS TO CONTROL THE LOCATION OF THE REAR BRAKE TUBES, AND APPLY ANTI-CORROSION MATERIAL TO THE TUBES IN THE AREAS WHERE CONTACT WITH THE MOUNTING BRACKETS MAY HAVE OCCURRED. OWNER NOTIFICATION BEGAN ON OCTOBER 13, 2003. OWNERS WHO TAKE THEIR VEHICLES TO AN AUTHORIZED DEALER ON AN AGREED UPON SERVICE DATE AND DO NOT RECEIVE THE FREE REMEDY WITHIN A REASONABLE TIME SHOULD CONTACT HYUNDAI AT 1-800-633-5151. HYUNDAI RECALL NO. 061.
Description: HYUNDAI IS RECALLING CERTAIN MY 2001-2002 ELANTRA VEHICLES. MOVEMENT OF THE SIDE IMPACT AIR BAG WIRING HARNESS MOUNTED UNDER EACH FRONT SEAT, POSSIBLY CAUSED BY CONTACT FROM MATERIALS PLACED UNDER THE SEAT, MAY RESULT IN AN ELECTRICAL RESISTANCE THAT WOULD CAUSE SUPPLEMENTAL RESTRAINT SYSTEM (SRS) WARNING LIGHT ILLUMINATION.
THIS CONDITION ONLY RELATES TO THE DRIVER AND PASSENGER SEAT MOUNTED SIDE IMPACT AIR BAGS AND MAY PREVENT SEAT MOUNTED SIDE IMPACT AIR BAG DEPLOYMENT DURING A CRASH WHERE SUCH DEPLOYMENT SHOULD OCCUR. NON-DEPLOYMENT OF THE SRS AIR BAGS MAY INCREASE THE RISK OF INJURY TO THE DRIVER AND FRONT PASSENGER UNDER CERTAIN CRASH CONDITIONS.
Remedy: DEALERS WILL INSTALL NEW SIDE IMPACT AIR BAG WIRING HARNESS CONNECTOR CLIPS AND REVISED SIDE IMPACT AIR BAG WIRING HARNESS ATTACHMENTS UNDER THE DRIVER'S AND FRONT PASSENGER'S SEATS. THE RECALL IS EXPECTED TO BEGIN DURING THE FOURTH QUARTER OF 2008, AND WILL BE SENT OUT IN SIX MAILINGS. OWNERS MAY CONTACT HYUNDAI AT 1-800-633-5151. HYUNDAI RECALL NO. 088.
Description: HYUNDAI IS RECALLING 160,904 MY 2001-2003 ELANTRA AND MY 2003 TIBURON VEHICLES ORIGINALLY SOLD IN OR CURRENTLY REGISTERED IN THE STATES OF CONNECTICUT, DELAWARE, ILLINOIS, INDIANA, IOWA, MAINE, MARYLAND, MASSACHUSETTS, MICHIGAN, MINNESOTA, MISSOURI, NEW HAMPSHIRE, NEW JERSEY, NEW YORK, OHIO, PENNSYLVANIA, RHODE ISLAND, VERMONT, WEST VIRGINIA, WISCONSIN, AND THE DISTRICT OF COLUMBIA. ROAD SALT USED DURING THE WINTER MONTHS IN THESE JURISDICTIONS MAY RESULT IN INTERNAL CORROSION AND THINNING OF THE STEEL IN THE FRONT LOWER CONTROL ARMS. THE CORROSION MAY PROGRESS TO THE POINT WHERE THE LOWER CONTROL ARM'S UPPER AND LOWER PANELS BECOME PERFORATED. A PERFORATED FRONT LOWER CONTROL ARM MAY FRACTURE BETWEEN ITS BALL JOINT ATTACHMENT AND THE FORWARD AND REARWARD PIVOT ATTACHMENTS TO THE CHASSIS.
THE FRACTURING OF THE CONTROL ARM COULD AFFECT AN OWNER'S CONTROL OVER THEIR VEHICLE WHICH MAY INCREASE THE RISK OF A CRASH.
Remedy: DEALERS WILL INSPECT THE FRONT LOWER CONTROL ARMS FOR CORROSION DAMAGE. IF SPECIFIED LEVELS OF INTERNAL CORROSION DAMAGE ARE FOUND, THE FRONT LOWER CONTROL ARMS WILL BE REPLACED WITH NEW FRONT LOWER CONTROL ARMS INCORPORATING ADDITIONAL HOLES IN THE UPPER AND LOWER PANELS. IF THE FRONT LOWER CONTROL ARMS DO NOT REQUIRE REPLACEMENT, THE DEALER WILL ADD DRAINAGE HOLES TO THE FRONT LOWER CONTROL ARMS AND WILL TREAT THE FRONT LOWER CONTROL ARMS WITH RUST-PROOFING MATERIALS TO ARREST THE INTERNAL CORROSION PROCESS. THESE PROCEDURES WILL BE PERFORMED FREE OF CHARGE. THE RECALL BEGAN ON AUGUST 17, 2009. OWNERS MAY CONTACT THE HYUNDAI CUSTOMER ASSISTANCE CENTER AT 1-800-633-5151. HYUNDAI RECALL NO. 091.
Glossary
Accident / Damage Indicator
CARFAX receives information about accidents in all 50 states, the District of Columbia and Canada. Different information in a vehicle's history can indicate an accident or damage, such as: salvage auction, fire damage, police-reported accident, crash test vehicle, damage disclosure, collision repair facility and automotive recycler records. Not every accident or damage event is reported and not all reported are provided to CARFAX. Details about the accident or damage event when reported to CARFAX (e.g. severity, impact location, airbag deployment) are included on the Vehicle History Report. CARFAX recommends you obtain a vehicle inspection from your dealer or an independent mechanic.
According to the National Safety Council, Injury Facts, 2007 edition, 7% of the 245 million registered vehicles in the U.S. were involved in an accident in 2005. Over 75% of these were considered minor or moderate.
CARFAX depends on many sources for its accident / damage data. CARFAX can only report what is in our database on 7/16/15 at 1:10:00 PM (EDT). New data will result in a change to this report.
CARFAX Price Adjustment™
Accidents, service records, number of owners and many other history factors can affect a vehicle's value. The CARFAX Price Adjustment is a tool that analyzes millions of used car transactions to measure how the combination of all the information reported to CARFAX affects the value of a particular vehicle. The vehicle's retail book value plus the CARFAX Price Adjustment will give you a more accurate measure of the vehicle's value. Use this tool, along with a vehicle inspection and test drive, to make a better decision about your next used car.
First Owner
When the first owner(s) obtains a title from a Department of Motor Vehicles as proof of ownership.
Manufacturer Recall
Automobile manufacturers issue recall notices to inform owners of car defects that have come to the manufacturer's attention. Recalls also suggest improvements that can be made to improve the safety of a particular vehicle. Most manufacturer recalls can be repaired at no cost to you.
New Owner Reported
When a vehicle is sold to a new owner, the Title must be transferred to the new owner(s) at a Department of Motor Vehicles.
Ownership History
CARFAX defines an owner as an individual or business that possesses and uses a vehicle. Not all title transactions represent changes in ownership. To provide estimated number of owners, CARFAX proprietary technology analyzes all the events in a vehicle history. Estimated ownership is available for vehicles manufactured after 1991 and titled solely in the US including Puerto Rico. Dealers sometimes opt to take ownership of a vehicle and are required to in the following states: Maine, Massachusetts, New Jersey, Ohio, Oklahoma, Pennsylvania and South Dakota. Please consider this as you review a vehicle's estimated ownership history.
Salvage Auction Record
Most vehicles sold at Salvage auctions were declared totaled by insurance companies. Most of these vehicles have sustained significant damage but there are some exceptions. For instance, recovered stolen vehicles are often declared a total loss regardless of the actual damage. Rebuilders and Recyclers purchase these vehicles at auction with intentions to rebuild them or dismantle them for parts.
Salvage Title
A Salvage Title is issued on a vehicle damaged to the extent that the cost of repairing the vehicle exceeds approximately 75% of its pre-damage value. This damage threshold may vary by state. Some states treat Junk titles the same as Salvage but the majority use this title to indicate that a vehicle is not road worthy and cannot be titled again in that state. The following eleven states also use Salvage titles to identify stolen vehicles - AZ, FL, GA, IL, MD, MN, NJ, NM, NY, OK and OR.
Title Issued
A state issues a title to provide a vehicle owner with proof of ownership. Each title has a unique number. Each title or registration record on a CARFAX report does not necessarily indicate a change in ownership. In Canada, a registration and bill of sale are used as proof of ownership.
CARFAX DEPENDS ON ITS SOURCES FOR THE ACCURACY AND RELIABILITY OF ITS INFORMATION. THEREFORE, NO RESPONSIBILITY IS ASSUMED BY CARFAX OR ITS AGENTS FOR ERRORS OR OMISSIONS IN THIS REPORT. CARFAX FURTHER EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. CARFAX® | {
"pile_set_name": "Pile-CC"
} |
1. Field of the Invention
The invention relates to a method and an apparatus according to the preamble of claims 1 and 13 for loading an adapter for a printed circuit board testing device.
2. Description of the Related Art
From practical operation a method and an apparatus of this kind are known which for each arrangement of the adapter pins uses an individual main magazine and an associated intermediate magazine and a common so-called locking packet. The selection plate is fastened to the intermediate magazine. The diameter of the holes in the main magazine, in the intermediate magazine including the selection plate and in the locking packet is smaller than the diameter of the heads and at least equal to that of the shafts of the adapter pins. The adapter pins thus hang by their heads in the main magazine, in the intermediate magazine and in the locking packet.
The procedure for transferring a first arrangement of adapter pins from a first main magazine into the adapter is as follows:
1. Transporting the main magazine filled with the adapter pins underneath the open locking packet, PA0 2. lifting and thereby transferring the adapter pins into the locking packet by lifting them by means of a hole-free plate moved from below towards the main magazine, PA0 3. closing the locking packet to hold the transferred adapter pins, PA0 4. removing the main magazine that has been completely emptied, PA0 5. transporting the empty intermediate magazine with the selection plate facing upwards beneath the closed locking packet, PA0 6. opening the locking packet so that the adapter pins to be loaded into the adapter fall with their contact ends first through the selection plate into the intermediate magazine, PA0 7. closing the locking packet to hold the remaining adapter pins, PA0 8. removing the loaded intermediate magazine, PA0 9. transporting the empty main magazine beneath the closed, partly filled locking packet, PA0 10. opening the locking packet so that the remaining adapter pins therein fall back into the main magazine with their contact ends first, PA0 11. removing the partly emptied main magazine, PA0 12. transporting the loaded intermediate magazine beneath the open empty locking packet, PA0 13. lifting the adapter pins and transferring them into the locking packet in the same way as described in step 2, PA0 14. closing the locking packet to hold the transferred adapter pins, PA0 15. removing the empty intermediate magazine, PA0 16. transporting the empty adapter beneath the closed partly filled locking packet, PA0 17. opening the locking packet so that the adapter pins therein fall into the adapter with their contact ends first, PA0 18. removing the filled adapter. PA0 1. The empty intermediate magazine is placed on the full main magazine by relative movement in which the closing plate is arranged on the upper side of the intermediate magazine opposite the main magazine and the selection plate is arranged between the main magazine and the intermediate magazine, PA0 2. the intermediate magazine and the main magazine are tilted together through about 180.degree. so that the adapter pins to be loaded into the adapter fall through the selection plate with their contact heads first into the intermediate magazine, PA0 3. the partly emptied main magazine is removed, PA0 4. the empty adapter is placed with its side holding the heads of the adapter pins when in the loaded state by relative movement on to the side of the loaded intermediate magazine facing away from the closing plate, PA0 5. the adapter and the intermediate magazine are tilted together through about 180.degree. so that the adapter pins fall into the adapter with their contact ends first, PA0 6. the loaded adapter is removed. PA0 7. Repetition of the aforementioned step 1, but with a second main magazine that is loaded with the adapter pins of the second arrangement, PA0 8. repetition of the aforementioned step 2, but with the second main magazine, PA0 9. repetition of the aforementioned step 3, but with the second main magazine, PA0 10. the intermediate magazine loaded with the adapter pins from the second main magazine is tilted through about 90.degree. so that it is on edge and by relative movement is placed against the adapter, loaded with adapter pins from the first main magazine, that has already been tilted on edge--this prevents adapter pins from falling out of the intermediate magazine, which would be the case if it had been tilted through 180.degree. to place it on the adapter located in the horizontal position after step 6, PA0 11. the intermediate magazine and the adapter are tilted together through 90.degree. so that the adapter pins fall into the adapter with their contact ends first and the intermediate magazine remains behind empty, PA0 12. the completely loaded adapter is removed.
These 18 steps are repeated using a second intermediate magazine if the adapter is additionally to be loaded by a second arrangement of adapter pins from a second main magazine.
It is an object of the invention to further develop the method and apparatus of the kind mentioned in the introduction so that the adapter can be loaded more simply and quickly and with less constructional outlay.
This object is achieved according to the invention by the characterizing features of claims 1 and 13. In this way it is possible to reduce the number of process steps from 18 or 36 to 6 or 12 steps and to use only one intermediate magazine even when loading the adapter with adapter pins in various arrangements and to dispense with the locking packet completely.
The transfer of a Single arrangement of adapter pins is advantageously done by means of the following steps:
If the adapter is to be loaded additionally with a second arrangement of adapter pins it is then advantageously tilted through about 90.degree. so that it is on edge. The following steps can then ensue:
It is also possible, after transferring the adapter pins from the first main magazine into the intermediate magazine, to transfer further adapter pins that are to be loaded into the adapter from one or several further main magazines successively into the intermediate magazine with their heads first under gravity.
It is advantageous to tilt the intermediate magazine loaded with adapter pins from at least the first main magazine through about 90.degree. so that it is on edge and, after placing it against a further main magazine likewise on edge to tilt them back together through about 90.degree. so that the adapter pins are transferred under gravity from the further main magazine into the intermediate magazine. After removing this main magazine the aforementioned steps 4 to 6 or 10 to 12 are advantageously carried out, steps 10 to 12 being carried out analogously with an empty adapter and with the intermediate magazine loaded with adapter pins from the first and the further main magazine. Obviously the aforementioned procedure for transferring the adapter pins from the main magazine to the intermediate magazine and to the adapter, in each case by tilting them twice through 90.degree., can also be used to load a still empty intermediate magazine and still empty adapter with adapter pins from the first main magazine by modifying steps 1 to 6.
According to a modification of the method the adapter pins that have been transferred from at least one main magazine into the intermediate magazine can be held securely by closing a clamping device adjacent to the closing plate, whereupon the intermediate magazine with the securely held adapter pins is tilted through about 180.degree. and placed on the adapter so that after the clamping device is opened the adapter pins are transferred under gravity into the adapter with their contact ends first. In this way the intermediate magazine can be tilted together with the adapter through 180.degree. instead of twice through 90.degree..
To obtain the same advantage when transferring adapter pins of a further arrangement into the intermediate magazine, after closing the clamping device and tilting through about 180.degree. the loaded intermediate magazine is preferably placed on a further main magazine and tilted again with it through about 180.degree. so that after releasing the clamping device again the adapter pins are transferred under gravity from the further main magazine into the intermediate magazine with their heads first.
After this the adapter is advantageously placed with its side holding the heads of the adapter pins when in the loaded state on the side of the loaded intermediate magazine facing away from the closing plate and after closing the clamping device is tilted together with the intermediate magazine through about 180.degree., so that after releasing the clamping device the adapter pins are transferred to the adapter with their contact ends first.
The main magazine preferably comprises at least two perforated plates arranged parallel to and spaced from one another having holes arranged coaxially at the aforementioned grid points, their diameters being smaller than the diameters of the heads and at least equal to the diameters of the shaft section of the adapter pins to be accommodated.
Similarly the intermediate magazine can likewise comprise at least two perforated plates arranged parallel to and spaced from one another having holes arranged coaxially at the aforementioned grid points with a diameter that is at least equal to the diameter of the heads of the adapter pins.
The clamping device preferably comprises a clamping plate that is arranged between the two perforated plates and that can be moved in its plane from an open position to a closed position, having holes arranged at the aforementioned grid points whose diameters are at least equal to the diameter of the heads of the adapter pins such that when the clamping plate is in its open position it holes are arranged centrally with the holes of the perforated plates and eccentrically thereto when it is in its closed position. The clamping device can be urged by a spring into its closed position.
The method according to the invention can be carried out both manually and mechanically. For this purpose a transporting arrangement is advantageous with which the main magazine, the intermediate magazine and the adapter can be transported relative to one another into positions in which the adapter pins can be transferred under gravity from the main magazine to the intermediate magazine and thence into the adapter. | {
"pile_set_name": "USPTO Backgrounds"
} |
Ultra-wideband transmission of information typically operates in highly populated frequency ranges. Typically, ultra-wideband communications (e.g., impulse radio communications) employ pulses of very short duration on the order of nanoseconds or picoseconds, for example. However, signals of such short duration often must contend with a variety of natural and synthetic noise signals resulting in signal cancellation, amplification or interference.
Furthermore, the transmission errors can be compounded by conventional encoding and decoding techniques. Conventional encoding and decoding techniques generally receive an entire transmission and then process (e.g., data type, decode) the transmission. After that conventional error detection processes (e.g., a check sum error algorithm) proceed. If after this error detection process, a transmission is found to have too many errors, then a request for a re-transmission of the entire transmission is required. This technique generally inefficient and time-intensive in detecting errors.
Accordingly, there is a need for a system or method of encoding and decoding an ultra-wideband transmission as part of an ultra-wideband communications system in which the method of encoding and decoding allows for the detection of errors and, if appropriate, the requesting for re-transmission before the complete transmission is received. | {
"pile_set_name": "USPTO Backgrounds"
} |
A Short Existential Case Example from Counseling and Psychotherapy Theories . . .
Each chapter in Counseling and Psychotherapy Theories in Context and Practice includes at least two case vignettes. These vignettes are brief, but designed to articulate how clinicians can use specific theories to formulate cases and engage in therapeutic interactions. The following case is excerpted from the Existential Theory and Therapy chapter.
This post is part of a series of free posts available to professors and students in counseling and psychology who are teaching and learning about theories of counseling and psychotherapy. It, as well as the recommended video clip at the end, can be used for discussion purposes and/or to supplement course content.
In this case, a Native American counselor-in-training is working with an 18-year-old Latina female. The client has agreed to attend counseling to work on her anger and disruptive behaviors within a residential vocational training setting. Her behaviors are progressively costing her freedom at the residential setting and contributing to the possibility of her being sent home. The client says she would like to stay in the program and complete her training, but her behaviors seem to say otherwise.
Client: Yeah, I got in trouble again yesterday. I was just walking on the grass and some “ho” told me to get on the sidewalk so I flipped her off and staff saw. So I got a ticket. That’s so bogus.
Counselor: You sound like you’re not happy about getting in trouble, but you also think the ticket was stupid.
Client: It was stupid. I was just being who I am. All the women in my family are like this. We just don’t take shit.
Counselor: We’ve talked about this before. You just don’t take shit.
Client: Right.
Counselor: Can I be straight with you right now? Can I give you a little shit?
Client: Yeah, I guess. In here it’s different.
Counselor: On the one hand you tell me and everybody that you want to stay here and graduate. On the other hand, you’re not even willing to follow the rules and walk on the sidewalk instead of the grass. What do you make of that?
Client: Like I’ve been saying, I do my own thing and don’t follow anyone’s orders.
Counselor: But you want to finish your vocational training. What is it for you to walk on the sidewalk? That’s not taking any shit. All you’re doing is giving yourself trouble.
Client: I know I get myself trouble. That’s why I need help. I do want to stay here.
Counselor: What would it be like for you then . . . to just walk on the sidewalk and follow the rules?
Client: That’s weak brown-nosing bullshit.
Counselor: Then will you explore that with me? Are you strong enough to look very hard right now with me at what this being weak shit is all about?
Client: Yeah. I’m strong enough. What do you want me to do?
Counselor: Okay then. Let’s really get serious about this. Relax in your chair and imagine yourself walking on the grass and someone asks you to get on the sidewalk and then you just see yourself smiling and saying, “Oh yeah, sure.” And then you see yourself apologize. You say, “Sorry about that. My bad. You’re right. Thanks.” What does that bring up for you.
In this counseling scenario the client is conceptualized as using expansive and angry behaviors to compensate for inner feelings of weakness and vulnerability. The counselor uses the client’s language to gently confront the discrepancy between what the client wants and her behaviors. As you can see from the preceding dialogue, this confrontation (and the counselor’s use of an interpersonal challenge) gets the client to look seriously at what her discrepant behavior is all about. This cooperation wouldn’t be possible without the earlier development of a therapy alliance . . . an alliance that seemed deepened by the fact that the client saw the counselor as another Brown Woman. After the confrontation and cooperation, the counselor shifts into a visualization activity designed to focus and vivify the client’s feelings. This process enabled the young Latina woman to begin understanding in greater depth why cooperating with rules triggered intense feelings of weakness. In addition, the client was able to begin articulating the meaning of feeling “weak” and how that meaning permeated and impacted her life. | {
"pile_set_name": "Pile-CC"
} |
Q:
rmarkdown::render to compile LaTeX documents
This example LaTeX file compiles just fine for me using Rstudio, TexShop, and pdflatex example.tex. But rmarkdown::render does not work.
> rmarkdown::render("example.tex", output_format = "pdf_document")
/usr/local/bin/pandoc +RTS -K512m -RTS example.utf8.md --to latex --from markdown+autolink_bare_uris+ascii_identifiers+tex_math_single_backslash --output example.pdf --template /Library/Frameworks/R.framework/Versions/3.3/Resources/library/rmarkdown/rmd/latex/default.tex --highlight-style tango --latex-engine /Library/TeX/texbin/pdflatex --variable graphics=yes --variable 'geometry:margin=1in'
! LaTeX Error: Can be used only in preamble.
See the LaTeX manual or LaTeX Companion for explanation.
Type H <return> for immediate help.
...
l.88 \documentclass
pandoc: Error producing PDF from TeX source
Error: pandoc document conversion failed with error 43
>
Is there a way to tell rmarkdown that I'm starting with a LaTeX document? I am using
Mac OS 10.11.5
R 3.3.0
rmarkdown 0.9.6
pandoc 1.13.2
pdfTeX 3.14159265-2.6-1.40.17 (TeX Live 2016)
A:
Never mind. tools::texi2pdf("example.tex") worked for me with Rstudio and R from the command line. The R GUI failed in error, though.
| {
"pile_set_name": "StackExchange"
} |
Reducz
Reducz is a village in the administrative district of Gmina Łęki Szlacheckie, within Piotrków County, Łódź Voivodeship, in central Poland. It lies approximately north of Łęki Szlacheckie, south-east of Piotrków Trybunalski, and south of the regional capital Łódź.
References
Reducz | {
"pile_set_name": "Wikipedia (en)"
} |
Q:
routing to a webform using MVC routing
I have a MVC 2 project runnin in .net 3.5. There are some Webforms which i have in a separate folder called "Forms". I need to routing to be implemented for this page. Like, localhost/home.aspx should be re-directed to localhost/Forms/home.aspx. When i tried using the following code,
routes.MapRoute(
"Default", // Route name
"home.aspx", // URL with parameters
@"Forms/Home.aspx"// Parameter defaults
);
I get an error saying,
The RouteData must contain an item named 'controller'
I tried this link, but when i try to implement
routes.MapPageRoute("ReportRoute", // Route name
"Reports/{reportname}", // URL
"~/CommonReports/{reportname}.aspx" // File
);`
Iam not getting the MapPageRoute() method in my routes object. Could some one helpme how to handle this?
Thanks in Advance
A:
MapPageRoute() was only introduced in .Net 4 - which is why it is not available. There is an article about using a custom route handler that implements IRouteHandler at http://msdn.microsoft.com/en-us/library/cc668202%28v=vs.90%29.aspx which should do what you want.
| {
"pile_set_name": "StackExchange"
} |
config_set alias.column Aliases.real_name
[[0,0.0,0.0],true]
table_create Aliases TABLE_HASH_KEY ShortText
[[0,0.0,0.0],true]
column_create Aliases real_name COLUMN_SCALAR ShortText
[[0,0.0,0.0],true]
table_create Memos TABLE_HASH_KEY ShortText
[[0,0.0,0.0],true]
load --table Memos
[
{"_key": "Groonga"}
]
[[0,0.0,0.0],1]
select Memos --filter 'caption == "Groonga"'
[
[
[
-63,
0.0,
0.0
],
"Syntax error: <caption| |== \"Groonga\">: [expr][parse] unknown identifier: <caption>"
]
]
#|e| [expr][parse] unknown identifier: <caption>
#|e| Syntax error: <caption| |== "Groonga">: [expr][parse] unknown identifier: <caption>
load --table Aliases
[
{"_key": "Memos.caption", "real_name": "_key"}
]
[[0,0.0,0.0],1]
select Memos --filter 'caption == "Groonga"'
[[0,0.0,0.0],[[[1],[["_id","UInt32"],["_key","ShortText"]],[1,"Groonga"]]]]
| {
"pile_set_name": "Github"
} |
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Flot Examples: Time Axes</title>
<link href="../examples.css" rel="stylesheet" type="text/css">
<!--[if lte IE 8]><script language="javascript" type="text/javascript" src="../../excanvas.min.js"></script><![endif]-->
<script language="javascript" type="text/javascript" src="../../jquery.js"></script>
<script language="javascript" type="text/javascript" src="../../jquery.flot.js"></script>
<script language="javascript" type="text/javascript" src="../../jquery.flot.time.js"></script>
<script type="text/javascript">
$(function() {
var d = [[-373597200000, 315.71], [-370918800000, 317.45], [-368326800000, 317.50], [-363056400000, 315.86], [-360378000000, 314.93], [-357699600000, 313.19], [-352429200000, 313.34], [-349837200000, 314.67], [-347158800000, 315.58], [-344480400000, 316.47], [-342061200000, 316.65], [-339382800000, 317.71], [-336790800000, 318.29], [-334112400000, 318.16], [-331520400000, 316.55], [-328842000000, 314.80], [-326163600000, 313.84], [-323571600000, 313.34], [-320893200000, 314.81], [-318301200000, 315.59], [-315622800000, 316.43], [-312944400000, 316.97], [-310438800000, 317.58], [-307760400000, 319.03], [-305168400000, 320.03], [-302490000000, 319.59], [-299898000000, 318.18], [-297219600000, 315.91], [-294541200000, 314.16], [-291949200000, 313.83], [-289270800000, 315.00], [-286678800000, 316.19], [-284000400000, 316.89], [-281322000000, 317.70], [-278902800000, 318.54], [-276224400000, 319.48], [-273632400000, 320.58], [-270954000000, 319.78], [-268362000000, 318.58], [-265683600000, 316.79], [-263005200000, 314.99], [-260413200000, 315.31], [-257734800000, 316.10], [-255142800000, 317.01], [-252464400000, 317.94], [-249786000000, 318.56], [-247366800000, 319.69], [-244688400000, 320.58], [-242096400000, 321.01], [-239418000000, 320.61], [-236826000000, 319.61], [-234147600000, 317.40], [-231469200000, 316.26], [-228877200000, 315.42], [-226198800000, 316.69], [-223606800000, 317.69], [-220928400000, 318.74], [-218250000000, 319.08], [-215830800000, 319.86], [-213152400000, 321.39], [-210560400000, 322.24], [-207882000000, 321.47], [-205290000000, 319.74], [-202611600000, 317.77], [-199933200000, 316.21], [-197341200000, 315.99], [-194662800000, 317.07], [-192070800000, 318.36], [-189392400000, 319.57], [-178938000000, 322.23], [-176259600000, 321.89], [-173667600000, 320.44], [-170989200000, 318.70], [-168310800000, 316.70], [-165718800000, 316.87], [-163040400000, 317.68], [-160448400000, 318.71], [-157770000000, 319.44], [-155091600000, 320.44], [-152672400000, 320.89], [-149994000000, 322.13], [-147402000000, 322.16], [-144723600000, 321.87], [-142131600000, 321.21], [-139453200000, 318.87], [-136774800000, 317.81], [-134182800000, 317.30], [-131504400000, 318.87], [-128912400000, 319.42], [-126234000000, 320.62], [-123555600000, 321.59], [-121136400000, 322.39], [-118458000000, 323.70], [-115866000000, 324.07], [-113187600000, 323.75], [-110595600000, 322.40], [-107917200000, 320.37], [-105238800000, 318.64], [-102646800000, 318.10], [-99968400000, 319.79], [-97376400000, 321.03], [-94698000000, 322.33], [-92019600000, 322.50], [-89600400000, 323.04], [-86922000000, 324.42], [-84330000000, 325.00], [-81651600000, 324.09], [-79059600000, 322.55], [-76381200000, 320.92], [-73702800000, 319.26], [-71110800000, 319.39], [-68432400000, 320.72], [-65840400000, 321.96], [-63162000000, 322.57], [-60483600000, 323.15], [-57978000000, 323.89], [-55299600000, 325.02], [-52707600000, 325.57], [-50029200000, 325.36], [-47437200000, 324.14], [-44758800000, 322.11], [-42080400000, 320.33], [-39488400000, 320.25], [-36810000000, 321.32], [-34218000000, 322.90], [-31539600000, 324.00], [-28861200000, 324.42], [-26442000000, 325.64], [-23763600000, 326.66], [-21171600000, 327.38], [-18493200000, 326.70], [-15901200000, 325.89], [-13222800000, 323.67], [-10544400000, 322.38], [-7952400000, 321.78], [-5274000000, 322.85], [-2682000000, 324.12], [-3600000, 325.06], [2674800000, 325.98], [5094000000, 326.93], [7772400000, 328.13], [10364400000, 328.07], [13042800000, 327.66], [15634800000, 326.35], [18313200000, 324.69], [20991600000, 323.10], [23583600000, 323.07], [26262000000, 324.01], [28854000000, 325.13], [31532400000, 326.17], [34210800000, 326.68], [36630000000, 327.18], [39308400000, 327.78], [41900400000, 328.92], [44578800000, 328.57], [47170800000, 327.37], [49849200000, 325.43], [52527600000, 323.36], [55119600000, 323.56], [57798000000, 324.80], [60390000000, 326.01], [63068400000, 326.77], [65746800000, 327.63], [68252400000, 327.75], [70930800000, 329.72], [73522800000, 330.07], [76201200000, 329.09], [78793200000, 328.05], [81471600000, 326.32], [84150000000, 324.84], [86742000000, 325.20], [89420400000, 326.50], [92012400000, 327.55], [94690800000, 328.54], [97369200000, 329.56], [99788400000, 330.30], [102466800000, 331.50], [105058800000, 332.48], [107737200000, 332.07], [110329200000, 330.87], [113007600000, 329.31], [115686000000, 327.51], [118278000000, 327.18], [120956400000, 328.16], [123548400000, 328.64], [126226800000, 329.35], [128905200000, 330.71], [131324400000, 331.48], [134002800000, 332.65], [136594800000, 333.16], [139273200000, 332.06], [141865200000, 330.99], [144543600000, 329.17], [147222000000, 327.41], [149814000000, 327.20], [152492400000, 328.33], [155084400000, 329.50], [157762800000, 330.68], [160441200000, 331.41], [162860400000, 331.85], [165538800000, 333.29], [168130800000, 333.91], [170809200000, 333.40], [173401200000, 331.78], [176079600000, 329.88], [178758000000, 328.57], [181350000000, 328.46], [184028400000, 329.26], [189298800000, 331.71], [191977200000, 332.76], [194482800000, 333.48], [197161200000, 334.78], [199753200000, 334.78], [202431600000, 334.17], [205023600000, 332.78], [207702000000, 330.64], [210380400000, 328.95], [212972400000, 328.77], [215650800000, 330.23], [218242800000, 331.69], [220921200000, 332.70], [223599600000, 333.24], [226018800000, 334.96], [228697200000, 336.04], [231289200000, 336.82], [233967600000, 336.13], [236559600000, 334.73], [239238000000, 332.52], [241916400000, 331.19], [244508400000, 331.19], [247186800000, 332.35], [249778800000, 333.47], [252457200000, 335.11], [255135600000, 335.26], [257554800000, 336.60], [260233200000, 337.77], [262825200000, 338.00], [265503600000, 337.99], [268095600000, 336.48], [270774000000, 334.37], [273452400000, 332.27], [276044400000, 332.41], [278722800000, 333.76], [281314800000, 334.83], [283993200000, 336.21], [286671600000, 336.64], [289090800000, 338.12], [291769200000, 339.02], [294361200000, 339.02], [297039600000, 339.20], [299631600000, 337.58], [302310000000, 335.55], [304988400000, 333.89], [307580400000, 334.14], [310258800000, 335.26], [312850800000, 336.71], [315529200000, 337.81], [318207600000, 338.29], [320713200000, 340.04], [323391600000, 340.86], [325980000000, 341.47], [328658400000, 341.26], [331250400000, 339.29], [333928800000, 337.60], [336607200000, 336.12], [339202800000, 336.08], [341881200000, 337.22], [344473200000, 338.34], [347151600000, 339.36], [349830000000, 340.51], [352249200000, 341.57], [354924000000, 342.56], [357516000000, 343.01], [360194400000, 342.47], [362786400000, 340.71], [365464800000, 338.52], [368143200000, 336.96], [370738800000, 337.13], [373417200000, 338.58], [376009200000, 339.89], [378687600000, 340.93], [381366000000, 341.69], [383785200000, 342.69], [389052000000, 344.30], [391730400000, 343.43], [394322400000, 341.88], [397000800000, 339.89], [399679200000, 337.95], [402274800000, 338.10], [404953200000, 339.27], [407545200000, 340.67], [410223600000, 341.42], [412902000000, 342.68], [415321200000, 343.46], [417996000000, 345.10], [420588000000, 345.76], [423266400000, 345.36], [425858400000, 343.91], [428536800000, 342.05], [431215200000, 340.00], [433810800000, 340.12], [436489200000, 341.33], [439081200000, 342.94], [441759600000, 343.87], [444438000000, 344.60], [446943600000, 345.20], [452210400000, 347.36], [454888800000, 346.74], [457480800000, 345.41], [460159200000, 343.01], [462837600000, 341.23], [465433200000, 341.52], [468111600000, 342.86], [470703600000, 344.41], [473382000000, 345.09], [476060400000, 345.89], [478479600000, 347.49], [481154400000, 348.00], [483746400000, 348.75], [486424800000, 348.19], [489016800000, 346.54], [491695200000, 344.63], [494373600000, 343.03], [496969200000, 342.92], [499647600000, 344.24], [502239600000, 345.62], [504918000000, 346.43], [507596400000, 346.94], [510015600000, 347.88], [512690400000, 349.57], [515282400000, 350.35], [517960800000, 349.72], [520552800000, 347.78], [523231200000, 345.86], [525909600000, 344.84], [528505200000, 344.32], [531183600000, 345.67], [533775600000, 346.88], [536454000000, 348.19], [539132400000, 348.55], [541551600000, 349.52], [544226400000, 351.12], [546818400000, 351.84], [549496800000, 351.49], [552088800000, 349.82], [554767200000, 347.63], [557445600000, 346.38], [560041200000, 346.49], [562719600000, 347.75], [565311600000, 349.03], [567990000000, 350.20], [570668400000, 351.61], [573174000000, 352.22], [575848800000, 353.53], [578440800000, 354.14], [581119200000, 353.62], [583711200000, 352.53], [586389600000, 350.41], [589068000000, 348.84], [591663600000, 348.94], [594342000000, 350.04], [596934000000, 351.29], [599612400000, 352.72], [602290800000, 353.10], [604710000000, 353.65], [607384800000, 355.43], [609976800000, 355.70], [612655200000, 355.11], [615247200000, 353.79], [617925600000, 351.42], [620604000000, 349.81], [623199600000, 350.11], [625878000000, 351.26], [628470000000, 352.63], [631148400000, 353.64], [633826800000, 354.72], [636246000000, 355.49], [638920800000, 356.09], [641512800000, 357.08], [644191200000, 356.11], [646783200000, 354.70], [649461600000, 352.68], [652140000000, 351.05], [654735600000, 351.36], [657414000000, 352.81], [660006000000, 354.22], [662684400000, 354.85], [665362800000, 355.66], [667782000000, 357.04], [670456800000, 358.40], [673048800000, 359.00], [675727200000, 357.99], [678319200000, 356.00], [680997600000, 353.78], [683676000000, 352.20], [686271600000, 352.22], [688950000000, 353.70], [691542000000, 354.98], [694220400000, 356.09], [696898800000, 356.85], [699404400000, 357.73], [702079200000, 358.91], [704671200000, 359.45], [707349600000, 359.19], [709941600000, 356.72], [712620000000, 354.79], [715298400000, 352.79], [717894000000, 353.20], [720572400000, 354.15], [723164400000, 355.39], [725842800000, 356.77], [728521200000, 357.17], [730940400000, 358.26], [733615200000, 359.16], [736207200000, 360.07], [738885600000, 359.41], [741477600000, 357.44], [744156000000, 355.30], [746834400000, 353.87], [749430000000, 354.04], [752108400000, 355.27], [754700400000, 356.70], [757378800000, 358.00], [760057200000, 358.81], [762476400000, 359.68], [765151200000, 361.13], [767743200000, 361.48], [770421600000, 360.60], [773013600000, 359.20], [775692000000, 357.23], [778370400000, 355.42], [780966000000, 355.89], [783644400000, 357.41], [786236400000, 358.74], [788914800000, 359.73], [791593200000, 360.61], [794012400000, 361.58], [796687200000, 363.05], [799279200000, 363.62], [801957600000, 363.03], [804549600000, 361.55], [807228000000, 358.94], [809906400000, 357.93], [812502000000, 357.80], [815180400000, 359.22], [817772400000, 360.44], [820450800000, 361.83], [823129200000, 362.95], [825634800000, 363.91], [828309600000, 364.28], [830901600000, 364.94], [833580000000, 364.70], [836172000000, 363.31], [838850400000, 361.15], [841528800000, 359.40], [844120800000, 359.34], [846802800000, 360.62], [849394800000, 361.96], [852073200000, 362.81], [854751600000, 363.87], [857170800000, 364.25], [859845600000, 366.02], [862437600000, 366.46], [865116000000, 365.32], [867708000000, 364.07], [870386400000, 361.95], [873064800000, 360.06], [875656800000, 360.49], [878338800000, 362.19], [880930800000, 364.12], [883609200000, 364.99], [886287600000, 365.82], [888706800000, 366.95], [891381600000, 368.42], [893973600000, 369.33], [896652000000, 368.78], [899244000000, 367.59], [901922400000, 365.84], [904600800000, 363.83], [907192800000, 364.18], [909874800000, 365.34], [912466800000, 366.93], [915145200000, 367.94], [917823600000, 368.82], [920242800000, 369.46], [922917600000, 370.77], [925509600000, 370.66], [928188000000, 370.10], [930780000000, 369.08], [933458400000, 366.66], [936136800000, 364.60], [938728800000, 365.17], [941410800000, 366.51], [944002800000, 367.89], [946681200000, 369.04], [949359600000, 369.35], [951865200000, 370.38], [954540000000, 371.63], [957132000000, 371.32], [959810400000, 371.53], [962402400000, 369.75], [965080800000, 368.23], [967759200000, 366.87], [970351200000, 366.94], [973033200000, 368.27], [975625200000, 369.64], [978303600000, 370.46], [980982000000, 371.44], [983401200000, 372.37], [986076000000, 373.33], [988668000000, 373.77], [991346400000, 373.09], [993938400000, 371.51], [996616800000, 369.55], [999295200000, 368.12], [1001887200000, 368.38], [1004569200000, 369.66], [1007161200000, 371.11], [1009839600000, 372.36], [1012518000000, 373.09], [1014937200000, 373.81], [1017612000000, 374.93], [1020204000000, 375.58], [1022882400000, 375.44], [1025474400000, 373.86], [1028152800000, 371.77], [1030831200000, 370.73], [1033423200000, 370.50], [1036105200000, 372.18], [1038697200000, 373.70], [1041375600000, 374.92], [1044054000000, 375.62], [1046473200000, 376.51], [1049148000000, 377.75], [1051740000000, 378.54], [1054418400000, 378.20], [1057010400000, 376.68], [1059688800000, 374.43], [1062367200000, 373.11], [1064959200000, 373.10], [1067641200000, 374.77], [1070233200000, 375.97], [1072911600000, 377.03], [1075590000000, 377.87], [1078095600000, 378.88], [1080770400000, 380.42], [1083362400000, 380.62], [1086040800000, 379.70], [1088632800000, 377.43], [1091311200000, 376.32], [1093989600000, 374.19], [1096581600000, 374.47], [1099263600000, 376.15], [1101855600000, 377.51], [1104534000000, 378.43], [1107212400000, 379.70], [1109631600000, 380.92], [1112306400000, 382.18], [1114898400000, 382.45], [1117576800000, 382.14], [1120168800000, 380.60], [1122847200000, 378.64], [1125525600000, 376.73], [1128117600000, 376.84], [1130799600000, 378.29], [1133391600000, 380.06], [1136070000000, 381.40], [1138748400000, 382.20], [1141167600000, 382.66], [1143842400000, 384.69], [1146434400000, 384.94], [1149112800000, 384.01], [1151704800000, 382.14], [1154383200000, 380.31], [1157061600000, 378.81], [1159653600000, 379.03], [1162335600000, 380.17], [1164927600000, 381.85], [1167606000000, 382.94], [1170284400000, 383.86], [1172703600000, 384.49], [1175378400000, 386.37], [1177970400000, 386.54], [1180648800000, 385.98], [1183240800000, 384.36], [1185919200000, 381.85], [1188597600000, 380.74], [1191189600000, 381.15], [1193871600000, 382.38], [1196463600000, 383.94], [1199142000000, 385.44]];
$.plot("#placeholder", [d], {
xaxis: { mode: "time" }
});
$("#whole").click(function () {
$.plot("#placeholder", [d], {
xaxis: { mode: "time" }
});
});
$("#nineties").click(function () {
$.plot("#placeholder", [d], {
xaxis: {
mode: "time",
min: (new Date(1990, 0, 1)).getTime(),
max: (new Date(2000, 0, 1)).getTime()
}
});
});
$("#latenineties").click(function () {
$.plot("#placeholder", [d], {
xaxis: {
mode: "time",
minTickSize: [1, "year"],
min: (new Date(1996, 0, 1)).getTime(),
max: (new Date(2000, 0, 1)).getTime()
}
});
});
$("#ninetyninequarters").click(function () {
$.plot("#placeholder", [d], {
xaxis: {
mode: "time",
minTickSize: [1, "quarter"],
min: (new Date(1999, 0, 1)).getTime(),
max: (new Date(2000, 0, 1)).getTime()
}
});
});
$("#ninetynine").click(function () {
$.plot("#placeholder", [d], {
xaxis: {
mode: "time",
minTickSize: [1, "month"],
min: (new Date(1999, 0, 1)).getTime(),
max: (new Date(2000, 0, 1)).getTime()
}
});
});
$("#lastweekninetynine").click(function () {
$.plot("#placeholder", [d], {
xaxis: {
mode: "time",
minTickSize: [1, "day"],
min: (new Date(1999, 11, 25)).getTime(),
max: (new Date(2000, 0, 1)).getTime(),
timeformat: "%a"
}
});
});
$("#lastdayninetynine").click(function () {
$.plot("#placeholder", [d], {
xaxis: {
mode: "time",
minTickSize: [1, "hour"],
min: (new Date(1999, 11, 31)).getTime(),
max: (new Date(2000, 0, 1)).getTime(),
twelveHourClock: true
}
});
});
// Add the Flot version string to the footer
$("#footer").prepend("Flot " + $.plot.version + " – ");
});
</script>
</head>
<body>
<div id="header">
<h2>Time Axes</h2>
</div>
<div id="content">
<div class="demo-container">
<div id="placeholder" class="demo-placeholder"></div>
</div>
<p>Monthly mean atmospheric CO<sub>2</sub> in PPM at Mauna Loa, Hawaii (source: <a href="http://www.esrl.noaa.gov/gmd/ccgg/trends/">NOAA/ESRL</a>).</p>
<p>If you tell Flot that an axis represents time, the data will be interpreted as timestamps and the ticks adjusted and formatted accordingly.</p>
<p>Zoom to: <button id="whole">Whole period</button>
<button id="nineties">1990-2000</button>
<button id="latenineties">1996-2000</button></p>
<p>Zoom to: <button id="ninetyninequarters">1999 by quarter</button>
<button id="ninetynine">1999 by month</button>
<button id="lastweekninetynine">Last week of 1999</button>
<button id="lastdayninetynine">Dec. 31, 1999</button></p>
<p>The timestamps must be specified as Javascript timestamps, as milliseconds since January 1, 1970 00:00. This is like Unix timestamps, but in milliseconds instead of seconds (remember to multiply with 1000!).</p>
<p>As an extra caveat, the timestamps are interpreted according to UTC and, by default, displayed as such. You can set the axis "timezone" option to "browser" to display the timestamps in the user's timezone, or, if you use timezoneJS, you can specify a time zone.</p>
</div>
<div id="footer">
Copyright © 2007 - 2014 IOLA and Ole Laursen
</div>
</body>
</html>
| {
"pile_set_name": "Github"
} |
David Vogelsanger
David Vogelsanger, born on 16 September 1954, is a former Swiss diplomat who served in his most recent posting from 2014 to 2019 as the Ambassador of Switzerland to New Zealand Fiji, Samoa, Tonga, Tuvalu and the Cook Islands and as Consul General to American Samoa.
Biography
Vogelsanger is the son of Swiss protestant theologian, minister and historian Peter Vogelsanger and of Irmgard Vogelsanger-de Roche. He is married to American Laura Garland Vogelsanger. His sister is ethnologist Dr Cornelia Vogelsanger.
He studied history and political science from 1975 to 1979, obtained a doctorate from University of Zurich in 1986 and occasionally publishes essays. He has also served in the Swiss army until 2014, in early years as a machine-gunner in the mountain infantry, later in military intelligence and in the legal branch as a specialist officer major.
In 2018 he unsuccessfully ran, from New Zealand, for mayor of his small hometown Kappel am Albis, receiving a relative majority, but failing, by 13 votes, to obtain the necessary absolute majority. He has been a member of the liberal-conservative Swiss People’s Party since 1997. In the Swiss federal elections on 20 October 2019, he ran as a candidate of that party for the National Council on a list of people over 55 years old and obtained 2022 votes.
Career
Vogelsanger worked from 1980 to 1984 as a delegate of the International Committee of the Red Cross in armed conflict situations in Chad, Cambodia, Uganda, Angola, Lebanon and Iraq. On 24 June 1981, he was the senior Red Cross official present when Uganda National Liberation Army troops massacred 86 civilians in the Ombaci mission compound in Arua, West Nile, Northern Uganda which he had previously declared a neutralized zone. He served in 1984/85, as a humanitarian advisor to the United Nations Peacekeeping Force in Cyprus.
After a short period in the private economy, Vogelsanger joined in early 1987 the Swiss Diplomatic Service. Early assignments were the International Organisations Division of the Federal Department of Foreign Affairs and the Swiss Delegation to the OECD in Paris. From 1993 to 1997, he was the political officer and media spokesman at the Embassy of Switzerland to the United States. During this period, he was closely involved in the controversy regarding Holocaust-era bank accounts and Swiss National Bank gold transactions. Vogelsanger strongly defended the record of his country during that period in numerous discussions with members United States Congress, representatives of American organisations and journalists.
Vogelsanger then served as deputy to the Swiss Ambassador to Bulgaria and Macedonia from 1997, during the later part of the Yugoslav Wars. From 2001, he directed the International Organisations Section in the Federal Department of Foreign Affairs . In March 2004, he was responsible for the organisation of a United Nations conference on Cyprus in the Bürgenstock Resort which adopted the Annan Plan, rejected in a Greek Cypriot referendum a month later.
From 2005, Vogelsanger was Consul General of Switzerland in Milan. In 2010, he was appointed Ambassador to Ivory Coast, Burkina Faso, Guinea, Liberia and Sierra Leone, residing in Abidjan. During the 2010-11 Ivorian crisis, he maintained contacts with both sides throughout the conflict.
Vogelsanger was appointed Ambassador to New Zealand and Pacific Island States by the Swiss Federal Council on 13 November 2013 , and presented his credentials to Governor General Sir Jerry Mateparaeat at Government House in Wellington on 30 October 2014 . After five years in that function, he retired from the diplomatic service at the end of September 2019 and returned to Switzerland.
References
External links
Category:Swiss diplomats
Category:1954 births
Category:Living people | {
"pile_set_name": "Wikipedia (en)"
} |
Q:
Keras VGG16 with flow_from_directory val_acc not rising
I use keras and import VGG16 network with imagenet weights to classify male/female photos.
Strcture of directories is:
split_1/train/male/*.jpg
split_1/train/female/*.jpg
split_1/val/female/*.jpg
split_1/val/male/*.jpg
I tried most of the solutions I found over the internet but none of them worked:
changing batch_size
changing optimizers
changing class_mode/loss function
setting every layer to trainable
copying every layer from VGG to my sequential
import numpy as np
from keras.preprocessing.image import ImageDataGenerator
from keras.models import Sequential
from keras.layers import Dropout, Flatten, Dense
from keras import applications
[...]
img_width, img_height = 224, 224
top_model_weights_path = "%s_retry2.h5" % split
train_data_dir = "%s/train" % split
validation_data_dir = "%s/val" % split
batch_size = 48
nb_train_samples = 4000
nb_validation_samples = ( 299 // batch_size ) * batch_size
epochs = 5
def train_top_model():
datagen = ImageDataGenerator(
horizontal_flip=True,
shear_range=0.2,
rescale=1. / 255)
vdatagen = ImageDataGenerator(rescale=1./255)
traingen = datagen.flow_from_directory(
train_data_dir,
target_size=(img_width, img_height),
batch_size=batch_size,
class_mode='categorical',
follow_links=True,
shuffle=True)
valgen = vdatagen.flow_from_directory(
validation_data_dir,
target_size=(img_width, img_height),
batch_size=batch_size,
class_mode='categorical',
follow_links=True,
shuffle=True)
vgg_model = applications.VGG16(input_shape=(224,224,3), weights="imagenet", include_top=False)
model = Sequential()
model.add(vgg_model)
model.add(Flatten())
model.add(Dense(2, activation='softmax'))
model.compile(optimizer="rmsprop", loss='categorical_crossentropy', metrics=['accuracy'])
history = model.fit_generator(traingen,
epochs=epochs,
steps_per_epoch=nb_train_samples // batch_size,
validation_data=valgen,
validation_steps=nb_validation_samples // batch_size)
It reports actual amount of images so it finds the jpgs properly.
Accuracy in val keeps being "random" and the same (~50%) during entire training.
A:
Try reducing the learning rate, it may be the case where your model is overshooting the minima every time and hence not able to converge.
If any kind of hyper parameter tuning doesn't work then you need to fix your data but i think male/female classification data shouldn't be that tough to learn for a CNN model with pre-trained weights.
| {
"pile_set_name": "StackExchange"
} |
Lying about watching porn...
I've been lying to my girlfriend for years about my porn use. She caught me lying to her a few times in the beginning of our relationship (about other things as well as porn use) and has never really trusted me again properly since then. However I have always been adamant that I'm not hiding anything from her. We have had millions of talks about it and she's always remained skeptical that I am telling her the truth.
This has been going on for four+ years. I've been trying to convince her that I never watch porn, that I haven't watched it since she caught me a few years ago and that the incident was a one-off, a mistake. She has never believed me. Until recently, she has started to get way more trusting, the fights have stopped almost completely and she has been very happy. I think I may have finally convinced her that I don't watch porn, or talk to other girls behind her back, or any of the other things she has caught me doing in the past. Our relationship has been great these past few months. She hasn't caught me lying to her for over a year, and I've been persistent in telling her that I'm not lying, I'd never do that, I love her, etc. It seems to have finally worked.
I should be thrilled but I actually feel surprisingly guilty. Because the thing is, I do watch porn, and a lot of it, I just got better at hiding it. The weird thing is, in the beginning of our relationship she had no problem with porn use, it's only when she caught me lying about it that she started to have an issue with it. I think at this point she'd never be with me if she knew the extent of my porn use, but as far as she knows I'm an honest and faithful guy. My victory is hollow and now I don't know what to do. Seeing her be so happy, and so unsuspecting makes me feel very guilty. It's much worse than when she used to question me on everything. Watching porn now makes me feel sick and guilty. I haven't been able to orgasm to porn for the past 2 months or so since things in my relationship started to improve. It took so much convincing and fighting and talking and so much of her crying and being heartbroken, confused, disappointed to get to this point. Now I can't get her happy face out of my head and I feel like an asshole.
Either come clean, stop watching porn, or split up with her. She deserves better than this. Obviously you can't be trusted if you lie to her so often and about so many things. Please save the poor girl all the hurt and either stay single or find someone who will hurt you just as much as you're probably going to hurt her.
Yeah im with person and mia. My partner lied about his porn use too, but us gals are very good at picking lies. Difference being, he realised if he didnt stop lying we'd break up. He hasn't lied in months. In your situation, if you tell your gf you've been lying this whole time, expect her to dump you. Why should she have been lied to for so long over this topic? Either stop using it like you've said to her, or leave. Relationships are not built on lies
Well you have three choices. One, stop lying about it. It's good you feel guilty because it's really deplorable that you've been persistently lying and hiding. Why do you feel you have the right to lie about this? Do you have an addiction? You know it bugs her, especially when you lie, but you continue to do so for absolutely no reason other than to protect your habit.
Two, stop watching porn. You know it bothers her, you know the relationship is better without porn, so just stop. It makes you feel sick and guilty. So stop! Why do you feel like you have to even if it makes you feel guilty, makes her cry, and you have to be that guy who has to lie to protect his habit? There's nothing positive at this point in doing it, so why do you continue? I'll ask again, do you think you might be addicted?
3) Leave. If your porn use is that important to you that you are willing to lie to your girlfriend for years, you're willing to make her cry over it, and the hope you have is that she'll stop catching you in your lies so you can have your porn to yourself, you should leave so she can find someone who respects her enough not to lie to her face and make her feel like crap. It would probably be good for her to be with someone who actually respects her enough to not lie constantly to her. | {
"pile_set_name": "Pile-CC"
} |
Little Dixie, Kentucky
Little Dixie (also Little Dixi) is an unincorporated community in Pike County, Kentucky, United States.
Notes
Category:Unincorporated communities in Pike County, Kentucky
Category:Unincorporated communities in Kentucky | {
"pile_set_name": "Wikipedia (en)"
} |
IN THE UNITED STATES COURT OF APPEALS
FOR THE FIFTH CIRCUIT
United States Court of Appeals
Fifth Circuit
No. 14-30934 FILED
February 27, 2017
SEALED APPELLEE, Lyle W. Cayce
Clerk
Plaintiff-Appellee
v.
SEALED APPELLANT,
Defendant-Appellant
Appeal from the United States District Court
for the Eastern District of Louisiana
USDC No. 2:15-CV-2111
Before OWEN, ELROD, and COSTA, Circuit Judges.
PER CURIAM: *
The movant seeks a certificate of appealability (COA) to appeal the
denial of his motion for resentencing for the offense of conspiracy to distribute
and possess with intent to distribute cocaine. His conviction was entered on
March 7, 2012, and the movant did not appeal. Approximately two years later,
his retained counsel moved the district court for resentencing. Without
asserting a basis for the court’s jurisdiction, the motion alleged that a
guidelines enhancement imposed at sentencing violated the Ex Post Facto
* Pursuant to 5TH CIR. R. 47.5, the court has determined that this opinion should not
be published and is not precedent except under the limited circumstances set forth in 5TH
CIR. R. 47.5.4.
No. 14-30934
Clause. The district court denied relief on the merits. Acting pro se, the
movant timely appealed. He did not move for a COA.
Although the case initially was docketed as an appeal of the criminal
conviction, it was re-designated as an appeal from the denial of what was, in
effect, a 28 U.S.C. § 2255 motion. See Tolliver v. Dobre, 211 F. 3d 876, 877 (5th
Cir. 2000) (“Section 2255 is the primary means of collaterally attacking a
federal sentence.”); see also, e.g., United States v. Fisher, 372 F. App’x 526, 528
(5th Cir. 2010) (noting that where a federal prisoner’s motion “primarily seeks
to challenge collaterally the constitutionality of his conviction, it should be
construed, and considered, by the district court as a motion under 28 U.S.C.
§ 2255”). The movant then filed a motion in this court for a COA, which is
required to appeal the denial of relief under § 2255. See 28 U.S.C.
§ 2253(c)(1)(B).
Rule 11(a) of the Rules Governing § 2255 Proceedings requires the
district court to “issue or deny a certificate of appealability when it enters a
final order adverse to the applicant.” This requirement previously appeared
in Federal Rule of Appellate Procedure 22(b). See FED. R. APP. P. 22(b) (2008);
Cardenas v. Thaler, 651 F.3d 442, 444 & n.1 (5th Cir. 2011). Under Rule 22,
“the absence of a prior determination by the district court on whether a COA
should issue posed a jurisdictional bar to this court’s consideration of whether
to grant or deny a COA.” Cardenas, 651 F.3d at 445 & n.3. We assume,
without deciding, that this jurisdictional requirement continues to apply under
Rule 11.
The district court’s order denying the motion for resentencing is
VACATED, and the case is REMANDED for further proceedings consistent
with Rule 11(a), as well as the requirements in Castro v. United States, 540
U.S. 375, 383 (2003), for construing a pro se litigant’s motion as a first motion
2
No. 14-30934
under § 2255. The motion for appointment of counsel is DENIED. See FIFTH
CIRCUIT PLAN FOR REPRESENTATION ON APPEAL UNDER THE CRIMINAL JUSTICE
ACT, § 3B.
3
| {
"pile_set_name": "FreeLaw"
} |
Preparing students to participate in an active learning environment.
Most students have spent the majority of their school career in passive learning environments in which faculty were disseminators of information, and students were required to memorize information or use specified algorithms to "solve problems." In an active learning environment, students are encouraged to engage in the process of building and testing their own mental models from information that they are acquiring. In such a learner-centered environment, faculty become facilitators of learning, and students become active participants, engaging in a dialogue with their colleagues and with the instructor. To create a successful active learning environment, both faculty and students must make adjustments to what has been their respective "traditional" roles in the classroom. For the instructor who is committed to promoting active learning, the challenge lies in helping students understand the necessity of becoming active colleagues in learning. This process can be facilitated if the curriculum includes exercises to direct students' attention to a number of issues that impact their learning. This paper describes four such exercises designed to help students form appropriate course expectations, recognize the need for seeking clarification when communicating, recognize the role of personal experience in building mental models, and become familiar with study aids for building formal models. | {
"pile_set_name": "PubMed Abstracts"
} |
// Copyright 2011 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package csv
import (
"io"
"reflect"
"strings"
"testing"
"unicode/utf8"
)
func TestRead(t *testing.T) {
tests := []struct {
Name string
Input string
Output [][]string
Error error
// These fields are copied into the Reader
Comma rune
Comment rune
UseFieldsPerRecord bool // false (default) means FieldsPerRecord is -1
FieldsPerRecord int
LazyQuotes bool
TrimLeadingSpace bool
ReuseRecord bool
}{{
Name: "Simple",
Input: "a,b,c\n",
Output: [][]string{{"a", "b", "c"}},
}, {
Name: "CRLF",
Input: "a,b\r\nc,d\r\n",
Output: [][]string{{"a", "b"}, {"c", "d"}},
}, {
Name: "BareCR",
Input: "a,b\rc,d\r\n",
Output: [][]string{{"a", "b\rc", "d"}},
}, {
Name: "RFC4180test",
Input: `#field1,field2,field3
"aaa","bb
b","ccc"
"a,a","b""bb","ccc"
zzz,yyy,xxx
`,
Output: [][]string{
{"#field1", "field2", "field3"},
{"aaa", "bb\nb", "ccc"},
{"a,a", `b"bb`, "ccc"},
{"zzz", "yyy", "xxx"},
},
UseFieldsPerRecord: true,
FieldsPerRecord: 0,
}, {
Name: "NoEOLTest",
Input: "a,b,c",
Output: [][]string{{"a", "b", "c"}},
}, {
Name: "Semicolon",
Input: "a;b;c\n",
Output: [][]string{{"a", "b", "c"}},
Comma: ';',
}, {
Name: "MultiLine",
Input: `"two
line","one line","three
line
field"`,
Output: [][]string{{"two\nline", "one line", "three\nline\nfield"}},
}, {
Name: "BlankLine",
Input: "a,b,c\n\nd,e,f\n\n",
Output: [][]string{
{"a", "b", "c"},
{"d", "e", "f"},
},
}, {
Name: "BlankLineFieldCount",
Input: "a,b,c\n\nd,e,f\n\n",
Output: [][]string{
{"a", "b", "c"},
{"d", "e", "f"},
},
UseFieldsPerRecord: true,
FieldsPerRecord: 0,
}, {
Name: "TrimSpace",
Input: " a, b, c\n",
Output: [][]string{{"a", "b", "c"}},
TrimLeadingSpace: true,
}, {
Name: "LeadingSpace",
Input: " a, b, c\n",
Output: [][]string{{" a", " b", " c"}},
}, {
Name: "Comment",
Input: "#1,2,3\na,b,c\n#comment",
Output: [][]string{{"a", "b", "c"}},
Comment: '#',
}, {
Name: "NoComment",
Input: "#1,2,3\na,b,c",
Output: [][]string{{"#1", "2", "3"}, {"a", "b", "c"}},
}, {
Name: "LazyQuotes",
Input: `a "word","1"2",a","b`,
Output: [][]string{{`a "word"`, `1"2`, `a"`, `b`}},
LazyQuotes: true,
}, {
Name: "BareQuotes",
Input: `a "word","1"2",a"`,
Output: [][]string{{`a "word"`, `1"2`, `a"`}},
LazyQuotes: true,
}, {
Name: "BareDoubleQuotes",
Input: `a""b,c`,
Output: [][]string{{`a""b`, `c`}},
LazyQuotes: true,
}, {
Name: "BadDoubleQuotes",
Input: `a""b,c`,
Error: &ParseError{StartLine: 1, Line: 1, Column: 1, Err: ErrBareQuote},
}, {
Name: "TrimQuote",
Input: ` "a"," b",c`,
Output: [][]string{{"a", " b", "c"}},
TrimLeadingSpace: true,
}, {
Name: "BadBareQuote",
Input: `a "word","b"`,
Error: &ParseError{StartLine: 1, Line: 1, Column: 2, Err: ErrBareQuote},
}, {
Name: "BadTrailingQuote",
Input: `"a word",b"`,
Error: &ParseError{StartLine: 1, Line: 1, Column: 10, Err: ErrBareQuote},
}, {
Name: "ExtraneousQuote",
Input: `"a "word","b"`,
Error: &ParseError{StartLine: 1, Line: 1, Column: 3, Err: ErrQuote},
}, {
Name: "BadFieldCount",
Input: "a,b,c\nd,e",
Error: &ParseError{StartLine: 2, Line: 2, Err: ErrFieldCount},
UseFieldsPerRecord: true,
FieldsPerRecord: 0,
}, {
Name: "BadFieldCount1",
Input: `a,b,c`,
Error: &ParseError{StartLine: 1, Line: 1, Err: ErrFieldCount},
UseFieldsPerRecord: true,
FieldsPerRecord: 2,
}, {
Name: "FieldCount",
Input: "a,b,c\nd,e",
Output: [][]string{{"a", "b", "c"}, {"d", "e"}},
}, {
Name: "TrailingCommaEOF",
Input: "a,b,c,",
Output: [][]string{{"a", "b", "c", ""}},
}, {
Name: "TrailingCommaEOL",
Input: "a,b,c,\n",
Output: [][]string{{"a", "b", "c", ""}},
}, {
Name: "TrailingCommaSpaceEOF",
Input: "a,b,c, ",
Output: [][]string{{"a", "b", "c", ""}},
TrimLeadingSpace: true,
}, {
Name: "TrailingCommaSpaceEOL",
Input: "a,b,c, \n",
Output: [][]string{{"a", "b", "c", ""}},
TrimLeadingSpace: true,
}, {
Name: "TrailingCommaLine3",
Input: "a,b,c\nd,e,f\ng,hi,",
Output: [][]string{{"a", "b", "c"}, {"d", "e", "f"}, {"g", "hi", ""}},
TrimLeadingSpace: true,
}, {
Name: "NotTrailingComma3",
Input: "a,b,c, \n",
Output: [][]string{{"a", "b", "c", " "}},
}, {
Name: "CommaFieldTest",
Input: `x,y,z,w
x,y,z,
x,y,,
x,,,
,,,
"x","y","z","w"
"x","y","z",""
"x","y","",""
"x","","",""
"","","",""
`,
Output: [][]string{
{"x", "y", "z", "w"},
{"x", "y", "z", ""},
{"x", "y", "", ""},
{"x", "", "", ""},
{"", "", "", ""},
{"x", "y", "z", "w"},
{"x", "y", "z", ""},
{"x", "y", "", ""},
{"x", "", "", ""},
{"", "", "", ""},
},
}, {
Name: "TrailingCommaIneffective1",
Input: "a,b,\nc,d,e",
Output: [][]string{
{"a", "b", ""},
{"c", "d", "e"},
},
TrimLeadingSpace: true,
}, {
Name: "ReadAllReuseRecord",
Input: "a,b\nc,d",
Output: [][]string{
{"a", "b"},
{"c", "d"},
},
ReuseRecord: true,
}, {
Name: "StartLine1", // Issue 19019
Input: "a,\"b\nc\"d,e",
Error: &ParseError{StartLine: 1, Line: 2, Column: 1, Err: ErrQuote},
}, {
Name: "StartLine2",
Input: "a,b\n\"d\n\n,e",
Error: &ParseError{StartLine: 2, Line: 5, Column: 0, Err: ErrQuote},
}, {
Name: "CRLFInQuotedField", // Issue 21201
Input: "A,\"Hello\r\nHi\",B\r\n",
Output: [][]string{
{"A", "Hello\nHi", "B"},
},
}, {
Name: "BinaryBlobField", // Issue 19410
Input: "x09\x41\xb4\x1c,aktau",
Output: [][]string{{"x09A\xb4\x1c", "aktau"}},
}, {
Name: "TrailingCR",
Input: "field1,field2\r",
Output: [][]string{{"field1", "field2"}},
}, {
Name: "QuotedTrailingCR",
Input: "\"field\"\r",
Output: [][]string{{"field"}},
}, {
Name: "QuotedTrailingCRCR",
Input: "\"field\"\r\r",
Error: &ParseError{StartLine: 1, Line: 1, Column: 6, Err: ErrQuote},
}, {
Name: "FieldCR",
Input: "field\rfield\r",
Output: [][]string{{"field\rfield"}},
}, {
Name: "FieldCRCR",
Input: "field\r\rfield\r\r",
Output: [][]string{{"field\r\rfield\r"}},
}, {
Name: "FieldCRCRLF",
Input: "field\r\r\nfield\r\r\n",
Output: [][]string{{"field\r"}, {"field\r"}},
}, {
Name: "FieldCRCRLFCR",
Input: "field\r\r\n\rfield\r\r\n\r",
Output: [][]string{{"field\r"}, {"\rfield\r"}},
}, {
Name: "FieldCRCRLFCRCR",
Input: "field\r\r\n\r\rfield\r\r\n\r\r",
Output: [][]string{{"field\r"}, {"\r\rfield\r"}, {"\r"}},
}, {
Name: "MultiFieldCRCRLFCRCR",
Input: "field1,field2\r\r\n\r\rfield1,field2\r\r\n\r\r,",
Output: [][]string{
{"field1", "field2\r"},
{"\r\rfield1", "field2\r"},
{"\r\r", ""},
},
}, {
Name: "NonASCIICommaAndComment",
Input: "a£b,c£ \td,e\n€ comment\n",
Output: [][]string{{"a", "b,c", "d,e"}},
TrimLeadingSpace: true,
Comma: '£',
Comment: '€',
}, {
Name: "NonASCIICommaAndCommentWithQuotes",
Input: "a€\" b,\"€ c\nλ comment\n",
Output: [][]string{{"a", " b,", " c"}},
Comma: '€',
Comment: 'λ',
}, {
// λ and θ start with the same byte.
// This tests that the parser doesn't confuse such characters.
Name: "NonASCIICommaConfusion",
Input: "\"abθcd\"λefθgh",
Output: [][]string{{"abθcd", "efθgh"}},
Comma: 'λ',
Comment: '€',
}, {
Name: "NonASCIICommentConfusion",
Input: "λ\nλ\nθ\nλ\n",
Output: [][]string{{"λ"}, {"λ"}, {"λ"}},
Comment: 'θ',
}, {
Name: "QuotedFieldMultipleLF",
Input: "\"\n\n\n\n\"",
Output: [][]string{{"\n\n\n\n"}},
}, {
Name: "MultipleCRLF",
Input: "\r\n\r\n\r\n\r\n",
}, {
// The implementation may read each line in several chunks if it doesn't fit entirely
// in the read buffer, so we should test the code to handle that condition.
Name: "HugeLines",
Input: strings.Repeat("#ignore\n", 10000) + strings.Repeat("@", 5000) + "," + strings.Repeat("*", 5000),
Output: [][]string{{strings.Repeat("@", 5000), strings.Repeat("*", 5000)}},
Comment: '#',
}, {
Name: "QuoteWithTrailingCRLF",
Input: "\"foo\"bar\"\r\n",
Error: &ParseError{StartLine: 1, Line: 1, Column: 4, Err: ErrQuote},
}, {
Name: "LazyQuoteWithTrailingCRLF",
Input: "\"foo\"bar\"\r\n",
Output: [][]string{{`foo"bar`}},
LazyQuotes: true,
}, {
Name: "DoubleQuoteWithTrailingCRLF",
Input: "\"foo\"\"bar\"\r\n",
Output: [][]string{{`foo"bar`}},
}, {
Name: "EvenQuotes",
Input: `""""""""`,
Output: [][]string{{`"""`}},
}, {
Name: "OddQuotes",
Input: `"""""""`,
Error: &ParseError{StartLine: 1, Line: 1, Column: 7, Err: ErrQuote},
}, {
Name: "LazyOddQuotes",
Input: `"""""""`,
Output: [][]string{{`"""`}},
LazyQuotes: true,
}, {
Name: "BadComma1",
Comma: '\n',
Error: errInvalidDelim,
}, {
Name: "BadComma2",
Comma: '\r',
Error: errInvalidDelim,
}, {
Name: "BadComma3",
Comma: '"',
Error: errInvalidDelim,
}, {
Name: "BadComma4",
Comma: utf8.RuneError,
Error: errInvalidDelim,
}, {
Name: "BadComment1",
Comment: '\n',
Error: errInvalidDelim,
}, {
Name: "BadComment2",
Comment: '\r',
Error: errInvalidDelim,
}, {
Name: "BadComment3",
Comment: utf8.RuneError,
Error: errInvalidDelim,
}, {
Name: "BadCommaComment",
Comma: 'X',
Comment: 'X',
Error: errInvalidDelim,
}}
for _, tt := range tests {
t.Run(tt.Name, func(t *testing.T) {
r := NewReader(strings.NewReader(tt.Input))
if tt.Comma != 0 {
r.Comma = tt.Comma
}
r.Comment = tt.Comment
if tt.UseFieldsPerRecord {
r.FieldsPerRecord = tt.FieldsPerRecord
} else {
r.FieldsPerRecord = -1
}
r.LazyQuotes = tt.LazyQuotes
r.TrimLeadingSpace = tt.TrimLeadingSpace
r.ReuseRecord = tt.ReuseRecord
out, err := r.ReadAll()
if !reflect.DeepEqual(err, tt.Error) {
t.Errorf("ReadAll() error:\ngot %v\nwant %v", err, tt.Error)
} else if !reflect.DeepEqual(out, tt.Output) {
t.Errorf("ReadAll() output:\ngot %q\nwant %q", out, tt.Output)
}
})
}
}
// nTimes is an io.Reader which yields the string s n times.
type nTimes struct {
s string
n int
off int
}
func (r *nTimes) Read(p []byte) (n int, err error) {
for {
if r.n <= 0 || r.s == "" {
return n, io.EOF
}
n0 := copy(p, r.s[r.off:])
p = p[n0:]
n += n0
r.off += n0
if r.off == len(r.s) {
r.off = 0
r.n--
}
if len(p) == 0 {
return
}
}
}
// benchmarkRead measures reading the provided CSV rows data.
// initReader, if non-nil, modifies the Reader before it's used.
func benchmarkRead(b *testing.B, initReader func(*Reader), rows string) {
b.ReportAllocs()
r := NewReader(&nTimes{s: rows, n: b.N})
if initReader != nil {
initReader(r)
}
for {
_, err := r.Read()
if err == io.EOF {
break
}
if err != nil {
b.Fatal(err)
}
}
}
const benchmarkCSVData = `x,y,z,w
x,y,z,
x,y,,
x,,,
,,,
"x","y","z","w"
"x","y","z",""
"x","y","",""
"x","","",""
"","","",""
`
func BenchmarkRead(b *testing.B) {
benchmarkRead(b, nil, benchmarkCSVData)
}
func BenchmarkReadWithFieldsPerRecord(b *testing.B) {
benchmarkRead(b, func(r *Reader) { r.FieldsPerRecord = 4 }, benchmarkCSVData)
}
func BenchmarkReadWithoutFieldsPerRecord(b *testing.B) {
benchmarkRead(b, func(r *Reader) { r.FieldsPerRecord = -1 }, benchmarkCSVData)
}
func BenchmarkReadLargeFields(b *testing.B) {
benchmarkRead(b, nil, strings.Repeat(`xxxxxxxxxxxxxxxx,yyyyyyyyyyyyyyyy,zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz,wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww,vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
xxxxxxxxxxxxxxxxxxxxxxxx,yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy,zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz,wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww,vvvv
,,zzzz,wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww,vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy,zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz,wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww,vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
`, 3))
}
func BenchmarkReadReuseRecord(b *testing.B) {
benchmarkRead(b, func(r *Reader) { r.ReuseRecord = true }, benchmarkCSVData)
}
func BenchmarkReadReuseRecordWithFieldsPerRecord(b *testing.B) {
benchmarkRead(b, func(r *Reader) { r.ReuseRecord = true; r.FieldsPerRecord = 4 }, benchmarkCSVData)
}
func BenchmarkReadReuseRecordWithoutFieldsPerRecord(b *testing.B) {
benchmarkRead(b, func(r *Reader) { r.ReuseRecord = true; r.FieldsPerRecord = -1 }, benchmarkCSVData)
}
func BenchmarkReadReuseRecordLargeFields(b *testing.B) {
benchmarkRead(b, func(r *Reader) { r.ReuseRecord = true }, strings.Repeat(`xxxxxxxxxxxxxxxx,yyyyyyyyyyyyyyyy,zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz,wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww,vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
xxxxxxxxxxxxxxxxxxxxxxxx,yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy,zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz,wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww,vvvv
,,zzzz,wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww,vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx,yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy,zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz,wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww,vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
`, 3))
}
| {
"pile_set_name": "Github"
} |
Effects of the Post-Spinal Cord Injury Microenvironment on the Differentiation Capacity of Human Neural Stem Cells Derived from Induced Pluripotent Stem Cells.
Spinal cord injury (SCI) causes loss of neural functions below the level of the lesion due to interruption of spinal pathways and secondary neurodegenerative processes. The transplant of neural stem cells (NSCs) is a promising approach for the repair of SCI. Reprogramming of adult somatic cells into induced pluripotent stem cells (iPSCs) is expected to provide an autologous source of iPSC-derived NSCs, avoiding the immune response as well as ethical issues. However, there is still limited information on the behavior and differentiation pattern of transplanted iPSC-derived NSCs within the damaged spinal cord. We transplanted iPSC-derived NSCs, obtained from adult human somatic cells, into rats at 0 or 7 days after SCI, and evaluated motor-evoked potentials and locomotion of the animals. We histologically analyzed engraftment, proliferation, and differentiation of the iPSC-derived NSCs and the spared tissue in the spinal cords at 7, 21, and 63 days posttransplant. Both transplanted groups showed a late decline in functional recovery compared to vehicle-injected groups. Histological analysis showed proliferation of transplanted cells within the tissue and that cells formed a mass. At the final time point, most grafted cells differentiated to neural and astroglial lineages, but not into oligodendrocytes, while some grafted cells remained undifferentiated and proliferative. The proinflammatory tissue microenviroment of the injured spinal cord induced proliferation of the grafted cells and, therefore, there are possible risks associated with iPSC-derived NSC transplantation. New approaches are needed to promote and guide cell differentiation, as well as reduce their tumorigenicity once the cells are transplanted at the lesion site. | {
"pile_set_name": "PubMed Abstracts"
} |
var CC = require('../index.js').ConfigChain
var test = require('tap').test
var f1 = '/tmp/f1.ini'
var f2 = '/tmp/f2.json'
var ini = require('ini')
var f1data = {foo: {bar: 'baz'}, bloo: 'jaus'}
var f2data = {oof: {rab: 'zab'}, oolb: 'suaj'}
var fs = require('fs')
fs.writeFileSync(f1, ini.stringify(f1data), 'utf8')
fs.writeFileSync(f2, JSON.stringify(f2data), 'utf8')
test('test saving and loading ini files', function (t) {
new CC()
.add({grelb:'blerg'}, 'opt')
.addFile(f1, 'ini', 'inifile')
.addFile(f2, 'json', 'jsonfile')
.on('load', function (cc) {
t.same(cc.snapshot, { grelb: 'blerg',
bloo: 'jaus',
foo: { bar: 'baz' },
oof: { rab: 'zab' },
oolb: 'suaj' })
t.same(cc.list, [ { grelb: 'blerg' },
{ bloo: 'jaus', foo: { bar: 'baz' } },
{ oof: { rab: 'zab' }, oolb: 'suaj' } ])
cc.set('grelb', 'brelg', 'opt')
.set('foo', 'zoo', 'inifile')
.set('oof', 'ooz', 'jsonfile')
.save('inifile')
.save('jsonfile')
.on('save', function () {
t.equal(fs.readFileSync(f1, 'utf8'),
"bloo = jaus\nfoo = zoo\n")
t.equal(fs.readFileSync(f2, 'utf8'),
"{\"oof\":\"ooz\",\"oolb\":\"suaj\"}")
t.same(cc.snapshot, { grelb: 'brelg',
bloo: 'jaus',
foo: 'zoo',
oof: 'ooz',
oolb: 'suaj' })
t.same(cc.list, [ { grelb: 'brelg' },
{ bloo: 'jaus', foo: 'zoo' },
{ oof: 'ooz', oolb: 'suaj' } ])
t.pass('ok')
t.end()
})
})
})
| {
"pile_set_name": "Github"
} |
The foundations of buildings often experience water problems due to a variety of causes. When such foundations are constructed, the surrounding soil must be removed prior to construction and then replaced after the foundation is completed. As a result, foundations can become damaged as soil settles outside of the foundation. Furthermore, a negative grade sloping toward the foundation is also often formed due to such settling. With the negative grade, the force of gravity causes water to move toward the foundation cracking the foundation and eventually entering into the building. This is especially true of basements and crawl spaces.
When water enters a dwelling, many problems arise, both to the physical structure of the dwelling and to the air. It is known in the art to install structural waterproofing systems to drain water from basements and crawl spaces. Typical waterproofing systems include some method of draining the water from inside the building to the outside. U.S. Pat. No. 4,798,034 discloses a basement draining channel that extends around the periphery of a basement floor, next to the wall, for draining away collected water. The channel includes a plurality of drain entrance holes leading to drain tubes. When water enters the basement walls, it is collected in the channel and directed toward the entrance holes due to gravity. The water is channeled via gravity to a drain connector pipe to a sump pump. The problem with such existing gravity-based waterproofing systems, however, is that the system must absorb a certain amount of water before the water will flow, and ultimately drain from the structure. If there is too little water to cause flow, the water remains stagnant and may evaporate back into the interior of the basement causing mildew, mold, and general dampness. Also when a sufficient amount of water is present to create a flow, a residual amount of water is left in the conduit when the flow stops. Additionally, any water drained directly beneath the floor of the basement may evaporate back into the waterproofing system and eventually back into the basement. Dampness and associated mold from such evaporation causes damage to buildings, ruins possessions, produces foul odors, and even presents potential health problems. When excessive moisture or water accumulates indoors, growing molds produce allergens, irritants, and potentially toxic substances. Although mold growth can be treated, it cannot be eliminated as long as a moisture problem exists.
Thus, there remains a need in the art for a system for handling water leakage and resulting humidity in a basement and other room of a building or structure. | {
"pile_set_name": "USPTO Backgrounds"
} |
Plasma triglyceride reduction in mice after direct injections of muscle-specific lipoprotein lipase DNA.
The present study was conducted to determine if direct injections of plasmid pMCKhLPL DNA would lead to sufficient overexpression of lipoprotein lipase (LPL) to reduce plasma triglycerides in mice. After single intramuscular (i.m.) injections, human lipoprotein lipase (hLPL) mRNA was detectable in the quadriceps muscle for at least 21 days. Repeated intraperitoneal (i.p.) and i.m. DNA administration increased the LPL activity in skeletal muscle by 58% (i.p.) and 36% (i.m.) when compared with control-injected mice. A concomitant reduction of plasma triglycerides by 38% (i.p.) and 26% (i.m.) was obtained. Also, repeated measures of plasma triglycerides indicate that the triglyceride-lowering effect of pMCKhLPL can be noted early after DNA injections. Thus, the injection of pMCKhLPL into the peritoneum or quadriceps muscle results in plasma triglyceride reduction in mice. | {
"pile_set_name": "PubMed Abstracts"
} |
White Balance
Power Management
Weight & Dimensions
Exposure
Technical Information
Description
Announced in 2011, the DSC W510 is a 12.1 megapixel camera with a 26-104mm equivalent lens with 4x optical zoom and 2.7 inch articulated LCD screen. As an entry level Ultra compact camera, the DSC W510 allows you to take breathtaking ultra wide 231 degree panoramic shots with the Sweep Panorama
Announced in 2011, the DSC W510 is a 12.1 megapixel camera with a 26-104mm equivalent lens with 4x optical zoom and 2.7 inch articulated LCD screen. As an entry level Ultra compact camera, the DSC W510 allows you to take breathtaking ultra wide 231 degree panoramic shots with the Sweep Panorama mode. With the Optical SteadyShot image stabilization, say goodbye to blurry photos, even if your hand was not steady when shooting the moment. And with Intelligent Auto (iAuto), the camera will do the job for you! It will recognize the scene you are shooting and automatically adjust the settings for you according to the lighting and faces. The DSC W510 also features the Face Detection technology that detects up to 8 faces and adjusts the focus, exposure, flash and white balance to deliver the best images. When your friends are smiling; the DSC W510 will immediately take a photo for them, thanks to the Smile Shutter technology it has. Not to forget that your DSC W510 can also shoot 640x480 movies at 30 frames per second in 480p AVI movie mode. | {
"pile_set_name": "Pile-CC"
} |
Q:
Building Uplift due to water pressure
I have a building that is 7 story height (which 5 stories are basement floors which means they are underground) My water level is at 1.5 m from the surface. the stories have typical rectangular shape of 30 m x 36.2 m with a grid of columns as shown in the picture below.
When modeling the raft foundation that is subjected to gravity loads and water pressure (opposite to gravity loads) and since the raft is at a level of 19.5 m from the ground surface it is subjected to a lot of uplift the overall gravity load is of 108858 KN as for the uplift is (19.5-1.5)*10*30*36.2 = 195480 KN which is greater than the gravity loads so their will be an uplift of the building.
How to solve this problem ? I mean how many solutions that are available today for this problem and what is the most economical one ?
A:
There are a few possible solutions.
You can use pile foundations, where the piles dig deep into the soil and resist the uplift. They'll work entirely in tension, instead of the usual compressive load, so point bearing capacity is non-existent, only consider lateral capacity. Depending on the soil type (and remembering it is saturated), this may or may not be viable, especially if you need to handle seismic loads. Regardless, it is probably not the best idea.
The usual solution is mass. Lots and lots of mass. Your walls and bottom basement slab are under massive loads, so just go crazy and make them monstrously thick. This will lower your steel reinforcement and reduce cracking. And, if you put in enough (including a safety factor), your structure will weigh more than the water it'll displace (weight > uplift).
| {
"pile_set_name": "StackExchange"
} |
375 F.3d 909
Godwin MADUKA, M.D., Plaintiff-Appellant,v.SUNRISE HOSPITAL, a Nevada corporation, dba Sunrise Hospital and Medical Center; Sunrise Hospital and Medical Center Fair Hearing Committee; Columbia/HCA Healthcare Corporation, a Delaware corporation, Defendants-Appellees.
No. 03-15332.
United States Court of Appeals, Ninth Circuit.
Argued and Submitted April 14, 2004.
Filed July 15, 2004.
Randall H. Scarlett, Randall H. Scarlett Law Group, San Francisco, CA, and Cal J. Potter, III, Potter Law Offices, Las Vegas, NV, for the plaintiff/appellant.
John R. Bailey, Law Offices of John R. Bailey, Las Vegas, NV, and Dennis L. Kennedy, Lionel Sawyer & Collins, Las Vegas, NV, for the defendants/appellees.
Appeal from the United States District Court for the District of Nevada, Lloyd D. George, District Judge, Presiding, D.C. No. CV-00-00830-LDG.
Before WALLACE, KOZINSKI, and THOMAS, Circuit Judges.
OPINION
WALLACE, Senior Circuit Judge.
1
Dr. Godwin Maduka appeals from the district court's judgment dismissing his Second Amended Complaint with prejudice. We have jurisdiction over Maduka's timely filed appeal pursuant to 28 U.S.C. § 1291. We reverse.
I.
2
The following narrative is drawn primarily from Maduka's complaint. Sunrise Hospital hired Maduka, an American of African ancestry, as an anesthesiologist in August 1997. Shortly after completing the hospital's monitorship program, Maduka was involved in two incidents that prompted the revocation of his staff privileges.
3
On May 4, 1999, Maduka was administering anesthesia to a candidate for cardio-defibrillator implant surgery. Maduka's initial placement of a laryngeal mask airway was unsuccessful, as the blueish hue of the patient's skin proved. Maduka attempted to insert an endotracheal tube, but soon needed to reintubate with a larger tube. The surgery was aborted, although Maduka's complaint does not indicate why. The patient apparently did not suffer any neurological damage from a lack of oxygen, yet he subsequently died from an arrhythmia brought on by his cardiac condition.
4
Exactly one month after the first reintubation, another patient under Maduka's care began showing signs of oxygen deprivation, and Maduka again had to reinsert an endotracheal tube. This operation proceeded as planned once Maduka successfully reintubated the patient, and there were no indications of any side effects from the improper initial placement.
5
Although the supervising physicians did not file a report on either occasion, two nurses apparently witnessed the incidents and provided statements to Dr. Mantin, who relayed the statements to the Sunrise Hospital and Medical Center Fair Hearing Committee (Committee). Acting as prosecutor in the Committee's subsequent hearing, Dr. Mantin vouched for the witnesses' credibility, but he did not reveal their identities. Maduka was denied several standard procedural protections at the hearing, including the opportunity to cross-examine the two nurses. The Committee summarily suspended Maduka's staff privileges on June 4, 1999.
6
Maduka filed a federal civil rights action against Sunrise Hospital and several related entities (Sunrise) in the United States District Court. The district court dismissed all his claims with prejudice except his charge of defamation (which was dismissed without prejudice) and denied a subsequent petition for reconsideration. After the filing of Maduka's First Amended Complaint, the district court granted Maduka's motion to reconsider, vacated its order dismissing Maduka's discrimination claim with prejudice, and instead dismissed the claim without prejudice. Maduka's Second Amended Complaint (Complaint) — the one at issue here — only alleged discrimination. The Complaint asserted claims under the United States Constitution and 42 U.S.C. §§ 1981 and 1988, alleging that Sunrise's actions were motivated by his race, and offering two examples demonstrating this discriminatory motive. First, whereas other Sunrise staff who were not Americans of African ancestry violated hospital rules during the two incidents, none faced discipline. Second, Sunrise summarily dismissed Maduka without providing various procedural protections, which it routinely affords non-black staff members.
7
Sunrise moved to dismiss the Complaint pursuant to Federal Rule of Civil Procedure 12(b)(6) for failure to state a claim upon which relief can be granted. The district court granted the motion and dismissed the Complaint on January 22, 2003. It held that Maduka made "only conclusory allegations of racial discrimination, and ... fail[ed] to allege any fact or facts constituting either direct or circumstantial evidence of discrimination."
II.
8
We review a Rule 12(b)(6) dismissal for failure to state a claim de novo, and accept as true all well-pleaded allegations of fact in the Complaint, construing them in the light most favorable to Maduka. Roe v. City of San Diego, 356 F.3d 1108, 1111-12 (9th Cir.2004). Dismissal "is appropriate if it appears beyond doubt that [Maduka] can prove no set of facts in support of his claim which would entitle him to relief." Id. at 1112 (internal quotation marks and citation omitted).
9
Nearly a year before the district court's dismissal, the Supreme Court determined the pleading standards appropriate for complaints alleging employment discrimination. See Swierkiewicz v. Sorema N.A., 534 U.S. 506, 122 S.Ct. 992, 152 L.Ed.2d 1 (2002). Presented with "the question whether a complaint in an employment discrimination lawsuit must contain specific facts establishing a prima facie case of discrimination under the framework set forth by this Court in McDonnell Douglas Corp. v. Green, 411 U.S. 792, 93 S.Ct. 1817, 36 L.Ed.2d 668 (1973)," the Court held "that an employment discrimination complaint need not include such facts and instead must contain only `a short and plain statement of the claim showing that the pleader is entitled to relief.'" Id. at 508, 122 S.Ct. 992, quoting Fed.R.Civ.P. 8(a)(2).
10
Surprisingly, neither of the parties in this "employment discrimination lawsuit" cited Swierkiewicz to the district court and the district court does not appear to have applied it to Maduka's case. Only after we ordered the parties to prepare to discuss the case at oral argument did counsel for Sunrise incorporate Swierkiewicz's standard into his analysis, although Maduka's counsel failed to do so even then.
11
Admittedly, Swierkiewicz involves a slightly different context: Maduka seeks relief pursuant to 42 U.S.C. § 1981, while the plaintiff in Swierkiewicz asserted claims under Title VII of the Civil Rights Act of 1964 and the Age Discrimination in Employment Act of 1967. See id. at 509, 122 S.Ct. 992. Nevertheless, there is little doubt that Swierkiewicz governs complaints in section 1981 discrimination actions. At a minimum, its "reasoning applies to any claim to which the McDonnell Douglas framework is applicable." Edwards v. Marin Park, Inc., 356 F.3d 1058, 1062 (9th Cir.2004); see also Swierkiewicz, 534 U.S. at 513, 122 S.Ct. 992 ("Rule 8(a)'s simplified pleading standard applies to all civil actions, with limited exceptions."); cf. Galbraith v. County of Santa Clara, 307 F.3d 1119, 1125-26 (9th Cir.2002) (holding that Swierkiewicz overruled the heightened pleading standards imposed by the Ninth Circuit on certain constitutional tort claims). Since we employ McDonnell Douglas's summary judgment evidentiary approach to employment discrimination claims under 42 U.S.C. § 1981, see, e.g., Rodriguez v. Gen. Motors Corp., 904 F.2d 531, 532 (9th Cir.1990), it logically follows that we employ Swierkiewicz's pleadings approach to these claims as well. We therefore hold that in order to survive a Rule 12(b)(6) motion to dismiss, a complaint asserting a claim for employment discrimination pursuant to 42 U.S.C. § 1981 "must contain only `a short and plain statement of the claim showing that the pleader is entitled to relief.'" Swierkiewicz, 534 U.S. at 508, 122 S.Ct. 992, quoting Fed.R.Civ.P. 8(a)(2).
III.
12
Conceding Swierkiewicz's applicability, Sunrise asserts that the district court in fact faithfully followed it. Our review, however, yields a different conclusion: the district court did not follow the teaching of Swierkiewicz that "the Federal Rules do not contain a heightened pleading standard for employment discrimination suits." Id. at 515, 122 S.Ct. 992.
13
The district court framed "[t]he critical question" as "whether Maduka has alleged sufficient facts showing that he was similarly situated to a non-African American doctor, but nevertheless received different treatment." It concluded that the Complaint was inadequate under this test because it included "only conclusory allegations of racial discrimination, and ... fail[ed] to allege any fact or facts constituting either direct or circumstantial evidence of discrimination." This approach is inconsistent with Swierkiewicz's willingness to "allow[] lawsuits based on conclusory allegations of discrimination to go forward," id. at 514, 122 S.Ct. 992, and it ignores Swierkiewicz's command that "an employment discrimination plaintiff need not plead a prima facie case of discrimination," id. at 515, 122 S.Ct. 992; see also Edwards, 356 F.3d at 1061 ("Swierkiewicz overruled the ... practice of imposing, at the dismissal stage, the prima facie case framework of McDonnell Douglas ...."). Whether "similarly situated individuals outside [Maduka's] protected class were treated more favorably" is one of the four criteria for a prima facie case under McDonnell Douglas, Leong v. Potter, 347 F.3d 1117, 1124 (9th Cir.2003), but Maduka's Complaint need not satisfy this requirement under Swierkiewicz. Simply put, the district court erred in not applying "the ordinary rules for assessing the sufficiency of a complaint." Swierkiewicz, 534 U.S. at 511, 122 S.Ct. 992.
IV.
14
We do not determine here whether Maduka's complaint "satisf[ies] only the simple requirements of Rule 8(a)." Id. at 513, 122 S.Ct. 992. Rather, we remand to the district court so that it may do so in the first instance.
15
REVERSED and REMANDED.
| {
"pile_set_name": "FreeLaw"
} |
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.alibaba.wasp.ipc;
/**
* Interface for receiving asynchronous callbacks.
* For each request with an asynchronous callback,
* either {@link #handleResult(Object)} or {@link #handleError(Exception)}
* will be invoked.
*/
public interface Callback<T> {
/**
* Receives a callback result.
* @param result the result returned in the callback.
*/
void handleResult(T result);
/**
* Receives an error.
* @param error the error returned in the callback.
*/
void handleError(Throwable error);
}
| {
"pile_set_name": "Github"
} |
/*
Copyright © 2001-2004 World Wide Web Consortium,
(Massachusetts Institute of Technology, European Research Consortium
for Informatics and Mathematics, Keio University). All
Rights Reserved. This work is distributed under the W3C® Software License [1] in the
hope that it will be useful, but WITHOUT ANY WARRANTY; without even
the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
[1] http://www.w3.org/Consortium/Legal/2002/copyright-software-20021231
*/
/**
* Gets URI that identifies the test.
* @return uri identifier of test
*/
function getTargetURI() {
return "http://www.w3.org/2001/DOM-Test-Suite/level1/html/HTMLElement101";
}
var docsLoaded = -1000000;
var builder = null;
//
// This function is called by the testing framework before
// running the test suite.
//
// If there are no configuration exceptions, asynchronous
// document loading is started. Otherwise, the status
// is set to complete and the exception is immediately
// raised when entering the body of the test.
//
function setUpPage() {
setUpPageStatus = 'running';
try {
//
// creates test document builder, may throw exception
//
builder = createConfiguredBuilder();
docsLoaded = 0;
var docRef = null;
if (typeof(this.doc) != 'undefined') {
docRef = this.doc;
}
docsLoaded += preload(docRef, "doc", "element");
if (docsLoaded == 1) {
setUpPageStatus = 'complete';
}
} catch(ex) {
catchInitializationError(builder, ex);
setUpPageStatus = 'complete';
}
}
//
// This method is called on the completion of
// each asychronous load started in setUpTests.
//
// When every synchronous loaded document has completed,
// the page status is changed which allows the
// body of the test to be executed.
function loadComplete() {
if (++docsLoaded == 1) {
setUpPageStatus = 'complete';
}
}
/**
*
The dir attribute specifies the base direction of directionally neutral text and the directionality of tables.
Retrieve the dir attribute of the EM element and examine its value.
* @author NIST
* @author Mary Brady
* @see http://www.w3.org/TR/1998/REC-DOM-Level-1-19981001/level-one-html#ID-52460740
*/
function HTMLElement101() {
var success;
if(checkInitialization(builder, "HTMLElement101") != null) return;
var nodeList;
var testNode;
var vdir;
var doc;
var docRef = null;
if (typeof(this.doc) != 'undefined') {
docRef = this.doc;
}
doc = load(docRef, "doc", "element");
nodeList = doc.getElementsByTagName("em");
assertSize("Asize",1,nodeList);
testNode = nodeList.item(0);
vdir = testNode.dir;
assertEquals("dirLink","ltr",vdir);
}
function runTest() {
HTMLElement101();
}
| {
"pile_set_name": "Github"
} |
Q:
Error: Unknown provider: aProvider <- a
I'm using AngularJS in a Ruby on Rails 3.2.8 project with assets.
When I load up my form which is using AngularJS on my development machine I don't have a problem. However when I load the same form up on my production server I get this error in the Javascript console:
Error: Unknown provider: aProvider <- a
I've tracked it back to my coffeescript file where I setup AngularJS for use within a form:
$ (event) ->
$("#timesheet_description").autocomplete({source: '/autocomplete/work_descs'})
# Create AngularJS module
app = angular.module 'timesheetApp', []
# Create a AngularJS controller
app.controller "TimesheetCtrl", ($scope) ->
$scope.costed_amount = 0
# Bind my module to the global variables so I can use it.
angular.bootstrap document, ["timesheetApp"]
If I comment all this out the page will load without errors and without AngularJS abilities.
Is the problem due to Rails assets compiling and minify?
Is there a way to fix this and still use coffeescript and Rails assets?
A:
AngularJS, when using the style you're using right now (called pretotyping), uses the function argument names to do dependency injection. So yes, minification does break this completely.
The fix is simple, though. In every case where you need injection (are using '$xxx') variables, do this:
app.controller "TimesheetCtrl", ['$scope', ($scope) ->
$scope.costed_amount = 0
]
Basically, replace all function definitions with an array. The last element should be the function definition itself, and the first ones are the $names of the objects you want injected.
There's some more (albeit not clear enough) info on the docs.
A:
If you miss the array notation somewhere , to locate this we need to modify the angular code little bit, but its very quick solution.
change is console.log("Array Notation is Missing",fn); ( line no 11 from function start)
Find out annotate function in angular.js (non-minified)
function annotate(fn) {
var $inject,
fnText,
argDecl,
last;
if (typeof fn == 'function') {
if (!($inject = fn.$inject)) {
$inject = [];
if (fn.length) {
console.log("Array Notation is Missing",fn);
fnText = fn.toString().replace(STRIP_COMMENTS, '');
argDecl = fnText.match(FN_ARGS);
forEach(argDecl[1].split(FN_ARG_SPLIT), function(arg){
arg.replace(FN_ARG, function(all, underscore, name){
$inject.push(name);
});
});
}
fn.$inject = $inject;
}
} else if (isArray(fn)) {
last = fn.length - 1;
assertArgFn(fn[last], 'fn');
$inject = fn.slice(0, last);
} else {
assertArgFn(fn, 'fn', true);
}
return $inject;
}
| {
"pile_set_name": "StackExchange"
} |
Because College is Expensive Scholarship
Super easy, fast and anyone can win!
Simply register on the form to the right and you could be the next winner! We are giving out two $500 awards, one ending June 30 & one ending December 31.
How it works- The $500 “Because College is Expensive” Scholarship is open to all students and those planning on enrolling within 12 months. The winner will be determined by random drawing and then contacted directly and announced on this Scholarship page. One entry per person is all that is necessary. Read the official rules for additional information.
Who can Apply?
High schoolers, adults looking to head back to school, current college students and anyone else looking to attend college or graduate school within 12 months.
Deadline: June 30, 2017- 11PM EST & December 31, 2017 11PM EST.
Like us on Facebook for an extra Scholarship Entry!
Congrats to the June 2016 Scholarship Winner!- Kaitlin Samuels
“This scholarship means so much to me, with tuition rising and choosing to live off-campus for my junior year I have been worried about how I’m going to pay for it all. Thanks to Cedar Education I can worry a bit less, so thank you so much!”
Congrats to the June 2017 Scholarship Winner!- Julia Xavier
I was pleasantly surprised to learn that I had received this scholarship. In an age when a college education is so important, yet so expensive, companies like Cedar Education that work to make the transition to college easier financially are indispensable to students. I am so grateful. Thank you so much, Cedar Education!”
Join Amazon Prime- For Free!
FREE Two-Day Shipping on millions of items.
Unlimited instant streaming of tens of thousands of movies and TV shows with Prime Video.
Unlimited ad-free access to over a million songs and over a thousand playlists with Prime Music.
Free unlimited photo storage with Prime Photos.
Read free books each month through Kindle First and the Kindle Owners’ Lending Library.
No cost for first six months-click on the Amazon logo below!
Enter Scholarship
Current school year
Your Email *
First Name *
Last Name *
High school grad year *
GPA out of 4.0*
SAT Math
SAT Reading
SAT Writing
ACT Math
ACT English
ACT Reading
ACT Science
To Reach you if you win
Home phone*
Address*
City*
State*
Zip*
Entry submission
Cedar Education Lending not affiliated by ownership with any Lender, but is compensated for the referral of each of the Lenders’ respective loan customers. By clicking on the link to any of the Lenders’ respective web sites, you are leaving Cedar's web site; Cedar does not maintain any of the Lenders’ web sites and is not responsible for the content of any such linked site. You are, of course, not limited to seeking loans or other products from any of the Lenders, and are free to obtain information and loans from all other providers of student loans and related products.
Private Student Loan Consolidation | Cedar Ed Lending
The best choice for Private Student Loan Consolidation and Refinance! You can also consolidate your federal student loans as well! | {
"pile_set_name": "Pile-CC"
} |
Marilyn Manson-Eat Me, Drink Me
Titulo del album: Eat Me, Drink MeArtista / Grupo: Marilyn MansonGenero:RockDiscografica: Interscope RecordsNum. de soportes: 1Formato:MP31.: If I Was Your Vampire 2.: Putting Holes In Happiness 3.: The Red Carpet Grave 4.: They Said Hells Not Hot 5.: Just A Car Crash Away 6.: Heart-Shaped Glasses (When The Heart Guides The Hand) 7.: Evidence 8.: Are You The Rabbit 9.: Mutilation Is The Most Sincere Form Of Flattery 10.: You And Me And The Devil Makes | {
"pile_set_name": "Pile-CC"
} |
All the forms of evil coalescing in Madam Hillary and her Party are at long last visible, and therefore defeatable, all at once.
Truth cannot be denied forever. A Person, Party or Movement who's true, evil purposes are hidden by lies, subterfuge and false images is just another temporary house of cards. Sooner or later, someone will sneeze on it, and it will all blow apart and come tumbling down. It never takes much.
Thanks to the internet, cell phones, social media, etc., the truth is actually getting out to the populace, despite all the concerted efforts of our evil Mainstream Media to censor it, spin it, propagandized it and distract attention from it, all at the same time. The Media, too, is now seen to be just another part of the whole evil house of cards, criminally colluding with the Establishment "Uni-Party", comprised of the Marxocrat Party, the Republicrat Party and the USCCB, for which the Media is the main public propagandist. I mean spokesman.
Truth seems to be on a roll.
Even the Moron Vote, that huge, previously impenetrable mass of the Marxocrat Party's convinced and dedicated followers, is starting to hear some Truth, even though all they ever pay any attention to at all, other than Entertainment and nonsense, is Mainstream News Propaganda.
Even as the Uni-Party quietly plots a future Impeachment for a future President Trump, before he has even assumed office, and before he has even done anything impeachable, more and more of We The People are waking up to the fact that the Uni-Party would never act to Impeach anyone who is actually evil, such as the current regime, and such as themselves. They are terribly afraid that Trump may actually win, despite all their combined efforts. And, guess what? He just might.
And what is the Establishment "Uni-Party"? It's the Marxocrat Party, the Republicrat Party and the USCCB, all covertly acting together for the advancement of the Marxist-Globalist goals of the Establishment Club that owns and operates them all. It's Cronyism on steroids. Crony Capitalism, Crony Communism and Crony Catholicism.
From our limited vantage point, it is difficult to tell whether the Hillary Campaign or the USCCB is actually driving this latest version of a "Catholic Spring" of Communist infiltration and revolution within American Catholicism. You can't even tell where the Campaign ends and the USCCB begins, or, for that matter, exactly where the Establishment Republicrats fit in. They are pretty much all the same.
All the evil is becoming visible now. All coalescing round Comrade Madam Hillary. Note how the Media censors her history of running the "Bimbo Eruption" program of destroying the lives of all of Billary's sexual predation victims, but they highlight Trumps vulgarian "words" as being, horror of horrors, micro-aggressions, or something equally horrifying to today's Millenial Snowflakes, sending them all running for their campus Safety-Zones, or mommy's basement. But the mask is coming off. Propaganda and Indoctrination are beginning to be seen for what they are, by those who's minds are not yet completely numbed or twisted by falsehoods.
All forms of evil are coming out in the open now, not just corruption and criminal activity, which by should be expected from the corner of the Clintons, the Obamas and all their associates and fellow travelers. Opposition to Equality, in the name of equality. Opposition to human Life in the name of "health". Opposition to Liberty. Opposition to Property. Fraud. Violations of national security. Bribery. Collusion with national enemies. Championing ever increasingly weird new forms of sexual perversion, and forcing normal people to cooperate in their advancement and "enculturation" into American society. Causing new problems so that they can be the ones to fix them, while blaming political opponents for them.
The list is endless.
Nevertheless, Truth is rolling now. Like a growing snowball.
Do not fall into the trap that says that voting, or polling-place cheating, or cheating in ballot counting cannot be vast or successful enough to change an election in a country our size. George Soros and various Alinskyite groups have been working on taking charge of grass-roots level poll-watching and controlling, and vote-counting authorities, for years and years, spending untold billions of dollars on it. Including on elections to Secretary of State in states, and similar related vote-counting political positions.
It is enough that the people know there was an election. The people who
cast the votes decide nothing. The people who count the votes decide
everything. --Joseph Stalin
Cheating an lying is what Marxists and Globalists do for a living. Do not think it cannot happen here. That belief is music to their ears.
Nevertheless, the Trump tide is starting to roll in. It is possible that, if he wins, he can do more to restore America to the Constitutional Republic it was designed to be than any more amicable, lets-all-get-along, one-step-at-a-time more Constitutionalist candidate.
Maybe.
Because he can and will kick ass.
Because he can, with the Constitution behind him, say "You're Fired!" to multiple Supreme Court Justices who have violated the Constitution. And Senators. And Congressmen.
Because he is an Alpha-Male, Git-R-Done, knowledgeable businessman and strong leader, who's natural tendency is to come out swinging hard whenever attacked.
And he has been and is being attacked, and future attacks are already being planned against him, and he knows it. If he wins, he actually can take advantage of all the possibilities outlined among the Impeachable Offenses Pages, with or without the cooperation of a hostile, Uni-Party controlled Congress. He can actually "weaponize" the Constitution, and put it to good use.
Whether purposely or inadvertently he would restore it at the same time.
Those of us who still don't see what's right under all of our noses are lacking in edumacation, to quote Herman Cain's Grandfather. They need more edumacatin'. Don't laugh. I would bet hard earned money that Herman Cain's Grandfather was far better edumacated, in the practical living of real-world life, than most of the contemporary professional edumacaters of his day.
The Trump snowball is rolling downhill into the valley of evil.
If I may quote Herman Cain's Grandfather one more time:
Them that's goin': GET ON THE WAGON!
Them that's stayin': GET OUT OF THE WAY!
=====
Sarcastic Acronym Hover-Link Footnotes: For the convenience of those readers using devices that lack a mouse, these footnotes are provided for all webpages, in case any webpage contains any hover-links. (If you don't have a mouse, you can't "hover" it over a link without clicking just to see the simple acronym interpretation. Click a footnote link to see the gory details.)
Just got home from work, ate dinner, and checked the email and found today's Vortex. Perfectly appropriate to this page for most of our Bishop's contribution to the advance of Globalism, Marxism and just plain evil in America. See if you agree.
Regards,
Vic
Language and Tone Statement
Please note the language and tone of this monitored Website. This is not the place to just stack up vulgar
one-liners and crude rejoinders. While you may support, oppose or
introduce any position or argument, submissions must meet our high Roman Catholic and Constitutional American standards of Truth, logical rigor and civil discourse. We will not
participate in merely trading insults, nor will we tolerate participants merely
trading insults. Participants should not be
thin-skinned or over sensitive to criticism, but should be prepared to
defend their arguments when challenged. If you don’t really have a
coherent argument or counter-argument of your own, sit down and don’t
embarrass yourself. Nonsensical, obscene, blindly & doggedly anti-Catholic, anti-American, immoral or merely insulting submissions will
not be published here. If you have something serious to contribute to
the conversation, be prepared to back it up, keep it clean, keep it civil, and it will be published. We humbly
apologize to all religious conservative thinkers for the need to even say
these things, but the Hard Left is what it always was, the New Leftist Liberals are what they are, and the Internet is what it is.
"Clickbait" advertising links are not acceptable for posting here.
If you fear intolerant Leftist repercussions, do not use your real name and do not include email or any identifying information. Elitist Culturally Marxist Pure Authoritarians cannot and will not tolerate your freedom of speech or any opposition to their rigid authoritarian, anti-equality, anti-life, anti-liberty, anti-property, hedonistic, anti-Constitution, pro-Marxist, pro-Islam, anti-Catholic, anti-Christian, anti-Semitic, anti-male, sexist, pro-homosexual, anti-heterosexual, anti-white, racist, anti-Western, anti-American, Globalist, anti-Nation, blatantly immoral, totally intolerant and bigoted point of view.
This Form cannot be submitted until the missing fields (labelled below in red) have been filled in
Add Your Comment
Please note that all fields followed by an asterisk must be filled in.
Silence in the face of evil is speaking. "We've had enough of exhortations to be silent!
Cry out with a hundred thousand tongues. I see that the world is rotten
because of silence." Saint Catherine of Siena
“An
error which is not resisted is approved; a truth which is not defended is
suppressed…. He who does not oppose an evident crime is open to the suspicion of
secret complicity.” – Pope Felix III
“Do not forget your purpose and destiny as God's creatures.
What you are in God's sight is what you are and nothing more”—Justice Clarence Thomas
"Blasphemy against the Holy Spirit, then, is the sin committed by the person who claims to have a 'right' to persist in evil-in any sin at all-and who thus rejects redemption." Pope Saint John Paul the GreatDOMINUM ET VIVIFICANTEM
"Not to oppose error is to approve it; and not to defend truth is to suppress it, and, indeed, to neglect to confound evil men-when we can do it-is no less a sin than to encourage them." Pope St. Felix III
If a purposeful violator of the Constitution who is a sworn officer of the governemt is not a domestic enemy of America and a traitor, then
there is no such thing, and the Constitution itself is without meaning,
and America has lost its grounding and its very purpose for being. Anti-American-Court
Live Interviews
"All the evils of the world are due to lukewarm Catholics." Pope Pius V
"All the strength of Satan's reign is due to the easygoing weakness of Catholics." Pope St. Pius X
Click the image above topublish your essay or article here,to be included among those below.
Submitted Articles andReprinted Articles
(Note: copyrights on these articles wherever present will supersede the WebSite copyright at the bottom footer of every WebPage)
Still Time To Get It Right. “Once you understand the role of energy in everything, you can begin to appreciate why there's simply nothing more important to get right. Energy is at the root of everything. If you have sufficient energy, anything is possible. But without it, everything grinds to a halt.” Chris Martenson
The Heresy of Chrislam. Those claiming that the “Allah” of Islam’s Qu’ran and Yahweh or God of both the Old and New Testaments of the Bible are one and the same are missing one glaring point: GOD NEVER CONTRADICTS HIMSELF.
Never be lukewarm.Life itself demands passion.He who is indifferent to God has already forfeited his soul.He who is indifferent to politics has already forfeited his liberty.In America, religion is not mere window dressing and citizenship is not a spectator sport.Do not allow our common destiny as a whole people to just happen without your input. Seek the Truth; find the Way; live the Life; please God, and live forever.
NewsletterCatholic American ThinkerFree E-zine Subscription
Email
You will receive immediate email newsletters with links to new articles as they are published here. Your email is perfectly secure here; we use it only to send you theCatholic American ThinkerNewsletterand absolutely nothing else.
The
Purpose of this grouping of links is to provide a record of the unique
American political aberration of Donald Trump-ism. Neither Republican
nor Democrat; neither Conservative nor Liberal; neither Christian nor
Atheist; neither Fish nor Fowl; a stand-alone, determined, independent
billionaire who just might save America from herself. Or, destroy her.
Maybe.
The Trump Phenomenon PagesDonald
Trump rose in the public estimation because he started talking about
stopping the illegal invasion of foreign intruders into America, which
was not only allowed, but encouraged by the Obama regime and the
Democrat Party, and not stopped by the Republican Party. Untold
millions were pouring across our Mexican border, for government
benefits. The American government was doing this on purpose, and
elements of the Catholic Church and others were supporting it. That is
the single issue that put Trump at the top of all political polls and
kept him there so long.
"We belong to the Church militant; and She is militant because on earth the powers of darkness are ever restless to encompass Her destruction. Not only in the far-off centuries of the early Church, but down through the ages and in this our day, the enemies of God and Christian civilization make bold to attack the Creator’s supreme dominion and sacrosanct human rights.”--Pope Pius XII
"It is not lawful to take the things of others to give to the poor. It is a sin worthy of punishment, not an act deserving a reward, to give away what belongs to others."--St. Francis of Assisi
Truth is incontrovertible. Malice may attack it, ignorance
may deride it, but in the end, there it is.—Winston
Churchill
The smallest minority on earth is the individual. Those who
deny individual rights cannot claim to be defenders of minorities.—Ayn Rand
Atheist Genesis:
In the beginning there was nothing, and nothing happened to nothing.
And then nothing accidentally exploded and created everything.
And then some bits of everything accidentally encountered other bits of everything and formed some new kinds of everything.
And then some bits of everything accidentally arranged themselves into self-replicating bits of everything.
And then some self-replicating bits of everything accidentally arranged themselves into dinosaurs.
See?
“ … for I have sworn upon
the altar of God eternal hostility against every form of tyranny over the mind
of man.” wrote Thomas Jefferson in a letter to Dr. Benjamin Rush in
the year of our Lord 1800. The context
involved resistance to any form of Christianity or Deism legally imposing
itself throughout the USA. We must wonder what he might say
about our current government's forced imposition of strict secularism – i.e.,
anti-theism – throughout the USA. I submit that legally enforced secularism of society, like theocracy, like Marxism,
and like Islam, is, precisely, a form of tyranny over the mind of man.Nothing good can come from the religious cleansing of Judaeo-Christian society. Government imposed secularism is just another form of theocracy. | {
"pile_set_name": "Pile-CC"
} |
7-Eleven Faces Illegal Immigrant Employment Crackdown
7-Eleven Faces Illegal Immigrant Employment Crackdown Almost 100 7-Eleven locations were targeted by U.S. Immigrations and Customs Enforcement, Wednesday. The operation is one of the biggest against an employer under The Trump Administration. Across 17 states, store employees were audited and interviewed and there were 21 arrests of individuals suspected of being in the country illegally. 7-Eleven released a statement to the Washington Post in response to the raids. 7-Eleven, Washington Post | {
"pile_set_name": "Pile-CC"
} |
The last time the two Swiss friends met in the Californian desert back in 2017, Stan called Fed a very rude word. He had just lost in straight sets to the old GOAT in the final, the 20th thumping he had taken from the man he called a pal, and he was getting a bit tearful during the presentation ceremony (he was exhausted and the emotions were all getting a bit much).
Choking his way through his speech, he looked over to the Mighty Fed only to see him laughing.
“I would like to congratulate Roger,” Wawrinka said to the crowd. “He’s laughing. He’s an a**hole, but it’ OK.”
A rude word from a pal
The crowd squirmed in their seats. Was this going to be an awkward moment? Actually, no, it turned out to be perfectly fine. As Roger admitted afterwards, it was not the first time he had been referred to in such anatomical detail.
"I was trying, when he looked at me, not to give him the sad face," he said. "I was looking at him going, 'You'll be fine,' and gave him a laugh, say, maybe gets his mind off it. I guess I achieved that."
Since that day, a lot has happened to both men. Federer has gone on to win two more Grand Slam titles and, last year, regain his world No.1 ranking. Stan, meanwhile, has undergone major surgery on his left knee, surgery that could have ended his career had it not been successful. He only took his first, faltering steps on the comeback trail at the Australian Open last year.
Federer knows the danger
It has been slow and painstaking work to get back on track but now Wawrinka is back up to No.40 in the rankings and is playing like the Stan of old. But not even the old Stan had much of a chance against Fed: their career record stands at 21 wins to three in Fed’s favour. No matter, Stan is feeling good again – even if he is realistic about his record against his oldest rival – and Fed knows exactly where the dangers lie in their match-up.
“I really feel like he's been back at a normal level, let's say, around the US Open [last year],” Federer said. “But obviously his ranking was low, he was still maybe missing some fitness, you know, that day-to-day match fitness that you need, mental fitness that you require to bring it every single day. I think he was just missing it a little bit. But I think as the season wore on, he only got stronger, even though at the end he didn't play anymore because he didn't want to take a chance, which I totally understand.
“But I think, from what I'm gathering, if he's in no pain or injury-free, I think we will see a great Stan here, down the road, without a doubt, because I know what he can do. I think a lot of Stan. He's got all the different options how to win points. He's a fighter and a winner. Yeah, I hope he's going to be in the top 20, top 10 very soon again.”
Not this week, but soon Stan...
Soon, but not too soon, not if Federer has anything to do with it. He would love to see his old friend back at the top of the game but just not this week. Not in the third round of the BNP Paribas Open. Fed has plans of his own for that match and if they go according to the well-worked plan, he is aiming for his 22nd win.
In 14 years of trying, Stan has realised that his only chance against the Mighty Fed is to play him on clay – all three of his wins have come on the red stuff.
“I think maybe on clay, first my game is a bit stronger, I have a little bit more time,” Stan said. “I can use more topspin, playing more heavy on his backhand, push him more from the baseline. I think on the hard courts he can always play a little bit quicker. He can come to the net more. He can mix a little bit more. Yeah, it's always been really difficult to play him.
Missing the red stuff
“It's going to be tough match, for sure. He's the best player to ever play the sport. Stats against each other are really, really not in my favour. Yeah, I think it's great for me. “Most important is to win two matches here, to win the way I won tonight. It was tough battle, fighting, staying there physically, tennis-wise, mentally, also. Those are matches I know that can help me to get some big result.”
And if he does get that big result, maybe it will Fed’s turn to call Stan a very rude word. And maybe it will Stan’s turn to laugh. | {
"pile_set_name": "Pile-CC"
} |
[Study of prevalence and association between asthma symptoms and obesity in the pediatric population of Pamplona].
The objective of this study is to determine the prevalence of asthma symptoms and overweight-obese in children aged 6-7 years and adolescents aged 13-14 years within the metropolitan area of Pamplona, and analyse the risk of asthma within the age groups and the influences if sex on this relationship. The study is based on data of asthma symptoms and body mass index of 4,413 children and adolescents obtained from the International Study of Asthma and Allergies phase III questionnaire. Unconditional logistic regression was used to obtain adjusted odds ratios (OR) and 95% confidence intervals (95% CI) for overweight-obesity and asthma symptoms in both groups, taking as reference the group of normal weight. Afterwards, it was stratified by sex. The prevalence of overweight-obesity in the group aged 6-7 years was 23.9% and in the group of teenagers was 11.5%. The prevalence of asthma symptoms in both age groups was lower than the Spanish average. The obese children aged 6-7 years had a higher risk of asthma symptoms. When it was stratified by sex, an increased risk in all asthma symptoms was observed only in obese girls. No relationship between obesity and asthma was observed n the adolescents group. Obesity in children is related to asthma symptoms. Obese girls have an increased risk and more severe asthma symptoms than boys. | {
"pile_set_name": "PubMed Abstracts"
} |
The objective of this proposal is to define the role of the protein kinase Akt and its downstream targets in the etiology of cancer. The PI 3-K-Akt signaling axis has been shown to be critical for tumor progression by impacting cell survival and growth. Little is known, however, concerning the role of Akt in controlling cell motility and invasive migration. Our studies have shown that Akt isoforms Akt1 and Akt2 have distinct effects on the motility of a number of breast cancer cell lines, where Akt1 functions as an inhibitor of invasive migration, whereas Akt2 may function as an enhancer. We further show that Akt can phosphorylate the transcription factor NFAT, promote its degradation and blunt transcriptional activity. Finally, we also show that the transcription factor FOXO3a, also an Akt substrate, increases motility and that phosphorylation by Akt blocks this phenotype. Based on our studies, we propose the hypothesis that Akt isoforms have distinct effects on the motility of epithelial cancer cells. We propose that this is mediated by cellular localization of Akt1 and Akt2, and that in turn this determines the Akt-mediated regulation and phosphorylation of NFAT and FOXO3a, leading to their nuclear export and degradation. Three aims will test this model:- In AIM 1, we will rigorously test the contribution of Akt1, Akt2 and Akt3 in regulating breast cancer cell motility and alterations in the actin cytoskeleton, using both loss-of-function approaches, such as siRNA, as well as gain-of-function genetic approaches with activated Akt alleles. We will investigate the importance of cellular localization of Akt isoforms, and also the contribution of the Akt phosphatase PHLPP. In AIM 2, we will determine the mechanism by which Akt isoforms control NFAT transcriptional activity, leading to nuclear export. We also propose experiments to mechanistically evaluate how Akt isoforms mediate ubiquitination and degradation of NFAT through the E3 ligases MDM2, Skp2 and NEDD4-2. We will evaluate the contribution of the ERK pathway in Akt-regulated invasive migration. In AIM 3, we will determine if FOXO3a, a distinct Akt substrate, promotes the acquisition of a motile phenotype in epithelial cells, and whether Akt-mediated phosphorylation, nuclear export, ubiquitination and proteasomal degradation block this response. The results of these studies will provide important new insights into the mechanisms by which Akt isoforms modulate cancer cell invasive migration through two crucial effectors, NFAT and FOXO3a. We anticipate that the successful completion of these studies will provide a paradigm shift in the field because they will show that signaling through Akt has profound effects on cell motility of cancer cells. There is also the potential that the outcome of our studies will provide for the future development of novel therapeutic interventions for tumor progression. | {
"pile_set_name": "NIH ExPorter"
} |
The major cause of tooth loss after the age of 35 is periodontal disease. The goal of periodontal therapy is stated as providing a dentition that will function in health and comfort for the life of the patient. This goal of providing a functional dentition has led to the development of varied approaches to therapy to preserve the periodontium. Recent reports indicate that this is an achievable goal and that the dentition can be maintained in a healthy functional state. Regeneration of the periodontium is defined as reproduction of reconstitution of a lost or injured part. The biochemical and molecular biological events necessary for regeneration to occur have not been defined. During the last two years we have actively studied biochemical manipulation of dentin surfaces with matrix factors and polypeptide growth factors to try and establish the appropriate conditions to induce periodontal regeneration. These studies indicate that periodontal ligament cells primarily respond chemotactically to TGFBeta and bFGF whereas PDGF is a major mitogenic stimulus. This response is not uniform. Depending on the age of donor we observed low to high responders with "young" donors responding substantially better than "old" donors. We observed a decrease in biological response of primary cultures of PDL cells as they are detached and reattached for passage in culture. Further evidence indicates that unattached cells express different molecular biological markers when compared to attached cells. We have observed decreases in specific mRNAs for fibronectin, actin, c- myc, bFgf and PDGF. Addition of PDL-CTX induces a PDL cell phenotype which is consistent with an increased chemotactic and mitogenic response characteristic of young donors. Here we propose to continue to characterize the factors necessary to induce PDL cells to assume a young migratory and mitogenic phenotype. Additionally, we will examine the interaction of various peptides with PDL cells that result in increased or decreased expression of mRNAs for factors necessary for cell survival and proliferation. The interaction of PDL-CTX and bFGF, PDGF and TGFBeta will be examined in relationship to the expression of FN, actin, c-myc, c-sis and c-fos. We will next establish the phenotype characteristic of the "young" PDL cells. This will be compared and contrasted to aging cultures of PDL cells or "old" primary cultures of PDL cells. Receptor number and affinity for various polypeptides in addition to expression of mRNAs will be determinants. We will also investigate the cell-cell relationship between endothelial cells (which synthesize and secrete bFGF) and PDL cells. From our studies we hypothesize that as PDL cells age in vitro or in vivo they become less responsive to specific matrix and polypeptide growth factors. We further hypothesize that "old" PDL cells do not synthesize and secrete adequate concentrations of PDL-CTX to maintain a non senescent phenotype. Finally, as both endothelial cells and PDL cells become more refractive to growth factor stimulation (decrease in angiogenesis and healing potential) the formerly health periodontium becomes susceptible to disease. | {
"pile_set_name": "NIH ExPorter"
} |