text
stringlengths 0
1.59M
| meta
dict |
---|---|
The state of South Africa’s electricity system was in dire straits this week, with Eskom losing almost half of its available capacity on Tuesday, plunging the country into stage-three load-shedding.
Experts expect the situation to get worse come winter, despite the government’s confidence that the power grid is sufficiently stable.
On Wednesday, Public Enterprises Minister Lynne Brown gave assurances that stage-three load shedding was “in no way an indication that we are close to a blackout”.
Her comments came shortly before the utility once again implemented stage-three power cuts in the late afternoon.
Eskom reportedly lost 14 500MW in both planned and unplanned outages on Tuesday, almost half of its available capacity of 30 211MW.
Despite the government’s assurances that there is no crisis, energy analyst Ted Blom believes the situation is likely get worse this winter.
The loss of capacity caused by planned and unplanned outages suggested that Eskom’s energy availability could drop to 60% of its total on a “prolonged basis”, he said.
Eskom’s total capacity is 41 990MW but its available capacity – the actual amount of electricity that can be provided to the grid – can vary from day to day.
The completion of the Medupi and Kusile power stations could each add a nominal 4 800MW to the grid. But construction has been substantially delayed and Medupi is only expected to be fully operational by 2019.
Deferred maintenanceBlom said there could be load-shedding for up to 12 hours in some parts of the country.
The utility has blamed its past policy of deferred maintenance as one of the reasons for the current constraints.
In a bid to keep the lights on, it previously postponed much-needed maintenance of its aging fleet, leading to a higher incidence of unplanned outages.
Eskom’s own forecasts for winter are bleak. It could be running on roughly half of its capacity during some weeks if there are not improvements in demand and supply.
According to its medium-term adequacy report, which forecasts peak capacity and demand, and incorporates “planned risk” and “likely risk”, Eskom predicts that, in the coming weeks, the planned risk will be roughly 9 000MW that is not available – 7 000MW for assumed planned outages and a 2 000MW reserve from generation.
But Eskom’s likely risk prediction is 11 000MW in losses.
Taking planned maintenance into Eskom’s forecasts, should the likely risk scenario play out, in some weeks the utility will be able to provide only about half the electricity it has available.
In the week of April 27, Eskom forecasts 37 190MW of available capacity. Assuming losses of 11 000MW under the likely risk scenario, as well as the loss of 6 583MW because of planned maintenance, only 19 337MW may be available.
Forecasts for the week of June 15 suggest these figures will be about 57% of available capacity and 51% of installed capacity.
But the report did indicate that, as of May, the assumed unplanned outages would be 5 500MW less, and that this figure and the associated risk would be reviewed.
Blom said one way to alleviate the constraints on the grid was to halt the supply of electricity to two of the aluminium smelters owned by mining giant BHP Billiton. The two, Hillside in KwaZulu-Natal and Mozal in Mozambique, consume about 5.68% of Eskom’s capacity. A third smelter, Bayside, is being decommissioned.
Thanks to special, commodity-linked pricing agreements with Eskom, the smelters also receive electricity at a deeply discounted rate.
This is particularly galling at a time when the price of electricity is expected to increase sharply.
The utility recently applied to the National Energy Regulator of South Africa (Nersa) to have its tariffs increased by 25%.
The details of the pricing agreements with Billiton were revealed in 2013 after a protracted court case between the company and the news group Media24.
At the time, Chris Yelland, an energy analyst and managing director of EE Publishers, calculated that the smelters paid a significant average of 27c a kilowatt less than other customers.
Review stalledThe contracts have resulted in major losses for Eskom in past financial years.
The utility applied to Nersa in 2012 to have these contracts renewed, but the process has stalled.
The regulator promised to release the review, given the public interest in the issue, but it told the Mail & Guardian this week that it is considering legal opinion over whether it has the mandate to deal with the matter.
It could not say when the review would be completed, but added that this would be only “when all aspects have been covered”.
The contracts include interruptability clauses, which allow Eskom to interrupt supply to the smelters for short times.
In response to questions, Eskom said it was making use of these provisions “whenever there is a system constraint and before Eskom declares [an] emergency”.
But the contracts remained valid and binding, said Eskom.
The current power shortages do not qualify as a force majeure according to the utility and, as such, it would be in breach of its contracts if it ceased supplying the smelters with electricity.
The matter is further complicated by a dispute over the termination of dates of the contracts, notably for the Hillside smelter.
Eskom is contracted to provide power to two of Hillside’s pot (production) lines until 2020. A supplementary contract was signed for a third pot line, which came on line in 2001, requiring Eskom to supply it until 2028.
Rooftop solarAccording to Yelland, there is still a major disagreement between Eskom and Billiton over whether the supplementary contract covers all of Hillside’s pot lines. If it does, it would lock Eskom into supplying all three pot lines for a further eight years.
Blom said another way to reduce the strain on the grid was to allow greater take-up of rooftop solar power by households.
He calculated that, if all the country’s brick-and-mortar households installed solar panels, it could free up between 8 000MW and 10 000MW.
Blom was critical of the government’s so-called war room under Deputy President Cyril Ramaphosa, which was set up to address the electricity problem and the chronic instability at Eskom. Since its establishment late last year, it had “gone quiet”, he said.
The chairperson of the utility, Zola Tsotsi, recently resigned, following the suspension of some of its key executives, including its chief executive, Tsediso Matona.
But Brown said the state was “working tirelessly to ensure that we have adequate electricity supply”.
She apologised on behalf of the government “for the inconvenience anyone has suffered due to load-shedding” and thanked citizens for their patience.
Eskom would continue with its “preventative maintenance schedules” to its aging plants “so that the recovery to sustainable and reliable power generation is expedited”, she said.
“Eskom’s maintenance strategy and its execution are receiving focused attention from the war room to ensure that it delivers the improvements required in plant availability and plant performance,” said Brown.
“Eskom has deployed 30 experienced senior managers from head office to power stations to ensure that maintenance is done correctly.”
Other steps were being taken, including restoring the supply from the Majuba power station, where a coal silo collapsed last year. About 1 200MW had been recovered and Majuba was running at 85% capacity during peak hours.
BHP Billiton responds
Mining giant BHP Billiton previously stated its intentions to hold Eskom to the smelter contracts. It gave no indication this week that it has changed its position.
The mining house was participating in the National Energy Regulator of South Africa’s review process. It had provided relevant facts, including the cost of supplying Hillside and the contribution it makes to the economy, to assist the regulator in its decision-making processes, Billiton South Africa’s vice-president for corporate affairs Lulu Letlape told the M&G.
The creation of a new company, South32, to house its local operations “does not affect the current contracts”, she said.
The agreements allow Eskom to interrupt the supply of electricity at times when Eskom’s system is under stress, enabling the power utility to continue to supply electricity to other customers.
“Within the technical limitations of our plant, we have agreed with Eskom to provide more support during emergencies without risking our operations,” she added.
In the face of current power constraints, the smelters could not be treated differently from other industrial customers, said Letlape.
“The smelter contracts have conditions of supply which align with Eskom’s standard large power user contracts and the smelters will not be treated differently.”
Despite the past negative effect the contracts have had on Eskom’s bottom line through embedded derivatives, Eskom said that in 2015 it had realised a gain, though it did not indicate what this was in rand terms. | {
"pile_set_name": "Pile-CC"
} |
Open Source Home Automation System based on LinkSpriteIO and LinkNode
Introduction
Home automation is the residential extention of building automation and involes the control and automation of lighting, heating, air conditioning, appliances and security. There are many products using Ethernet, RS-485, ZigBee and Z-Wave as communication protocols.
We has developed an open source home automation system which is based on a very cheap $10 WiFi development board LinkNode D1. It is Arduino-compatible WiFi board and is very easy to program.
This system use several sensors including motion sensor, O2 sensor and temperature&humidity sensor to perceive the environment in your home,on the other hand, it is connected to LED, servo and replay to control home appliances. The most important thing is that the system and App are all connected to LinkSpriteIO IoT cloud server which supports REST API and HTTP/websocket communication ,and it enables the home appliances to be controlled online via Internet.
The diagram below illustrates the connection flow of the system. The LinkNode D1 should be connected to the Internet through WiFi for this to work, as well as your mobile device.
This artical shows you how to make your own home automation system with LinkNode D1 and LinkSpriteIO IoT cloud server. Also you can deploy your own Ethernet device as home automation system using the LinkSpriteIO’s REST API.
Requirement
Hardware
LinkNode D1
Linker Base for D1
Llnker Oxygen Sensor
Linker temperature & humidity sensor
Linker relay module
Linker LED module
IR distance sensor
Servo
1602 LCD
Software
Arduino IDE with ESP8266 hardware package
Android SDK and Java
Tutorial
Assembling the hardware
Conection
Peripheral Module
LinkNode D1 Pins
T&H sensor
GPIO0
Linker LED
GPIO5
1602 LCD txPin
GPIO14
Servo
GPIO15
Relay
GPIO16
O2 sensor
A0
Preparing the Software
We use Arduino IDE to program the LinkNode D1 but the offical Arduino IDE doesn’t support LinkNode D1 board, and we have to install the ESP8266 Arduino code pacakge, details please check the wiki page of LinkNode D1.
LinkNode D1 Arduino code
This code block connects the LinkNode D1 to the WiFi network using WiFi manager library which can make configure AP’s SSID and password via web page.
LinkSpriteIO
LinkSpriteIO(www.linksprite.io) provides a RESTful Web API to interact with clients (Web App, Mobile App, Desktop App, etc.), which is the core of this home automation system. It connects the mobile App and endpoint device, and enables remotely control the home appliances. The details of RESTful API for LinkSpriteIO, you can check it here.
Mobile App
According to the RESTful API that LinkSpriteIO supports, we have developed an Android App for this system. With this App, we can remote control the LED or Air conditioning or window, at the same time, we can remotely get the temperature and humidity at home. We use a IR distance sensor to detect the person near your house door, if someone is near the house door, the APP will get alert message.
Conclusion
This article explains a basic construction of an open source home automation system which connects to LinkSpriteIO cloud server. The mobile App then connects to the server, which enables it to send commands to the LinkNode D1 then into the home appliances as well as get environmental data from sensors.
This implementation is for DIY only, and it contains Authorization and Authentication layers but it doesn’t use HTTPs, hence it is not very secured. | {
"pile_set_name": "Pile-CC"
} |
Background {#Sec1}
==========
Upper extremity deep venous thrombosis (UEDVT) is a thrombus within the subclavian, axillary or brachial vein. UEDVT is much less common than it's lower extremity counterpart, but is associated with similar complications including: post-thrombotic syndrome, recurrent thrombosis, and rarely, pulmonary embolism. Thrombosis of the upper extremity is divided into primary and secondary causes; primary UEDVT occurs spontaneously in the setting of strenuous upper extremity effort or in the absence of known thrombotic risk factors. Secondary UEDVT is related to a known risk factor such as malignancy or central venous catheters \[[@CR1],[@CR2]\].
The thoracic outlet is bound by the clavicle and subclavius muscle anteriorly, the scalenus anticus muscle laterally, the first rib posterior-inferiorly and the costoclavicular ligament medially. Compression of the neurovascular bundle within the thoracic outlet is termed thoracic outlet syndrome (TOS) and is present in approximately 60% of patients with UEDVT \[[@CR1]\]. Effort-induced thrombosis, or Paget-Schroetter syndrome, is a clinical manifestation of TOS caused by distortion and narrowing of the vein within the tunnel by repetitive upper extremity exercise. Historically, Paget-Schroetter syndrome has been associated with unusual pursuits or occupations including: golf, tennis, baseball, football, weight lifting, painting, etc. \[[@CR3]\] A literature review of recent case reports reveals UEDVT associated with baseball, surfing, and weight lifting \[[@CR4]-[@CR6]\]. Per Urschel and Razzuk, the preferred treatment for Paget-Schroetter syndrome is thrombolytic therapy followed by prompt resection of the first rib for neurovascular decompression \[[@CR3]\]. However, surgery is not without its risks (e.g. pneumothorax, nerve injury, etc.) and no randomized controlled trials have been performed to investigate the optimal treatment of UEDVT \[[@CR1]\].
This is the first report of the development of effort-induced thrombosis of the upper extremity following the use of an increasingly popular, modified, oscillating dumbbell.
Case presentation {#Sec2}
=================
This is a 53 year-old African American male, with no significant past medical history who presented with a one-day history of right arm swelling. He woke up with a swollen arm and dull, aching pain in the right upper extremity. Our patient, a retired office manager, reported exercising daily over the prior week with a new "vibrating device" (Figure [1](#Fig1){ref-type="fig"}). Patient denies any past interventions to the right upper extremity.Figure 1Oscillating dumbbell exercise device. A photograph of the patient's modified, oscillating dumbbell, which he commenced exercise with one week prior to presentation with an upper extremity deep vein thrombosis.
Clinical findings {#Sec3}
-----------------
Patient denied: known malignancy, personal or family history of DVT, trauma, intravenous therapy, and drug abuse. Physical examination was unremarkable except for extensive right upper extremity swelling.
Timeline {#Sec4}
--------
See Additional file [1](#MOESM1){ref-type="media"}.
Diagnostic assessment {#Sec5}
---------------------
Laboratory testing revealed CBC, CMP, PT/INR and aPTT all within normal limits.
A venous doppler study revealed an occlusive thrombus in the right axillary, proximal brachial and basilic veins. Access via a forearm vein was achieved and venography confirmed extensive occlusion of the right axillary, proximal brachial and basilic veins (Figure [2](#Fig2){ref-type="fig"}).Figure 2Venogram 1. Venography confirmed extensive occlusion of the right axillary, proximal brachial and basilic veins.
Therapeutic intervention {#Sec6}
------------------------
An infusion catheter was positioned to allow tPA infusion of the thrombus throughout its entire length over the ensuing 24 hours. The following day, a venogram revealed the presence of a small residual thrombus and a 50% stricture in the right axillary vein (Figure [3](#Fig3){ref-type="fig"}). Mechanical thrombectomy using an angiojet device, followed by balloon angioplasty and deployment of a 12 × 6 mm stent resolved the residual thrombosis and stenosis. Completion angiography showed complete resolution of the stricture and thrombus (Figure [4](#Fig4){ref-type="fig"}).Figure 3Venogram 2. Venography following 24 hours of tPA infusion revealed small residual thrombus and 50% stricture in the right axillary vein.Figure 4Venogram 3. Completion angiography showed complete resolution of the stricture and thrombus following mechanical thrombectomy, balloon angioplasty, and stent placement.
Follow-up and outcomes {#Sec7}
----------------------
The patient was discharged the following day on warfarin and aspirin. There were no adverse or unanticipated events.
Discussion {#Sec8}
==========
Our patient exercised regularly for years and began using the device only one week prior to developing an UEDVT. The device is a modified dumbbell with a centralized spring and weight attached to either end. When shaken, the weight bounces off either end creating self-perpetuated oscillations and increased resistance. The resistance leads to sustained thoracic wall and arm muscle contraction, purportedly increasing the effects of exercise by forcing the muscles to work harder. Fitness IQ, the company that makes the original device, the Shake Weight, has termed this technology "dynamic inertia" \[[@CR7]\]. In 2010, Shake Weight sales had reached \$40 million with the expectation of selling 10 million more units \[[@CR8]\].
In the absence of any other etiology for thoracic outlet syndrome or other precipitating factors, we hypothesize that our patient developed an axillary vein thrombosis as a result of the recently initiated exercise with the device. We hypothesize the mechanism of injury to the axillary vein when such devices are used is repeated compression and traumatization to the vein by the contracted muscles that form the boundaries of thoracic outlet, thereby initiating clot formation. In this case, first rib resection was not pursued due to the belief that it was initiation with the device alone that caused the thrombosis. However, should the patient experience a recurrence, first rib resection would be a viable treatment option.
Conclusions {#Sec9}
===========
This is the first report of the development of effort-induced thrombosis of the upper extremity following the use of an increasingly popular, modified, oscillating dumbbell. This association has never been reported and is worth further monitoring. Due to the growing popularity of modified dumbbells and the possible risk for axillary vein thrombosis, consideration should be made to caution consumers of this potential complication. Pharmacological and mechanical thrombolysis is effective in resolving the axillary vein thrombosis and should be considered in healthy, athletic individuals.
Consent {#Sec10}
=======
Informed consent was obtained from the patient for publication of this Case report and any accompanying images. A copy of the written consent is available for review by the Editor-in-Chief of this journal.
Additional file {#Sec11}
===============
Additional file 1:**Timeline of interventions and outcomes.**
UEDVT
: Upper extremity deep vein thrombosis
TOS
: Thoracic outlet syndrome
tPA
: Tissue plasminogen activator
**Competing interests**
The authors declare that they have no competing interests.
**Authors' contributions**
KH carried out the literature review, gathered imaging and drafted the manuscript. BB participated in the design of the study and helped to draft the manuscript. HS conceived of the case report, participated in its design, and helped to draft the manuscript. All authors read and approved the final manuscript.
| {
"pile_set_name": "PubMed Central"
} |
Nafisa Shah
Nafisa Shah (; born 20 January 1968) is a Pakistani politician who has been a member of the National Assembly of Pakistan, since August 2018. Previously, she was member of the National Assembly from March 2008 to May 2018.
Early life and education
Shah was born on 20 January 1968 in Khairpur, Sindh to Qaim Ali Shah.
She has doctorate in Social and Cultural Anthropology from the University of Oxford.
Political career
Shah served as Nazim of District Khairpur from 2001 to 2007.
She was elected to the National Assembly of Pakistan on a reserved seat for women as a candidate of Pakistan Peoples Party (PPP) from Sindh in the 2008 Pakistani general election. She served as chair of the National Commission for Human Development and general secretary of the Women's Parliamentary Caucus between 2008 and 2013.
She has been vice president of the Commonwealth Parliamentary Association. She also headed the National Commission for Human Development. In 2011, she was awarded a Ph.D degree by the University of Oxford for her study on honour killing in Sindh.
She was re-elected to the National Assembly as a candidate of PPP on a seat reserved for women from Sindh in the 2013 Pakistani general election for the second time.
She was re-elected to the National Assembly as a candidate of PPP from Constituency NA-208 (Khairpur-I) in 2018 Pakistani general election. She received 107,847 votes and defeated Ghous Ali Shah.
books
Honour Unmasked: Gender Violence, Law, and Power in Pakistan – 2016
Honour and Violence: Gender, Power and Law in Southern Pakistan. 2017
References
Category:1968 births
Category:Sindhi people
Category:Pakistan Peoples Party MNAs
Category:Living people
Category:Women mayors of places in Pakistan
Category:Alumni of the University of Oxford
Category:Mayors of places in Pakistan
Category:Karachi Grammar School alumni
Category:Women members of the National Assembly of Pakistan
Category:Pakistani MNAs 2008–2013
Category:Pakistani MNAs 2013–2018
Category:Pakistani MNAs 2018–2023
Category:St Joseph's Convent School, Karachi alumni | {
"pile_set_name": "Wikipedia (en)"
} |
Q:
asyncio across multiple long lived client connections
I am trying to write a simple application that connects to multiple rudimentary TCP servers with long lived connections where I send/receive data from each connection. Basically receiving events from the server, sending commands back and receiving results from the commands. Think of controlling a device, but i want to control N devices on a single thread.
I have a working non-async, non-blocking implementation, but the time.sleep() are killing the responsiveness or killing the CPU, and using select is so much cooler.
Given the below example, i want to connect to all three servers, and await receive_message on each one simultaneously. Currently, it's blocked in the connect's receive_message(), so I only get this output:
Connecting to 1
Sending password to 1
Waiting for message from 1
I'd like to get something similar to this, not exactly, but showing that the connections are all independently scheduled.
Connecting to 1
Connecting to 2
Connecting to 3
Sending password to 1
Sending password to 2
Sending password to 3
Waiting for message from 1
Waiting for message from 2
Waiting for message from 3
Connected to 1
Connected to 2
Connected to 3
Waiting for message from 1
Waiting for message from 2
Waiting for message from 3
Watered down version of what i'm trying. No, the real server isn't this insecure.... this is just an example.
import asyncio
class Connection:
def __init__(self, name, host, port):
self.name = name
self.host = host
self.port = port
self.reader, self.writer = None, None
self.connected = False
async def connect(self):
print(f'Connecting to {self.name}')
self.reader, self.writer = await asyncio.open_connection(self.host, self.port)
await self.send_message('password')
response = await self.receive_message()
if response == 'SUCCESS':
self.connected = True
print(f'Connected to {self.name}')
else:
raise Exception('unsuccessful connection')
print(f'Connected to {self.name}')
async def send_message(self, message):
print(f'Sending {message} to {self.name}')
self.writer.write(f'{message}\n'.encode('utf-8'))
async def receive_message(self):
print(f'Waiting for message from {self.name}')
return (await self.reader.readline()).decode('utf-8')
connections = (
Connection(1, 'localhost', 21114),
Connection(2, 'localhost', 21115),
Connection(3, 'localhost', 21116)
)
async def run():
for connection in connections:
await connection.connect()
# how to receive messages from each connection as they are received
for connection in connections:
await connection.receive_message()
asyncio.run(run())
A:
The await in the for loop is effectively serializing your connections. In asyncio parallelism happens at the level of task, so if you want the connections to run in parallel, you need to spawn several tasks (or use a function that will do it for you, such as asyncio.gather). For example:
async def handle_connection(conn):
await conn.connect()
await conn.receive_message()
# ...
async def run():
tasks = []
for conn in connections:
tasks.append(asyncio.create_task(handle_connection(conn)))
# wait until all the tasks finish
await asyncio.gather(*tasks)
| {
"pile_set_name": "StackExchange"
} |
This invention relates to activating catalysts of selected Group VIII metals on alumina.
Platinum supported on alumina has long been used as an isomerization catalyst. It is broadly known to treat such materials with halogens to activate same. However, it has been found that the effectiveness of such treatments can vary widely and are not at all predictable. | {
"pile_set_name": "USPTO Backgrounds"
} |
Collection of liquid specimens for laboratory analysis in order to detect the presence of specific diseases or conditions in a patient is well known. Typically, a liquid specimen or a swab is collected and, depending on the desired assay, the appropriate component of the specimen is extracted. In cases where the desired component is cellular or subcellular, the specimens are generally centrifuged to pellet the cells. The cell pellets are optionally lysed to release a subcellular component. Alternatively, lysis may occur prior to centrifugation and the pelleted debris can be analyzed. Because centrifugation equipment is not readily portable, specimen collection, especially high-volume liquid specimen collections, have generally been limited to the clinical or laboratory setting. While swabs have been transported for years, the collection process generally requires trained technicians to assure the collection of a useful specimen and careful storage and transport of resuspended cells from the swab.
More recently, mouthwash specimens have been introduced as a method of collecting patient cell specimens for analysis. Typically, a patient is given an oral rinse or mouthwash which is expectorated into a collection container upon completion of the rinse step. The resulting mouthwash specimen contains saliva and sloughed buccal cells mixed in with the expectorated rinse. Such a mouthwash specimen can be analyzed to determine its various components or certain patient attributes.
For example, as reported in The Lancet, Vol. 340, Jul. 25, 1992, pp 214-216, a method of collecting mouthwash specimens to collect patient cells for cystic fibrosis screening has been studied in the United Kingdom. Cellmark Diagnostics has also developed a method for extraction of DNA from mouthwash specimens as part of its CF Mutation Analysis System. In the Cellmark process, once the mouthwash specimen is collected, it is centrifuged and the desired components are extracted from the pelleted cells.
The centrifugation step is normally done at the collection site. In order to perform the collection and analysis using this system, the collection of the specimen must be at a site where equipment is available for centrifugation and extraction. In addition, only a small percentage of the total specimen is required for tests. This means that since the entire specimen must be kept viable, the entire specimen must be stored until the extraction step is completed. In a typical example, only one percent of the specimen is required for an analysis. This means 99% of the storage specimen is ultimately discarded. By maintaining such a large specimen, the costs of transportation, storage and disposal of the specimen becomes critical.
While mouthwash collection has been found to be an efficient and desirable, non-invasive method of collecting cell specimens from a human patient, the transportation, storage and disposal problems have minimized its widespread acceptability. In addition, the fact that the primary cell collection steps must be performed at a central location further diminish the value of this method of collection.
In order to analyze mouthwash specimens properly, the specimens must be collected in fluid form in a sterile container, sealed and transported to the central centrifugation and extraction site. This is also true of most other collected liquid specimens of bodily fluids.
Therefore, the advantages of specimen collection are often outweighed by the disadvantages of the cumbersome, inconvenient and costly steps required in the storage preservation and transportation of the specimen to an analysis site. In order for the liquid specimen techniques to gain widespread acceptance, a need must be met to minimize the difficulty in collecting, storing and transferring the specimens obtainable from the liquid solution.
For example, U.S. Pat. No. 3,888,629, entitled: Performance of Chemical or Biological Reactions within Absorbent Matrix Pad, issued to K. D. Bagshawe on Jun. 10, 1975 shows a system for drawing a liquid specimen through a discrete matrix pad for analysis of an antigenic component. It does not, however, deal with the collection of the original specimen or with the isolation of cells for analysis. This is also true with the device shown and described in U.S. Pat. No. 4,891,134, entitled: Specimen Filtration Device, issued to J. Vcelka on Jan. 2, 1990. In both of these documents the cells are lysed to release the antigenic component of interest prior to application to the matrix filter.
While numerous examples are available for introducing a specimen to a test medium such as a matrix pad or the like, the clinical use of such systems has generally been limited because of the requirement for the entire liquid test specimen to be transported in a liquid state from the collection site to the analysis facility, thereby requiring sealed, sterile containers and shipping parcels which must be handled with great care. This is true whether the specimen is generated using invasive techniques (such as the collection of blood specimens) or in an non-invasive manner (such as urine or mouthwash specimens). Therefore, there remains a need to improve the clinical environment for the collection and transportation of liquid specimens.
The so-called "Guthrie Spot" is universally used for screening neonatal whole blood for a variety of products of errors of metabolism {R. Guthrie, Organization of a regional newborn screening laboratory, in Neonatal screening for inborn error of metabolism (ed. H. Bickel, R. Guthrie and G Hammersen), pp 259-270, Springer Verlag, Berlin 1980}. The dried blood spots are of great utilty because they facilitate the ability to ship, archive and perform multiple analyses on the same sample. More recently, the utility of such dried blood spots has been extended to tests involving DNA amplification and analysis (McCabe ERB. 1991. Utility of PCR for DNA Analysis from Dried Blood Spots on Filter Paper Blotters, in PCR Methods and Applications, Volume 1: pp 99-106). Application of the technique is limited, however, and has only been applied to analysis of blood samples. | {
"pile_set_name": "USPTO Backgrounds"
} |
In a steam reformer, under high temperatures (e.g., 400-800° C.) and in the presence of a catalyst (e.g., nickel), steam may react with a feed gas (e.g., methane) to generate a reformate (e.g., hydrogen) which may be used as fuel in a hydrogen fuel cell to generate electricity, for example. In some examples, the steam is generated in a steam boiler which is coupled to the reformer. As a size of the steam reformer is reduced due to packaging constraints, for example, a size of the steam boiler should also be reduced. | {
"pile_set_name": "USPTO Backgrounds"
} |
Intas Biopharmaceuticals
The Biologics Business Unit (BU) of Intas Pharmaceuticals Limited was formerly an independent biotechnology company and was known as Intas Biopharmaceuticals Ltd. Intas Pharmaceuticals limited is an Indian company headquartered in Ahmedabad, India. The Biologics BU is located in Moraiya, Ahmedabad and is one of the leading biosimilar product manufacturers in Asia.
The Biologics BU of Intas Pharmaceuticals has biopharmaceutical operations with R&D facility and an EU-GMP certified bio-pharmaceutical manufacturing facility.
History
Intas Biopharmaceuticals Limited was set up in 1980, by Binnish Chudgar, as an independent biotechnology division of Intas Pharmaceuticals Ltd., a mid-sized generic formulation manufacturer located in Ahmedabad, India. The BU was merged with the parent company Intas Pharmaceuticals Limited in 2013.
The company faced EU-GMP (Good Manufacturing Practice) audit in December 2006, to seek approval of clinical trial of its biosimilar Filgrastim in Europe and was certified as EU-GMP compliant in April 2007, becoming the first company in India to receive such certification for biologics facility.
Apart from EU-GMP certification, the company has approvals from MCC South Africa, Gulf Cooperation Council (GCC), Syria, Yemen, Belarus and several other national health authorities for its manufacturing facility and products.
News articles
References
External links
Intas Pharmaceuticals Ltd.
Category:Indian brands
Category:Pharmaceutical companies of India
Category:Biotechnology companies of India
Category:Pharmaceutical companies established in 2000
Category:Companies based in Ahmedabad
Category:Biotechnology companies established in 2000
Category:2000 establishments in India | {
"pile_set_name": "Wikipedia (en)"
} |
Q:
Pointer and Structure problems
I am suppose to be creating a memory map of this program for my class, but when I try to compile it, I get an error:
invalid operands to binary expression ('double *' and 'double *')
I am a student, please do not edit the code to print out memory locations, I need to write that myself.
main()
{
double testd;
int testi;
FILE *fpt;
struct frog {
double *x, y;
}frog;
struct frog turtle, *apple, tv[3];
testi = 2;
apple = &turtle;
apple->x = &testd
*(turtle).x = 7.3; //this is where im getting the error.
(*apple).y = 3.6;
turtle.y = 1.5;
for (testi = 0; testi < 3; testi++)
tv[testi].x = &(tv[(testi+1)%3].y);
*(tv[1].x) = 6.4;
}
A:
You are missing the ; at the end of the previous line.
You are not wrong to dereference *(turtle).x instead of *(turtle.x). The . operator has higher precedence than the * operator, meaning those two statements are equivalent and you don't even need parentheses: you could just do *turtle.x.
Check out this site for precedence ordering.
| {
"pile_set_name": "StackExchange"
} |
Q:
Java RMI Reference
I am trying to teach myself about Java RMI. But till now, I cannot find any particular reference book/video/site that could be able to teach me clearly about this. Sure that there is the documentation site here http://docs.oracle.com/javase/tutorial/rmi and I have tried looking at them (and still) . But i want a different tutorial that could guide me step by step on creating one simple java rmi application. So do u guys have any idea about this? thanks!
A:
Here are some of the references you may find useful for learning Java RMI.
http://www.java2all.com/1/5/22/114/Technology/RMI/RMI-Program/RMI-example
http://www.studytonight.com/java/rmi-in-java.php
| {
"pile_set_name": "StackExchange"
} |
1. Field of the Invention
The invention relates to a cooking assembly, more particularly to a cooking assembly with a safety device for preventing insertion of a plug into a socket of a tray unit when the tray unit is disconnected from a base member and for preventing undesired removal of the tray unit from a base member when the plug is inserted into the socket of the tray unit.
2. Description of the Related Art
Referring to FIG. 1, a conventional cooking assembly 11 is shown to include a base member 13, a tray unit 14 mounted detachably on the base member 13 and formed with a socket 140, a plug 12 adapted to be inserted releasably into the socket 140 for establishing electrical connection between the tray unit 14 and a power source (not shown), and a top cover 15 for covering the tray unit 14.
One disadvantage resulting from the use of the aforesaid conventional cooking assembly resides in that when the tray unit 14 is removed from the base member 13 for cleaning purposes, the user may accidentally get an electric shock during cleaning process if the plug 12 is still in the socket 140. | {
"pile_set_name": "USPTO Backgrounds"
} |
Q:
Can an Oracle 19c database dblink to an Oracle 10.2.3 database?
I have an Oracle 12.1.0.2 database that dblinks to an Oracle 10.2.0.3.0 database.
I am upgrading the Oracle 12.1.0.2 database to 19c (12.2.0.3).
Will my dblinks to the Oracle 10.2.0.3.0 database continue to work?
A:
Based on this document from Oracle Support, the answer appears to be "No". A 19c client (the owner of your DB Link) is only supported/compatible with a server version of 11.2 or greater.
Conversely, a 10.2 database can only support a client as new as 12.1, so any upgrade of your 12.1 database to any newer version will break your db link.
| {
"pile_set_name": "StackExchange"
} |
Q:
AIX process memory is increasing with malloc free calls in loop
I am running this code on AIX 6.1
while(true)
{
int a = rand(); //generate a random integer value
void* test = malloc(a*a); //allocate large chunk of memory block
usleep(3000000); //sleep for 3 sec
free(test); // release memory block
}
using MALLOCTYPE=buckets
My observation is
Resident set size(real memory) and data section size for process is continuously increasing. This is check by command ps v PID
pg sp value shown in topas for process is slowly increasing.
Can someone justify this behavior.
A:
On free, memory is not released to AIX os, but it is reserved for reuse. With MALLOCOPTIONS=disclaim, free releases memory back to AIX os and their is not increase in memory utilization. But with MALLOCOPTIONS=disclaim, CPU utilization is almost 2-3 times greater.
| {
"pile_set_name": "StackExchange"
} |
Buyer Tip: If you're the
High Bidder in an auction when it closes, don't assume you're the final High Bidder.
Someone could outbid you in the final seconds of the auction if your Max Bid isn't
high enough. You're not the high Bidder until you've been notified by email that
you are. All Auctions are conducted in Pacific Time.
Guns For Sale - -- AMT 22 MAGNUM HUNTER 3 TEN ROUND CLIPS
Up for sale is a used AMT 22 MAGNUM HUNTER. This rifle is stainless with a synthetic stock and a 20 inch barrel. It comes with three ten round magazines. The stock is in great condition, The barrel has a few light scratches in the finish I would rate the overall condition of this rifle is 90%. The scop is also included, it is a Tasco 3-9x40. If you have any questions or concerns feel free to ask and thank you for looking.
Payment and Shipping Instructions:
MUST SHIP TO A VALID FFL HOLDER
SHIPPING IS $30.00 ON RIFLES AND SHOTGUNS, AND $20.00 ON ALL HANDGUNS
PAYMENT MUST BE A CERTIFIED MONEY ORDER OR CASHIERS CHECK
ITEM MUST BE PAID FOR WITHIN 10 DAYS OF AUCTION CLOSING OR ITEM WILL BE RELISTED AND RESOLD. IF YOU CAN’T DO THAT PLEASE DON’T BID
I DO NOT CHARGE ANY EXTRA IF USING A CREDIT CARD
SHIPPING INCLUDES INSURANCE
DO TO NEW SHIPPING REGULATIONS NO CALIFORNIA SALES
CHECK OUT OUR WEB SITE TO SEE THE CUSTOM RIFLES THAT WE BUILD AND OUR GUNSMITHING SERVICES. SPEARFISHGUNSMITHING.COMPayment Methods:
Buyer Tip: Seller assumes all responsibility for listing this item. If you have any questions
regarding this item, you should contact the Seller before bidding. You can contact the seller by
clicking on the seller's nickname.
The Seller is required to give the Buyer a minimum of three days to inspect any firearm sold through
GunAuction.com. See the GunAuction.com
Terms and Conditions for details. | {
"pile_set_name": "Pile-CC"
} |
Sajid Nadiadwala de-boards Salman’s private flight
A chartered flight carrying Salman Khan"s friends and family including Arbaaz, Sohail and David Dhawan to Dubai on Thursday for his Being Human concert had to be delayed by almost an hour, as Sajid Nadiadwala suddenly fell ill.
Apparently, there was alarm and panic on-board. A doctor had to be rushed to the flight. On examining him, the doctor announced that Sajid was not fit to travel and was advised to de-board. Salman"s flight had to leave without Sajid.
News of the Housefull producer"s sudden illness spread like wildfire in the industry. After repeated attempts to contact him, Sajid finally answered the phone on Friday afternoon.
Sounding pale and weak the producer said, “It was a condition I had been trying to suppress for some time now with antibiotics. Apparently, the antibiotics turned hostile on me and I didn"t even know it. On Thursday, when I was ready to take off for Dubai with Salman, I suddenly had an acute pain in my stomach. I just couldn"t bear it."
The doctor got him off the flight and suggested a series of complicated tests. Says Sahid, “Apparently, my white blood-cell count has shot up at an alarming rate. That needs to be checked immediately. Now, I"m completely house-bound and bed-ridden for some time."
Has this sudden withdrawal from Salman"s entourage miffed the star? “Not at all!", protest Sajid. “In fact he was the most concerned and persuaded me to stay back." | {
"pile_set_name": "Pile-CC"
} |
SoButtonEvent.3coin3 man page
SoButtonEvent — The SoButtonEvent class is the base class for all button events.
The event classes which results from the user pushing buttons on some device (keyboard, mouse or spaceball) all inherit this class. The SoButtonEvent class contains methods for setting and getting the state of the button(s).
The event classes which results from the user pushing buttons on some device (keyboard, mouse or spaceball) all inherit this class. The SoButtonEvent class contains methods for setting and getting the state of the button(s). | {
"pile_set_name": "Pile-CC"
} |
Wisconsin Bridge and Iron Company
The Wisconsin Bridge and Iron Company (WB&I) is, or was, a fabricator and erector of iron and steel bridges and other large structures.
According to one source it was founded in Milwaukee, Wisconsin in 1888. According to another source, the firm was founded by three brothers in Wauwatosa, Wisconsin in 1870 as Weinhagen Brothers, Engineers, which in 1880 became known as the Wisconsin Bridge and Iron Company, and was incorporated in 1891 using that name. The 1887 Turtleville bridge was believed to be one of the earlier truss bridges constructed by the firm.
The Riemer family of Elm Grove, Wisconsin was heavily affiliated with the company until it was sold in the 1970s. A competitor to American Bridge Company, (in at least one case both firms submitted bids that matched to the penny), this firm was responsible for many bridges and other large structures in the United States Midwest and elsewhere. The Historic American Engineering Record shows at least 16 projects where WB&I were believed to be either the prime, steel or fabrication contractors.
A number of the firm's works are listed on the U.S. National Register of Historic Places (NRHP).
Selected works
Not meant as an exhaustive list, here are a few projects that WB&I is known to have participated in:
Heath M. Robinson Memorial Cut River Bridge - US-2, Michigan - 1947
Green Bay Road Bridge - Manitowoc Rapids, Wisconsin - 1887
Turtleville Iron Bridge (1887), near Beloit, Wisconsin, a Pratt truss bridge, NRHP-listed
Ashfork-Bainbridge Steel Dam- Arizona - 1898
Redridge Steel Dam - Michigan - 1901
Hauser Dam - 1907
Brownsville & Matamoros International Bridge - Texas - 1908
MacArthur Bridge - Iowa/Illinois - 1917
Ironton-Russell Bridge - Ironton, Ohio - 1922
U.S. Rt. 90 Pearl River Bridge - Mississippi / Louisiana - 1933
Jefferson Street Viaduct (1936), over Des Moines River, Ottumwa, Iowa, NRHP-listed
Hutsonville Bridge - Indiana - 1939
Aloha Stadium - Hawaii
Lincoln Center movable stage.
Shirley Railroad Bridge - Arkansas - 1908, NRHP-listed as Middle Fork of the Little Red River Bridge, Co. Rd. 125 over the Middle Fork of the Little Red River Shirley, Arkansas
Seventh Street-Black River Bridge, Seventh St. over Black R. Port Huron, Michigan, NRHP-listed
St. Francis River Bridge, US 70, over the St. Francis River Madison, Arkansas, NRHP-listed
Waverly Bridge, spans Tombigbee River between Waverly & Columbus, Mississippi, NRHP-listed
Notes
Category:Bridge companies
Category:Companies based in Milwaukee
Category:Engineering companies of the United States | {
"pile_set_name": "Wikipedia (en)"
} |
Hyundai Kona & 2019 Tucson: First Impressions
Here’s a first look at the facelifted Hyundai Tucson, as well as the brand new Kona crossover – which Hyundai has been hinting at bringing into India for some time.
Hyundai has made great strides over the years when it comes to design. Their fluidic design philosophy has truly elevated the image of the brand globally. But this isn’t a static process, it’s ongoing – as a result of which their design philosophy is evolving as well. Just take the new Hyundai Kona for instance – the latest crossover from the brand. With an edgy design, the Kona reveals a completely different side to the brand. And with the option of hybrid and electric versions, it also does a great deal to expand Hyundai’s product portfolio worldwide.
In terms of aesthetic appeal, the Kona, with its triple headlight arrangement and a large front grille, is quite attractive and instantly catches your eye. Now, I don’t usually fall for futuristic designs, but the Kona is an exception – somehow, it manages to transcend the line between futuristic and realistic. In that sense, the bold front design of the car is a definite highlight, not just for the Kona as a product but also for Hyundai as a brand, for it takes the brand into an exciting new direction in terms of styling. The balanced stance of the Kona, with wheels on each corner and the muscular body cladding, give it a confidence and appeal that’s hard to match.
The interior too is no less bold. The cabin is embellished with contrast stitching on the seats and accented colour highlights that uplift the interior . One of the aspects of the Kona that I really admire is its ride and handling, which makes the car an absolute delight to drive. With its 177bhp, 1.6-litre turbocharged petrol engine, the Kona picks up pace at an urgent rate and feels quite pleasing to drive. Also, the steering feel and response is absolutely world-class. After a long time, Hyundai has launched a product that has genuine steering feel, and in abundance – something that I really enjoyed during our brief drive to a Turkish beach town right outside Istanbul.
Tucson gets sharper The other car that we sampled was the new facelifted version of the Tucson. An SUV that I’m already a big fan of – I love the crossover ability, the refinement, as well as the lovely ride and comfortable seats. The facelifted Tucson offers more of what is already an excellent package. Design wise, the first thing you notice is that the formidable front of the Tucson has now become even more imposing. The bi-LED headlamps have also been designed very well, adding to their functionality and, thereby, improving the driving experience. In the interior, the Tucson now features a new, larger multimedia system, which like the Kona, is mounted in a way that it appears to be floating above the dashboard. All this only adds to the already luxurious air of the interior.
While we didn’t drive the exact version that Hyundai will introduce in India in the middle of 2019, the version we did drive has a lot going for it. The Tucson still remains one of the best SUVs for in India in terms of size – a great five-seater with a big boot and yet small enough to park easily in congested cities. Now, with a new eight-speed automatic gearbox making its debut on the international version, it would be exciting to see how the existing – quite powerful, yet refined and frugal – 2.0-litre turbocharged diesel engine would work with this new transmission. With this new eight-speed, the Tucson could easily turn out to be one of the best affordable SUVs to drive in India.
Now, despite the fact that the Indian automotive market is still in flux with regard to the ideal future propulsion choice (petrol, diesel, CNG or electric), Hyundai has decided to take the step of introducing the Kona EV into the Indian market. While the facelifted Tucson is expected by the middle of 2019, the Kona EV is expected to be launched in India in the second half of 2019. Suffice to say that a very stylish and usable full EV is expected very soon. | {
"pile_set_name": "Pile-CC"
} |
More Things in Heaven and Earth: Spirit Possession, Mental Disorder, and Intentionality.
Spirit possession is a common phenomenon around the world in which a non-corporeal agent is involved with a human host. This manifests in a range of maladies or in displacement of the host's agency and identity. Prompted by engagement with the phenomenon in Egypt, this paper draws connections between spirit possession and the concepts of personhood and intentionality. It employs these concepts to articulate spirit possession, while also developing the intentional stance as formulated by Daniel Dennett. It argues for an understanding of spirit possession as the spirit stance: an intentional strategy that aims at predicting and explaining behaviour by ascribing to an agent (the spirit) beliefs and desires but is only deployed once the mental states and activity of the subject (the person) fail specific normative distinctions. Applied to behaviours that are generally taken to signal mental disorder, the spirit stance preserves a peculiar form of intentionality where behaviour would otherwise be explained as a consequence of a malfunctioning physical mechanism. Centuries before the modern disciplines of psychoanalysis and phenomenological-psychopathology endeavoured to restore meaning to 'madness,' the social institution of spirit possession had been preserving the intentionality of socially deviant behaviour. | {
"pile_set_name": "PubMed Abstracts"
} |
(1) Field of the Invention
The invention relates to silicon-on-insulator (SOI) devices and, more particularly, to a method to form a SOI device having improved ESD performance.
(2) Description of the Prior Art
At present, the vast majority of integrated circuit products are formed on bulk semiconductor wafers. However, silicon-on-insulator (SOI) wafer-based products are under development as a majority technology for the future. SOI offers the advantages of improved short channel performance, improved isolation, and reduced power supply capability. However, ESD protection of SOI devices remains a significant challenge to manufacturers.
Referring now to FIG. 1, an example of a prior art SOI MOSEET is shown. The SOI substrate comprises a buried oxide layer 14, typically many microns thick, that is formed overlying a substrate 10. A silicon layer is formed overlying the buried oxide layer 14. In this case, the silicon layer has been doped to form an N+ source 26, an N+drain 22, and a P—body region 34 for a MOS transistor. A typical gate 30 is formed overlying the body region 34 between source 26 and drain 22. Shallow trench isolations (STI) 1B are formed through the silicon layer to the buried oxide layer 14 to isolate the MOS device.
The typical SOI NMOS transistor shown differs from a bulk version NMOS due to the presence of the buried oxide layer 14 underlying the MOS device. The buried oxide layer 14 provides excellent device isolation while facilitating the formation of MOS devices having improved short-channel capabilities. Note that the N+ drain 22 is coupled to an I/O pad for the integrated circuit device. Therefore, this transistor must be able to withstand ESD events due to external handling and/or external conditions. However, the presence of the buried oxide layer 14 may have detrimental effects for the ESD performance of the device.
During an ESD event, the drain 26 to body 34 junction will exhibit a reverse breakdown when the junction breakdown voltage is exceeded. Significant current will flow through the device. To prevent damage to the MOS device and to other parts of the overall integrated circuit, it is essential that the energy of the ESD pulse be dissipated. In a bulk MOS device, a part of this energy dissipation will occur in the bulk silicon material of the substrate. In the SOI, device, however, the buried oxide layer 14 blocks current flow into the bulk substrate 10. Further, the buried oxide layer 14 has a low thermal conductivity compared to silicon (about {fraction (1/10)} as large as silicon). Therefore, the buried oxide layer 14 tends to display excessive heating due to current flow. In addition, the absence of a bulk current path causes current concentration near the surface of the MOS channel where excessive energy dissipation can cause damage. Finally, the relative energy dissipation in the device is proportional to the reverse breakdown voltage of the N+ drain 22 to P—body 34 junction. It is found that the SOI MOSFET device displays a lower power-to-failure curve than a bulk-substrate MOSFET. A method of improving the ESD performance of the SOI MOS device would represent a significant step forward in the development of SOI as a majority technology.
Several prior art inventions relate to the ESD performance of SOI devices. U.S. Pat. No. 6,242,763 to Chen et al teaches a silicon-controlled rectifier (SCR) device for a SOI process. The SCR adds an N+/P+ zener diode to the prior SCR to reduce the trigger voltage. U.S. Pat. No. 6,222,710 to Yamaguchi discloses an ESD device in a SOI process where at least one MOS transistor is coupled to the external terminal by a forward bias. Another MOS transistor is also coupled to the terminal by reverse bias. U.S. Pat. No. 6,143,594 to Tsao et al describes a bulk silicon ESD protection scheme compatible with low voltage CMOS processing. U.S. Pat. No. 6,133,078 to Yun teaches a method to manufacture a bulk semiconductor device having an ESD protection region. Several impurity layers are implanted into the ESD region to improve ESD performance. U.S. Pat. No. 6,034,399 to Brady et al discloses an ESD device for use in a SOI system. The ESD device is formed in a bulk region to protect other devices formed in the SOI region. U.S. Pat. No. 5,982,003 to Hu et al teaches a SOI MOSFET having a low barrier body contact under the source region. An improvement in ESD performance of the device is cited. | {
"pile_set_name": "USPTO Backgrounds"
} |
The invention relates to means which enables a signal to be given whether electric contacts between two parts in relative rotary movement are open or closed; it is of particular use in an automobile to indicate that a limiting value has been reached by a parameter related to the behaviour of its tires in such a way as to activate a sound and/or light wavering device provided for this purpose in the interior of the said vehicle.
Devices of this type have already been proposed, particularly for detecting an abnormal drop in the pressure in a tire. In such devices a pressure contact connected to the valve of the tire being monitored is in series in the circuit of a coil which is movable with the wheel of the vehicle and thus passes at regular intervals in front of two devices mounted facing the said coil on the chassis of the vehicle, the first device inducing in the mobile coil a current which is then coupled to the second or receiving device. The position of the pressure contact changes when the pressure inside the tire reaches a predetermined minimum value, thereby bringing about the presence or absence of the current induced by the mobile coil in the receiving device. The receiving device then processes the information thus provided and translate it so that it can be used by alarm means.
Different solutions have been proposed for the receiving device. One of these solutions is the use of an oscillatory circuit whose oscillations depend upon the current induced by the mobile coil. The inconvenient aspects of such an arrangement result from the severe environment in which it is implanted. The mobile coil which should be linked to the movement of the wheel is in fact fixed either on the rim or on the moving part of the braking system; this means that the fixed devices can only be implanted on or near the fixed parts of the brakes. It will be realised that situated here the electronic circuits must be subjected to exceedingly high temperatures (which can exceed 500.degree. C) which causes them to deteriorate rapidly. Another solution therefore also uses coils for said first and second devices so as to bring only the transmitting and receiving coils close to the mobile coil; the electronic circuits to which they are connected can be in a less exposed part of the vehicle. A known device of this type comprises a mobile coil wound on the rotating part of the braking system and working in co-operation with two fixed coils, one of which is a transmitter, the other a receiver, mounted on a part of the vehicle chassis and diametrically opposed with regard to the circumference defined by the mobile coil; the diameter being great enough to prevent all disturbing interaction of the transmitting coil on the receiving coil. It will be realised that it is awkward to mount such a device, and is in fact only practisable if done originally on a new vehicle. Any necessary repairs to the coils also present difficulties. | {
"pile_set_name": "USPTO Backgrounds"
} |
1. Field of the Invention
The present invention relates to a document reader, an image forming apparatus, and an image processing method which are preferable applied to a scanner, a color digital copying machine, or a complex machine having an image area identification and adjustment function of identifying an image area and adjusting image data.
2. Description of the Prior Arts
Recently, there has been used a color image forming apparatus for forming a color image based on image data related to red (R), green (G), and blue (B) colors obtained from a colored document image or for forming a color image based on image data received from a printer controller (an external device) such as a server or a personal computer (hereinafter, referred to simply as PC). To form an optimum color image by means of this type of color image forming apparatus, it is necessary to identify a photographic image, a screened halftone image, or a character area on the basis of image data of a document and to perform image processing based on a result of the identification before the image formation.
Japanese Unexamined Patent Publication (Kokai) No. Hei09-172544 (1997) discloses an image processing apparatus for identifying a type of a target image in FIG. 2 on page 2. According to the image processing apparatus, an identification means identifies a type of an image based on image data when identifying a type of image data obtained from a document reader (scanner). The image data is processed according to a result of the image type identified by the identification means. When executing a magnification/reduction process, the processing means modifies an identification operation of the identification means. In other words, an identification parameter of the processing means is variable according to reading conditions in the document reader. This enables a precise identification of the type of the target image according to processing conditions or reading conditions of the target image.
Japanese Unexamined Patent Publication (Kokai) No. 2000-134472 discloses a digital image forming apparatus for forming an electrostatic latent image by converting document information to electric signals before developing the electrostatic latent image in FIG. 2 on page 3. The digital image forming apparatus comprises a threshold modification means, which modifies a threshold for classifying dots in the document into a character part and an image part to a character processing side or to an image processing side when setting the threshold. In other words, the setting is made with modifying the threshold for classifying dots into an image and a character. This increases sharpness of the character part and realizes a smooth and natural copy image in the screened halftone image part, which matches the document or a user's intention.
Japanese Unexamined Patent Publication (Kokai) No. Hei07-30752 (1995) discloses an image area identifying apparatus for identifying a type of an image in FIG. 2 on page 2. The image area identifying apparatus comprises a photographic image area identification means, a screened halftone image area identification means, and a character area identification means, wherein the image area identifying apparatus finds an average density for each block from image data, finds a density difference between the average density obtained for each block and an average density of adjacent blocks, and identifies a photographic image area, a screened halftone image area, and a character area on the basis of the density difference. This enables a character image area to be discriminated from a non-character image area from a mixed image area including a character image, a photographic image, and a screened halftone image.
The conventional color image forming apparatuses, however, have the following problems when identifying a photographic image, a screened halftone image, or a character image from image data of a chromatic or achromatic document and performing image processing based on a result of the identification.
(1) In the above patent publications, an image identification parameter is often set on an operating screen easy to operate for a user. When the image identification parameter is set on the operating screen, generally the operating screen is separated into two parts: an operating screen for adjusting a character image and an operating screen for adjusting a non-character image. For example, if a thick gray character with a tinge of some color need be output sharply in solid black, the operating screen separated into two parts requires an operation with visiting the character image adjustment setting screen and the non-character image adjustment setting screen alternately.(2) As stated above, unless the image identification parameter is appropriate according to the document, it is necessary to repeat color adjustment while opening two adjustment setting screens and visiting the screens alternately. Furthermore, inconveniently a user cannot be informed of their adjustment amounts at a time. Therefore, there is the possibility that it becomes hard to predict an output after color adjustment or that it takes a lot of time for color adjustment, thereby deteriorating the operationality at the color adjustment. | {
"pile_set_name": "USPTO Backgrounds"
} |
Sleep Studies
Sleep studies
Sleep deprivation has a measurable negative effect on performance, and
physical and mental health. Symptoms include sleeping poorly, snoring,
waking up tired, falling asleep during the day and waking up with
headaches, resulting in reduced energy, difficulty concentrating, mood
changes and a greater risk for accidents. Adult symptoms differ from those
of children and symptoms may often mimic other conditions. Proper
diagnosis is a necessary first step to assure that all symptoms are treated
properly. There are 84 classified sleep disorders that can affect the
quality of sleep. Some of these include sleep apnea, narcolepsy,
chronic insomnia, restless leg syndrome, periodic limb movement disorder and
circadian rhythm disturbances.
Washington County Hospital is equipped
with state of the art equipment to perform detailed sleep studies that
help the physician determine the nature and cause of sleep disorders.
Sleep studies are scheduled to coordinate with the patientís normal
bedtime schedule. Tests begin in the evening and night, so that patients
can avoid taking time off from work. Sleep studies are covered under
most medical insurance plans. Deductibles and percentages of coverage
vary for each policy. Sleep studies require a referral from a
physician and can be scheduled by calling 1-888-38SLEEP | {
"pile_set_name": "Pile-CC"
} |
Combating of scorpion bite with Pakistani medicinal plants having ethno-botanical evidences as antidote.
Although the majority of serious cases in the world are concerned with snake bite envenomation, but those which are caused by scorpion stings are also famous for causing extreme pain. The present view is an attempt to enlist scientifically ignored medicinal plants of Pakistan exhibiting anti-scorpion venom activity. In this review data of 35 medicinal plants is collected with their families, parts used, distribution in Pakistan, and major constituents present in plant. Amaranthaceae, Astraceae and Euphorbiaceae represent 3 species. Anacardiaceae, Asclepidaceae and Liliaceae represent 2 species. Araceae, Capparidaceae, Ceasalpinaceae, Cyperaceae, Labiatae, Lamiaceae, Meliaceae, Menispermaceae, Oleaceae, Oxalidaceae, Pinaceae, Polygonaceae, Rhamnaceae, Rubiaceae, Solanaceae, Valerianaceae and Zingiberaceae represented single medicinal plant with anti scorpion potential. According to literature, all parts are used in anti scorpion envenomination. Leaves exhibit 30%, whole plant 9%, fruit, bark and seeds 8% anti scorpion activity. Bulb and stems show 5% contribution in this respect and twigs, resins, inflorescence, latex and flowers express 3% potential. This article may assist the researchers to bring innovation in natural product field for scorpion bite envenomation. However, these medicinal plants are still requiring pharmacological and phytochemical investigation in order to be claimed as effective in scorpion bite envenomation. | {
"pile_set_name": "PubMed Abstracts"
} |
//===----------------------------------------------------------------------===//
//
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
// See https://llvm.org/LICENSE.txt for license information.
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
//
//===----------------------------------------------------------------------===//
// <forward_list>
// forward_list()
// noexcept(is_nothrow_default_constructible<allocator_type>::value);
// This tests a conforming extension
// UNSUPPORTED: c++98, c++03
#include <forward_list>
#include <cassert>
#include "test_macros.h"
#include "MoveOnly.h"
#include "test_allocator.h"
template <class T>
struct some_alloc
{
typedef T value_type;
some_alloc(const some_alloc&);
};
int main(int, char**)
{
#if defined(_LIBCPP_VERSION)
{
typedef std::forward_list<MoveOnly> C;
static_assert(std::is_nothrow_default_constructible<C>::value, "");
}
{
typedef std::forward_list<MoveOnly, test_allocator<MoveOnly>> C;
static_assert(std::is_nothrow_default_constructible<C>::value, "");
}
#endif // _LIBCPP_VERSION
{
typedef std::forward_list<MoveOnly, other_allocator<MoveOnly>> C;
static_assert(!std::is_nothrow_default_constructible<C>::value, "");
}
{
typedef std::forward_list<MoveOnly, some_alloc<MoveOnly>> C;
static_assert(!std::is_nothrow_default_constructible<C>::value, "");
}
return 0;
}
| {
"pile_set_name": "Github"
} |
/** @file
Register names for PCH Serial IO Controllers
Copyright (c) 2018 - 2019, Intel Corporation. All rights reserved.<BR>
SPDX-License-Identifier: BSD-2-Clause-Patent
**/
#ifndef _PCH_REGS_SERIAL_IO_
#define _PCH_REGS_SERIAL_IO_
#define R_SERIAL_IO_CFG_BAR0_LOW 0x10
#define R_SERIAL_IO_CFG_BAR0_HIGH 0x14
#define R_SERIAL_IO_CFG_BAR1_LOW 0x18
#define R_SERIAL_IO_CFG_BAR1_HIGH 0x1C
#define R_SERIAL_IO_CFG_PME_CTRL_STS 0x84
#define R_SERIAL_IO_CFG_D0I3MAXDEVPG 0xA0
#define R_SERIAL_IO_MEM_PPR_CLK 0x200
#define B_SERIAL_IO_MEM_PPR_CLK_EN BIT0
#define B_SERIAL_IO_MEM_PPR_CLK_UPDATE BIT31
#define V_SERIAL_IO_MEM_PPR_CLK_M_DIV 0x30
#define V_SERIAL_IO_MEM_PPR_CLK_N_DIV 0xC35
#define R_SERIAL_IO_MEM_PPR_RESETS 0x204
#define B_SERIAL_IO_MEM_PPR_RESETS_FUNC BIT0
#define B_SERIAL_IO_MEM_PPR_RESETS_APB BIT1
#define B_SERIAL_IO_MEM_PPR_RESETS_IDMA BIT2
#endif
| {
"pile_set_name": "Github"
} |
Experts in the field of celebration
MetLife Stadium is the nation's preeminent destination for sports and entertainment. Not only is it the home of the New York Jets and the New York Giants, but it can also serve as the home of your next private event! From our dedicated event specialists, to our Executive Chef, your event will receive the attention and service that only a world class facility can provide.
From the fireside lounges to a rustic wine bar to crossing the same goal line as your NFL Idols, MetLife Stadium is the perfect venue to impress at your next special event. Just minutes from New York City, come see for yourself what puts MetLife Stadium in a field of its own. | {
"pile_set_name": "Pile-CC"
} |
Monteneuf
Monteneuf () is a commune in the Morbihan department of Brittany in north-western France.
Demographics
Inhabitants of Monteneuf are called in French Monténeuviens.
See also
Communes of the Morbihan department
References
Mayors of Morbihan Association
INSEE commune file
External links
French Ministry of Culture list for Monteneuf
Map of Monteneuf on Michelin
Category:Communes of Morbihan | {
"pile_set_name": "Wikipedia (en)"
} |
/*
* Copyright (C) 2016 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.google.android.exoplayer2.util;
/**
* Wraps a byte array, providing methods that allow it to be read as a NAL unit bitstream.
* <p>
* Whenever the byte sequence [0, 0, 3] appears in the wrapped byte array, it is treated as [0, 0]
* for all reading/skipping operations, which makes the bitstream appear to be unescaped.
*/
public final class ParsableNalUnitBitArray {
private byte[] data;
private int byteLimit;
// The byte offset is never equal to the offset of the 3rd byte in a subsequence [0, 0, 3].
private int byteOffset;
private int bitOffset;
/**
* @param data The data to wrap.
* @param offset The byte offset in {@code data} to start reading from.
* @param limit The byte offset of the end of the bitstream in {@code data}.
*/
@SuppressWarnings({"initialization.fields.uninitialized", "method.invocation.invalid"})
public ParsableNalUnitBitArray(byte[] data, int offset, int limit) {
reset(data, offset, limit);
}
/**
* Resets the wrapped data, limit and offset.
*
* @param data The data to wrap.
* @param offset The byte offset in {@code data} to start reading from.
* @param limit The byte offset of the end of the bitstream in {@code data}.
*/
public void reset(byte[] data, int offset, int limit) {
this.data = data;
byteOffset = offset;
byteLimit = limit;
bitOffset = 0;
assertValidOffset();
}
/**
* Skips a single bit.
*/
public void skipBit() {
if (++bitOffset == 8) {
bitOffset = 0;
byteOffset += shouldSkipByte(byteOffset + 1) ? 2 : 1;
}
assertValidOffset();
}
/**
* Skips bits and moves current reading position forward.
*
* @param numBits The number of bits to skip.
*/
public void skipBits(int numBits) {
int oldByteOffset = byteOffset;
int numBytes = numBits / 8;
byteOffset += numBytes;
bitOffset += numBits - (numBytes * 8);
if (bitOffset > 7) {
byteOffset++;
bitOffset -= 8;
}
for (int i = oldByteOffset + 1; i <= byteOffset; i++) {
if (shouldSkipByte(i)) {
// Skip the byte and move forward to check three bytes ahead.
byteOffset++;
i += 2;
}
}
assertValidOffset();
}
/**
* Returns whether it's possible to read {@code n} bits starting from the current offset. The
* offset is not modified.
*
* @param numBits The number of bits.
* @return Whether it is possible to read {@code n} bits.
*/
public boolean canReadBits(int numBits) {
int oldByteOffset = byteOffset;
int numBytes = numBits / 8;
int newByteOffset = byteOffset + numBytes;
int newBitOffset = bitOffset + numBits - (numBytes * 8);
if (newBitOffset > 7) {
newByteOffset++;
newBitOffset -= 8;
}
for (int i = oldByteOffset + 1; i <= newByteOffset && newByteOffset < byteLimit; i++) {
if (shouldSkipByte(i)) {
// Skip the byte and move forward to check three bytes ahead.
newByteOffset++;
i += 2;
}
}
return newByteOffset < byteLimit || (newByteOffset == byteLimit && newBitOffset == 0);
}
/**
* Reads a single bit.
*
* @return Whether the bit is set.
*/
public boolean readBit() {
boolean returnValue = (data[byteOffset] & (0x80 >> bitOffset)) != 0;
skipBit();
return returnValue;
}
/**
* Reads up to 32 bits.
*
* @param numBits The number of bits to read.
* @return An integer whose bottom n bits hold the read data.
*/
public int readBits(int numBits) {
int returnValue = 0;
bitOffset += numBits;
while (bitOffset > 8) {
bitOffset -= 8;
returnValue |= (data[byteOffset] & 0xFF) << bitOffset;
byteOffset += shouldSkipByte(byteOffset + 1) ? 2 : 1;
}
returnValue |= (data[byteOffset] & 0xFF) >> (8 - bitOffset);
returnValue &= 0xFFFFFFFF >>> (32 - numBits);
if (bitOffset == 8) {
bitOffset = 0;
byteOffset += shouldSkipByte(byteOffset + 1) ? 2 : 1;
}
assertValidOffset();
return returnValue;
}
/**
* Returns whether it is possible to read an Exp-Golomb-coded integer starting from the current
* offset. The offset is not modified.
*
* @return Whether it is possible to read an Exp-Golomb-coded integer.
*/
public boolean canReadExpGolombCodedNum() {
int initialByteOffset = byteOffset;
int initialBitOffset = bitOffset;
int leadingZeros = 0;
while (byteOffset < byteLimit && !readBit()) {
leadingZeros++;
}
boolean hitLimit = byteOffset == byteLimit;
byteOffset = initialByteOffset;
bitOffset = initialBitOffset;
return !hitLimit && canReadBits(leadingZeros * 2 + 1);
}
/**
* Reads an unsigned Exp-Golomb-coded format integer.
*
* @return The value of the parsed Exp-Golomb-coded integer.
*/
public int readUnsignedExpGolombCodedInt() {
return readExpGolombCodeNum();
}
/**
* Reads an signed Exp-Golomb-coded format integer.
*
* @return The value of the parsed Exp-Golomb-coded integer.
*/
public int readSignedExpGolombCodedInt() {
int codeNum = readExpGolombCodeNum();
return ((codeNum % 2) == 0 ? -1 : 1) * ((codeNum + 1) / 2);
}
private int readExpGolombCodeNum() {
int leadingZeros = 0;
while (!readBit()) {
leadingZeros++;
}
return (1 << leadingZeros) - 1 + (leadingZeros > 0 ? readBits(leadingZeros) : 0);
}
private boolean shouldSkipByte(int offset) {
return 2 <= offset && offset < byteLimit && data[offset] == (byte) 0x03
&& data[offset - 2] == (byte) 0x00 && data[offset - 1] == (byte) 0x00;
}
private void assertValidOffset() {
// It is fine for position to be at the end of the array, but no further.
Assertions.checkState(byteOffset >= 0
&& (byteOffset < byteLimit || (byteOffset == byteLimit && bitOffset == 0)));
}
}
| {
"pile_set_name": "Github"
} |
Introduction
============
Social and Scientific Contexts
------------------------------
Web 2.0 and, particularly, social networks (Facebook, Google+, and LinkedIn), interconnect billions of users and manage terabytes of dynamic data flow \[[@ref1]\]. They are at the forefront of the interactions and cooperation between humans and big data, and as such, they have established or popularized new conventions. A central concept in these innovations is the notion of an agent, representing an autonomous and active network member with various prerogatives. Notably, an agent can (1) add new information, via micro-blogging for example; (2) spread information through the network via sharing \[[@ref2]\]; (3) evaluate information with like, dislike, or vote reactions; (4) partition information using privacy settings; or (5) annotate information with comments. Agents play an active role in the evolution of the network structure by creating nodes (agent profile pages) and bidirectional (friendship) or unidirectional (follower) links between agents. They also partition agents into groups and connect agents to unstructured information (tagging). These actions are processed by specialized tools embedded in the network to create valuable feedback in the form of filtered and personalized information such as friendship suggestions, affinity scores between people, news feeds, targeted advertisements \[[@ref3]\], merchandise suggestions \[[@ref4]\], or real-time world observations \[[@ref5]\].
The field of biology is evolving and adapting at a tremendous rate in response to the widespread use of high throughput methods and the rise of personal genomics \[[@ref6]\]. For the end user of biological data, the paradigm shift initiated by the emergence of this big data \[[@ref7]\] has led to important changes in the research landscape \[[@ref8]\]. To keep up with the huge volumes of data and information, users need to easily and intuitively access, communicate, and network with useful information of personal interest. Therefore, data storage platforms and workflow infrastructures must evolve to integrate Web 2.0 and social network conventions.
Bioinformatics in the Web 2.0 Era
---------------------------------
In this context, several major bioinformatics resources have introduced tools for personalized data flow management. The Online Mendelian Inheritance in Man (OMIM) \[[@ref9]\] resource now proposes MIMmatch \[[@ref10]\], a service allowing users to receive email notifications when entries for their favorite genes or diseases have changed. MyNCBI \[[@ref11]\] retains user preferences to provide customized services for NCBI databases, whereas the Uniprot \[[@ref12]\] website has been updated to allow users to select only categories of information they are interested in, to mask large-scale publications, and to use a basket to store proteins of interest. Similar efforts toward more efficient and personalized information management are also emerging in the exploitation of the increasing publication flow. Bibsonomy \[[@ref13]\] allows a researcher to collect and manage publications and collaborate with colleagues, whereas PubChase and ReadCube recommend new publications depending on the content of an existing library. BioTextQuest+ \[[@ref14]\] provides an interactive exploration platform for PubMed \[[@ref15]\] and OMIM, and facilitates knowledge extraction by document clustering and bioentity recognition. GoPubMed \[[@ref16]\] proposes pertinent publication searches by using background knowledge in the form of ontologies (gene ontology \[GO\], Medical Subject Headings \[MeSH\], etc) that take into account the user's keywords, but also synonyms and child concepts, whereas DeepQA4PA \[[@ref17]\] returns GO concepts associated with publications related to a specific question. After identifying a gene or list of genes of interest, GeneMania \[[@ref18]\] and GenesLikeMe \[[@ref19]\] identify and score related genes that may also interest the user based on ontologies, disorders, compounds, phenotypes, expression levels, domains, sequences, and other data.
Important efforts have also been devoted to contextualizing entities by connecting them to their network. For instance, FACTA+ \[[@ref20]\], Pubtator \[[@ref21]\], or PAML-IST \[[@ref22]\] return publications and their links to various biological entities such as compounds, drugs, enzymes, genes, diseases, symptoms, mutations, species, and others. EuropePMC \[[@ref23]\] adds connections to GO and experimental factor ontology (EFO), and iHOP \[[@ref24]\] highlights the most recent publications linked to a protein. Interaction with this complex data has been facilitated by the progressive democratization of visualization techniques. For instance, Javascript libraries like BioJS \[[@ref25]\] provide reusable components for visualization of biological information (3D structures, phylogenetic trees, proteomes, pathways, and multiple sequence alignments), contributed by users and stored in a registry. Visualization techniques facilitate understanding of information updates, clarify links between entities and groups of entities, and highlight metadata information such as data sources, confidence estimates, and so on. For example, the ExAC browser \[[@ref26]\] provides clear visualization of variations in a gene, the Semantic Body Browser \[[@ref27]\] shows gene expression in a human and a mouse with a heat map on a schematized body, and NetGestalt \[[@ref28]\] introduces 1-dimensional visualization of network modules to facilitate network comparisons.
Conversely, other tools aim to extract relationships between entities. For example, Chilibot \[[@ref29]\] searches interaction (stimulation, inhibition, etc) or parallel (studied together, coexistence, homology, etc) relationships between user-submitted genes or proteins. EvexDB \[[@ref30]\] extracts specific events: regulatory control, coregulation, or binding to a given gene.
Finally, some bioinformatics resources have introduced specific collaborative and social components, with wiki-inspired approaches like Proteopedia \[[@ref31]\] or WikiGene \[[@ref32]\], collaborative sequence annotations such as WebApollo \[[@ref33]\], or voting for medical relevance and scientific evidence of variations with GeneTalk \[[@ref34]\]. Recent initiatives such as Coremine or MAGI \[[@ref35]\] combine these trends. Coremine allows exploration of various biomedical concepts and connections between them, addition of private or public comments, alerts on new articles or connections, and bookmarking. MAGI combines public and private cancer genomics datasets with sharing and collaborative annotation features as well as with interactive visualizations of variants, gene expression, and protein-protein interactions.
MyGeneFriends
-------------
Building on these advances, we have developed MyGeneFriends, a Web platform inspired by social networks, to redefine and enhance the relationship between humans and biological big data. By leveraging and combining conventions and practices arising from popular social networks, it provides more intuitive interactions with biological data and simplifies access to complex information by organizing it around three agents: genetic diseases, genes, and humans. This allows MyGeneFriends to be used not only by researchers and clinicians but also by the public, including empowered patients.
We focused on human genetic diseases (closely connected to genes and human users), as they represent major clinical challenges and provide a simplified context to shed light on major common diseases. MyGeneFriends allows retrieval, management, contextualization, and annotation of information related to genes (expression, localization, and so on), genetic diseases (phenotypes, variations, and so on), and humans (interests, publications, and so on). The platform leverages user behavior and networking to personalize data visualization and the flood of information for each human user's needs, and allows project-oriented collaborations. Publication and friendship suggestions facilitate the identification of new relevant genes and diseases. Finally, we capitalize on the global social network to extract additional knowledge. MyGeneFriends was used during its development by members of our laboratory that provided continuous feedback. Additional feedback was collected from clinicians and researchers of the Medical Genetics Laboratory of Strasbourg and from colleagues from other laboratories that was particularly useful for improving the visualization of variations linked to a disease.
The aim of this paper was to introduce readers to MyGeneFriends and describe how practices from social networks can be applied to improve access to biological data.
Methods
=======
Platform Architecture
---------------------
The MyGeneFriends platform integrates multiple services ([Multimedia Appendix 1](#app1){ref-type="supplementary-material"}) to extract and integrate large amounts of heterogeneous data. The data are stored and managed in a Postgres database, with a backup copy produced daily and stored on an external server. Elasticsearch \[[@ref36]\] is used for powerful, complex, and fast plain text queries of publications and is synchronized daily with the MyGeneFriends database. The website is based on a stateless framework (Play framework) that includes many useful features such as error handling, build-in support for Json, WebServices, WebSockets, CoffeeScript, EBean object-relational mapper (ORM), localization, logging, and WebJars. The Play framework ensures easy horizontal scaling and scalability for increasing website traffic.
To execute local scripts and programs, a Web service has been developed using the Flask framework, which is called by MyGeneFriends using REST requests to run analysis or integration tasks. Data integration scripts are written in python, using peewee as the ORM.
Data Sources
------------
Gene-related data including gene symbol, short description, type, and protein sequence are mainly obtained from the Ensembl \[[@ref37]\] database. UCSC provides simple access to RefSeq \[[@ref38]\] annotations for transcripts. To map gene identifiers between Ensembl and NCBI, we combine mappings performed by Ensembl and NCBI, together with gene symbol mapping, and extract one-to-one relationships. Gene expression data are obtained from the Human Genome Atlas microarray data \[[@ref39]\] available in the gene expression omnibus (GEO) \[[@ref40]\] database and validated using in-house statistical methods. In addition, relative signal intensities are calculated for heat map visualization using log signal intensities normalized in the range (0-1). Cellular localization of gene products is based on cellular component terms from GO \[[@ref41]\]. Phylogenetic distributions for human genes and 100 eukaryotic species are retrieved from the OrthoInspector database \[[@ref42]\] and used to categorize genes according to their evolutionary profile.
The relationships between genes and publications are defined using the gene2pubmed file from the NCBI. Publication abstracts are downloaded from Pubmed and integrated in the MyGeneFriends database. The python natural language toolkit (NLTK) \[[@ref43]\] library is used to extract keywords from textual data linked to genes and diseases. It tokenizes the text into phrases and words, stems words in order to retrieve a canonical form, and filters words on the basis of the NCBI list of stop words (words that occur frequently in texts but are not informative) and in-house filters for word size, numbers, and special characters. Then, we take advantage of the gensim \[[@ref44]\] library to calculate the Inverse Document Frequency (IDF) of the keywords and the TF\*IDF (Term Frequency \* Inverse Document Frequency). The IDF is used as a specificity score, and the TF\*IDF is used to weight the relationship between a keyword and a gene or disease.
The main disease-related data are obtained from OMIM and Orphanet. In order to take into account differences in disease definitions from different data sources and propose a unified view of the current disease knowledge, an integration process was developed with two simple rules ([Multimedia Appendix 2](#app2){ref-type="supplementary-material"}). After integration, diseases are linked to phenotypes using human phenotype ontology (HPO) \[[@ref45]\] data files (hp.obo and phenotype_annotations.tab) containing phenotypes and phenotype-disease relationships. Variations and variation-disease relationships are extracted from the curated set provided by ClinVar \[[@ref46]\] in the variant call format (VCF) file (limited to records with an rs\# identifier). Each line is parsed and a variant entry is integrated into MyGeneFriends as a couple of genomic position and allele, allowing precise definition of the relationships between diseases and mutations. Variant effect predictor (VEP) \[[@ref47]\] is used to link variations retrieved from ClinVar to Ensembl transcripts and to estimate their effect. The effects are then automatically classified into more general categories using the sequence ontology \[[@ref48]\] data.
Data Flow Management
--------------------
The data flow management involves the integration of data from diverse sources (databases, FTP servers, and local files) into the MyGeneFriends database. After cleaning and parsing mined data, additional analyses are automatically processed, such as keyword extraction from biological text or generation of links between variants and transcripts (mentioned previously). Then, MyGeneFriends compares remote and local data to generate news events. One or more fields from each item is used as a unique identifier. If a remote item has an identifier (one or several selected fields from an item) that is absent from the local database, it is considered to be a "new" event. If a local item has an identifier that is not present in the remote source, it is considered to be a "delete" event. If the identifier is present in both remote and local sources, the items are compared field by field to generate "update" events. Once these events are generated, the local database is synchronized with the remote source.
Finally, the way the news item is presented to the user depends on the biological context of the considered element. When an agent is linked to a publication that is not available in the MyGeneFriends database, the publication is downloaded and made accessible directly from the news panel. When a sequence is updated, a sequence alignment is generated using ClustalW \[[@ref49]\]. When a textual information changes, such as the description of a disease, the google-diff \[[@ref50]\] python library is used to compare both versions of the text and highlight the differences.
Data Display as Word Clouds
---------------------------
Word cloud representations are used in the visualization panel of an agent to display the cellular localization of the protein encoded by a gene and the phenotypes associated with a disease. Specific terms are considered as more informative and emphasized in the word cloud. The specificity of a term (cellular component in GO and phenotype in HPO) describing an agent is estimated using the information content (IC) metric \[[@ref51]\]. The IC is defined as the negative natural logarithm of the probability of a term t:
IC (t)=−logP (t),
where P (t) is based on the frequency of the term in the considered ontology.
The specificity is then defined as the IC normalized in the range (0-1), where 0 corresponds to the minimal font size and 1 to the maximal font size during word cloud rendering.
Friendships
-----------
The MyGeneFriends network is based on friendships between agents. Human friendships are defined by users, whereas gene-gene, disease-disease, and gene-disease links are automatically built from external sources (search tool for recurring instances of neighboring genes, STRING \[[@ref52]\]; and HPO) or inferred from the MyGeneFriends network (Error: Reference source not found). STRING global scores (higher than 0.7, corresponding to "high confidence" in STRING) are used as a metric of friendship between genes based on protein-protein interaction data. Causative genes mined by HPO from OMIM and Orphanet are exploited to link genes and diseases.
In addition to these external sources, MyGeneFriends establish links based on common properties. Diseases sharing phenotypes are related to each other with a score defined as the sum of specificity scores of phenotypes common to both diseases, divided by the sum of specificity scores of all phenotypes related to both diseases. Similarly, genes sharing GO \[[@ref41]\] terms are connected according to two different metrics. The first metric ("GO simple") is based on the number of shared GO terms between 2 genes, whereas the second corresponds to the functional semantic similarity (FSS) \[[@ref51]\]. Genes and diseases related to the same variant(s) are also linked. Moreover, genes are evolutionarily linked when applicable, on the basis of the Jaccard distance calculated between in-house phylogenetic profiles produced by OrthoInspector \[[@ref42]\].
Finally, nonhuman agents can become friends based on social connections emerging from the network itself: genes sharing human or disease friends are connected, as well as diseases with common human or gene friends.
Suggestions and Affinity Score
------------------------------
To suggest new gene or disease friends or new publications to a user, MyGeneFriends relies on the content of the user's active Topic. For friendship suggestions, each nonhuman agent from MyGeneFriends (a~c~) is scored relative to the user's active Topic and the top 10 candidates are suggested as new friends. The score of an agent (gene or disease) given a Topic is the sum of scores (S) between this agent and all agents of the same type in the active Topic (a~t~):
score(a~c~) = Ʃ^N^~t=0~ S(a~t~, a~c~)To score genes, we use the global STRING score, whereas the score between two diseases d1 and d2 is calculated using the Information Content (IC) of the related phenotypes (P) as:
Score(d1, d2) = (Ʃ *IC* (*P* ∈d1∩d2))/ (Ʃ *IC* (*P* ∈d1∪d2))
In addition, we provide an affinity score (a~aff~) reflecting the proximity between an agent and the content of the user Topic and thus, the relevance of befriending this agent. It is displayed on the gene and disease profile pages when the agent can be related to the content of the Topic. The affinity score is defined as:
a~aff~ = a~c~ /max ac X 100
To suggest pertinent publications, MyGeneFriends uses keywords associated with the active Topic. These keywords have been either added manually by the user or automatically inferred (see formula below). The keywords are weighted and used to query the Elasticsearch server to retrieve pertinent publications. For Elasticsearch, weights between 0 and 1 reduce the relevance of a term, and weights higher than 1 increase it. Therefore, the weight for each keyword given the content of the Topic (k~t~) is defined as:
weight(k~t~) = 1 + Ʃ^N^~t=0~ ka~t~ + k~h~,
where ka~t~ is the score describing the relationship between the keyword and an agent from the Topic, and k~h~ is a factor applied if the user has explicitly added this keyword to the Topic.
Results
=======
Overview of the Platform
------------------------
MyGeneFriends is a new social network leveraging conventions from Web 2.0 and interconnecting three kinds of autonomous and active agents: human genes, humans, and genetic diseases. All genetic disorders including malformations, groups of phenotypes, etc are included in the network, as well as all types of human genes (coding and noncoding) in agreement with the growing evidence concerning the importance of noncoding genes in biological processes and diseases \[[@ref53]-[@ref55]\].
All agent-related data is accessible via standardized profile pages. Daily data mining and integration processes have been developed to maintain the "nonhuman" agents (more than 63,000 human genes and 14,000 genetic diseases) up to date and generate a news flow (more than 1 million news items were created in the last year) by exploiting public (Ensembl \[[@ref37]\], NCBI, Uniprot \[[@ref12]\], HPO \[[@ref45]\], OMIM \[[@ref10]\], Orphanet \[[@ref56]\], OrthoInspector \[[@ref42]\], etc) and in-house data resources. All data retrieved or processed by MyGeneFriends and related to genes and diseases are "public," whereas data submitted by humans are "private" (visible only by the owner) by default, unless the human decides to make it "protected" (visible by owner and selected collaborators) or "public" (visible to anyone).
The MyGeneFriends network arises from several millions of connections (called "friendships") between agents, resulting from automated dynamic data mining processes combined with human actions ([Figure 1](#figure1){ref-type="fig"}). Assessment of gene-gene, gene-disease, and disease-disease connections (nonhuman friendships) are based on automated mining of bibliographic, evolutionary, functional, phenotypic, or social data. Human friendships with genes, diseases, and other humans are defined by the user through gene targeting, definition of research interests (Topics), or user targeting (groups). Human friendships with genes or diseases can be private, protected, or public, although they are public by default to encourage networking. This data privacy management \[[@ref57]\] is crucial to keep essential data private, while being open enough to "attract" new information and collaborators.
By exploiting human actions, MyGeneFriends can automatically (1) personalize information and visualization by highlighting and filtering pertinent data, (2) suggest new publications and friends (gene or disease), and (3) provide subnetworks for collaborations on defined research interests.
Agent Profiles
--------------
Each agent in MyGeneFriends has a profile ([Figure 2](#figure2){ref-type="fig"}) that provides a unified architecture and organization to ensure intuitive navigation through the network and access to relevant and personalized information about agents. These profiles contain 4 major sections: "header," "basic information," "friends," and "news."
![Ontology of friendships between agents in MyGeneFriends. Agents are linked by numerous friendships (corresponding to green boxes) of different kinds (blue boxes). First, we separate decision-driven friendships (agent actions) from naturally occurring friendships (mined). Then, we split natural friendships into those due to direct contact between agents, and those influenced by an external factor. This external factor mimics the human tendency of befriending people with the same interests (represented here as phenotypes, annotations, variants, and phylogenetic distributions) or common friends (genes, humans, and diseases).](jmir_v19i6e212_fig1){#figure1}
![Representative profile page of a MyGeneFriends agent (here the gene BBS4). Four distinct sections are shown. The "header" section briefly introduces the agent, displays a list of synonyms, and allows friendship management. It shows the affinity score (here 96%) estimating how interesting this agent could be for the user. The "basic Information" section shows more detailed information about the agent: a description, different visualizations describing the agent, links to external sources, and a personal annotation from the user. The "friends" section allows navigation through the "friends of friends" network by displaying public friends of the agent, grouped according to their type. Finally, the "news" section displays all the news related to the agent.](jmir_v19i6e212_fig2){#figure2}
The top agent-related keywords are displayed in the header to briefly introduce the agent, whereas the summary in the "basic information" section provides a more detailed description. Humans can expand the official description of a nonhuman agent by adding personal annotations or unpublished results that can then be accessed at any time and shared with collaborators ([Figure 2](#figure2){ref-type="fig"}). Exploration panels give access to the most important information using visualization techniques (see [Figure 3](#figure3){ref-type="fig"}) to highlight specific information for genes and diseases as described below. The "friends" section of the profile displays links to public friends (genes, diseases, or humans) of the agent, allowing further networking with potentially interesting agents. Finally, the news feed is an intuitive way to track changes in information related to an agent.
To personalize the profile view, the keywords inferred to be important for the viewer are highlighted in the agent description. For example, if the user is friends with cilia-related genes, the word cilium is highlighted in the description of the other agents (human, gene, or disease). Moreover, if a nonhuman agent is related to the user's current collaborators, an affinity score is shown, inviting the user to befriend this agent. If the agent already collaborates with the user, the score reflects how close it is to other collaborators.
![MyGeneFriends uses various visualization techniques to optimize the display of biological information: (1) word clouds highlight the most specific ontology terms, (2) barcodes offer a synaptic and interactive view of the density of variations related to regions of a gene or effect on a protein, (3) highlighting words in text identifies the most pertinent paragraphs for a given human user, (4) networks of friends help to understand the connections between agents and identify groups of highly connected agents, (5) colors highlight modifications in textual information related to agents, (6) timelines show the evolution of the popularity of gene collaborators in a Topic, (7) pairwise alignments identify the differences between two versions of protein sequences, and (8) heat maps on schemas of the human body, brain, and fetus allow easy analysis of the expression pattern of a given gene.](jmir_v19i6e212_fig3){#figure3}
Gene Profile
------------
Gene profiles use RefSeq summaries to describe agents and connect these agents to external resources via links to Ensembl, GeneCards, NCBI, and neXtprot websites.
Exploration panels display the most important aspects of the gene. The first panel presents gene transcripts with their properties: sequence, type (protein coding, miRNA, etc), reliability (known, putative, and novel), and corresponding protein sequence, if any. The second panel shows the subcellular localization(s) of the encoded proteins, defined by the GO cellular component ontology, as a word cloud ([Figure 3](#figure3){ref-type="fig"}). The third panel shows the gene expression for protein coding genes as a heat map in more than 40 tissues, through an interactive schematic view of the human body (male and female), brain, and foetus ([Figure 3](#figure3){ref-type="fig"}). Pan and zoom capabilities (jquery.panzoom.js) allow users to navigate through the schematic view and visualize even the smallest tissues. Additional information such as tissue description and probe set signal intensities are available. In addition to the visualization of gene expression, the "Expression filter" tool allows users to find genes of interest based on their expression or absence of expression in a defined set of tissues. Publications associated with the gene are displayed with their abstract and can be liked, disliked, or marked as valuable. The number of all genes related to the publication, as well as the count of likes and dislikes, help to estimate the relevance of the publication for the considered gene. Moreover, genes related to a publication can be visualized as an interactive graph, allowing further networking and identification of additional genes of interest.
Genetic Disease Profile
-----------------------
Diseases are extracted from the OMIM (all entries except explicit genes) and Orphanet (all entries, including groups of phenotypes) databases. The preference of exhaustivity over specificity is motivated by the inherent difficulty in defining a disease. We use expert created links between Orphanet and OMIM entries (displayed on Orphanet entries) as the main data source to merge diseases. When a disease is not linked to any other, or when a clear one-to-one mapping can be made between an Orphanet and an OMIM entry, the entries from both databases are fused into a single one (see [Multimedia Appendix 2](#app2){ref-type="supplementary-material"}). Once this process is complete, we use the remaining one-to-many connections (eg, one entry for "Bardet-Biedl syndrome" in Orphanet corresponds to multiple entries in OMIM for each Bardet Biedl syndrome subtype) to create groups of highly connected diseases, which we call "metadiseases."
Two main features have been selected to characterize a disease on the disease profile panel: (1) variations explaining the causes of a disease, and (2) phenotypes describing its consequences. Phenotypes are represented by a word cloud highlighting rare HPO phenotypes associated with the disease. The description of variants is generated by the integration of more than 100,000 ClinVar \[[@ref46]\] curated variations (single-nucleotide variants and small insertions and deletions) directly linked to diseases.
As the effects of the variants can differ per considered transcript, MyGeneFriends uses the Ensembl VEP \[[@ref47]\] script to create more than a million links between variants and Ensembl transcripts stored in the MyGeneFriends database. To describe the complex relationships between variants, transcripts, and disease-causing genes, we have developed three synoptic and interactive views with variants grouped per affected gene. With this synthetic barcode representation ([Figure 3](#figure3){ref-type="fig"}), the human user has a rapid overview of the characteristics of the known variants associated with the disease and can easily identify variants exhibiting specific features, for instance, synonymous variants affecting a splicing region. The third view focuses on variants differentially affecting protein coding transcripts ([Multimedia Appendix 3](#app3){ref-type="supplementary-material"}). Such variants can generate a mix of affected and unaffected proteins depending on the tissue or developmental stage and often result in puzzling phenotypes.
Metadiseases have special profile pages on MyGeneFriends, summarizing the main properties of nested diseases, displaying nested diseases as a network, and highlighting the most representative gene friends and phenotypes of the concerned diseases. To date, MyGeneFriends has information on 725 metadiseases, representing 3418 diseases.
Human Profile
-------------
The third agent in MyGeneFriends is the human user, who must register on the website (registration is free, and a demo account is available for testing purposes). The user's profile page contains information provided by the owner: his affiliation, geographic localization, a list of authored publications, and a short description. Even if no description is provided, MyGeneFriends introduces the human to other users by automatically extracting best scored keywords associated with public gene and disease friends of the human and displaying them on his profile.
The private view of the profile page allows humans to create and manage groups of collaborators related to research projects, called Topics. All Topics owned by the user are shown in the "My Topics" section. The Topic selected as "active" is used for personalization and suggestion processes. A second section called "My collaborations" allows the user to monitor Topics from the other users with whom he collaborates.
Friendships and Networking
--------------------------
Friendships are an essential concept in MyGeneFriends, since on the one hand, they allow networking through friends and evaluation of the relatedness of 2 agents, and on the other hand, they are used to suggest interesting agents as new friends. Some friendships are automatically generated based on data mining, whereas others result from human activity. Friendships offer different and complementary points of view on the close environment of an agent in terms of protein interactions, function and localization, implication in research projects or diseases, and many others ([Figure 1](#figure1){ref-type="fig"}).
Exploitation of the friendship network in MyGeneFriends leverages mined and user-created connections to discover highly connected clusters. Interactive graph views with repulsion physics (using the vis.js library) allow intuitive visualization of friendships within a group of agents (genes from a publication, diseases from a metadisease, or agents associated with a Topic), leading to selection and observation of different types of friendships (common friends, common features, cooccurrence, and so on). Highly connected agents will naturally form subgroups corresponding to biologically relevant categories as exemplified by the Congenital Hepatic Fibrosis \[[@ref58]\] gene network ([Figure 4](#figure4){ref-type="fig"}).
![Dynamic network visualization of relationships between actors. Network of 52 genes related to Congenital Hepatic Fibrosis (CHF), a developmental disorder most frequently associated with ciliopathies. Red links represent shared public human friends, grey links represent shared diseases, violet links represent STRING relationships, and green links represent similar evolutionary profiles. Each link type can be removed or added to the network in real time. Moreover, in the dynamic network view provided by MyGeneFriends, highly connected genes are clustered automatically to form subgroups. In this example, 3 main subnetworks (highlighted by rectangles) emerge corresponding to genes associated with a distinct ciliopathy: Bardet-Biedl Syndrome (blue rectangle), Joubert and Meckel syndromes (orange rectangle), and Senior-Loken syndrome and nephronophthisis (green rectangle).](jmir_v19i6e212_fig4){#figure4}
Topic: Interactive Collaborative Unit
-------------------------------------
On their profile pages, users can create groups of agents (called Topics). Each group centralizes information around a research project and links to agents collaborating with it ([Multimedia Appendix 4](#app4){ref-type="supplementary-material"}), thus presenting a subjective view of biological information from a given research perspective.
This allows MyGeneFriends to display a personalized news feed, providing a technological watch of bibliographical and public database updates related to gene and disease friends that collaborate in the user's Topics. News items include various subjects such as new or lost friendships between diseases and genes, updated symbols, synonyms, descriptions, new or lost GO or HPO annotations, protein sequence updates, or presence in a new publication.
Several tools are provided for the analysis of Topic related agents. The network visualization facilitates the evaluation of the heterogeneity of the Topic's content ([Multimedia Appendix 5](#app5){ref-type="supplementary-material"}), and the identification of highly linked subgroups of agents and relationships between these groups. The timeline visualization ([Figure 3](#figure3){ref-type="fig"}) places the Topic in a global research perspective, presenting the annual evolution of the number of publications associated with the genes in a Topic.
Finally, in addition to serving as a basis for friendships and publications suggestions (see Methods), information mined from Topics allows the enhancement of the reading experience of an agent's descriptions and publication abstracts by automatically highlighting the keywords most representative of the user's interests ([Multimedia Appendix 6](#app6){ref-type="supplementary-material"}).
Discussion
==========
Principal Findings
------------------
By leveraging conventions and practices used in popular social networks, MyGeneFriends aims to challenge the way we interact with data by providing a first step toward a system where biological entities such as genes and genetic diseases are no longer passive concepts, but are instead proactive agents of the research process, helping and collaborating with human counterparts.
In mainstream social networks, humans can create a representation of themselves in the form of a profile, then interact with the network by writing posts, adding commentaries or likes, making new friends, and sharing and spreading information. To transpose this concept to MyGeneFriends, we had to create a network that could reflect current research efforts in genetics and medicine. To populate the network, we focused on human genetic diseases because of their broad interest, and their more direct links to genes and genomic variations compared with infectious diseases or cancer. With humans and human genetic diseases selected, the choice of the third agent was obvious as many publications and bioinformatics resources structure their information in a gene-centric manner. To interconnect the network, we adopted two of the main characteristics of real-world friendships: commonality (common friends, qualities, and interactions), and group membership (family, coworkers, and hobbies).
Compared with existing Web services, MyGeneFriends can (1) leverage user behavior to provide personalized profiles and news feeds, given each user's specific research interests; and (2) consider user behavior as valid biological information integrated in the biological data network to be mined and influencing the discovery of connections between genes and diseases.
Conclusions
-----------
The development of MyGeneFriends lies at the frontier between bioinformatics and the emerging science of human-data interaction, and in the future, we plan to extend the functionalities in both areas. First, genes from other model species (mouse, zebrafish, etc) will be added and connected by friendship links based on orthology. Additional friendships will be incorporated to provide a regulatory context such as friendships based on transcription factors or miRNA. Second, we believe that while humans remain special agents in this first version of MyGeneFriends, in the future the three agents will interact on the same level, with more independent and proactive genes and diseases. Research will be facilitated by better communication between different agents, with each agent able to produce and transmit new, relevant data and knowledge. A gene could, for example, find itself linked to a new disease or ask to be sequenced by his friend, the sequencer. With this increased autonomy of nonhuman agents and an independent flow of information, the role of the human in the network must clearly evolve. This evolution can be viewed either as a danger or as a source of new collaborations and opportunities.
This work was funded by ANR Investissement d'Avenir Bioinformatique BIP: BIP (ANR10-BINF03-05).
The authors are thankful to Alexia Rohmer for her help with the interactive schematic view of the human body, and are also grateful to Dr. Ioannis Xenarios (Swiss Institute of Bioinformatics), Dr. Frédéric Chalmel (Université de Rennes 1), Dr. Laurent Vallar (Luxembourg Institute of Health), and Prof. Pierre Gançarski (University of Strasbourg) for helpful discussions.
Authors\' Contributions: AA developed MyGeneFriends with contributions from KC and YN, and wrote the manuscript. AK and RR managed hardware infrastructure. JL wrote the manuscript. OP and OL supervised the project and wrote the manuscript. All authors read and approved the final manuscript.
Conflicts of Interest: None declared.
MyGeneFriends relies on multiple servers, scripts, and databases. Jenkins is used to periodically execute python integration scripts, which maintain the MyGeneFriends database up to date. A backup copy of the database is created daily, and the publications table is synchronized daily with an Elasticsearch server. The MyGeneFriends website is built using the Play framework and calls an API server built with Flask to execute command line programs and download publications into the local database. Bug reports are sent to the YouTrack server.
Diseases from different, contradictory data sources are merged using two rules. First, disease A is merged with disease B if and only if B has a single link to disease A, and no other diseases have a single link to A. Second, if a disease is linked to several other diseases, a disease group called Metadisease is created.
The "differential effect on proteins" view for variants on the "Bardet-biedl syndrome 6" disease profile (a) shows that while variants (here rs74315398, rs28937875, rs587777827, rs74315399, rs74315397, rs74315396) linked to this disease affect the coding DNA sequence (CDS) of 2 transcripts of the gene MKKS, one protein coding transcript (green rectangle on Ensembl Genome Browser \[b\], and 1 of 3 labels in the view \[a\]) is not affected in the CDS.
A Topic groups genes, diseases, and humans collaborating on a shared research interest. When a human becomes friends with a new gene or disease, it is added to the active Topic. Human collaborators see all protected friends and annotations related to the Topic.
Network visualization of agents related to a Topic (here a set of Bardet-Biedl syndrome related genes on the left and a set of muscular fiber related genes on the right) help to understand how many potentially different research interests a Topic contains. The network displays highly connected agents automatically grouped together. Purple links represent STRING based relationships, green links are based on evolutionary profile similarity, red links indicate shared public human friends, and grey links shared disease friends.
Keywords most related to agents from active Topics are highlighted in (1) publication abstracts, and (2) descriptions on agent profiles. This helps to quickly identify paragraphs that may interest the reader.
CDS
: coding DNA sequence
EFO
: experimental factor ontology
FSS
: functional semantic similarity
FTP
: file transfer protocol
GEO
: gene expression omnibus
GO
: gene ontology
HPO
: human phenotype ontology
IC
: information content
IDF
: inverse document frequency
MeSH
: MEdical Subject Headings
NCBI
: National Center for Biotechnology Information
NLTK
: natural language toolkit
OMIM
: Online Mendelian Inheritance in Man
ORM
: object-relational mapping
PDF
: portable document format
REST
: representational state transfer
STRING
: search tool for recurring instances of neighboring genes
TF
: term frequency
UCSC
: University of California, Santa Cruz
UTR
: untranslated region
VCF
: variant call format
VEP
: variant effect predictor
| {
"pile_set_name": "PubMed Central"
} |
(Decorative Binding)
social_share
Inquire
Gallery
Tabs
About
Auction:
Books & Manuscripts - 2300
Location:
Boston
Date / Time :
October 30, 2005 11:00AM
Description:
(Decorative Binding), Moore, Thomas, (1779-1852), Irish Melodies, London: Longman and Co., first edition, illustrated by Maclise, full crushed green levant morocco with gilt inlay and leather onlays by Sangorski and Sutcliffe, with red cloth clamshell box, 4to, (very good). Note: This book was exhibited at the 1939 New York World's Fair as one of the few samples sent by the prominent binders of Great Britain. Estimate $300-400
Keywords
Departments
The Fine Books & Manuscripts department delivers scholarship, expertise, and attention to detail in appraisals, evaluations and auctions of rare and historically important material ranging from medieval manuscripts to presidential documents. | {
"pile_set_name": "Pile-CC"
} |
fileFormatVersion: 2
guid: 51d34008285243768f59a545839dc097
timeCreated: 1539108536 | {
"pile_set_name": "Github"
} |
Computational representation of a realistic head and brain volume conductor model: electroencephalography simulation and visualization study.
Computational head and brain volume conductor modeling is a practical and non-invasive method to investigate neuroelectrical activity in the brain. Anatomical structures included in a model affect the flow of volume currents and the resulting scalp surface potentials. The influence of different tissues within the head on scalp surface potentials was investigated by constructing five highly detailed, realistic head models from segmented and processed Visible Human Man digital images. The models were: (1) model with 20 different tissues, that is, skin, dense connective tissue (fat), aponeurosis (muscle), outer, middle and inner tables of the scalp, dura matter, arachnoid layer (including cerebrospinal fluid), pia matter, six cortical layers, eye tissue, muscle around the eye, optic nerve, temporal muscle, white matter and internal air, (2) model with three main inhomogeneities, that is, scalp, skull, brain, (3) model with homogeneous scalp and remaining inhomogeneities, (4) model with homogeneous skull and remaining inhomogeneities, and (5) model with homogeneous brain matter and remaining inhomogeneities. Scalp potentials because of three different dipolar sources in the parietal-occipital lobe were computed for all five models. Results of a forward solution revealed that tissues included in the model and the dipole source location directly affect the simulated scalp surface potentials. The major finding indicates that significant change in the scalp surface potentials is observed when the brain's distinctions are removed. The other modifications, for example, layers of the scalp and skull are important too, but they have less effect on the overall results. | {
"pile_set_name": "PubMed Abstracts"
} |
Renal Pseudoaneurysms and Arteriovenous Fistulas as a Complication of Nephron-Sparing Partial Nephrectomy: Technical and Functional Outcomes of Patients Treated With Selective Microcoil Embolization During a Ten-Year Period.
The aim of this study was to evaluate the clinical and functional outcomes in patients who underwent selective interventional embolization of renal pseudoaneurysms or arteriovenous fistulas at our center. Our retrospective analysis included all consecutive patients who received selective transcatheter embolization of renal pseudoaneurysms or arteriovenous fistulas after partial nephrectomy in our department from January, 2003 to September, 2013. The technical and clinical success rate and functional outcome of every procedure was collected and analyzed. Furthermore, the change in renal parenchymal volume before and after embolization was determined in a subgroup. A total of 1425 patients underwent partial nephrectomy at our hospital. Of these, 39 (2.7 %) were identified with a pseudoaneurysm or an arteriovenous fistula after partial nephrectomy. The diagnosis of the vascular lesions was made by means of biphasic CT or CEUS. Technical success by means of selective microcoil embolization was achieved in all 39 patients (100 %). Clinical success, defined as no need for further operation or nephrectomy during follow-up, was achieved in 35 of 39 patients (85.7 %). Renal function, as measured by eGFR before and after the intervention, did not change significantly. However, a mean loss of parenchymal volume of 25.2 % was observed in a subgroup. No major or minor complications were attributable to the embolization procedure. Transcatheter embolization is a promising method for treating vascular complications which may occur after partial nephrectomy. We confirm the high success rate of this technique while discussing renal functional outcomes and potential safety aspects. Arterial pseudoaneurysms and arteriovenous fistulas are rare but severe complications after partial nephrectomy. Selective microcoil embolization is a safe and effective kidney-preserving procedure for treating these complications. Embolization leads to a significant loss of renal parenchymal volume but not to a loss of renal function. | {
"pile_set_name": "PubMed Abstracts"
} |
..\nothing.com
del osask_at.exe
del osask_qe.exe
ren OSASK.EXE osask_at.exe
..\osalink1.exe
ren osask.exe osask_qe.exe
ren osask_at.exe OSASK.EXE
..\imgtol.com s osask_qe.exe osask_qe.sys 2048
..\edimg.exe @edimgopt.txt | {
"pile_set_name": "Github"
} |
Mutations derepressing silent centromeric domains in fission yeast disrupt chromosome segregation.
The ura4+ gene displays phenotypes consistent with variegated expression when inserted at 11 sites throughout fission yeast centromere 1. An abrupt transition occurs between the zone of centromeric repression and two adjacent expressed sites. Mutations in six genes alleviate repression of the silent-mating type loci and of ura4+ expressed from a site adjacent to the silent locus, mat3-M. Defects at all six loci affect repression of the ura4+ gene adjacent to telomeres and at the three centromeric sites tested. The clr4-S5 and rik1-304 mutations cause the most dramatic derepression at two out of three sites within cen1. All six mutations had only slight or intermediate effects on a third site in the center of cen1 or on telomeric repression. Strains with lesions at the clr4, rik1, and swi6 loci have highly elevated rates of chromosome loss. We propose that the products of these genes are integral in the assembly of a heterochromatin-like structure, with distinct domains, enclosing the entire centromeric region that reduces or excludes access to transcription factors. The formation of this heterochromatic structure may be an absolute requirement for the formation of a fully functional centromere. | {
"pile_set_name": "PubMed Abstracts"
} |
In a High School football game i was hit and rolled my ankle. I HAD A TORN LIGAMENT IN MY FOOT AND DIDNT EVEN KNOW IT. I went to the locker room to get taped up at halftime and played well on it. I rushed for 123 yrds and was game MVP thanks to Kwik Goal Athletic Tape. | {
"pile_set_name": "Pile-CC"
} |
Q:
PHP, retrieving specific image from an album as a thumbnail for that particular album
$albums = get_albums_gallery();
foreach($albums as $album){
$album_id = $album['id'];
echo $album_id;
$images = get_images_gallery($album_id);
echo '<p>',$album['event'],'(', $album['count'],'images) <br>
',$album['description'],'...<br>
/
</p><img src="admin/uploads/',
$images['album'],'/',$images['id'],'.',
$images['ext'],'"title="Uploaded',
date(' DM Y/h:i',$images['timestamp']),
'"alt="hello" height="100px" width="100px"/>
'
;
}
The "img" above is supposed to display one image from inside an album as a thumbnail for that album that is looped. However the $images['album'],$mages['id'] etc all seemed to result as an undefined index. I have already included the necessary connection files.
Code for get_albums_gallery()
function get_albums_gallery(){
$albums = array();
$albums_query = mysql_query("
SELECT `albums`.`album_id`, `albums`.`timestamp`,`albums`.`event`,`albums`.`name`, LEFT(`albums`.`description`,50) as `description`, COUNT(`images`.`image_id`) as ` image_count`
FROM `albums`
LEFT JOIN `images`
ON `albums`.`album_id` = `images`.`album_id`
GROUP BY `albums`.`album_id`
");
while($albums_row = mysql_fetch_assoc($albums_query)){
$albums[] = array(
'id' => $albums_row['album_id'],
'timestamp' => $albums_row['timestamp'],
'name' => $albums_row['name'],
'description' => $albums_row['description'],
'count' => $albums_row['image_count'],
'event' => $albums_row['event']
);
}
return $albums;
}
and code for get_images_gallery()
function get_images_gallery($album_id){
$album_id = (int)$album_id;
$images = array();
$image_query = mysql_query("SELECT `image_id`, `album_id`,`timestamp`,`ext` FROM `images` WHERE `album_id`=$album_id");
while($images_row = mysql_fetch_assoc($image_query)){
$images[] = array(
'id' => $images_row['image_id'],
'album'=> $images_row['album_id'],
'timestamp'=> $images_row['timestamp'],
'ext' => $images_row['ext']
);
}
return $images;
}
I dont know where I did wrong as I've already passed a valid $album_id parameter in get_images_gallery($album_id). the line containing $album['event'] is working fine until it reaches the img tag and I get an undefined index error. Thanks in advance
A:
I tell you what went wrong. You return an array containing arrays with your get_images_gallery function.
You itterate over the albums array with your foreach and ONLY over the albums so what you could do to make your code work is this:
</p><img src="admin/uploads/',
$images[0]['album'],'/',$images[0]['id'],'.',
$images[0]['ext'],'"title="Uploaded',
date(' DM Y/h:i',$images[0]['timestamp']),
'"alt="hello" height="100px" width="100px"/>
If this isn't giving you the desired output you have to itterate over the images inside the albums loop again
| {
"pile_set_name": "StackExchange"
} |
Q:
What's event `mouseenter.zoom'?
I'm a beginner JavaScript programmer. While I was reading the source code of jQuery Zoom (a jQuery plugin), I saw the author defined a handler for event mouseenter.zoom.
I know there's an event called mouseenter but can't find mouseenter.zoom. Can someone give me a hint?
Thanks.
A:
It is actually the mouseenter event, but it is using event namespace
The namespaces are used normally to refer to a particular event handler so that it can be individually removed later.
Example
$('<selector>').on('mouseenter.zoom', function(){});
later to remove the handler
$('<selector>').off('mouseenter.zoom');
If you look at the end of the plugin there is $(source).off(".zoom"); it means remove all the event handlers with namespace zoom, it is an easier method to destroy the plugin than removing each event handler individually.
| {
"pile_set_name": "StackExchange"
} |
Power Station of Art’s “2017 Emerging Curators Project” enlistment guide
Deadline for proposals: 27th June 2017 12:00 a.m. GMT+8
Proposals to be sent to: [email protected]
PSA’s “Emerging Curators Project” is currently an unparalleled domestic development and research program for Chinese young curators. As an exhibition and academic trademark, the “Emerging Curators Project” is devoted to explore the potential of young Chinese curators, provides them with an ideal platform for practice, comprehensive and in-depth guidance, a way to enter the public field and a positive environment to grow up.
Since its establishment in 2014, the Emerging Curators Project was organized three consecutive times, helping more than twenty young curators to realize nine exhibitions. While an international jury lineup with a broad field of vision, a professional support for exhibition coordinating and an orientation towards a rich platform of exhibition exposure offer an extraordinary starting point for the chosen young curators; it also continues to inject an abundant impetus to Chinese contemporary art scene. Having been through this practice, the curators are ready to take a lively role and become an eye-catching force within the art practice both here and overseas.
This year the “Emerging Curators Project” will continue to dig out new curatorial potential and tackle the most pressing issues in the artistic environment –the enlisting process for the “2017 Emerging Curators Project” begins on May 3rd 2017 and it is addressed to all Chinese around the world. The details about the event and the proposal submission regulations are as follows,
Three elected project groups will carry out the realization of their exhibitions
The selection of the three projects will undergo three stages: preliminary evaluation, secondary evaluation and final evaluation, during which the jury will choose three projects out of all submitted proposals. Each proposal can be individual or collective project, with the amendment that the collective project group shouldn’t exceed three persons. The selected exhibition proposals will be realized within the space designated by PSA, the exhibition time is scheduled for the end of 2017 and will last for two to three months.
Two “Emerging Curators Overseas Researchers”
With the support of the Consulate-General of France in Shanghai, two of the participants in the “Emerging Curators Project” will receive “overseas researcher” qualifications, and will have the chance to travel to France during the spring and summer of 2018 in order to carry out a three to four weeks exchange session with the local artists and art organizations.
“2017 Emerging Curators Project” Touring Plan
During the national exchange tour in the enlistment period for 2017 Emerging Curators Project, the 2017 Emerging Curators Project will coordinate with higher educational institutions, culture and art organizations in several cities to plan and promote the Emerging Curators themed symposium, notable personalities within the field will be invited to discuss the current situation of young curators, share their experience, analyze problems and spread creativity. More on the subject will be published soon.
Project proposal regulations for “Emerging Curators Project”
Enlisting Objectives and requirements:
Chinese nationals or overseas Chinese born not earlier than January 1st 1977 (including mentioned date), who are conducting research or practice in (but not limited to) the fields of arts, visual arts, design, architecture, sound arts, etc. These requirements apply to all applicants, as well as to the artists involved in the submitted projects.
Applicants must provide a résumé in both English and Chinese, an ID (or passport) copy and valid contact information.
Project requirements:
The applicants must submit a finished curating project, which could touch upon artistic and cultural spheres, with no restrictions on the subject matter. The project should include: an exposition of the curatorial concept (not more than 1000 words), the exhibition structure, the list of participating artists and a brief introduction for each of them, pictures of the artworks, as well as captions and introductions of the artwork for each picture (introductions should not exceed 80 words per artwork), the display blueprint and a detailed budget (including shipping, board and lodging, insurance, manufacturing of the artworks, installations, travel and accommodation costs for staff, publications costs, etc.). The project should be submitted in both Chinese and English.
On a technical, safety and functional level, the participating artworks should meet the requirement of two to three months of exhibition time; at the inauguration, pictures with maintenance instructions as well as on operating manual should be handed over to the technical personnel of the museum; if the curating team cannot guarantee the maintenance during the exhibition period, then maintenance staff and expenses will be allocated by PSA instead. The elected team can provide a public program plan relevant to the exhibition, which will be realized after the approval of the PSA public education department.
Implementation details:
The elected team should execute the display design within the space designated by Power Station of Art. The designated exhibition space is hall number 7 (two exhibition spaces) and number 8 exhibition hall at the fifth floor of the museum. Blueprints of the exhibition spaces can be downloaded click on the link below. The participants can chose one of the three spaces.
PSA will provide an “Emerging Curators Project Special Fund” of up to 300,000 RMB (tax included) for each winning project, any exceeding expenses shall be handled by the winning team; the distribution and use of the “Emerging Curators Project Special Fund” has to pass the examination and approval of the financial department of PSA, the process and rules of its implementation have to conform with the respective national regulations.
The media coverage as well as the planning of the educational programs will be provided free of charge by PSA.
Evaluation process: will comprise of three screening stages: preliminary evaluation, secondary evaluation and final evaluation, the candidates who pass the third stage will be interviewed by thejury committee at the beginning of July in Shanghai (travel expenses from outside mainland China should be covered by the candidate).
Members of the jury: the jury will be formed by members of the PSA academic committee, as well as specially invited members.
The results will be published in July 2017; after the final three projects have been selected by the committee, they will be announced to the public through the official media channels of PSA, such as the official website or the official WeChat account.
Rewards: the three elected project groups will be entitled to use the “Emerging Curators Project Special Fund” as pointed out in the previous section. This year’s “Emerging Curators Project” will select two outstanding curators who will become the “Emerging Curators Project Overseas Researchers”; for details please read the previous section.
Emergency withdrawal rules: in order to guarantee the quality of the exhibition, PSA has the right to withdraw the candidate’s eligibility in the following situations: lack of practical execution capabilities, lack of responsibility for the curatorial work, failing to follow the managerial regulations of the museum, or failing to execute the work before the appointed deadline.
Method and deadline for proposals:
Time period for project submission: starting from today till June 26th 2017 12:00 PM (Beijing Time, including mentioned date)
Submission method: starting from today, mail to [email protected]; the e-mail should be titled “Application for 2017 Emerging Curators Project”.
Disclaimer
By relevant laws and regulations in China, all participants who voluntarily submit their projects to PSA are considered by the organizing committee to accept that the attribution of submitted projects’ copyrights have been irrevocably claimed as follows:
Statement of Originality
The participating projects shall be the participant’s original work without infringement of any other’s copyrights, trademark rights and other intellectual property rights; the projects shall have never been commercially exploited in any forms. Otherwise, the organizing committee shall invalidate the projects’ qualifications to be included, selected and awarded, and reserve the rights to pursue further legal actions.
Attribution of Participating Projects’ Intellectual Property Rights
The attribution of all submitted projects’ rights belongs to the applicant. PSA, however, owns the rights over display, promotion and other activities regarding all the awarded and selected projects.
PSA’s official website (www.powerstationofart.com) and its official Wechat account “yancongpsa” are the only appointed portals for the project’s information release.
All participating projects should respect the Chinese national condition and should not violate the current relevant laws and regulations.
*PSA reserves all the final rights of interpretation for the mentioned event. | {
"pile_set_name": "Pile-CC"
} |
Epidemiology of first-episode psychosis: illustrating the challenges across diagnostic boundaries through the Cavan-Monaghan study at 8 years.
The epidemiology of first-episode psychosis is poorly understood because of the paucity of systematic studies, yet it constitutes the fundamental basis for understanding the disorder and the foundations on which clinical, biological, therapeutic, and long-term outcome studies are built. A particular need is to clarify the diagnostic breadth of first-episode psychosis and, on this basis, to undertake systematic comparisons across representative populations of the psychoses, to include comparisons with first-episode mania. Considered here is the new generation of prospective studies that may be able to inform in some way on these issues. Attainment of the above goals requires prolonged accrual of "all" cases of nonaffective, affective, and any other psychotic illness, including first-episode mania, to derive the required representative populations. To illustrate some of the challenges, the structure of the Cavan-Monaghan prospective first episode study is described and its interim findings are outlined, as rural Ireland provides psychiatric care based on strict catchment areas and is characterized by substantive ethnic and socioeconomic homogeneity and stability. It is argued that there are 3 primary diagnostic nodes (schizophrenia spectrum psychosis, bipolar disorder, and major depressive disorder with psychotic features) around which there exist numerous additional, overlapping, and well-populated diagnostic categories that are distinct only in terms of their operational definition. Only through systematic, epidemiologically based studies that access this intrinsic diversity are we likely to understand fully the origins and pathobiology of first-episode psychosis. | {
"pile_set_name": "PubMed Abstracts"
} |
Friday, November 19, 2004
Boston.com / Business / Oracle advances in PeopleSoft takeover fight
Boston.com / Business / Oracle advances in PeopleSoft takeover fight: "Oracle Corp. moved closer to victory in its $8.8 billion hostile takeover bid for PeopleSoft Inc.
California Public Employees' Retirement System, the largest US pension fund and owner of 1.5 million PeopleSoft shares, said it tendered in favor of keeping the offer alive. PeopleSoft executives wrote to employees telling them not to be surprised if Oracle wins the majority of votes.
'We think they'll get it,' Tom Burnett, the president of Merger Insight, an affiliate of brokerage Wall Street Access, said of the share tender. 'That's more important than anything else.'" | {
"pile_set_name": "Pile-CC"
} |
Q:
Interacting with a form without it activating
I'm trying to implement code-completion popup window in my project. The window is derived from Form. It contains two controls: custom list derived from UserControl (it shows completion possibilities with icons) and a VScrollBar.
When the popup appears, it doesn't steal focus from the editor (form's ShowWithoutActivation is overriden to return true) and the editor sends certain keystrokes to the popup so the user can interact with it using keyboard. So far it works like a charm.
The problem is, I want to allow the user to use mouse as well. But, when the user clicks into the popup window, its form activates and steals focus from the editor. I can react to this by giving the focus back to the editor, I have even set up a Timer to do this regularly, but apart from being a poor solution, the title bar of the editor always flickers when this happens (when the popup is clicked).
Is there any way to interact with the popup form (using mouse) that doesn't make the form activate?
The ShowWithoutActivation's documentation reads: "If your non-activated window needs to use UI controls, you should consider using the ToolStrip controls, such as ToolStripDropDown. These controls are windowless, and will not cause a window to activate when they are selected." This seems exactly like the thing I need, but I want to use a custom control and a scroll bar.
The same problem would be with a tooltip that shows these two arrows to switch method overloads (known from VS) - the whole form would use no controls at all (only render the text and the arrows), but when clicked, it should not activate. The problem could be summarized up to "How to create a form that would never activate, but allow the user to interact with certail controls inside?".
Thanks.
A:
OK, I may have found a solution. The key seems to be WM_MOUSEACTIVATE message, which the popup form must intercept and respond with MA_NOACTIVATE. But there's a catch - the control derived from UserControl still grabs focus when clicked (the scrollbar luckily doesn't anymore). The problem seems to be in the UserControl.OnMouseDown method, which internally puts focus on the control. There are some ways to fix this:
derive the control from Control instead of UserControl
override the OnMouseDown method and not call base.OnMouseDown there
make the control's CanFocus property return false, but this seems not possible, because that means to make the control either not visible or not enabled, which is both undesirable
The last case when the popup form steals focus seems to be when its resizing (using mouse) ends. But it is safe here to call Owner.Activate() as a result to Activated event...
| {
"pile_set_name": "StackExchange"
} |
Seskar
Seskar () () is an island in the Gulf of Finland, part of the Leningrad Oblast of Russia. The island was an independent municipality of Finland populated by Finns at least since 16th century, until 1940, when ownership was transferred to the Soviet Union following the Moscow Peace Treaty. The ownership was ratified after World War II.
Prior to the transfer of ownership to the Soviet Union, the island was also known by the name Siskar Island. The island has been involved in multiple shipwrecks over the years, which includes some ships sunk, wrecked or otherwise lost.
In 1777 the Great Britain ship Mercey was wrecked on Siskar Island. She was on a voyage from Saint Petersburg to London.
In 1802 the Russian ship Roman Vasselevitch was wrecked on Siskar Iskand. She was on a voyage from Saint Petersburg to London.
In 1807 the United Kingdom ship Nelly was driven ashore on Siskar Island, in the Gulf of Finland. She was on a voyage from London to Saint Petersburg, Russia. Nelly was later refloated.
In 1815 the United Kingdom ship Graces was wrecked on Siskar island. The crew was rescued.
The municipality Seiskari had been formed from the Koivisto municipality in 1903, and belonged to the province of Viipuri and to the South Karelia region.
Sources
Risto Hamari, Martti Korhonen, Timo Miettinen, Ilmar Talve: Suomenlahden ulkosaaret; Lavansaari, Seiskari, Suursaari, Tytärsaari, Jyväskylä 1996;
Category:Russian islands in the Baltic
Category:Islands of Leningrad Oblast | {
"pile_set_name": "Wikipedia (en)"
} |
Our Services & Tools
We are in a unique position to offer a range of tools & services supported by leading New Zealand research.
The tools we offer our clients are the tools we use ourselves. As graduate recruiters running full outsourced solutions, we ensure you optimise the use of our tools and services to get the best results.
Our extensive range of products and services is designed to support every step of the attraction, selection and development stages of your programme.
In addition, our tools can be extended for use beyond graduate programmes to experienced hire recruitment as well.
The Talent Solutions team don’t just sell you a tool, they take a personal interest in your business and the results you want to achieve to ensure they are delivered.
Paula Henriques - T&G Global
Outsourced Services
Talent Solutions offers a range of outsourced services from the building of your attraction strategy, executing on-campus and digital marketing, through to full design and management of your selection process. These services are perfect for organisations that do not have a dedicated resource for graduate and internship programme delivery.
Partial outsourced services are also available, where an organisation has some resource to support the programme, but want to draw on our expertise to design and co-ordinate delivery.
Our Tools
We select the tools we work with based on the following critical factors:
Customisation – can we adapt the tool to different needs?
User-friendly – is it easy to use?
Stable and secure – providing a great user experience and confidentiality.
Easy to report from – data is power in recruitment and you need to be able to access it in real-time.
Great look and feel – is it fun and engaging to use?
Our Current Partners Include:
Vieple Video Interview Software
Video interview is fast replacing phone screening as a much more effective and efficient way of evaluating a candidate’s communication skills. Video interviewing is convenient for candidates and reviewers and enables fair, robust and consistent evaluations.
We love how customisable the Vieple system is to enable employers to offer candidates a unique and engaging candidate experience. We also love the reporting functionality with one-click download of all data. Vieple is already integrated in the Campaign™ candidate management system.
“Vieple video interviewing helped us to cut our screening time in half.”
Mandy McAlweeFisher & Paykel Healthcare
Campaign™ Candidate Management System
The Campaign™ applicant management system provides an efficient, professional and secure method of managing applications.
The Campaign™ system enables customised communication with candidates throughout the process, the ability to create a bespoke selection process with unlimited stages and also provides real-time reporting with the ability to view a range of charts at the click of a button.
The Campaign™ system is integrated with the Vieple video interview software and Testgrid psychometric testing to enable seamless management of candidates across these selection tools.
Testgrid Psychometric Testing Solutions
Testgrid offer an extensive range of psychometric tools to fit every type of job role and organisation. Supported by a team of Organisational Psychologists, the Testgrid tools can be developed around your organisation’s critical competency framework delivering tailoured solutions that are meaningful and predictive of success.
The Testgrid suite of tools also has a broad set of norm groups to compare your test results to, which are graduate specific. We also have a New Zealand International norm group set to offer organisations that recruit candidate for whom English is not their first language.
Modlettes
Modlettes is a fun and engaging, customisable e-learning platform which enables you to share your content in a format that is easy for you and the end user. If you have content you want to share with 3 to 500 people, Modlettes is perfect for you, with usability across all platforms and optimised for mobile learning.
Modlettes offers six design modes including video, slide deck, text and quizzes to create engaging content. Clients have used this system for inductions and learning and development programmes. Reporting through a dashboard lets you know what content has been viewed by whom and every plan has access to all the features. | {
"pile_set_name": "Pile-CC"
} |
Q:
Will 1090 Mhz band become too congested in the future?
1090 Mhz is currently used for SSR Mode A/C replies and Mode S communication(ELS-EHS replies and ADS-B broadcasts) by civilian aircraft and some of military IFF modes.
With the infamous 2020 ADS-B Mandate about ADS-B usage in certain airspaces(Mandate) , it is expected that this frequency will be very crowded in future.
There are certain methods/precautions to prevent congestion like randomized broadcast timing(between 0.4 s and 0.6 s for Airborne Position for example). F.R.U.I.T. and garble problems are also not new to this frequency.
Are there any discussions in the aviation circles about precautions in anticipation to congested 1090 Mhz band for certain airspaces?
A:
There are some areas where the 1090 MHz frequency is already very busy. The area around Frankfurt am Main in Germany and the Los Angeles Basin airspace is the USA are the most congested in the world.
The direct of impact of ADS-B is an increase in the frequency use of 1090 MHz. At the same time it allows a reduction of number of Mode-S radars, it enables the development of a more effective TCAS with reduced interrogation rates (known as ACAS X), and it reduces the number of interrogations needed by WAM systems. On the long term the impact of ADS-B will likely be positive.
But with the increase in number of flights the 1090 MHz congestion will remain a concern.
There are many discussions in the ATC surveillance circles about the topic and the 1090 MHz frequency (and 1030 MHz as well) is are frequently monitored. There are ground based monitors and periodically there are measurement flights to identify areas of high frequency load. Adding new radars to already congested areas is made very difficult by spectrum protection regulations, instead cross-border surveillance data sharing is encouraged. Some countries monitor 1090 MHz transmissions around the clock and the are plans to have a permanent monitoring service of 1030 MHz and 1090 MHz across Europe that will analyse spectrum usages trends and identify rogue transmission.
| {
"pile_set_name": "StackExchange"
} |
Q:
How to load second view ,that can see the first view thourgh it (transparent), in ios 9
This is my question,think that I have two views. in the first view there is a imageview(with a image) and a button.When I press the button then it load second view(with storyboard segue kind is present modally).when that view loads, I want to set the first view, through the second view(should be transparent).
I tried with setting secondview's defatul view background color to default but it gives black.how can I do that.
A:
Oh i fixed you issue after a few minutes test...
I found that segue has a property named presentation,like this:
you may change the property to Over Current Context and it works
| {
"pile_set_name": "StackExchange"
} |
Clinical evaluation of the relative effectiveness of multidose crystalloid and cold blood potassium cardioplegia in coronary artery bypass graft surgery: a nonrandomized matched-pair analysis.
Controversy exists concerning the most effective method of myocardial protection during coronary artery bypass graft operations. Accordingly, we performed a matched-pair analysis between 25 patients receiving multidose hypothermic potassium crystalloid cardioplegia and 25 other patients receiving cold blood potassium cardioplegia. Patients were matched on the basis of preoperative ejection fraction (EF) and the number of anatomically similar stenotic coronary arteries. The adequacy of myocardial protection was assessed by serial perioperative determinations of radionuclide ventriculography, hemodynamic measurements, analyses of electrocardiograms and serum levels of MB-CK. We found that the level of myocardial protection was similar between unstratified groups. However, when subgroups were selected on the basis of prolonged aortic cross-clamp time (greater than ninety minutes) or impaired preoperative left ventricular function (EF less than 40%), there was a suggestion that cold blood cardioplegia may be advantageous. | {
"pile_set_name": "PubMed Abstracts"
} |
Videoconferencing between multiple people typically involves many pieces of hardware working together, such as cameras, microphones, headsets, computers, monitors, routers, and other equipment. As the number of different devices increases, the difficulty and time consumption in identifying the source of a problem also increases, as the problem may lie in any one of the devices, and may also include network limitations. A problem at the beginning of a videoconference results in inefficiency and annoyance among conference participants, as well as other personnel who may be responsible for setting up and operating the videoconference equipment.
Current solutions typically involve a videoconference equipment manufacturer providing a specific hardware device to connect to the manufacturer's videoconference device to test for video integrity, such as detecting packet loss and jitters of the videoconference stream. However, these manufacturer's solutions are typically limited to the manufacturer's dedicated hardware and limited by the type of information provided by the manufacturer's dedicated hardware.
For the foregoing reasons there is a need for a platform agnostic monitoring solution that can detect the health of a system of devices and each individual device so problems may be readily identified and targeted. | {
"pile_set_name": "USPTO Backgrounds"
} |
Unexpected Places (1918 film)
Unexpected Places is a 1918 American silent comedy-drama film directed by E. Mason Hopper and starring Bert Lytell, Rhea Mitchell, and Rosemary Theby. It was released on September 30, 1918.
Cast list
Bert Lytell as Dick Holloway
Rhea Mitchell as Ruth Penfield
Rosemary Theby as Cherie
Colin Kenny as Lord Harold Varden
Louis Morrison as Hiram Penfield
Edythe Chapman as Mrs. Penfield
John Burton as Jocelyn
Stanton Heck as Brauer
Jay Dwiggins as Meyer
Frank Newberry
Martin Best
References
External links
Category:Films directed by E. Mason Hopper
Category:Metro Pictures films
Category:American films
Category:American silent feature films
Category:American black-and-white films
Category:American comedy-drama films
Category:1910s comedy-drama films | {
"pile_set_name": "Wikipedia (en)"
} |
INTRODUCTION {#sec1-1}
============
Allergic diseases have become one of the most important health problems worldwide, and it is thought that 20%--30% of western populations suffer from at least one form of them.\[[@ref1]\] Allergic Rhinitis (AR) as the most common allergic diseases has an ascending prevalence worldwide\[[@ref2][@ref3]\] that annually billion dollars paid for the treatment of physical and mental problems and disabilities of such patients that imposes a heavy burden on health services.\[[@ref4][@ref5]\] General principles of treatment are education and awareness, the avoidance of allergen, appropriate medicine use, and finally the immunotherapy application.\[[@ref6][@ref7][@ref8]\] Given that complete allergen avoidance is not possible and administrations of current medicines are restricted because of their side effects and also decreased effectiveness following continuous consumption. Therefore, trying to find ways to increase immunotherapy effects and choosing alternative treatments are still one of the issues of interest. Based on hygiene hypothesis and evidence, probiotics or nonpathogenic commensal microorganisms that coexist with the living being, especially human, are beneficial and can be considered as a complementary therapy for allergic diseases. Definition of the Food and Agriculture Organization of the United Nations and the World Health Organization for probiotics is "Live microorganisms that when administrated in sufficient quantities confer a health benefit on the host." Prebiotics are nutrition elements that selectively induce growth and activity of limited numbers of the colon residing bacteria and is consist of indigestible carbohydrates such as inulin, fructooligosaccharides (FOS), galactooligosaccharides, and lactose. The mixture of probiotics and prebiotic called Synbiotic.\[[@ref9]\]
The aim of this study was to evaluate the effectiveness of synbiotic on gene expression of interferon-gamma (IFN-γ), interleukin-4 (IL-4), interleukin-10 (IL-10), interleukin-17 (IL-17), transforming growth factor beta (TGF-β), and forkhead box P3 (FoxP3) when it administrated simultaneously with immunotherapy in a placebo-controlled, randomized, double-blind clinical trial in AR patients in the city of Mashhad, in North-Eastern Iran.
MATERIALS AND METHODS {#sec1-2}
=====================
Characterization of patients {#sec2-1}
----------------------------
Twenty AR patients enrolled at the Mashhad University of Medical Sciences, Allergy ward of Ghaem Hospital, Mashhad, North-Eastern Iran. Each participant signed a written informed consent. Patients were considered for the study based on clinical criteria, positive prick test for aeroallergens and established perennial AR. Exclusion criteria comprised pregnancy, history of autoimmune or immunodeficiency disorders, systemic corticosteroids or immunosuppressive medicine usage, suffering from allergic asthma, malnutrition, also infection and antibiotic intake during enrolment.
Study design {#sec2-2}
------------
The study was designed as a placebo-controlled, randomized, double-blind clinical trial that the protocol was approved by the Ethics Committee of Mashhad University of Medical Sciences. Registration ID in Iranian Registry of Clinical Trail (IRCT) was IRCT2017061223235N11. The patient recruitment occurred from August 2015 to June 2016. The study was designed for 20 patients, ten in the synbiotic group who received synbiotic capsules from "ZistTakhmir" company ([www.zisttakhmir.com](www.zisttakhmir.com)) and each synbiotic capsule consisted of *Lactobacillus casei, Lactobacillus acidophilus, Lactobacillus rhamnosus, Lactobacillus bulgaricus, Bifidobacterium breve, Bifidobacterium longum, Streptococcus thermophilus* as probiotics and FOS as prebiotic. In addition, ten patients underwent immunotherapy and received placebo. Both groups took the synbiotic and placebo for 2 months. Cluster immunotherapy was performed based on a protocol in Middleton\'s Allergy book\[[@ref10]\] for 2 months in both groups. Clinical symptoms and quality of life evaluated by SNOT-22\[[@ref11]\] and mini- Rhinoconjunctivitis Quality of Life Questionnaire (RQLQ)\[[@ref12]\] standard questionnaires in time points 0, 2, and 6 months. Meanwhile, 3cc of venous blood was taken in EDTA for RNA extraction from PBMCs and synthesis of cDNA.
Gene expression assessment for interferon-gamma, interleukin-4, interleukin-10, interleukin- 17, transforming growth factor beta, and forkhead box P3 {#sec2-3}
-----------------------------------------------------------------------------------------------------------------------------------------------------
RNA was extracted with GeneJET Whole Blood RNA Purification Mini kit (Made by Slovenian Thermo scientific company, Cat No, K0716\#), then cDNA synthesis performed by RevertAid First Strand cDNA Synthesis Kit (Thermo scientific company).
The expression of mentioned genes was evaluated by SYBR Green real-time reverse transcription polymerase chain reaction (RT-PCR) technique. Primers designated by Beacon Designer software (7.9 version) and Primer NCBI online software and ordered by Pishgam company Tehran, Iran ([www.pishgambc.com](www.pishgambc.com)). Specificity of primers and product reaction confirmed by sequencing through Bioneer Company in South Korea. Sequences of primers are shown in [Table 1](#T1){ref-type="table"}.
######
Sequence of primers for SYBR Green real time-polymerase chain reaction assay
Forward primer Reverse primer
------- -------------------------------------- ---------------------------------------
GAPDH 5'-CAC TAG GCG CTC ACT GTT CTC-3' 5'-CCA ATA CGA CCA AAT CCG TTG AC-3'
IFN-γ 5'-GAG TGT GGA GAC CAT CAA GGA AG-3' 5'-TGC TTT GCG TTG GAC ATT CAA GTC-3'
IL-4 5'-CCG TAA CAG ACA TCT TTG CTG CC-3' 5'-GAG TGT CCT TCT CAT GGT GGC T-3'
IL-10 5'-TCT CCG AGA TGC CTT CAG CAG A-3' 5'-TCA GAC AAG GCT TGG CAA CCC A-3'
IL-17 5'-CGG ACT GTG ATG GTC AAC CTG A-3' 5'-GCA CTT TGC CTC CCA GAT CAC A-3'
TGF-β 5'-TAC CTG AAC CCG TGT TGC TCT C-3' 5'-GTT GCT GAG GTA TCG CCA GGA A-3'
FoxP3 5'-GGC ACA ATG TCT CCT CCA GAG A-3' 5'-CAG ATG AAG CCT TGG TCA GTG C-3'
GAPDH=Glyceraldehyde-3-phosphate dehydrogenase; IFN-γ=Interferon-gamma; IL=Interleukin; TGF-β=Transforming growth factor beta; FoxP3=Forkhead box P3; SYBR=SYBR Green^™^
Master mix provided by Takara Company (Japan \[[www.takara-bio.com](www.takara-bio.com)\]). The real-time RT-PCR amplifications were performed based on the following condition: for GAPDH, IFN-γ, IL-4, IL-10, TGF-β genes, primary denaturation was started at 95°C for 10 min and followed by 40 cycles of denaturation at 95°C for 10 s, annealing at 60°C for 30 s and an extension at 72°C for 20 s. The reaction was conducted at the total volume of 10 μL which consisted of 0.4 μL forward primer (10 pmol/μL), 0.4 μL reverse primer (10 pmol/μL), 0.2 μL distilled water, 5 μL master mix, and 4 μL cDNA. For IL-17 and FoxP3 genes, primary denaturation was set up at 95°C for 2 min and followed by 50 cycles of denaturation at 95°C for 15 s, annealing at 60°C for 15 s and an extension at 72°C for 20 s. The reaction was prepared at the total volume of 10 μL which consisted of 0.25 μL forward primer (10 pmol/μL), 0.25 μL reverse primer (10 pmol/μL), 2.5 μL distilled water, 5 μL master mix, and 2 μL cDNA.
Statistics {#sec2-4}
----------
Data of gene expression analyzed based on the 2^-ΔΔCt^ method,\[[@ref13]\] and GAPDH chose as the house-keeping gene.\[[@ref14]\] Statistical analysis such as descriptive statistics, Chi-square, unpaired *t*-test, and one way ANOVA was performed by SPSS software version 16 (SPSS Inc., Chicago, IL, USA) and the *P* \< 0.05 was statistically significant.
RESULTS {#sec1-3}
=======
Twenty AR patients randomized in Immunotherapy + Synbiotic (First group) and Immunotherapy + Placebo (Second group). Despite, lack of any side effects, three patients (two in the synbiotic and one in the placebo group) stopped treatment, and 17 patients (ten males and seven females) finished study procedure. The mean duration of the disease was 7.5 ± 2.3. The mean age of patients was 24 ± 12.82 with a range of 9--53 years. The age distribution was assessed by Kolmogorov--Smirnov test, and it was normal in both groups. Furthermore, the age difference was not significant between the two groups based on the *t*-test (*P* = 0.4). Demographic data were summarized in [Table 2](#T2){ref-type="table"}.
######
Demographic data of patients with allergic rhinitis
Characteristics Synbiotic group (*n*=8) Placebo group (*n*=9)
----------------- ------------------------- -----------------------
Sex
Male 6 4
Female 2 5
Age (year) 21.12±14.29 26.55±11.58
The analysis of SNOT-22 standard questionnaire showed a significant reduction in clinical symptoms in both groups with *P* = 0.0002 and *P* = 0.005 for the synbiotic the placebo group, respectively. However, in the comparison between groups, the reduction was higher in the synbiotic group, but not statistically significant (*P* = 0.9). Based on the mini-RQLQ standard questionnaire analysis, quality of life was significantly improved in synbiotic (*P* = 0.0001) and placebo (*P* = 0.014) groups. Although the quality of life showed better improvement in synbiotic group, the difference was not significant (*P* = 0.9). The data of standard questionnaires for SNOT-22 and mini-RQLQ were summarized in [Table 3](#T3){ref-type="table"}.
######
Data of standard questionnaires for Sinonasal Outcome Test-22 and mini-Rhinoconjunctivitis Quality of Life Questionnaire
SEM±mean
------------ ---------- ---------- ----------
SNOT-22
Synbiotic 44.6±7 16.4±3.6 11.4±3.5
Placebo 43±8.6 19.5±4.9 13.7±3.7
Mini-RQLQ
Synbiotic 51.4±6.3 16.9±3.7 16±2.5
Placebo 40±6.9 21.3±5.9 16.1±2.9
Scores for severity of disease and quality of life obtained from SNOT22 and mini-RQLQ standard questioners data, respectively. RQLQ=Rhinoconjunctivitis quality of life questionnaire; SEM=Standard error of mean; SNOT-22=Sinonasal Outcome Test-22
The analysis of gene expression showed no significant difference between the two groups for IFN-γ (*P* = 0.2), IL-4 (*P* = 0.7), IL-10 (*P* = 0.72), TGF-β (*P* = 0.07), and FoxP3 (*P* = 0.6) when comparison performed before and 2 months after intervention. However, gene expression of IL-17 in synbiotic group was significantly reduced compared with placebo group, when analyzed before and 2 months after the intervention (*P* = 0.001) \[[Figure 1](#F1){ref-type="fig"}\].
![Gene expression of IFN-gamma, IL-4, IL-10, IL-17, TGF-beta, and FoxP3 in patients with allergic rhinitis who received synbiotic or placebo in combination with immunotherapy in time point zero and 2 months following the intervention](JRMS-24-51-g001){#F1}
Similar analysis was performed in 2--6 months interval and showed no significant difference between the two groups with regard to IFN-γ (*P* = 0.7), IL-4 (*P* = 0.2), IL-10 (*P* = 0.21), TGF-β (*P* = 0.43) FoxP3 (*P* = 0.16), and IL-17 genes (*P* = 0.48) \[[Figure 2](#F2){ref-type="fig"}\].
![Gene expression of IFN-gamma, IL-4, IL-10, IL-17, TGF-beta, and FoxP3 in patients with allergic rhinitis who received synbiotic or placebo in combination with immunotherapy in time point 2 and 6 months following the intervention](JRMS-24-51-g002){#F2}
The analysis of gene expression in 0--6 months interval and comparison between the groups; showed no significant difference with regard to IFN-γ (*P* = 0.6), IL-4 (*P* = 0.3), IL-10 (*P* = 0.1), TGF-β (*P* = 0.24), and FoxP3 genes (*P* = 0.73), whereas the gene expression of IL-17 in synbiotic group was significantly decreased compared with placebo group (*P* = 0.0001) \[[Figure 3](#F3){ref-type="fig"}\].
![Gene expression of IFN-gamma, IL-4, IL-10, IL-17, TGF-beta, and FoxP3 in patients with allergic rhinitis who received synbiotic or placebo in combination with immunotherapy in time point zero and 6 months following the intervention](JRMS-24-51-g003){#F3}
DISCUSSION {#sec1-4}
==========
Annoying symptoms in AR patients are due to the disturbance in protective physiologic functions of the immune system.\[[@ref15]\] Based on the evidence, probiotics are one of the alternative treatments for allergic diseases especially AR.\[[@ref9]\] The examination of gene expression profile is a powerful tool to diagnosis and differentiate diseases in human; also can clarify the progression or regression and to screening treatment responses. For the first time, in the present study, the expression of related genes to the T-cell subsets was evaluated in patients with AR who received placebo or synbiotic in combination with immunotherapy.
The evaluation of mini-RQLQ and SNOT-22 revealed that quality of life and clinical symptoms of all patients improved significantly regardless of taking synbiotic or placebo. Although the improvement was more in synbiotic group comparing to the placebo, the difference was not significant. Our results are similar to Lin *et al*. and Nembrini *et al*. studies that they also reported significant improvement in the quality of life and clinical symptoms. Lin *et al*. evaluated the effects of *Lactobacillus paracasei* (HF. A00232) in 6--13-year-old children with perennial AR in a 12-week treatment. They measured clinical symptoms and quality of life by nasal total symptom score, eye total symptom score, pediatric RQLQ standard questionnaires following the probiotic administration.\[[@ref16]\] In addition, Nembrini *et al*. evaluated modulatory effects of *L. paracasei* NCC2461 on AR patients and measured clinical symptoms and quality of life by total nasal symptom score, total ocular symptom score, and mini-RQLQ standard questionnaires.\[[@ref7]\] On the contrary, Nagata *et al*. who evaluated *Lactobacillus plantarum* No. 14 effects on seasonal AR in Japanese students\[[@ref17]\] and Costa *et al*. that evaluated efficacy of *L. paracasei* LP-33 in the same disease\[[@ref18]\] showed that clinical symptoms improved significantly in the intervention group versus placebo. Meanwhile, Singh *et al*. that evaluated the immunemodulatory effect of *B. lactis* NCC2818 in patients with seasonal AR revealed that nasal symptoms were improved significantly in the synbiotic group.\[[@ref19]\]
Previous studies have shown that Th1/Th2 imbalance and subsequently IL-4 and IL-13 secretion by Th2 cells leads to class switching in B lymphocyte and produce allergen-specific IgE in AR patients.\[[@ref20]\] Moreover, several modulatory effects considered for probiotics such as inhibition of Th2 differentiation through dendritic cells and also suppression of IL-4, IL-5, and IL-13 cytokines secretion.\[[@ref21]\] In this study, gene expression of IL-4 considered as the Th2 main cytokine and our results showed a reduction during the intervention. Although it was more in the synbiotic group in the first 2 months, the differences were not significant. This part of our results was in concordance with Lin *et al*. and Ivory *et al*. studies that evaluated IL-4 cytokine level in serum, nasal mucosal secretions, and supernatants of PBMCs cultures.\[[@ref16][@ref22]\] However, significant reduction of IL-5 and IL-13 in studies of Singh *et al*. and IL-13 in Chen *et al*. as Th2 cytokines were seen in synbiotic group versus placebo.\[[@ref19][@ref23]\] In addition, Nagata *et al*. reported a significant increase in Th1 population and also in Th1/Th2 ratio following treatment with *Lactobacillus plantarum* No. 14.\[[@ref17][@ref24]\]
On the other hand, several studies showed an important role of Th1 and its cytokine, IFN-γ; in the cellular immune responses.\[[@ref25]\] Our results showed that the gene expression of IFN-γ increased in the first 2 months of treatment in the synbiotic group, whereas it was decreased in the placebo group. Although the gene expression of IFN-γ was lower in synbiotic receivers, it was not significant. Our results were similar to findings of Ivory *et al*.,\[[@ref22]\] who reported that oral administration of *L. casei* significantly increased the level of IFN-γ cytokine production in cultured PBMCs. On the contrary, a significant decrease of IFN-γ as the main cytokine of Th1 subset was shown in Lin *et al*. who evaluated effects of *L. paracasei* (HF. A00232) on serum level of IFN-γ,\[[@ref16]\] Chen *et al*. who studied the influence of L. gassei A5 on IFN-γ secretion by PBMCs,\[[@ref23]\] Singh *et al*. who assessed IFN-γ secretion of stimulated blood lymphocytes in the presence of *B. lactis* NCC2818\[[@ref19]\] and also Lopez *et al*. who detected IFN-γ secretion by T-cells following treatment by *B. bifidum* CMG13195. All these results were not in accordance with our data, too. Notably, in Perrin and colleagues\' study, serum level of IFN-γ was shown to be not influenced by *L. paracasei* NCC2461.\[[@ref24]\] Controversial results in different studies may be related to differences in treatment protocols, the period of synbiotic intake and also various strains of probiotics and methods to evaluate serum cytokine level or supernatants of cell cultures and gene expression.
Contrary to common belief that AR is merely a result of the imbalance between Th1/Th2 subsets, recently proofs imply on Th17 subset role in AR pathogenesis and these cells were found in nasal mucus of AR patients. Furthermore, the severity of clinical symptoms increases along with serum level of IL-17.\[[@ref26]\] In our study, gene expression of IL-17 cytokine in 0--2 and 0--6-month intervals, was significantly decreased in the synbiotic group versus placebo. Similar findings showed in Zhang *et al*. that oral administration of *Enterococcus faecalis* FK-23 as in the murine model of allergy showed a significant reduction in the percentage of Th17 CD4+ cells.\[[@ref27]\] Moreover, Owaga *et al*. showed that administration of *Lactobacillus* Gasseri in the murine model of allergic asthma lead to significant reduction of IL-17 serum level in bronchoalveolar liquid and also suppressed significantly IL-17 secretion in splenocytes.\[[@ref28]\] These findings are in concordance with other studies that show probiotics lead to directly and indirectly downregulating and suppress Th17 subset and responses and cytokine secretion related to this cytokine.\[[@ref29][@ref30]\]
On the other hand, modulatory effects of Treg in the immune system have shown in previous studies regarding allergic disease. It should be noted that suppressive phenotype of regulatory T cells is dependent on gene expression of the FoxP3 transcription factor that plays a critical role in the differentiation of Treg CD4+ CD25+.\[[@ref31]\] In our study, gene expression of FoxP3 increased in both groups. Although the gene expression of FoxP3 was more in synbiotic group, the difference was not significant. Our results are in agreement with Lopez *et al*. that used *B. bifidum*\[[@ref32]\] and Chen *et al*. which used L. gasseri A5\[[@ref23]\] as probiotics and reported that treatment with probiotics could trigger Treg CD4+ CD25+ FoxP3+ differentiation, but not significant.
Secretion of IL-10 and TGF-β as the major cytokines of Treg subset showed important modulatory effects. In our study, gene expression of IL-10 in 2 months and TGF-β in 6 months of intervention was not significantly increased in the synbiotic group in comparison with placebo receivers. Our results were in concordance with Lin *et al*. that used *L. paracasei* (HF. A00232) in 6--13-year-old children with perennial AR,\[[@ref16]\] Ivory *et al*. who assessed effects of *L. casei* in seasonal AR patients\[[@ref22]\] and Chen *et al*. who performed the same trial on children with AR by the administration of L. gassei A5.\[[@ref23]\] We should note that all these three studies measured TGF-β and IL-10 in the serum of patients whereas our data was according to the gene expression. On the contrary, the serum level of IL-10 in Perrin *et al*. study which used *L. paracasei* NCC2461\[[@ref24]\] and also nasal secretion level of this cytokine in Lopez *et al*. study which used *B. bifidum*,\[[@ref32]\] was increased significantly due to synbiotic treatment and was in disagreement with our results.
CONCLUSION {#sec1-5}
==========
Significant reduction in the gene expression of IL-17 as inflammatory cytokines in the synbiotic receivers compared with placebo in our study shows modulatory effects of synbiotic on immunopathogenesis of AR. To achieve a better conclusion regarding the effects of synbiotics, we suggest carry on more researches with a larger sample size and including of a group of patients who receive synbiotic without immunotherapy, extending the follow-up period and also taking advantages of more trial on various strains of synbiotics.
Financial support and sponsorship {#sec2-5}
---------------------------------
Nil.
Conflicts of interest {#sec2-6}
---------------------
There are no conflicts of interest.
These data have been extracted from the thesis of Sajad Dehnavi, MSc student in clinical immunology, Mashhad University of Medical Sciences, Mashhad, Iran. Special acknowledgment should be dedicated to patients with allergic rhinitis, who helped us with blood collection and participation in the clinical trial. We should also acknowledge Allergy Research Center, Mashhad University of Medical Sciences, Mashhad, Iran, for financial help. The grant code for this research was 941403, approval code of the ethics committee was IR.MUMS.fm.REC.1394.618 and the Registration ID in Iranian Registry of Clinical Trail (IRCT) was IRCT2017061223235N11.
| {
"pile_set_name": "PubMed Central"
} |
Intracerebral hemorrhage in the rat: effects of hematoma aspiration.
Deep intracerebral hemorrhage is associated with considerable mortality and morbidity, but the value of surgical therapy is debatable. The purpose of this study was to evaluate whether aspiration of the hematoma in a rodent model of intracerebral hemorrhage could improve final neurological outcome. Intracerebral hemorrhage was induced in 2 groups of rats by injection of bacterial collagenase into the caudate nucleus. In 1 group of rats, streptokinase was used to lyse the hematoma 4 hours after hemorrhage induction, and the clot was then aspirated. Behavioral function was evaluated repeatedly until the rats were killed 7 weeks after collagenase injection. Histology was used to assess neuronal loss, astroglial proliferation, and overall brain morphology. In a second experiment, brain water was measured at 24 hours. The treated rats performed significantly better than controls on a motor-behavior evaluation on days 1, 2, and 28 after aspiration. Skilled forelimb testing performed for 3 weeks after the global behavior evaluations showed a significant deficit of contralateral forelimb function in both groups, but there was no significant difference between the 2 groups. Neuronal loss in the perihematoma striatum was significantly greater in untreated compared with treated rats. In most rats, structural damage extended into the internal capsule and thalamus. Aspiration of the hematoma after collagenase-induced hemorrhage slightly improved acute functional outcome and reduced neuronal loss from the striatum. Further studies are required to delineate the mechanism of the effect. | {
"pile_set_name": "PubMed Abstracts"
} |
Strontium (Sr) and silver (Ag) loaded nanotubular structures with combined osteoinductive and antimicrobial activities.
Two frequent problems are associated with the titanium surfaces of bone/dental implants: lack of native tissue integration and associated infection. These problems have prompted a significant body of research regarding the modification of these surfaces. The present study describes a hydrothermal treatment for the fabrication of strontium (Sr) and silver (Ag) loaded nanotubular structures with different tube diameters on titanium surfaces. The Sr loading from a Sr(OH)2 solution was regulated by the size of the inner diameter of the titanium nanotubes (NT) (30nm or 80nm, formed at 10V or 40V, respectively). The quantity of Ag was adjusted by immersing the samples in 1.5 or 2.0M AgNO3 solutions. Sr and Ag were released in a controllable and prolonged matter from the NT-Ag.Sr samples, with negligible cytotoxicity. Prominent antibacterial activity was observed due to the release of Ag. Sr incorporation enhanced the initial cell adhesion, migration, and proliferation of preosteoblast MC3T3-E1 cells. Sr release also up-regulated the expression of osteogenic genes and induced mineralization, as suggested by the presence of more mineralized calcium nodules in cells cultured on NT-Ag.Sr surfaces. In vivo experiments showed that the Sr-loaded samples accelerated the formation of new bone in both osteoporosis and bone defect models, as confirmed by X-ray, Micro-CT evaluation, and histomorphometric analysis of rats implanted with NT-Ag.Sr samples. The antibacterial activity and outstanding osteogenic properties of NT-Ag.Sr samples highlight their excellent potential for use in clinical applications. Two frequent problems associated with Ti surfaces, widely used in orthopedic and dental arenas, are their lack of native tissue integration and risk of infection. We describe a novel approach for the fabrication of strontium (Sr) and silver (Ag) loaded nanotubular structures on titanium surfaces. A relevant aspect of this work is the demonstration of long-lasting and controllable Ag release, leading to excellent antibacterial and anti-adherent properties against methicillin-resistant Staphylococcus aureus (MRSA), and Gram-negative bacteria such as Escherichia coli. The extended release of Sr accelerates the filling of bone defects by improving the repair of damaged cortical bone and increasing trabecular bone microarchitecture. Our results highlight the potential of Sr and Ag loaded nanotubular structures for use in clinical applications. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
Deleting a row in a sheet when 2 cells in 2 different sheets are the same
This macro should compare cells in 2 different rows in 2 worksheets in the same workbook. When the value of the cells matches the row of the cell with the same value in a third worksheet same workbook should get deleted.
In the sheets that get compared are formulas but not in the sheet were the rows should be deleted.
The Problem is that it does not delete the cells in the third sheet.
I inserted pieces of code that suggest me that the comparison works. But the code seems to randomly delete stuff.
I tried solutions from the following (and some others were i dont have the links anymore) links:
How to compare columns from two different excel workbooks
Compare 2 cells in different sheets in VBA(Excel 2010)
Sub Vergleich_alter_Kundenausdruck_mit_aktuellen_Werten_V3()
Application.ScreenUpdating = False
Dim Sht1LastRow As Long
Dim i As Long
Dim j As Long
Set s1 = Sheets("Konditionen")
Set s2 = Sheets("Konditionseingabeausdruck")
Set s3 = s2.Next
Sht1LastRow = Sheets("Konditionen").Cells(65536, 1).End(xlUp).Row
For i = Sht1LastRow To 15 Step -1
If IsEmpty(s1.Cells(i, 6)) = True Then GoTo leer:
If s3.Cells(i, 5).Value <> s1.Cells(i, 6).Value Then
s1.Cells(i, 10).Value = s3.Cells(i, 5).Value
ElseIf s3.Cells(i, 5).Value = s1.Cells(i, 6).Value Then
s2.Cells(i, 6).EntireRow.Delete
s1.Cells(i, 9).Value = s3.Cells(i, 5).Value
Else
GoTo leer:
End If
leer:
Next i
Application.ScreenUpdating = True
End Sub
A:
In case of using the code:
Dim i As Long
With Workbooks("Book1").Worksheets("Sheet1")
For i = 1 To 4
If IsEmpty(.Cells(i, 1)) Then .Rows(i).Delete
Next i
End With
You will miss some rows. For example, if the code deletes row 3, then row 4 becomes row 3. However, variable i will change to 4. So, in this case the code will miss one row and check another, which wasn't in range previously.
In your case you should use this
For i = Sht1LastRow To 15 Step -1
| {
"pile_set_name": "StackExchange"
} |
"use strict";
/**
* @fileOverview
* Core operations on curve 25519 required for the higher level modules.
*/
/*
* Copyright (c) 2007, 2013, 2014 Michele Bini
* Copyright (c) 2014 Mega Limited
* under the MIT License.
*
* Authors: Guy K. Kloss, Michele Bini
*
* You should have received a copy of the license along with this program.
*/
var core = require('./core');
var utils = require('./utils');
/**
* @exports jodid25519/curve255
* Legacy compatibility module for Michele Bini's previous curve255.js.
*
* @description
* Legacy compatibility module for Michele Bini's previous curve255.js.
*
* <p>
* This code presents an API with all key formats as previously available
* from Michele Bini's curve255.js implementation.
* </p>
*/
var ns = {};
function curve25519_raw(f, c) {
var a, x_1, q;
x_1 = c;
a = core.dbl(x_1, core.ONE());
q = [x_1, core.ONE()];
var n = 255;
while (core.getbit(f, n) == 0) {
n--;
// For correct constant-time operation, bit 255 should always be
// set to 1 so the following 'while' loop is never entered.
if (n < 0) {
return core.ZERO();
}
}
n--;
var aq = [a, q];
while (n >= 0) {
var r, s;
var b = core.getbit(f, n);
r = core.sum(aq[0][0], aq[0][1], aq[1][0], aq[1][1], x_1);
s = core.dbl(aq[1 - b][0], aq[1 - b][1]);
aq[1 - b] = s;
aq[b] = r;
n--;
}
q = aq[1];
q[1] = core.invmodp(q[1]);
q[0] = core.mulmodp(q[0], q[1]);
core.reduce(q[0]);
return q[0];
}
function curve25519b32(a, b) {
return _base32encode(curve25519(_base32decode(a),
_base32decode(b)));
}
function curve25519(f, c) {
if (!c) {
c = core.BASE();
}
f[0] &= 0xFFF8;
f[15] = (f[15] & 0x7FFF) | 0x4000;
return curve25519_raw(f, c);
}
function _hexEncodeVector(k) {
var hexKey = utils.hexEncode(k);
// Pad with '0' at the front.
hexKey = new Array(64 + 1 - hexKey.length).join('0') + hexKey;
// Invert bytes.
return hexKey.split(/(..)/).reverse().join('');
}
function _hexDecodeVector(v) {
// assert(length(x) == 64);
// Invert bytes.
var hexKey = v.split(/(..)/).reverse().join('');
return utils.hexDecode(hexKey);
}
// Expose some functions to the outside through this name space.
/**
* Computes the scalar product of a point on the curve 25519.
*
* This function is used for the DH key-exchange protocol.
*
* Before multiplication, some bit operations are applied to the
* private key to ensure it is a valid Curve25519 secret key.
* It is the user's responsibility to make sure that the private
* key is a uniformly random, secret value.
*
* @function
* @param f {array}
* Private key.
* @param c {array}
* Public point on the curve. If not given, the curve's base point is used.
* @returns {array}
* Key point resulting from scalar product.
*/
ns.curve25519 = curve25519;
/**
* Computes the scalar product of a point on the curve 25519.
*
* This variant does not make sure that the private key is valid.
* The user has the responsibility to ensure the private key is
* valid or that this results in a safe protocol. Unless you know
* exactly what you are doing, you should not use this variant,
* please use 'curve25519' instead.
*
* @function
* @param f {array}
* Private key.
* @param c {array}
* Public point on the curve. If not given, the curve's base point is used.
* @returns {array}
* Key point resulting from scalar product.
*/
ns.curve25519_raw = curve25519_raw;
/**
* Encodes the internal representation of a key to a canonical hex
* representation.
*
* This is the format commonly used in other libraries and for
* test vectors, and is equivalent to the hex dump of the key in
* little-endian binary format.
*
* @function
* @param n {array}
* Array representation of key.
* @returns {string}
* Hexadecimal string representation of key.
*/
ns.hexEncodeVector = _hexEncodeVector;
/**
* Decodes a canonical hex representation of a key
* to an internally compatible array representation.
*
* @function
* @param n {string}
* Hexadecimal string representation of key.
* @returns {array}
* Array representation of key.
*/
ns.hexDecodeVector = _hexDecodeVector;
/**
* Encodes the internal representation of a key into a
* hexadecimal representation.
*
* This is a strict positional notation, most significant digit first.
*
* @function
* @param n {array}
* Array representation of key.
* @returns {string}
* Hexadecimal string representation of key.
*/
ns.hexencode = utils.hexEncode;
/**
* Decodes a hex representation of a key to an internally
* compatible array representation.
*
* @function
* @param n {string}
* Hexadecimal string representation of key.
* @returns {array}
* Array representation of key.
*/
ns.hexdecode = utils.hexDecode;
/**
* Encodes the internal representation of a key to a base32
* representation.
*
* @function
* @param n {array}
* Array representation of key.
* @returns {string}
* Base32 string representation of key.
*/
ns.base32encode = utils.base32encode;
/**
* Decodes a base32 representation of a key to an internally
* compatible array representation.
*
* @function
* @param n {string}
* Base32 string representation of key.
* @returns {array}
* Array representation of key.
*/
ns.base32decode = utils.base32decode;
module.exports = ns;
| {
"pile_set_name": "Github"
} |
PRO DESIGN, multi-Virtex-7 2000T FPGA-based prototyping system
The folks at PRO DESIGN, veterans in the EMS and EDA industry, have just announced the launch of their new product family of FPGA-based prototyping systems called “proFPGA.”
PRO DESIGN used to be known as the vendor of the successful CHIPit prototyping solutions. This CHIPit business unit was acquired by Synopsys in 2008. PRO DESIGN formed a new development team that has developed a a modular, scalable, flexible, and high-performance multi-FPGA solution that fulfills the highest needs in the area of FPGA-based prototyping.
The proFPGA product series consists of two types of motherboards (duo/quad), different kinds of FPGA modules featuring the latest Virtex 7 technology from Xilinx, a set of interconnection boards/cables, and various daughter boards (e.g. DDR3 memory boards, high speed interface boards e.g. PCIe, USB 3.0, Gigabit Ethernet, etc.) plus an extensive software environment. This addresses customers who need a flexible, high performance, and affordable FPGA-based prototyping solution for early software development and real-time system verification.
“With our new proFPGA product line we react on highest demands in the area of FPGA based Prototyping and we offer with an innovative system concept and latest technologies a solution with highest flexibility, maximum performance and reusability for several applications and projects. In combination with PRO DESIGN’s design and production services and a very attractive pricing structure our solution guarantees a best return on invest“, said Gunnar Scholl, CEO of PRO DESIGN.
The first member of the proFPGA product family is the proFPGA quad V7 system. The system consist of the proFPGA quad motherboard and is equipped with 4 exchangeable proFPGA Xilinx Virtex 7 XCV2000T FPGA modules offering up to 48 million ASIC gates capacity on a single board.
Multiple proFPGA quad systems can be stacked or connected together to provide unlimited scalability and no theoretical maximum in capacity. In addition, the user has nearly 100% access to all available FPGA I/Os (4400). This provides maximum freedom regarding the FPGA interconnection structure, thereby resulting in highest system performance. Furthermore, the system offers a total of 32 extension sites on the top and bottom site for different kind of FPGA modules (Xilinx or Altera), standard proFPGA daughter boards, or user-specific extension boards like DDR3 memory, PCIe Gen3 and all sorts of interconnection boards/cables.
The very elaborate boards of the proFPGA system are optimized and trimmed to ensure best signal integrity and to achieve highest system performance. The high speed boards together with the specific high speed connectors allow a maximum point to point speed of up to 1.2 Gbps over the standard FPGA I/O and up to 12.5 Gbps over the high speed gigabit transceivers of the FPGA.
The first early adopter customers are already using the proFPGA quad system successfully and are impressed by the compactness, flexibility, and pricing of the proFPGA solution. Particularly the concept with the exchangeable FPGA modules and daughter boards convinced the users, because it allows the use for several kinds of applications and development steps like system validation, pre silicon software development, field tests, and even post silicon system verification.
In addition to the well sophisticated hardware, the proFPGA prototyping system provides an extensive set of features and tools, like an advanced clock management, remote system configuration, integrated self- and performance test, automatic board detection, automatic I/O voltage programming, system scan- and safety mechanism, which extraordinarily simplifies the usage of this FPGA based system.
AvailabilityThe proFPGA quad V7 system has been available for early adopter customers since September 2012; general availability will be in Q1 2013.
If you found this article to be of interest, visit Programmable Logic Designline where – in addition to my Max's Cool Beans blogs – you will find the latest and greatest design, technology, product, and news articles with regard to programmable logic devices of every flavor and size (FPGAs, CPLDs, CSSPs, PSoCs...).
Also, you can obtain a highlights update delivered directly to your inbox by signing up for my weekly newsletter – just Click Here to request this newsletter using the Manage Newsletters tab (if you aren't already a member you'll be asked to register, but it's free and painless so don't let that stop you [grin]).
This is an interesting one, because I was just writing about another Virtex-7 2000T 3D IC/FPGA-based prototyping system from Synopsys -- the HAPS 70 family ( http://bit.ly/11yhp3G ).
The thing is that a few years' ago, Synopsys purchased the CHIPit business unit and technology from PRO Design.
My brain hurts :-) | {
"pile_set_name": "Pile-CC"
} |
Introduction
============
Around 50% of all familial breast and ovarian cancers are due to mutations in *BRCA1*and *BRCA2*. Germline mutations in the *BRCA2*gene are associated with an increased susceptibility to breast cancer (in both males and females) and they also confer an increased risk of early onset ovarian, prostate, and pancreatic cancer. The biological function of BRCA2 in the cell is still uncertain, although there is increasing evidence for a role in the repair of DNA by homologous recombination. BRCA2 and RAD51 (a homolog of the baterial recombination protein RecA) both co-localise to nuclear foci thought to be sites of DNA damage and repair and these nuclear foci fail to form in BRCA2 deficient cells. Loss of BRCA2 leads to error prone repair of double strand DNA breaks and in dividing cells can lead to chromosomal abberations and loss of genetic information. Compelling evidence of a more direct role for BRCA2 in DNA repair is provided by two recent studies investigating some of the protein\'s structural interactions.
Structural interactions of BRCA2
================================
In an exceptional publication in *Science*\[[@B1]\], Yang and colleagues demonstrate the crystal structure of the 800-residue carboxyl-terminal domain of BRCA2 that lies beyond the sequence of highly conserved BRC motifs (sets of amino acid repeats in the centre of BRCA2). This carboxyl-terminal region is likely to play an important role in the tumour suppressor function of BRCA2 as it corresponds to the most conserved portion of BRCA2 across different species and contains 27% of tumour-derived missense mutations. The authors strengthen this hypothesis by presenting the 3.1 angstrom structure of the carboxyl-terminal domain bound to another protein, DSS1 (deleted in split hand/split foot syndrome), and show that this structure contains multiple areas similar to single stranded and double stranded DNA binding motifs. They also show that this domain of BRCA2 can bind to single stranded DNA and stimulate RAD51 mediated recombination *in vitro*. Their data thus indicate a direct role for BRCA2 in homologous recombination and provide a structural insight into the loss of recombination mediated DNA repair in BRCA2 associated cancers.
Pellegrini and colleagues from Cambridge University explore further the structural interactions between BRCA2 and RAD51 and their role in DNA repair \[[@B2]\]. This paper reports for the first time the crystal structure of the complex between a BRC repeat and the catalytic domain of RAD51. The BRC repeat is found to mimic a motif in RAD51 that serves as an interface between adjacent RAD51 monomers. Through molecular mimicry, BRCA2 may therefore control the formation of the RAD51 nucleoprotein filament, which is essential for DNA recombination. This provides a structural basis for the BRCA2 regulation of RAD51 function and explains how *BRCA2*mutations may disrupt the predicted interactions between BRC and RAD51 and cause increased cancer susceptibility.
Conclusion
==========
Both studies outlined demonstrate the importance of structural analyses to further knowledge of protein function. They provide direct evidence for the role of BRCA2 in DNA repair and also a structural basis for the loss of recombination-mediated double strand DNA break repair in BRCA2-associated cancers. The challenge now is to take advantage of this deficiency in homologous recombination to specifically target and destroy BRCA2 mutant cells in cancer patients.
Competing interests
===================
None declared.
Note
====
This article is based on papers highlighted by Faculty of 1000 <http://www.facultyof1000.com/start.asp>, a web-based literature awareness service. Faculty of 1000 evaluations available for articles cited in this report may be viewed at: <http://breast-cancer-research.com/reports/bcr581.asp>
| {
"pile_set_name": "PubMed Central"
} |
'Birthgasm': A Literary Review of Orgasm as an Alternative Mode of Pain Relief in Childbirth.
Childbirth is a fundamental component of a woman's sexual cycle. The sexuality of childbirth is not well recognized in Western society despite research showing that some women experience orgasm(s) during labor and childbirth. Current thinking supports the view that labor and childbirth are perceived to be physically painful events, and more women are relying on medical interventions for pain relief in labor. This review explores the potential of orgasm as a mode of pain relief in childbirth and outlines the physiological explanations for its occurrence. Potential barriers to sexual expression during childbirth and labor, including the influence of deeply held cultural beliefs about sexuality, the importance of privacy and intimacy in facilitating orgasmic birth experiences, and the value of including prospective fathers in the birthing experience, are discussed. The role of midwives and their perceptions of the use of complementary and alternative therapies for pain relief in labor are examined. While there are indications of widespread use of complementary and alternative therapies such as hydrotherapy, herbal remedies, and breathing techniques for pain relief in childbirth, orgasm was not among those mentioned. Lack of recognition of the sexuality of childbirth, despite findings that orgasm can attenuate the effects of labor pain, suggests the need for greater awareness among expectant parents, educators, and health professionals of the potential of orgasm as a means of pain relief in childbirth. | {
"pile_set_name": "PubMed Abstracts"
} |
Everyone has failed, so don't play dumb or claim you've never messed up As Short Story Writer. Think of a time when a work-related situation didn't turn out quite as you had hoped. An interviewer is interested in seeing how you took responsibility for your failure, what you learned from it, and how you would prevent similar failures from happening again.
Red flags: This is the peanut butter to the previous question's jelly. Again, everyone should expect it, so it's a bad sign if someone seems totally unprepared, or gives a stock answer like, "I'm a perfectionist." Also, of course, candidates crazy enough to blurt out some horrible personality trait should go in the red flagged pile.
Good answer: Candidates should talk about a real weakness they've been working on improving. For instance, they're not good at public speaking, but they've been taking a course to help them improve. Or maybe they feel that they're easily distracted when working online, but have installed software that helps them stay on task. Answers like these show a desire for improvement, self awareness and discipline.
This question seems simple, so many people fail to prepare for it, but it's crucial. Here's the deal: Don't give your complete employment (or personal) history As Short Story Writer. Instead give a pitch-one that's concise and compelling and that shows exactly why you're the right fit for the job. Start off with the 2-3 specific accomplishments or experiences that you most want the interviewer to know about, then wrap up talking about how that prior experience has positioned you for this specific role.
This question typically follows on from the previous one. Here is where your research will come in handy. You may want to say that you want to work for a company that is Global Guideline, (market leader, innovator, provides a vital service, whatever it may be). Put some thought into this beforehand, be specific, and link the company's values and mission statement to your own goals and career plans.
This would be the first question asked in any interview. Therefore, it is important that you give a proper reply to the question regarding your education. You should have all the documents and certificates pertaining to your education and/or training, although time may not allow the interviewer to review all of them.
Candidates without specific examples often do not seem credible. However, the example shared should be fairly inconsequential, unintentional, and a learned lesson should be gleaned from it. Moving ahead without group assistance while assigned to a group project meant to be collaborative is a good example.
Emotional intelligence, or EQ, has come into vogue as a good trait to hire for.
EQ is the ability to use emotional information to guide thinking and behavior, to recognize other people's emotions and your own, and to discriminate between different feelings and label them appropriately.
EQ is considered essential to help teams function well. Here are some of the top questions for help you get an idea of how candidates perceive their emotions and those of others.
1. If you started a company today, what would its top values be?
2. Who inspires you? Why?
3. How could you create more balance in your life?
4. What makes you angry?
5. How do you have fun?
6. How good are you at asking for help?
7. How did you deal with a bad day?
8. What's something you're really proud of? Why?
9. Tell me about a time when your mood altered your performance (positively or negatively).
10. Has there ever been a time when you felt you needed to change your behavior at work? How did you do it?
11. Did you create friendships that lasted while working at a previous job?
☛ I am an extremely organized person, so I tend to be able to get my work done at work. However, if the need arose I would not be against taking work home. I try not to make it a habit, since I do value my free time. I do realize though that the work we do is important, and sometimes you have to do what needs to be done.
☛ I do not shy away from taking work home with me. I know that meeting deadlines and doing outstanding work sometimes means taking a bit of it home. I do not have a problem doing that when the need arises.
☛ Make sure to give an honest answer. Lying about taking work home may turn out badly for you if it is required and you do not do it.
Bad Answer: A generic or uninspired answer. Also, answers that show that this career/company is just a temporary stop for them.
Good answer: One that shows the candidate has thought about this question, has plans, and that those plans align with the job and a career path that is possible in the company. You want to see that this candidate is a good long term investment.
☛ Do you get along easily with people?
☛ Are you an effective collaborator?
☛ Can you communicate with people from various backgrounds and with different personalities?
☛ Can you motivate people?
☛ Do you know how to push back tactfully?
☛ Can you mediate conflicts?
☛ Can you deal with difficult personalities?
Another seemingly innocuous interview question, this is actually a perfect opportunity to stand out and show your passion for and connection to the company and for job As Short Story Writer. For example, if you found out about the gig through a friend or professional contact, name drop that person, then share why you were so excited about it. If you discovered the company through an event or article, share that. Even if you found the listing through a random job board, share what, specifically, caught your eye about the role.
It depends on the role - but the better way to answer this is to ask the interviewer what their expectations are with regards to what the role can expense and then simply state that you'll stay within those parameters
By asking this question, your interviewer hopes to learn whether you can communicate effectively, address issues in the workplace and motivate others during difficult times. Giving negative feedback requires honesty, thoughtfulness and tact. Answering this question well can help show an interviewer that you would be a good fit for a managerial position or a position that involves working closely with others.
Along similar lines, the interviewer wants to uncover whether this position As Short Story Writer is really in line with your ultimate career goals. While “an GGL star” might get you a few laughs, a better bet is to talk about your goals and ambitions-and why this job will get you closer to them.
Be completely honest and thoughtful with this one. You don't want to wake up one to find out that you're moving to a new city or state and it may be a major factor in your eligibility for employment. But again, if you don't want to move then the job probably isn't for you.
First prioritize the important activities that impact the business most. Then discuss the issue of having too many initiatives with the boss so that it can be offloaded. Work harder to get the initiatives done.
Being detailed is important for many types of job roles. Typically you want to highlight how you've done that in previous roles. Example: "Being meticulous is important to me. In my last job, I had to count the money in the register as a cashier to make sure it matched to the receipts down to the last penny." This was to ensure there wasn't any "wrongdoing" at the company by any of the cashiers and I was always accurate in my reports.
The list of crucial character traits includes patience, tact, and poise, with personal and cultural sensitivity. One needs the ability to work long hours, with much walking and some physical tasks. But the most important trait of all is to love people and to have the desire to care for them.
Just do not say that you imagine to only walk and watch what people do. Rather try to show them your attention to details and proactive attitude to job. Mention that you would try to observe the problems, weaknesses as well as opportunities to improve the results and take measures according to it.
A typical interview question to determine what you are looking for your in next job, and whether you would be a good fit for the position being hired for, is “What challenges are you looking for in a position As Short Story Writer?” The best way to answer questions about the challenges you are seeking is to discuss how you would like to be able to effectively utilize your skills and experience if you were hired for the job. You can also mention that you are motivated by challenges, have the ability to effectively meet challenges, and have the flexibility and skills necessary to handle a challenging job. You can continue by describing specific examples of challenges you have met and goals you have achieved in the past.
Discuss the clubs / activities you were in, share a personal story about why you enjoyed it and then describe how it's helped shape you to be who you are today. For example, I enjoyed rock climbing because it taught me the value of practicing hard at a sport to become skilled in it. I bring this same diligence to my work approach today as well.
Companies want staff that can ramp quickly, but also want people who are realistic. So take into consideration how intense the job is and then give a good answer. For example, if you have simple responsibilities that don't require a huge development curve, then your ramp time will probably be shorter. If it's a complex set of skills that you need to develop, then your ramp time could be longer - the key is you have to explain why you believe that ramp time should be.
Dedicate myself to learn everything about the new company that I can, look for ways and ideas that could improve, processes, safety, removing obstacles from the associates, I want to advance within the company.
Analyze the job responsibilities and match those to your skills sets. Then discuss how your experience and skills sets can truly create the best impact to the company in that specific job role. Impact could mean marketing impressions, sales, cutting costs, making products more efficiently, creating better customer service, engineering new designs that create customer excitement, etc.
People skills are a necessity for medical assistants. When answering this question, be sure to show that you enjoy interacting and working with others and that you also derive great enjoyment from helping others. This will show that you are a team player and that you would be a valuable team member As Short Story Writer.
In more general terms, a question such as this gives a candidate the opportunity to talk about their professional philosophy and skills. While the question is general in nature, the best answers are usually quite specific, picking one or two points and exemplifying them with instances from personal history.
Think of a time where you really stood out and shined within college. It could be a leadership role in a project, it could be your great grades that demonstrate your intelligence and discipline, it could be the fact that you double majored. Where have you shined?
The interviewer could be asking you this question for a number of reasons. Obviously, the salary is an important factor to your interest in this job, but it should not be the overriding reason for your interest. A good answer to this question is, “The salary was very attractive, but the job itself is what was most attractive to me.”
The #1 rule of answering this question is doing your research on what you should be paid by using site like Global Guideline. You'll likely come up with a range, and we recommend stating the highest number in that range that applies, based on your experience, education, and skills. Then, make sure the hiring manager knows that you're flexible. You're communicating that you know your skills are valuable, but that you want the job and are willing to negotiate.
Do your research before answering this question - first, consider what the market average is for this job. You can find that by searching on Google (title followed by salary) and globalguideline.com and other websites. Then, consider this - based on your work experience and previous results, are you above average, if yes, by what % increase from your pay today from your perspective? Also - make sure if you aim high you can back it up with facts and your previous results so that you can make a strong case.
Without a doubt, social media is becoming more and more pervasive in our jobs. You should stress that social media is not appropriate for personal use at work. However, if the company embraces social media in certain departments (for example marketing), then you may want to discuss how you could use it for work (as long as it applies to your role).
This is a classic brainteaser, which was reportedly first asked by a Microsoft interviewer. Here's how to ""solve"" this brainteaser (remember to speak and reason out loud while solving this brainteaser): Why are manhole covers round? Could there be a structural reason? Why aren't manhole covers square? It would make it harder to fit with a cover. You'd have to rotate it exactly the right way.
The pipes below are also round, so fitting them might be easier, as might be making them. So many manhole covers are round because they don't need to be rotated. There are no corners to deal with. Also, a round manhole cover won't fall into a hole because it was rotated the wrong way, so it's safer. Looking at this, it seems corners are a problem. You can't cut yourself on a round manhole cover. And because it's round, it can be more easily transported. One person can roll it.
According to me we can not grow in the field without taking more responsibilities and risks and also we can't enhance our team leading capabilities, managerial skills without expose to wide range of people.
Examine the trends of the company and also where there may be some weaknesses (news articles often document this on public companies or look at their competitors to see how they're positioning it against them.) Then, once you have that knowledge, think creatively on how you could improve upon that weakness for them.
When I was in college, I took an art class to supplement my curriculum. I didn't take it very seriously, and assumed that, compared to my Engineering classes, it would be a walk in the park. My failing grades at midterm showed me otherwise. I'd even jeopardized my scholarship status. I knew I had to get my act together. I spent the rest of the semester making up for it, ended up getting a decent grade in the class. I learned that no matter what I'm doing, I should strive to do it to the best of my ability. Otherwise, it's not worth doing at all.
Usually, if the answer to a brainteaser seems too easy, chances are the answer's wrong. And in this case, the answer is not zero degrees. The hour hand, remember, moves as well. That is, in addition to the minute hand. And so, at 3:15, the hour hand and the minute hand are not on top of each other. In fact, the hour hand has moved a quarter of the way between the 3 and 4. This means it's moved a quarter of 30 degrees (360 degrees divided by 12 equals 30). So the answer, to be exact, is seven and a half degrees (30 divided by four).
Any candidate can read and regurgitate the company's “About” page. So, when interviewers ask this, they aren't necessarily trying to gauge whether you understand the mission-they want to know whether you care about it. Start with one line that shows you understand the company's goals, using a couple key words and phrases from the website, but then go on to make it personal. Say, “I'm personally drawn to this mission because…” or “I really believe in this approach because…” and share a personal example or two.
In the past, I have found it difficult to work with others who see themselves as better than others, who can take criticism, and who refuse to work with others. I have found it challenging to work with them b/c I am a team oriented person who feels the importance of working together over the needs of the individual especially in a learning environment.
If asked about plans for continued education, companies typically look for applicants to tie independent goals with the aims of the employer. Interviewers consistently want to see motivation to learn and improve. Continuing education shows such desires, especially when potentials display interests in academia potentially benefiting the company.
Answering in terms of “I plan on continuing my studies in the technology field,” when offered a question from a technology firm makes sense. Tailor answers about continued studies specific to desired job fields. Show interest in the industry and a desire to work long-term in said industry. Keep answers short and to the point, avoiding diatribes causing candidates to appear insincere.
I work well under pressure to meet deadlines without jeopardizing the quality of my work. I have always worked in a fast pace environment where we are constantly under pressure to achieve best results within a time frame.
I pride myself on being a good problem solver. Through my previous job and management positions I have faced numerous conflicts in different situations, and my experiences have helped me to hone my issue resolution skills. I believe that it is important to get to and address the root of the issue, in a respectable manner.
For this be prepared and research salary to find out what similar positions are paying in your area before you go to the interview. Try to find this information out before giving your salary expectations. You can and should provide a range instead of an exact number. But again, don't say any numbers you're not comfortable with because if the employer offers you a salary at the lowest end of your range, you don't have much to negotiate with when it comes to getting a higher salary.
It's easy to talk about what you liked about your job in an interview, but you need to be careful when responding to questions about the downsides of your last position. When you're asked at a job interview about what you didn't like about your previous job, try not to be too negative. You don't want the interviewer to think that you'll speak negatively about this job or the company should you eventually decide to move on after they have hired you.
Being unfamiliar with the organisation will spoil your chances with 75% of interviewers, according to one survey, so take this chance to show you have done your preparation and know the company inside and out. You will now have the chance to demonstrate that you've done your research, so reply mentioning all the positive things you have found out about the organisation and its sector etc. This means you'll have an enjoyable work environment and stability of employment etc – everything that brings out the best in you.
This is a classic guesstimate question where you need to think aloud. And so first off you round the U.S. population to 300 million people (it's actually about 315 million but rounding will be much easier and your interviewer will not score you lower for rounding). Then estimate how many people eat pizza. A decent educated guess is two out of every three people, or 200 million. Now let's say the average pizza-eating person eats pizza twice a month, and eats two slices at a time. That's four slices a month. If the average slice of pizza is perhaps six inches at the base and 10 inches long, then the slice is 30 square inches of pizza. So, four pizza slices would be 120 square inches (30 times 4).
Since one square foot equals 144 square inches (12 times 12), let's assume that each person who eats pizza eats one square foot per month. Since there are 200 million pizza-eating Americans, 200 million square feet of pizza are consumed in the U.S. each month. To summarize: 300 million people in America, 200 million eat pizza, average slice of pizza is six inches at the base and 10 inches long or 30 square inches, average American eats four slices of pizza a month, four pieces times 30 square inches equals 120 square inches (one square foot is 144 square inches), so let's assume one square foot per person, and thus one square foot times 200 million people equals 200 million square feet of pizza a month.
This is your final opportunity to persuade the interviewer that you are the right candidate for the job. Now is not the time to ask questions about holidays, pay or pensions – all these things can be asked later when you get an offer of employment. Now is the time to ask about any reservations that the interviewer may have about your suitability for the role. You will then give yourself one last chance to persuade the interviewer that you are the right candidate for the job.
Example Thank you. I think we have covered everything. Before we finish the interview I would like to take the opportunity to ask if you have any reservations about my suitability for this role?
This question is like a loaded gun, tricky and dangerous if you're not sure what you are doing. It's not uncommon for people to end up talking salary before really selling their skills, but knowledge is power as this is a negotiation after all. Again, this is an area where doing your research will be helpful as you will have an understanding of average salary.
One approach is asking the interviewer about the salary range, but to avoid the question entirely, you can respond that money isn't a key factor and you're goal is to advance in your career. However, if you have a minimum figure in mind and you believe you're able to get it, you may find it worth trying.
Depending on what's more important for the the role, you'll want to choose an example that showcases your project management skills (spearheading a project from end to end, juggling multiple moving parts) or one that shows your ability to confidently and effectively rally a team. And remember: “The best stories include enough detail to be believable and memorable,”. Show how you were a leader in this situation and how it represents your overall leadership experience and potential.
If you do not have the experience they need, you need to show the employer that you have the skills, qualities and knowledge that will make you equal to people with experience but not necessary the skills. It is also good to add how quick you can pick up the routine of a new job role.
This is a loaded question and a nasty little game that you will probably lose if you answer first. So, do not answer it. Instead, say something like, that's a tough question. Can you tell me the range for this position? In most cases, the interviewer, taken off guard, will tell you. If not, say that it can depend on the details of the job. Then give a wide range.
On the whole I prefer to stick to doing what I'm told rather than setting myself up to fail by doing things off my own bat. But there was this one time when I suggested to my boss at the pizza parlor that she try offering an ‘all you can eat' deal to students to boost trade on Mondays. She thought it was an interesting idea but nothing ever came of it.
Companies love it when you discuss how you've made an impact on your teammates, clients, or partners in the business or in school. It should be rewarding because of the hard work and creative process that you've put into it.
Good interview questions to ask interviewers at the end of the job interview include questions on the company growth or expansion, questions on personal development and training and questions on company values, staff retention and company achievements.
Never ask Salary, perks, leave, place of posting, etc. regarded questions. Try to ask more about the company to show how early you can make a contribution to your organization like. “Sir, with your kind permission I would like to know more about induction and developmental programs?” OR Sir, I would like to have my feedback, so that I can analyze and improve my strengths and rectify my shortcomings.
There are two common answers to this question that do little to impress recruiters:
☛ ‘I got a 2.1'
☛ ‘I passed my driving test'
No matter how proud you are of these achievements, they don't say anything exciting about you. When you're going for a graduate job, having a degree is hardly going to make you stand out from the crowd and neither is having a driving licence, which is a requirement of many jobs.
SHARE
Submit Your Feedback:
Your Location Is:
×
Thank You For Your Feedback!
Your message has been sent successfully.
Disclaimer
Interview Questions Answers .ORG is responsive and optimized web portal for individuals to get preparation for their job interviews, learning and training. Content at Interview Questions Answers .ORG might be simplified to improve our users experience.
We constantly review our content to avoid errors and copyright violations, but we cannot warrant full correctness of all the content.
While using this site, you agree to have read and accepted our terms of use,
cookie and privacy policy.
Copyright 2007-2018 by Interview Questions Answers .ORG All Rights Reserved. | {
"pile_set_name": "Pile-CC"
} |
Pages
Monday, 28 January 2019
All Meals W/C 28th January
Squee! I am so excited for the February challenge, which is starting in just a few days, but also I'm rather excited about exciting prospects on the horizon, some new challenges and I'm going to need a few days to decide how my plan for the next five years or so is going to change. based on these exciting times and challenges. I did say I wanted Balance this year, looks like I'm going to be working hard for it! | {
"pile_set_name": "Pile-CC"
} |
I just wanted to let everybody know there will be an ESK series again for 2014. I have been trying to finalize the dates but it will be a similar schedule for next year. Tracks will include Kershaw, VIR, Summit, and I’m looking at several new venues that are not nailed down just yet… | {
"pile_set_name": "Pile-CC"
} |
/*
* Copyright (c) 2016, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
*
* WSO2 Inc. licenses this file to you under the Apache License,
* Version 2.0 (the "License"); you may not use this file except
* in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package io.siddhi.core.query.function;
import io.siddhi.core.SiddhiAppRuntime;
import io.siddhi.core.SiddhiManager;
import io.siddhi.core.event.Event;
import io.siddhi.core.query.output.callback.QueryCallback;
import io.siddhi.core.stream.input.InputHandler;
import io.siddhi.core.util.EventPrinter;
import org.apache.log4j.Logger;
import org.testng.AssertJUnit;
import org.testng.annotations.BeforeMethod;
import org.testng.annotations.Test;
public class UUIDFunctionTestCase {
private static final Logger log = Logger.getLogger(UUIDFunctionTestCase.class);
private int count;
private boolean eventArrived;
@BeforeMethod
public void init() {
count = 0;
eventArrived = false;
}
@Test
public void testFunctionQuery1() throws InterruptedException {
log.info("UUIDFunction test1");
SiddhiManager siddhiManager = new SiddhiManager();
String planName = "@app:name('UUIDFunction') ";
String cseEventStream = "define stream cseEventStream (symbol string, price double, volume long , quantity " +
"int);";
String query = "@info(name = 'query1') " +
"from cseEventStream " +
"select symbol, price as price, quantity, UUID() as uniqueValue " +
"insert into outputStream;";
SiddhiAppRuntime siddhiAppRuntime = siddhiManager.createSiddhiAppRuntime(planName +
cseEventStream + query);
siddhiAppRuntime.addCallback("query1", new QueryCallback() {
@Override
public void receive(long timestamp, Event[] inEvents, Event[] removeEvents) {
EventPrinter.print(timestamp, inEvents, removeEvents);
AssertJUnit.assertEquals(1.56, inEvents[0].getData()[1]);
AssertJUnit.assertNotNull("UUID is expected", inEvents[0].getData()[3]);
AssertJUnit.assertTrue("String UUID is expected", inEvents[0].getData()[3] instanceof String);
count = count + inEvents.length;
}
});
InputHandler inputHandler = siddhiAppRuntime.getInputHandler("cseEventStream");
siddhiAppRuntime.start();
inputHandler.send(new Object[]{"WSO2", 1.56d, 60L, 6});
Thread.sleep(200);
org.testng.AssertJUnit.assertEquals(1, count);
siddhiAppRuntime.shutdown();
}
}
| {
"pile_set_name": "Github"
} |
Q:
VUE2 passing parameter from child to parent
how do i properly pass parameter from child to parent with an $emit function?
here what i have done
HTML
<lista-servizi-gialla :servizi="modello" v-on:centramappa="mappaCenter(x,y,selected)"></lista-servizi-gialla>
COMPONENT
template'
<span class="pull-right forward"
v-on:click="centraNellaMappa(single.x,single.y,single.selected)"></span>',
methods:{
centraNellaMappa : function(x,y,selected){
this.$emit('centramappa',[x],[y],[selected]);
}
}
PARENT FUNCTION
mappaCenter : function(x,y,selected){
alert(x);
}
the 'x' parameter seems not being recognized
A:
Actually you are almost there, the only problem is the writing style you used for inline custom events handler.
v-on:centramappa="mappaCenter(x,y,selected)"
vue will look for x, y and selected variables in vue instance (this.x ...). Since you didn't define them in your instance, errors thrown.
So you have 3 solutions to solve this problem.
The easiest one. You can just pass method name like this.
v-on:centramappa="mappaCenter"
vue will match the method automatically and pass the arguments for you. See demo below.
Vue.component('lista-servizi-gialla', {
template: `
<span class="pull-right forward"
v-on:click="centraNellaMappa(3, 5, true)">
test
</span>
`,
methods:{
centraNellaMappa : function(x, y, selected) {
this.$emit('centramappa', [x], [y], [selected]);
}
}
});
new Vue({
el: '#app',
methods: {
mappaCenter: function(x, y, selected){
//alert(x);
console.log(`x: ${x}, y: ${y}, selected: ${selected}`);
}
}
});
<script src="https://cdnjs.cloudflare.com/ajax/libs/vue/2.4.2/vue.min.js"></script>
<div id="app">
<lista-servizi-gialla v-on:centramappa="mappaCenter"></lista-servizi-gialla>
</div>
You can also wrap your arguments into an object. Vue provides a special variable called $event, its value will be set as the first argument you passed in $emit event.
v-on:centramappa="mappaCenter($event)"
See demo below.
Vue.component('lista-servizi-gialla', {
template: `
<span class="pull-right forward"
v-on:click="centraNellaMappa(3, 5, true)">
test
</span>
`,
methods:{
centraNellaMappa : function(x, y, selected) {
this.$emit('centramappa', {x, y, selected});
}
}
});
new Vue({
el: '#app',
methods: {
mappaCenter: function({ x, y, selected }){
//alert(x);
console.log(`x: ${x}, y: ${y}, selected: ${selected}`);
}
}
});
<script src="https://cdnjs.cloudflare.com/ajax/libs/vue/2.4.2/vue.min.js"></script>
<div id="app">
<lista-servizi-gialla v-on:centramappa="mappaCenter($event)"></lista-servizi-gialla>
</div>
If you insist on keeping mappaCenter method in current form, you can use arguments variable which is defined in JavaScript spec.
v-on:centramappa="mappaCenter(...arguments)"
or
v-on:centramappa="mappaCenter(arguments[0], arguments[1], arguments[2])"
See demo below and check this answer for more information.
Vue.component('lista-servizi-gialla', {
template: `
<span class="pull-right forward"
v-on:click="centraNellaMappa(3, 5, true)">
test
</span>
`,
methods:{
centraNellaMappa : function(x, y, selected) {
this.$emit('centramappa', [x], [y], [selected]);
}
}
});
new Vue({
el: '#app',
methods: {
mappaCenter: function(x, y, selected){
//alert(x);
console.log(`x: ${x}, y: ${y}, selected: ${selected}`);
}
}
});
<script src="https://cdnjs.cloudflare.com/ajax/libs/vue/2.4.2/vue.min.js"></script>
<div id="app">
<lista-servizi-gialla v-on:centramappa="mappaCenter(arguments[0], arguments[1], arguments[2])"></lista-servizi-gialla>
</div>
| {
"pile_set_name": "StackExchange"
} |
Definition of sel
1. sell [ v ] exchange or deliver for money or its equivalentExamples:"He sold his house in January""She sells her body to survive and support her drug habit"
Used in print:
(The Providence Journal...)
The statutes , similar in both the Bay_State and Rhode_Island and dating_back in some instances to colonial times , severely limit the types of merchandise that may be sold on the Sabbath .
(The Philadelphia Inquirer,...)
The second agreement permits the authority to sell a 520 - acre tract west of Stage 1 Residential to Philadelphia Builders Eastwick_Corp. , a firm composed of 10 Philadelphia area builders , which is interested in developing part of the project .
(Chicago Daily Tribune...)
Typical touch : She sold a $ 10000 morning light mink to Sportsman_Freddie_Wacker for his frau , Jana_Mason , also an ex-singer .
(Chicago Daily Tribune,...)
He asserted that the Krogers were the bankers for Moscow , Lonsdale the Red paymaster , and the two civil_servants the recipients for selling their country 's secrets .
`` When they became members of the city police narcotics unit '' , Sokol said , `` they were told they would have to get to know certain areas of Chicago in_which narcotics were sold and they would have to get to know people in the narcotics racket . | {
"pile_set_name": "Pile-CC"
} |
Hypercalcaemia in acute renal failure.
A case of myoglobinuric acute renal failure complicated by hypercalcaemia is reported. Data on 13 other such cases published in the English literature since 1964 are summarised. Hypercalcaemia appears to be uniquely confined to rhabdomyolysis-myoglobinuric acute renal failure. Serum calcium concentrations should be monitored in such patients. | {
"pile_set_name": "PubMed Abstracts"
} |
Parallel synthesis of 1,3-dihydro-1,4-benzodiazepine-2-ones employing catch and release.
An efficient solid-phase method has been developed for the parallel synthesis of 1,3-dihydro-1,4-benzodiazepine-2-one derivatives. A key step in this procedure involves catching crude 2-aminobenzoimine products 4 on an amino acid Wang resin 10. Mild acidic conditions then promote a ring closure and in the same step cleavage from the resin to give pure benzodiazepine products 12. The 2-aminobenzoimines 4 can be synthesized from either 2-aminobenzonitriles 1 and Grignard reagents 2 or from iodoanilines 5 and nitriles 7 allowing a range of diversification. Further diversification can be introduced to the benzodiazepine products by N-alkylation promoted by a resin bound base and alkylating agents 13. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
Preserving whole potatoes
What is the best way to preserve potatoes for a long time with minimal loss of nutritional values?
I tried freezing, but the potatoes lost their taste and were unsuitable for cooking.
I tried cutting and drying, but the result was again tasteless.
When I just put the potatoes on the shelf, sometimes they remain good for a long time, but sometimes they rot. How can I lengthen their shelf time, and what is the maximum shelf lifetime I can hope for?
A:
The ideal storage for potatoes is approximately 42 to 50 F / 5.6 - 10.0 C in a dark space, with good humidity. This is historically what root cellars were for. With proper storage you should be able to get them from one harvest to the next—but ideal storage is rare at home. Nonetheless, at least a few weeks is more than reasonable.
Burying them in clean sand can be effective.
For more information than you ever wanted to know, see this article from Options for Storing Potatoes at home (PDF) from the University of Idaho extension.
A:
You could try cooking the potatoes before freezing them. In particular twice-baked potatoes and mashed potatoes take well to freezing.
How to Preserve Potatoes Without a Root Cellar on the Westphoria blog that discusses how to build a container so emulate a root cellar.
You could also experiment with lacto-fermentation, using either raw or cooked potatoes. Fermenting foods not only preserves them, but also generally improves their nutrition by making micronutrients more bioavailable.
Here is an interesting technical article about potato fermentation
Here are some comments from PaleoHacks on fermenting potatoes.
In The Art of Fermentation (p. 230) Sandor Katz briefly discusses potato fermentation. He describes fermenting cooked potatoes with other fermenting vegetables (though there's no reason you couldn't ferment them without the other vegetables).
He also references Jenny McGruther (of Nourished Kitchen), she has a recipe for fermented potato chips that demonstrates a basic fermentation technique. The technique is basically to slice the potatoes thin, then mix with water and a starter culture such as whey or a starter culture packet.
In The Mind of a Chef, season 1, episode 6 (or maybe 5), chef Rene Redzepi (of Noma) briefly discusses the process of aging potatoes to intensify their flavors, it might be interesting to you.
| {
"pile_set_name": "StackExchange"
} |
Recording Artist Alexa WildingWhat are some of your personal style influences? Women in the world like Patty Smith and Anna Corinna, and I kinda like to meet in the middle of that. This is definitely an an Anna Corinna day. My daily aesthetic is very rock and roll meets French ballerina. I love puffed sleeves, and I love things that are more costume.
How do you merge fashion and music? I wear Ivana Helsinki practically every single day because to me, it's the easiest embodiment of my style. It's innocent girl/woman with a little bit of an edge to it. I would always wear a dress like this with black tights adding sort of a beatnik edge to things instead of going Alice in Wonderland with it. I think for me, since music is my life, I try to be Alexa Wilding all the time. For me there really isn't much difference between the stage and everyday life. When I get up on stage, I try to bring that whimsical darkness as well. | {
"pile_set_name": "Pile-CC"
} |
Manndorff zu Pfannhofen und Wissenau
von und zu Manndorff zu Pfannhofen und Wissenau are an Austrian nobility family, more specifically the Uradel (old nobility). They are among the oldest Carinthian noble families still in existence today.
Origin
Besides the Metnitz family, the Manndorffs are the oldest non-extinct family belonging to Carinthian nobility. The spelling of the name changed between Manndorff, Manndorf, Mandorf, Mondorf, Monsdorf, Mansdorf, and Manstorff.
The first bearer of the name, Harte Manus miles de Mondorf, appears mentioned in February 1214 before Acre in the Kingdom of Jerusalem as a witness to a deed of gift from the Wicard of Karlsperg, who transferred one of his Carinthian estates to the St. Johannis hospital in Jerusalem. Besides this Manndorff other members of long-established Carinthian nobility, namely Silberberg, Gurniz and Perneck—who were on a pilgrimage in the Holy land with the Wicard of Karlsperg--, were also witnesses to the deed. The exact origin of this first Manndorff and his ancestors remains unclear.
In a legend—written down in the castle of Manndorf in the year of 1688 by Freiherr Georg Siegmund, Baron von und zu Manndorff—titled "Manndorferischem Stamen Paumb" (loosely translated from German "Family Tree of the Manndorff's"), the Duke of Württemberg in 1118 acquainted a big and wild man, who the Prince married to a tall woman. After they had many children, most of them male, the Prince gave them all a village and called them Manndorff. Thereafter the Prince of Württemberg had a war for which he called onto many Manndorff's, who measured well and honorable in battle. The Prince then upraised the Manndorffs to nobility, and in the shield (referring to the coat of arms), gave them a naked, wild brave man including 3 spears. There is no historical evidence for this story.
Many more Manndorffs are documented in Carinthia in the 13th and the 14th century and the family is documented in the official Carinthian nobility register of the years 1446.
Hans von und zu Manndorf, Lord on Manndorf, Gurnitz, Waldenstein, Wiesenau, and Flaschberg, Imperial General Collector in Carinthia, was recorded on January 3, 1625 in the country council of Carniola.
The Manndorffs received the status of "Reichs- und erbländisch-österreichische Freiherrenstand" (Free lords of the realm and inherited Austrian lands) from Emperor Ferdinand III. in Ebersdorf on September 15, 1644 through "Herr auf Pfannhoffen und Wißenau" and the merging of the coat of arms of with the now extinct Haßlinger zu Pfannhofen und Seepüh and the now also extinct von Pibriach zum Biberstein.
Possessions
Over the centuries the Manndorffs acquired the following dominions, estates, and castles in Carinthia.
Manndorf
Pfannhofen
Wiesenau
Schüttbach
Pittersberg
Goldenstein
Rothenthurn
Flaschberg
Wulross
Biberstein
Neudenstein
Krastowitz
Seebichl
Vorderberg
Dietrichstein
Söbriach
Görtschachhof
Waldenstein
Gurnitz
Oberfalkenstein
Winklern
More family possessions existed in eastern Tyrol, Carniola (modern Slovenia) and Hungary.
Hans Manndorff founded the monastery Maria Luggau in 1520 in the valley of Lesachtal. Around the year 1500 he remodeled the estate Edling at Kotschach in the upper Gail Valley in Carinthia to a castle which he called "Manndorf". Castle Manndorf is considered to be one of the first castles in Carinthia
People
Hans Manndorff (1480–1530) was an imperial war paymaster in Vienna.
Joachim (1507–1556), Caspar (1536–1618), Hans III (1571–1629) of Manndorff were general collection officers in Carinthia.
Many other Manndorffs became deputies to the Carinthian state parliament. The coat of arms of the family Manndorff is represented five times in the hall of coat of arms inside the "Landhaus" (palace of the estates) of Klagenfurt.
Balthasar Manndorff (1574–1628) was a well known mercenary during the Thirty Years' War, Captain in the wars against Italy, and was stabbed to death in 1628 in a duel by a Mr. of Aschau.
Johann Ferdinand Reichsfreiherr von und zu Manndorff (1644–1696) and his wife Anna, born Countess of Hohenwart, left Carinthia as Protestants around 1690 and settled in Hungary (the present Austrian region Burgenland), where they acquired the castles and estates Galoshaza, Nikitsch, and Pilgersdorf.
Vincenz Reichsfreiherr von und zu Manndorff (1755–1820) was a district captain of Radom, Lublin, and Samocse in Galicia (present Poland).
Through the marriage of Anton Konrad (1797–1866) with Anna Maria Countess of Esterházy-Galantha a Transylvania -based Hungarian line of the family Manndorff was created, which became extinct with the death of Anton (1922–1978).
Dr. Geza from this Hungarian line, Reichsfreiherr von und zu Manndorff (1860–1925) was a member of the Hungarian Parliament.
Rudolph (1849–1918) became known as a political writer, his son Dr. Maximilian Reichsfreiherr von und zu Manndorff (1888–1970) was the teacher of Archduke Gottfried, was a district captain in Waidhofen/Thaya, and the lower Austrian Heimwehr (home guard) Commander, after the Austria-Hungary K.u.k. monarchy ended.
Through marriage of Dr. Maximilian Manndorff with Albertine von Mannlicher (1893–1957), all surviving bearers of the name Manndorff are also descendants of the inventor and arms designer Ferdinand, Knight of Mannlicher.
Ferdinand Manndorff (born 1922) is a politician and was elected to the Landtag of lower Austria and the Austrian Parliament. His son Andy Manndorff (born 1957) is a well-known composer and Jazz guitarist.
Hans Manndorff (born 1928), Brother of Ferdinand Manndorff, was the long-time Director of the museum of ethnology in Vienna
Coat of arms
Coat of arms (original): Inside a shield split horizontally in black and gold are three spears (called Shweinsfeder - ”swine’s feather” – a spear like war weapon) next to each other with varying colors; on the helmet which has black-golden embellishments is an adorned wild man, holding a spear with both hands in an angle so that the right hand touches the spear's golden part, the left hand the black part. In the oldest seals the spears in the shield were instead bars, they were probably golden in black.
Coat-of-arms (1644): Split in four with a fifth subdivision in the center. The center features the original coat of arms (as described above). The top left and bottom right feature an inwards facing, upright, two-tailed golden lion, holding a three-leafed green hazel branch (representing extinct Haßlinger line) on a black background; Top right and bottom left feature a blue diagonal bar with a beaver running up its length (representing extinct Pibriach line) on a golden background. On top of the shield are three helmets representing the three lines. On the right helmet, which has black-and-gold embellishments, the Haßlinger lion. On the middle helmet, which has green embellishments as in the original coat of arms, the wild man. On the left helmet, which has blue-and-gold embellishments, the Pibriach beaver.
Family Tree
Achaz Mandorfer (died 1448) married Elisabeth Stainpekh
Ulrich Maindorfer married I. Elisabeth Fleckh von Penck, married II. Ursula Anna Plazoller zu Plazoll
(II.)Hans Mandorfer (1480–1530) married Anna Söll von Teisegg, military paymaster to the Kaiser
Joachim Mandorfer (1507–1556) married Dorothea von Graben zum Stein, General collector in Carinthia
Caspar Manndorfer zu Mandorf und Placzoll (1536–1618) married Helena von Pibriach zum Biberstein, General Collector in Carinthia
Hans von und zu Manndorf (1571–1629) married Margarethe Hasslinger zu Pfannhofen und Seepühl, General Collector in Carinthia
Freiherr Siegmund Friedrich von Manndorff, Lord of Pfannhofen and Wissenau (1613–1683) married Katharina Barbara von Attems-Petzenstein
Freiherr Georg Siegmund von Manndorff (1638–1700) married Countess Anastasia to Spaur and Flavon
Freiherr Georg Mathias von Manndorff (1678–1758) married I. Freiin Maria Magdalena von Gaisruck; verh. II. Maria Theresia Kemetter Freiin zu Trübein
Freiin Maria Anna Katharina Josepha Nepomucena von Manndorff (born 1722)
Freiherr Niklas Ehrenreich von Manndorff (born 1725) verh. Maria Theresia Menkhover von Menkhoven (1717–1794)
Freiherr Franz von Manndorff (1754–1797)
Freiherr Vinzenz von Manndorff (1755–1820) verh. I. Baroness Maria Philippine Vanczura z Rzehnicz married II. Karoline Vanczura z Rzehnicz Kreishauptmann von Radom, Liblin and Samocse in Galizien in modern-day Poland
(I.) Freiin Friederike von Manndorff (born 1864)
(II.) Freiherr Anton von Manndorff von Pfannhofen und Wiesenau (1797–1866) verh. Gräfin Anna Mária Esterházy de Galántha
Freiin Josefine von Manndorff (1833–1890)
Freiherr Karl von Manndorff (1834–1866)
Freiherr Geza von Manndorff (1860–1925) verh. Gizella Korbuly, Dr. jur., Gutsbesitzer in Velencze, k.u.k. Lt. d. Res., Abg. d. ungar. Reichstags
Freiherr Bela von Manndorff (1892–1971) verh. I. Ella Meszleny v. Meszlen verh. II Alexa Halasz v. Dabas, Dipl. Ing., Rittm. d. Res.
Freiin Eva Anna Maria von Manndorff (1920–2004)
Freiherr Anton von Manndorff (1922–1978) verh. I Alexa Herresbacher verh. II Marianne Rousso
Freiherr Nikolaus Bela von Manndorff (1948–1970)
Freiin Elisabeth von Manndorff (1926–2010), Ordensfrau im Sacre Coeur in Bregenz, Riedenburg
Freiin Anna Maria von Manndorff (1893–1968)
(II.) Freiherr Adolf von Manndorff, Herr auf Pfannhofen und Wissenau (1802–1876) verh. I. Freiin Eleonore Helversen von Helversheim verh. II. Luise Kager Freiin von Stampach verh. III. Johanna Schild
(I.) Freiin Maria von Manndorff (1841–1848)
(I.) Freiin Caroline von Manndorff (1842–1852)
(I.) Freiin Melanie von Manndorff (1843–1857)
(I.) Freiin Ottilie von Manndorff (1844–1870)
(I.) Freiherr Rudolf von Manndorff (1849–1918) verh. Sophia Fiedler, politischer Schriftsteller
Freiin Miriam von Manndorff (1880–1934)
Freiherr Rudolf von Manndorff (1882–1912)
Freiin Gabriele von Manndorff (1883–1940)
Freiherr Franz Xaver von Manndorff (1885–1941) verh. Anna Kropfitsch
Freiin Guida von Manndorff (1912–2004)
Freiherr Rudolf von Manndorff (1914–1941)
Freiherr Udo von Manndorff (1886–1901)
Freiin Sophie von Manndorff (1887–1949)
Freiherr Maximilian von Manndorff (1888–1970) verh. Albertine von Mannlicher, Dr. jur., Erzieher des Erzherzogs Gottfried, Bezirkshauptmann in Waidhofen/Thaya und Kommandant der Niederösterreichischen Heimwehr.
Ferdinand Manndorff (1922–2013) verh. I. Hildegard Petrasch verh. II. Dorothea Feldhahn, Politiker und Abgeordneter zum Niederösterreichischen Landtag und zum Österreichischen Nationalrat
(I.)Hartmann Rudolf Maria Manndorff (born 1951) verh. Patricia Danninger
Maximilian Friedrich Maria Manndorff (born 1989)
Isabella Katharina Maria Manndorff (born 1991)
Sophia Anna Maria Manndorff (born 1993)
(II.)Andy Manndorff (born 1957), Komponist und Jazzgittarist, verh. Andrea Schneider
Harti Manndorff (1924–1944), Fliegerleutnant
Lore Manndorff (1926–1992)
Hans Manndorff (born 1928) verh. I. Gertrude Graf verh. II. Elisabeth Bauer, Dr.phil., Univ. Prof., Direktor des Museums für Völkerkunde in Wien.
(I.) Wolfgang Manndorff (born 1960)
(I.) Rudolf Manndorff (born 1963) verh. Anette Schneider, Pilot
Julian Manndorff (born 1999)
(II.) Hemma Manndorff (born 1984)
Maria Manndoff (born 1934) verh. I. DI Nikolaus Rohla verh. II. Dr. Herbert Melichar verh. III. Mag. pharm. Wolfgang Lorenzoni
Franzi Manndorff (born 1936) verh. I. Elisabeth Daublebsky von Eichhain verh. II. Irene Umgeher, Dr. jur., Vorstandsdirektor einer Versicherungsgesellschaft, Major der Res.
Georg Manndorff (born 1969), Mag. rer.soc.oec.
Hannes Manndorff (born 1970), Dr. phil.
Freiherr Johann von Manndorff (1890–1891)
Freiin Helene von Manndorff (1892–1969)
Freiin Mathilde von Manndorff (1893–1970)
Freiherr Johann von Manndorff (1894–1895)
(I.) Freiin Maria von Manndorff (1850–1850)
(II.) Freiin Philomena von Manndorff (1872–1948)
(II.) Freiherr Robert von Manndorff (1874–1937)
Freiin Nepomucena von Manndorff
Literature
Gothaisches Genealogisches Taschenbuch der Freiherrlichen Häuser (GGT F). 1870 bis 1941
Genealogisches Handbuch des Adels, Freiherrliche Häuser XXIII. 2005, Ältere Genealogie
Friedrich Graf Lanjus: Mandorff-Regesten. In: Monatsblatt der Gesellschaft „ADLER“. 1934
Siebmachers Wappenbuch, Band 29, „Der Adel in Kärnten, Krain und Dalmatien“. Neustadt an der Aisch 1980
A. Weiß: Der Adel Kärntens bis zum Jahre 1300. Wien 1869
Paul Dedic: Kärntner Exulanten des 17. Jahrhundert. In: Carinthia I. 1952
Georg Siegmund Freiherr von Manndorff: Mandorfferischer „Stamen-Paumb“. Rothenthurn 1688
Vinzenz Freiherr von Manndorff: Ergänzungen dazu, Wien 1815
Gustav Adolf von Metnitz: Geadelte Bürger in Kärnten. In: Carinthia. 1964
H. Wiessner, M. Vyoral-Tschapka: Burgen und Schlösser in Kärnten. Bezirk Hermagor, Spittal/Drau, Villach, Wien 1986
Thomas Tiefenbacher: Helena - eine geschichtliche Erzählung. Klagenfurt 1958.
detaillierte Ahnentafeln auf
References
Category:Austrian noble families
Category:Austrian nobility | {
"pile_set_name": "Wikipedia (en)"
} |
801 F.2d 399
Grossv.C.I.R.
85-7706
United States Court of Appeals,Ninth Circuit.
9/22/86
1
U.S.T.C.
AFFIRMED
| {
"pile_set_name": "FreeLaw"
} |
[egg_info]
tag_build = dev
tag_svn_revision = true
| {
"pile_set_name": "Github"
} |
Nursing surgery born for an organizational and strategical choise which allowed us to create a link whit hospital and territorial children's doctor, going to fill the lack of assistance during the period of hospital discharge and first visit of specialist for children's. Our aims are essentially two: see to peaceful back home baby and their family, insure a continuity of care ,continuing the technical educational intervention started during hospitalization, increasing the confidence in themselves in this new role. This anamnestic assessment carried out together with the parents enables us to empathize with the parent to allow itself to expose their doubts and questions. The cases to which addressed a nurse's control are: weight loss \>10%, maternal-fetal incompatibility group, deficit of G6PDH (Glucose-6-phosphate dehydrogenase), values predischarge of bilirubins in the intermediate zone of risk such as descript of AAP guidelines, baby with perinatal risk factors of infection, preterm infants, SGA (Small for Gestational Age) infants, infants from families at risk (drug addiction, alcoholism, poor socio-economic conditions, migrant families without residence permits) , red highlights not executed due to technical problems at birth (eyelids tightened); doubt audiological screening at birth, any other baby who, for whatever reason, the physician who performs the discharge decides to revalue in post discharge. Access to the surgery is by reservation CUP that takes place directly at the discharge of the baby and is closely related to the hospital stay and do not in any way replace the first visit to the pediatrician to be made within 7° to 10° days after discharge.
| {
"pile_set_name": "PubMed Central"
} |
Q:
javax.ws.rs.NotFoundException: Could not find resource for full path
Environment
Windows 7(64)
jdk1.7.0_51(64)
RESTEasy3.0.7
apache-tomcat-7.0.50
Project Name: hello
RESTEasyHelloWorldService.java:
package com.javacodegeeks.enterprise.rest.resteasy;
import javax.ws.rs.GET;
import javax.ws.rs.Path;
import javax.ws.rs.PathParam;
import javax.ws.rs.Produces;
import javax.ws.rs.core.MediaType;
@Path("/RESTEasyHelloWorld")
public class RESTEasyHelloWorldService {
@GET
@Path("/{param}")
@Produces(MediaType.TEXT_PLAIN)
public String getMsg(@PathParam("param") String name) {
String msg = "Rest say: good " + name;
return msg;
}
}
web.xml:
<web-app xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns="http://java.sun.com/xml/ns/javaee"
xsi:schemaLocation="http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/web-app_3_0.xsd"
id="WebApp_ID" version="3.0">
<display-name>hello</display-name>
<servlet-mapping>
<servlet-name>resteasy-servlet</servlet-name>
<url-pattern>/rest/*</url-pattern>
</servlet-mapping>
<!-- Auto scan REST service -->
<context-param>
<param-name>resteasy.scan</param-name>
<param-value>true</param-value>
</context-param>
<!-- this should be the same URL pattern as the servlet-mapping property -->
<context-param>
<param-name>resteasy.servlet.mapping.prefix</param-name>
<param-value>/rest</param-value>
</context-param>
<listener>
<listener-class>
org.jboss.resteasy.plugins.server.servlet.ResteasyBootstrap
</listener-class>
</listener>
<servlet>
<servlet-name>resteasy-servlet</servlet-name>
<servlet-class>
org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher
</servlet-class>
</servlet>
</web-app>
why do I get the exception when I call the http://localhost:8080/hello/rest/RESTEasyHelloWorld/a
returns:
javax.ws.rs.NotFoundException: Could not find resource for full path: http://localhost:8080/hello/rest/RESTEasyHelloWorld/a
at org.jboss.resteasy.core.registry.ClassNode.match(ClassNode.java:73)
at org.jboss.resteasy.core.registry.RootClassNode.match(RootClassNode.java:48)
...
A:
You could try to use http://localhost:8080/hello/RESTEasyHelloWorld/a. (Without the /rest).
If you want to use /rest, you can modify your RESTEasyHelloWorldService @Path to /rest/RESTEasyHelloWorld.
But based on the APIs versions you are using, you can do a much simpler job to get your restful service working.
I'm assuming you have resteasy-jaxrs lib on your classpath.
Since you are not using JBOSS or EAP, you also need to get resteasy-servlet-initializer. Documentation for using Servlet 3.0 Containers like TOMCAT here.
You will need to extend Application, creating for example a RESTEasyService:
@ApplicationPath("/rest")
public class RESTEasyService extends Application {
}
You don't need to provide any implementation for that class, since RESTEasy will scan for all providers and resources. Documentation for using Application class here.
Leave your RESTEasyHelloWorldService just like you said on your question:
@Path("/RESTEasyHelloWorld")
public class RESTEasyHelloWorldService {
@GET
@Path("/{param}")
@Produces(MediaType.TEXT_PLAIN)
public String getMsg(@PathParam("param") String name) {
String msg = "Rest say: good " + name;
return msg;
}
}
Now your web.xml doesn't need anything. Java WS-RS and RESTEasy are already doing everything.
Your web.xml can be like this:
<web-app xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns="http://java.sun.com/xml/ns/javaee"
xsi:schemaLocation="http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/web-app_3_0.xsd"
id="WebApp_ID" version="3.0">
<display-name>hello</display-name>
</web-app>
RESTEasy official documentation is a little confusing at start, but once you understand that the implementation is the same for JBOSS and NON-JBOSS apps (just the use of libs that change), you get things going easier.
A:
I got the same issue when I tried with 3.0.11.Final
<dependency>
<groupId>org.jboss.resteasy</groupId>
<artifactId>resteasy-jaxrs</artifactId>
<version>3.0.11.Final</version>
</dependency>
but when I tried with another version it worked.
<dependency>
<groupId>org.jboss.resteasy</groupId>
<artifactId>resteasy-jaxrs</artifactId>
<version>3.0.4.Final</version>
</dependency>
And moreover The URL(http://localhost:8080/hello/rest/RESTEasyHelloWorld/a) which you are trying is correct since you have mentioned /rest in the web.xml .Hope this helps.
| {
"pile_set_name": "StackExchange"
} |
1. Field of the Invention
The present invention relates to a semiconductor device, and more particularly, to a semiconductor device and fabrication method thereof which increases a junction breakdown voltage and improves a snap-back characteristic thereof.
2. Description of the Background Art
An integrated circuit unified within a single chip with regard to a control function and a driving function is referred to as a smart power device. An output terminal of the smart power device includes a high power transistor operating at a high voltage of about 15-80V, and a logic unit includes a normal transistor operating at a low voltage of about 5V. Such smart power devices are employed to drive a display apparatus such as LCD (liquid crystal display), and HDTV (high definition TV).
A high power transistor of the smart power device is formed such that a lightly doped region (or, called as drift region) which is lightly doped between a drain and a channel region, compared to the drain.
FIG. 1 is a cross-sectional view illustrating a high power semiconductor device unit of a smart power device according to the conventional art. Therein, a p-channel transistor is shown but an n-channel transistor has the same structure. That is, the conductive type of impurities or ions is opposite and the structure remains identical.
As shown therein, an n-type well 110 is formed in a p-type semiconductor substrate 100. A plurality of field oxide layers 101 are formed on the p-type semiconductor substrate 100 and the n-type well 110. A gate electrode 102 is formed to cover a predetermine portion of the upper surface of the field oxide layer 101 and the n-type well 110. In the n-type well 110 at the sides of the gate electrode 102 there are formed p+ type impurity layers 103a, 103b. the p+ impurity layer 103a is formed adjacent to an end portion of the gate electrode 102, and the p+ type impurity layer 103a is formed at an end portion of the field oxide layer 101 with the gate electrode 102 laid thereon and spaced from the end portion of the gate electrode 102.
The p+ type impurity layer 103b distanced from the gate electrode 102 is a drain. Also, a p-type impurity layer 104 which is a lightly doped impurity layer in comparison to the source/drain 103a, 103b is extended from a certain point between the field oxide film 101 and the source 103a to an end portion of the drain 103b and covers the drain 103b from bottom and side surfaces thereof. Also, the junction depth of the drift layer 104 remains constant at respective sides of the source and drain. The drift layer serves as a buffer layer when a high electric field is applied to the drain side, thereby preventing a junction breakdown and restraining a hot carrier effect from generating.
However, the semiconductor device as shown in FIG. 1 has disadvantages. That is, since the junction depth of the drift layer is constant, the thickness D1 of the drift layer beneath the drain is relatively thin compared to the thickness D2 of the drift layer beneath the field oxide layer. Accordingly, when high power is applied to the drain region, the electric field loaded at the drain is not sufficiently relieved. Therefore, a junction breakdown easily occurs at the drain region, and the breakdown voltage is relatively low. Further, the snap-back voltage is low due to the hot carrier generation, thereby deteriorating reliability of the semiconductor device.
The present invention is directed to overcoming the conventional disadvantages.
Therefore, it is an object of the present invention to provide a semiconductor device wherein a drift layer of a portion of a drain region and a field oxide layer edge having a strong electric field is formed deeper than a drift layer of the other portion thereof, thereby sufficiently relieving electric field and preventing a hot carrier generation as well as improving product reliability.
To achieve the above-described object, there is provided a semiconductor device according to the present invention which includes a semiconductor substrate having a first conductive type impurity, a well having a second conductive type impurity formed in a predetermined region of the semiconductor substrate, a plurality of field oxide layer formed on an upper surface of the semiconductor substrate having the first conductive type impurity and the well having the second conductive type impurity, a gate electrode formed on corresponding portions of the field oxide layer and the well, and a lightly doped first impurity region formed in the well between the gate electrode and the first conductive type impurity region and surrounding the first conductive impurity region from sides and lower portions thereof and relatively lightly doped in comparison to the first conductive type impurity region, wherein the device includes a junction of the lightly doped first impurity region surrounding the first conductive type impurity region is relatively deep in comparison to a junction of the lightly doped first impurity region below the field oxide layer.
Further, to achieve the above-described object, there is provided a semiconductor device fabrication method according to the present invention which includes the steps of forming a second conductive type well on a predetermined portion of a first conductive type semiconductor substrate, forming a plurality of field oxide layers on the semiconductor substrate and the well, forming a mask on the semiconductor substrate and the well so as to form a first conductive impurity layer in the well, forming a first conductive type impurity layer by implanting and annealing first conductive type impurity ions in the well using the mask, removing the mask, forming a gate electrode on the field oxide layer, the drift layer and the well, and forming a source in the well adjacent to an end portion of the gate electrode and a drain in the first conductive type impurity layer at an end portion of the field oxide layer adjacent to the other end portion of the gate electrode.
The features and advantages of the present invention will become more readily apparent from the detailed description given hereinafter. However, it should be understood that the detailed description and specific example, while indicating preferred embodiments of the invention, are given by way of illustration only, since various changes and modifications within the spirit and scope of the invention will become apparent to those skilled in the art from this detailed description. | {
"pile_set_name": "USPTO Backgrounds"
} |
The present invention relates generally to integrated circuits and, more particularly, to a process for forming dual damascene structures in an integrated circuit.
Single damascene is an interconnection fabrication process for integrated circuits in which grooves are formed in an insulating layer and filled with a conductive material to form interconnects. Dual damascene is a multi-level interconnection process in which, in addition to forming the grooves of single damascene, conductive contact (or via) openings are also formed in the insulating layer. A conductive material is formed in the grooves and conductive contact (or via) openings.
In one standard dual damascene process, a first oxide layer is deposited over a conductive structure. A hard mask is formed over the first oxide layer and a first patterned photoresist layer is formed on the hard mask. The hard mask is patterned using the first photoresist layer as a pattern. The first photoresist layer is removed and a second oxide layer is then formed over the hard mask.
A second patterned photoresist layer is formed over the second oxide layer. Both the first oxide layer and the second oxide layer are etched to form the dual damascene opening. The first oxide layer is etched using the hard mask as a pattern and the underlying conductive structure as an etch stop. The second oxide layer is etched using the second photoresist layer as a pattern and the hard mask as an etch stop. The second photoresist layer is then stripped.
This process involves a combination of different steps to form the dual damascene structure. For example, the hardmask is patterned prior to forming the second dielectric layer. Thus, the partially fabricated integrated circuit is transferred between different processing systems to perform the different deposition and patterning steps.
In another dual damascene process, a dielectric is formed and patterned using a first photoresist. The first photoresist is removed and the dielectric is patterned again using a second photoresist. The vias and grooves are formed using the different patterning steps. This process uses a timed etch to control the depth of the grooves. This process is difficult to control. Thus, it is desirable to develop a process that reduces the complexity of the process to form a dual damascene structure.
The present invention is directed to a process for forming a dual damascene structure. The process includes forming a stack including insulating layers and a stop layer where two masks are formed above the stack. One of the masks is used to form via or contact openings in the insulating layers and the second mask is used to form grooves for interconnections in the insulating layers. In one embodiment, the via or contact openings are formed prior to the grooves.
By using the two mask layers after the stack is formed, the number of processing steps and movement of the partially fabricated integrated circuit between systems may be reduced. In other words, the insulating layers and the etch stop may be formed and then subsequently patterned to form the dual damascene structure. Further, the insulating layer and the etch stop layer may be formed in the same chamber or cluster of chambers.
It is to be understood that both the foregoing general description and the following detailed description are exemplary, but are not restrictive, of the invention. | {
"pile_set_name": "USPTO Backgrounds"
} |
Woodbine Early Pick 4 Analysis
by Al Cimaglia
February 24, 2018
The Saturday feature at Woodbine rolls in race 5, a Preferred Handicap Pace with a $34,000 purse. The night begins with a 0.20 Pick 5 sequence which has a $50,000 guaranteed pool. The 0.20 Early Pick 4 which also has a $50,000 guaranteed pool starts in Race 4 and will be my focus.
Last night at Woodbine drivers Louis Roy, Bob McClure, Trevor Henry and Sylvain Filion each had two trips to the winner's circle. On a track rated "good" conditioner Richard Moreau led all trainers with two pictures. In general, it was a very chalky night as seven of ten winners paid $5.00 or less.
On Friday at Cal Expo my posted Pick 4 ticket failed in the opening and closing legs. The #9-Lumberjack Willie, who I mentioned in comments but did not select because of his outside post won and paid $8.00. Willie drifted out down the stretch and raced wide, but still was able to hang on. In the last leg #2-Lilbitofmama, who was not chosen by his regular pilot, set a lifetime mark and paid a handsome $20.80. The (9-6-2-3) combination returned $433.40 for a 0.20 wager.
Comments and selections below are based on a fast track.
Race 4
3 - Rubis Prescott - Gets a good post draw at a level for success, should be in the hunt at a square price.
4 - Artistic Madison - Even efforts recently but like #3 drops out of Opens and should like the company.
5 - Exhilarated - Steps up but winner of two straight is sharp and best to respect once again.
9 - Teachers Vet - Could battle #5 for the lead, has gate speed and was McNair's choice, connections are hot.
Race 5
7 - Nirvana Seelster - Placed behind #8 in last but missed a start. Usually in the hunt and could be better tonight.
8 - The Rev - Looking for 4th in a row and 2nd straight at this class. Post could be an issue but is sharp as a tack.
9 - American Virgin - 2nd start back off a 20-day break. Fits with this bunch if McNair can work a trip.
Race 6
3 - Audreys Dream - Not loving the 7/2 ML but at this level and with an inside starting slot should be in the mix.
4 - Cool Rock - Takes a significant drop in third start off the bench. Could be sitting on a big try.
7 - Bugatti - 2nd start since claim, tuned up at Flmd after 20 days off and could be dialed on high tonight.
Race 7
2 - Fan Court - Has missed a start but fits well and from this post, it's wise to respect chances.
3 - Traceur Hanover - Roy's choice drops out of Preferred ranks and appears to be a major player.
6 - Classy Dragon - Winner of 3 of last 5 and 1 loss due to a break. Looks like a great post draw for his stalking style.
You May Also Like
11.5.2017
Courtesy Breeders' Cup Notes Team
Winning trainer Steve Asmussen (Gun Runner) – “It’s a good team and he’s an incredible horse. Incredible horse. Everyone is part of the team and they did a phenomenal job. Scott (Blasi, assistant trainer), Angel (Garcia, exercise rider), Florent (Geroux, jockey), the owners... we did the right things at the right time and all that made it special. What an awesome feeling this is. Florent has the ultimate confidence in Gun Runner and he rode Gun Runner. It’s all part of the process. We had discussed what we’d see (in the race) through the day and I told him to ‘ride Gun Runner.’ I’m the lucky trainer of the Horse of the Year.”
Winning jockey Florent Geroux (Gun Runner) – “This (win) means a lot. It’s the biggest win of my career. It’s the big race with Horse of the Year on the line. I’m glad he was the best horse.
Were you surprised you were in front? “No, not really. I think he was the quickest horse in the race from the beginning of the race.\
“(Trainer) Steve (Asmussen) was the one who gave me the opportunity to ride this horse. We knew from the beginning he was the real deal. We were so confident going into the Kentucky Derby; we really thought it was his best chance ever to win it.”
(Collected was pressing Gun Runner) “It wasn’t like my horse was going crazy and would lose his chance. I really like (Collected) and I respect him a lot. He was the horse for the course for sure. He showed it today. He was just second best; my horse was the best horse today.”
Bob Baffert (Second with Collected, third with West Coast, fifth with favorite Arrogate and eight with Mubtaahij) – “My horses ran well. Arrogate...I don’t know. He just can’t find the plate. He’s like a pitcher who can’t find the plate. Gun Runner is a really good horse and he ran a great race. My other horses ran great. I hate to make any excuses for the big horse (Arrogate), but he’s just not the horse he was. He struggles over this track, but when I got him up to Santa Anita, I thought maybe...When he broke, he broke flat-footed and broke in and he weaved in. He lost a lot of momentum there. We were hoping to really send him away from there. I don’t know what happened to him. I don’t know if it’s this track or what. He’s just losing interest and I think that’s what it is. He’s run so many incredible races that I really think he’s just losing interest. That’s what it is. It’s time (for him to retire).
“But he has done so much. What he accomplished in a short period of time, the Travers win (in track and stakes record time), beating California Chrome (in the 2016 Classic), winning the Pegasus and the way he won in Dubai. You have to give Gun Runner credit. He laid it down and he took a lot of heat. Collected is a really good horse. We know how good he is.
“West Coast ran really well. He’s a horse that wants to be forwardly placed. It looks like they were just marching around there. They just sort of didn’t change positions. They just stayed the same all the way around there.”
Second-place jockey Martin Garcia (Collected) – “He ran great. I can’t be sure, of course, but I think if our positions were switched – if I was inside (Gun Runner) and he was out – we might have had a different finish. I wanted to get to the rail and save ground, but I couldn’t. I’m proud of him, though. He gave me what he had.”
Third-place jockey Javier Castellano (West Coast) – “I thought I was in good position on the far turn, but I just could not catch the top two. I have no complaints. He ran his heart out today.”
Fourth-place trainer Jorge Navarro (War Story) – “What can I say? I’m very happy. The jockey (Jose Ortiz) listened to me and rode a great race. Fourth with a 60-1 shot in this race? Very happy."
Fourth-place jockey Jose Ortiz (War Story) – "I just followed the instructions Jorge [Navarro]. He told me he doesn’t like horses outside of him. On the first turn, he was traveling well and I was able to put him where Jorge wanted him. He ran a good race."
Dead-heat fifth-place jockey Mike Smith (Arrogate) – “He just doesn’t like this track. For whatever reason, I hate to say it, he has shown it time and time again and showed it today. (His bad start) is what he’s been doing every time he runs here. When he’s on his A race, he’s one of the fastest horses we have ever seen. He just won’t run over here. I have tried to talk myself into thinking he would. He has just showed me time and time again that he wouldn’t.
(On the bad start) “That’s just what he does over this racetrack. I don’t know what it is. Every time I ride him here, he never seems to get underneath himself.”
Dead-heat fifth-place trainer Antonio Sano (Gunnevera) – “We ran against good horses but my horse ran good. I’m happy. It’s a tough race but he was very good.”
Dead-heat fifth-place jockey Edgard Zayas (Gunnevera) – "I think he had a good trip. It was a very tough race. It seemed like the beginning of the day the horses off the pace were running, but as the day went on the speed was holding. They came out of the gate and kept on running. He ran his race. He just couldn’t get there."
Trainer Aidan O’Brien (Churchill, sixth and War Decree, ninth) – “Churchill has had two or three hard races. We will go back to the turf with him next time. He seems OK after the race and appears relaxed.”
Sixth-place jockey Ryan Moore (Churchill) – He was going ok, I tried to give him a chance down the backstretch, but he didn’t seem to handle it.”
Eighth-place jockey Drayden Van Dyke (Mubtaahij) – “I had a perfect trip. I was right behind the leaders and it was good. But then those front two (Gun Runner and Collected) took off and we just couldn’t catch them.”
Ninth-place jockey Seamus Heffernan (War Decree) – “He didn’t handle the surface.”
Tenth-place jockey Mario Gutierrez (Pavel) – “I liked my position early. I was where I wanted to be. But it just wasn’t there at the end.”
Tenth-place trainer Doug O’Neill (Pavel) – “He appeared to come back healthy. We’ll go over him good when we get him back to the barn. (Jockey) Mario (Gutierrez) said he might have bled. I loved his position for a while, but he didn’t maintain that.”
Eleventh-place Trainer George Papaprodromou (Win the Space) – “He never looked comfortable to me. Joe said the same thing. He just never got hold of the track. I guess Santa Anita is best for him.” | {
"pile_set_name": "Pile-CC"
} |
724 F.Supp.2d 904 (2010)
Christopher SHIRLEY, Plaintiff,
v.
JED CAPITAL, LLC and John Harada, Defendants.
Case No. 09 C 7894.
United States District Court, N.D. Illinois, Eastern Division.
July 8, 2010.
*908 Robert David Loventhal, Robert D. Loventhal Law Office, Boston, MA, for Plaintiff.
Martin B. Carroll, Josh Goldberg, Fox, Hefter, Swibel, Levin & Carroll, LLP, Chicago, IL, for Defendants.
MEMORANDUM OPINION AND ORDER
HARRY D. LEINENWEBER, District Judge.
Before the Court is Defendants' Motion to Dismiss under Federal Rules of Civil Procedure 12(b)(1), 12(b)(6), 9(b), and 17. For the following reasons, the Motion to Dismiss is granted in part and denied in part.
I. BACKGROUND
Christopher Shirley ("Shirley"), a member of JED Capital, LLC ("JED"), is suing JED and its manager, John Harada, on seven counts: (1) breach of contract, (2) fraud in the inducement, (3) breach of fiduciary duty under the Illinois Limited Liability Company Act, (4) for an accounting and damages, (5) violation of the Illinois Wage Payment and Collection Act, (6) violation of federal securities laws, and (7) violation of the Racketeer Influenced Corrupt Organizations Act ("RICO").
JED is an investment company that participates in, among other things, automated trading of futures, equities, and foreign exchange instruments. Before January 1, 2007, Plaintiff Christopher Shirley, while working for various investment companies, developed several methods and programs for automated securities trading, including a Liquidity Replenishment Program ("LRP"). In March 2007, Shirley began working full-time for JED. Shirley's efforts using LRP produced millions of dollars in income for JED.
In July 2007, John Harada ("Harada"), JED'S manager, persuaded Shirley to convert $200,000 owed to him by JED, plus up to $100,000 in future earnings, into equity in JED, making Shirley a 10% owner-member of the LLC. Shirley alleges that Harada promised to use the money to support LRP. Shirley alleges that Harada failed to tell him that JED could not pay its bills and had no revenues except those brought in by Shirley. Harada said that if Shirley did not agree, JED would fire him and continue to use LRP without him. Shirley reluctantly agreed to Harada's suggestion. Shirley became a member of JED, but Harada retained all decision-making authority for the LLC.
Shirley continued to work for JED, producing profits in the millions of dollars. In September 2008, Harada persuaded Shirley to invest an additional $250,000 into JED in order to expand the LRP trade to London, making Shirley a 20% *909 member. Shirley made the investment on the specific agreement that the money would be used solely to expand the company's trading capabilities on the London stock exchange. Shirley alleges that Harada failed to tell him that JED was in the process of repaying an investment whereby it would become insolvent, that JED could not pay its bills, that Harada had "sucked" money out of JED to finance other ventures, and that JED needed Shirley's money for its daily survival. After Shirley made the additional investment, Harada allegedly failed to expand the company into the London market. Shirley alleges that this failure cost him and JED $3,000 daily in lost profits.
Shirley also alleges that Harada failed to pay him a $10,000 monthly salary that Shirley was contractually bound to receive in addition to his share of the profits he generated. Harada also failed to live up to his promises to provide financial and personnel support for the LRP program. Shirley alleges that this failure was based on JED's and Harada's intention to "freeze" Shirley out of JED and concentrate JED's resources on other ventures, in violation of their fiduciary and contractual obligations to Shirley.
Shirley decided to leave JED. On August 5, 2009, Shirley and Harada agreed to shut down the LRP program, close JED, and disburse JED's capital to the remaining members. Shirley received his share of the profits, but not his unpaid salary. Despite Shirley and Harada's agreements to shut down LRP and JED, JED allegedly recommenced running trades on the LRP program after Shirley left. JED has not accounted to Shirley for his share of the profits Shirley believes he should have received as a 20% member of JED.
Shirley alleges numerous improprieties committed by Harada as manager of JED, including using JED assets to fund Harada's other business ventures and borrowing JED funds for personal and family purposes.
Only Counts 6 (securities violation) and 7 (RICO) of the Amended Complaint are based on federal law. Defendants JED and Harada argue that Counts 6 and 7 do not state a claim for which relief may be granted and that the Court therefore does not have subject matter jurisdiction. Shirley responds that the Court has diversity jurisdiction even if it does not have federal issue jurisdictiona point that JED disputes. JED argues that, even if the Court does have jurisdiction, Counts 1 through 4 must be dismissed under Rule 12(b)(6) or Rule 17.
II. LEGAL STANDARDS
A. Subject Matter Jurisdiction
A federal court must have federal-question jurisdiction under 28 U.S.C. § 1331 or diversity jurisdiction under 28 U.S.C. § 1332. Arbaugh v. Y & H Corp., 546 U.S. 500, 513, 126 S.Ct. 1235, 163 L.Ed.2d 1097 (2006). If it has neither, it must dismiss the case under Federal Rule of Civil Procedure 12(b)(1) for lack of subject matter jurisdiction.
B. Rule 12(b)(6)
Under Rule 12(b)(6), a court must dismiss a plaintiff's claim if it does not include sufficient facts to state a claim to relief that is plausible on its face. Justice v. Town of Cicero, 577 F.3d 768, 771 (7th Cir.2009). In considering a motion to dismiss, a court must accept a plaintiff's allegations as true and view them, along with any reasonable inferences drawn from them, in the light most favorable to the plaintiff. Id.
C. Rule 9(b)
Rule 9(b) provides, "In alleging fraud or mistake, a party must state with *910 particularity the circumstances constituting fraud or mistake." A cause of action may be dismissed for failing to plead fraud or mistake with particularity. See Hayduk v. Lanna, 775 F.2d 441, 443-45 (1st Cir.1985).
III. DISCUSSION
A. Subject Matter Jurisdiction
The Court addresses this threshold issue first. If Defendants are correct that Plaintiff fails to state a claim under federal securities laws or RICO, then there is no federal question jurisdiction. If this is so, the Court must consider whether it has diversity jurisdiction.
1. Federal Question Jurisdiction
a. Securities Violation (Count 6)
i. The Agreements as Investment Contracts
The crux of this debate is whether Plaintiff's investments in JED constitute an "investment contract." If not, federal securities laws do not apply to Plaintiff's investments. See 15 U.S.C. § 77b(a)(1). The Supreme Court has devised a test for defining investment contracts in SEC v. W.J. Howey Co., 328 U.S. 293, 66 S.Ct. 1100, 90 L.Ed. 1244 (1946). Agreements are investment contracts, and therefore "securities," if they reflect (1) an investment of money (2) in a common enterprise (3) with profits to come solely from the entrepreneurial or managerial efforts of others. Id. at 301, 66 S.Ct. 1100; Nelson v. Stahl, 173 F.Supp.2d 153, 164 (S.D.N.Y.2001). Only the third prong is contested in this case.
One of the principal purposes of the federal securities laws is to "protect investors by promoting full disclosure of information necessary to informed investment decisions." Bailey v. J.W.K. Props., Inc., 904 F.2d 918, 921 (4th Cir.1990). Because the securities statutes are remedial in nature, they should be read broadly. SEC v. Glenn W. Turner Enters., Inc., 474 F.2d 476, 482 (9th Cir.1973). The word "solely" should not be interpreted strictly, but rather realistically, and should turn on whether the actions of those other than the investor are the "undeniably significant ones, those essential managerial efforts which affect the failure or success of the enterprise." Id.
Furthermore, the Howey test is to be tempered by the requirement that it is to be applied in light of the substance of the relationship rather than the form. See Int'l Brotherhood of Teamsters v. Daniel, 439 U.S. 551, 558, 99 S.Ct. 790, 58 L.Ed.2d 808 (1979). The Securities Exchange Act's definition of a "security" is flexible and is designed to adapt to the "countless and variable schemes devised by those who seek the use of the money of others on the promise of profits." Howey, 328 U.S. at 299, 66 S.Ct. 1100. Whether an LLC interest is a security depends on the particular facts of the investment arrangement and is a question that courts must determine on a case-by-case basis after taking into account the particular facts and circumstances of the investment arrangement. Cogniplex, Inc. v. Ross, 2001 WL 436210, *9 (N.D.Ill.2001).
Interest in an LLC may be a security where the members are so dependent on a manager that they cannot replace him or exercise ultimate control without him. Nelson, 173 F.Supp.2d at 165. Plaintiff argues that he had a securities interest in JED by pointing out the undisputed fact that JED was a "manager-managed," as opposed to a "member-managed" LLC, with Harada as the manager. Plaintiff's investment agreements ratified his original Employment Agreement, by which he received commissions for his work. Although Plaintiff ran the LRP, he had no control over JED's expenditures and had no recourse within the company *911 when Harada failed to provide the resources he had promised to the LRP. Since Harada was two-thirds owner of JED, membership meetings could not be called without his consent. As manager, Harada had the sole power to authorize distributions and had veto power over any change in manager. The Operating Agreement had no provision for removal of the manager for cause. Plaintiff had no control over JED's business and could not bind the company. Because interest in a manager-managed LLC is more likely to be a security interest where the members' ability to exercise management control is effectively non-existent, see KFC Ventures, L.L.C. v. Metairie Med. Equip. Leasing Corp., 2000 WL 726877, *2 (E.D.La.2000), these facts weigh in favor of Plaintiff's agreement with JED being an investment contract.
Defendants contend, however, that Plaintiff's argument fails because he was investing money in JED for the sole purpose of dedicating those funds entirely to the LRP, the part of JED that Plaintiff controlled, not so that Plaintiff could profit from the efforts of others. Furthermore, Defendants argue, as Plaintiff claims to have been producing almost all the profits of an otherwise-insolvent company, he can hardly claim to be a passive investor who invested his money while expecting to earn profits from the efforts of others.
This set of facts creates a close call as to whether Plaintiff's investment in JED was a security interest. As this Court has noted, LLC organizational structures "defy formulaic application of the Howey test." Cogniplex, 2001 WL 436210 at *10. Plaintiff had control over the workaday operations of the LRP and was responsible for the lion's share of the income of JED. For this work, he received commissions and was promised a salary.
But the history of the relationship indicates that Shirley started out at JED as an employee who received commissions25% of the first $150,000 of net profit and loss generated by Plaintiff's trading strategies in a year and 50% of the net profit and loss over $150,000. Even when he became a member-investor, Shirley was still an "employee," and his pay scheme as employee remained exactly the same. Therefore, it is misleading to focus on the commissions Plaintiff received, as the facts show that he was owed these as an employee.
Naturally, when Plaintiff invested money in JED, he had a right to expect something in addition to what he was getting as an employee, namely, an equity interest in JED as a whole. That meant he had an interest (eventually, a 20% interest) in those LRP profits that did not flow to him as commissions and an interest in any other profits JED might be making. Although he was generating most of the profits, he had no control over them once they went into JED's coffers.
The "legal right to a voice in partnership matters" is a key issue in determining activity or passivity. See Nelson, 173 F.Supp.2d at 165 (finding investment in LLC not a securities interest where investors had direct authority over management of LLC). Obviously, Plaintiff had no voice in controlling the LLC as a whole. By investing in JED, Plaintiff expected to acquire a 20% interest in JED's total profits (including those profits based on his own efforts and those profits based on the efforts of other membersif there had been any such profits), but the disbursement of any profits was entirely under Harada's control. Plaintiff had no control over whether the funds would be frittered away or used to increase the value of JED. Plaintiff may have had control over his job earnings, but he had essentially no control over his "investment."
Thus, Plaintiff was a passive investor as far as any additional profits from JED *912 were concerned. Anything he got above and beyond his commissions and salary, which he would have gotten anyway as an employee, was dependent on how Harada managed JED's assets. The Court therefore finds that, under the unusual circumstances of this case, Plaintiff's agreement to invest in JED qualifies as an "investment contract" for purposes of federal securities laws.
ii. Sufficiency of the Fraud Allegation under Rules 12(b)(6) and 9(b)
In order for Plaintiff's claim for securities fraud to be legally sufficient, it must meet the requirements of Rule 12(b)(6) and Rule 9(b). Plaintiff alleges that Defendants violated section 10(b) of the Securities and Exchange Act of 1934 (as amended, 15 U.S.C. § 78j(b)) and Rule 10b-5 (17 C.F.R. § 240.10b-5). In alleging such violation, a plaintiff must allege with particularity (1) that defendant made an untrue statement of material fact or omitted a material fact that rendered the statements made misleading ("any manipulative or deceptive device or contrivance," 15 U.S.C. § 78j(b)), (2) in connection with a securities transaction, (3) with intent to mislead, (4) causing damages. Schlifke v. Seafirst Corp., 866 F.2d 935, 943 (7th Cir. 1989); FED. R. CIV. P. 9(b).
Plaintiff has alleged, among other things, that in September 2008, Harada induced him to invest $250,000 in JED for its London expansion but omitted to tell Plaintiff the material facts that JED was in the process of repaying an investment whereby it would become insolvent (Plaintiff names a specific investor and amount in his Amended Complaint), that JED could not pay its bills, that Harada had used JED money to finance his other business ventures (the Amended Complaint specifically names the business ventures), and that JED needed Plaintiff's money for its daily survival. These are certainly material facts to someone contemplating an investment in a business. Plaintiff alleges that had he known the above facts, he would not have invested the $250,000. Plaintiff has alleged lost profits of $3,000 a day to JED and to himself based on Harada's mishandling of JED's funds. The Court finds the pleading of securities fraud legally sufficient under Rules 9(b) and 12(b)(6). Cf. Stahl, 173 F.Supp.2d at 168 (finding securities fraud sufficiently pled where defendant was alleged to have misrepresented company's financial condition). The motion to dismiss Count 6 is therefore denied.
Because Plaintiff has stated a valid claim under U.S. securities laws, the Court finds that it has subject matter jurisdiction. See 28 U.S.C. § 1331.
Defendants move to strike Plaintiff's allegations in Count 6 that Defendants made false statements about the use of his investment proceeds and threatened to dismiss him in order to induce him to invest. Defendants argue that these allegations do not constitute fraudulent actions. The motion is denied. See FED. R. CIV. P. 12(f); 15 U.S.C. § 78j(b) (prohibiting use of manipulative or deceptive devices in securities transactions); Smith v. AVSC Int'l Inc., 148 F.Supp.2d 302, 317 (S.D.N.Y. 2001) ("[M]otions to strike are generally disfavored and will not be granted unless the matter asserted clearly has no bearing on the issue in dispute.").
b. RICO violation (Count 7)
Defendants argue that Plaintiff fails to state a claim for RICO violation, citing Rule 12(b)(6) and Rule 9(b).
i. Pattern of "racketeering activity"
It is unlawful for a person associated with an enterprise engaged in interstate commerce to conduct or participate, directly or indirectly, in the conduct of the enterprise's affairs through "a pattern of racketeering activity." 18 U.S.C. *913 § 1962(c). "Racketeering activities" are defined in 18 U.S.C. § 1961(1), which provides an exhaustive list. Defendants argue that the misdeeds Plaintiff attributes to them are not racketeering activities under section 1961. For example, Plaintiff cites securities fraud as a racketeering activity, but such activity is expressly excluded as a predicate act for civil RICO purposes unless the person has been criminally convicted of the alleged securities fraud. 18 U.S.C. § 1964(c).
Plaintiff also cites common law fraud, extortion, theft, tax fraud, and embezzlement as racketeering activities, but, without something more, only extortion is defined as a racketeering activity in section 1961. The "something more" that Plaintiff alleges involves mail fraud under 18 U.S.C. § 1341 and wire fraud under 18 U.S.C. § 1343, both of which are racketeering activities under section 1961. The mail fraud statute applies only where the defendant uses the U.S. mails as "part of the execution" of a fraudulent scheme. Schmuck v. United States, 489 U.S. 705, 710, 109 S.Ct. 1443, 103 L.Ed.2d 734 (1989). The wire fraud statute is identical to the mail fraud statute, except that it applies to communications transmitted by wire, i.e., telephone, radio, or television, and does not apply to intrastate communications. Gintowt v. TL Ventures, 226 F.Supp.2d 672, 677 (E.D.Pa.2002). To support a mail or wire fraud conviction, a transmission "must further the scheme to defraud or be incident to an essential part of that scheme." Id.
In Paragraphs 35 through 39 of his Amended Complaint, Plaintiff alleges that Harada paid the bulk of the expenses of Need To Know Network ("NTKN"), one of Harada's other businesses, from JED's account and never reimbursed JED; paid NTKN salaries from JED funds, which were never reimbursed; made improperly documented loans to NTKN in excess of $500,000, which have not been repaid; paid $150,000 to a company owned by a JED member to cover up a bad trade; sold NTKN to a third party without reimbursing JED for sums it had loaned to NTKN; loaned personal funds to JED, then converted the loans to equity, and the equity to debt; and paid himself $61,000 interest on the purported loans. Plaintiff alleges that these incidents occurred between July 13, 2007 and August 1, 2009, except the sale of NTKN, which occurred around December 1, 2009. Plaintiff alleges that Harada and JED often made such transactions through electronic funds transfers. Plaintiff also alleges that Harada used electronic transmissions and/or mail to issue false and misleading tax forms in 2007 and 2008. Harada also allegedly employed electronic transfers to use JED funds for personal and family uses and to support his other businesses.
Plaintiff certainly alleges a pattern of continuing and related questionable business practices that appear to be a regular way of doing business. See H.J. Inc. v. Northwestern Bell Telephone Co., 492 U.S. 229, 239-43, 109 S.Ct. 2893, 106 L.Ed.2d 195 (1989). But because he is alleging fraudulent practices done by mail or wire, Plaintiff must meet the heightened particularity requirements of Rule 9(b) for pleading fraud. See Slaney v. Int'l Amateur Athletic Fed'n, 244 F.3d 580, 599 (7th Cir.2001). To satisfy this standard, a RICO plaintiff must allege the identity of the person who made the representation, the time, place and content of the misrepresentation, and the method by which the misrepresentation was communicated. Vicom, Inc. v. Harbridge Merchant Serv., Inc., 20 F.3d 771, 777 (7th Cir.1994). Moreover, because a RICO plaintiff must allege at least two predicate acts of fraud, he must satisfy the requirements of Rule *914 9(b) twice. Emery v. Am. Gen. Fin., Inc., 134 F.3d 1321, 1323 (7th Cir.1998).
Plaintiff's Amended Complaint omits many needed details. Take, for example, the allegation that Harada paid the bulk of NTKN's expenses from JED's account and never reimbursed JED. What misrepresentation did Harada make? For all we know from Plaintiff's Amended Complaint, Harada might have transferred funds to NTKN with the complete knowledge and approval of JED's members. Then where would be the fraud? Plaintiff alleges that Harada paid $150,000 to a company owned by a JED member to cover up a bad trade. Which company? Owned by which JED member? What exactly was the misrepresentation, and to whom? How was an electronic transfer used to further the fraud? As for the tax forms, what did they say that was false or misleading? Plaintiff alleges that Harada used JED assets for personal and family expenses, but gives no specific examples. How were these fraudulent, and how were electronic transfers used to further the fraud?
Plaintiff alleges in a general way that numerous investments and transfers were made through the use of electronic funds transfers. This is not specific enough. Plaintiff must state which transfers he believes were made electronically or by mail and how they furthered the fraud. Furthermore, for the wire fraud statute to apply, the transfers must be made across state lines. Plaintiff makes no allegation to that effect.
For these reasons, the Court finds that Plaintiff has failed to plead a pattern of racketeering activity with the specificity required by Rule 9(b).
ii. Distinguishing the RICO Person from the RICO Enterprise
The RICO statute targets a "person" who is associated with an "enterprise." 18 U.S.C. § 1962(c) ("It shall be unlawful for any person employed by or associated with any enterprise . . ."). The Seventh Circuit has held that the "person" and the "enterprise" must be distinct entities. Haroco Inc. v. Am. Nat'l Bank & Trust Co. of Chicago, 747 F.2d 384, 400-02 (7th Cir.1984).
Plaintiff's Amended Complaint seeks to hold both JED and Harada liable for RICO violations. It also states that for RICO purposes, "JED and Harada constitute the operative racketeering enterprise." It would appear from Plaintiff's narrative that he means to target Harada as the "person" who used the "enterprise" of JED to engage in racketeering activities, but, as written, the Amended Complaint treats JED and Harada as both persons and enterprises. This is an additional reason for dismissing this count.
Count 7 is dismissed without prejudice for Plaintiff to amend his complaint.
2. Diversity jurisdiction
Because the Court has jurisdiction based on an issue of federal securities laws, the Court need not consider whether it has diversity jurisdiction.
B. Breach of Contract (Count 1) and Fraud in the Inducement (Count 2)
Because Plaintiff's state law claims arise out of a "common nucleus of operative facts" with the federal claim in the case, the Court has jurisdiction over the state law claims as well. 28 U.S.C. § 1367(a); United Mine Workers v. Gibbs, 383 U.S. 715, 725, 86 S.Ct. 1130, 16 L.Ed.2d 218 (1966).
1. Breach of Contract
Plaintiff alleges that Defendants breached their contract when they failed to honor their promises to provide resource support for the LRP, thereby preventing the LRP from reaching its full potential; this cost Plaintiff millions of dollars. But *915 there is no mention in the contracts between Plaintiff and Defendants of financial or resource support for the LRP. Apparently, Harada's promises on that score were made orally and do not appear in any written contract.
Under Illinois law, a written contract is presumed to include all material terms agreed upon by the parties, and prior negotiations or representations are merged into that agreement; extrinsic evidence, parol or otherwise, of earlier understandings and negotiations is generally inadmissible to alter, vary, or contradict the written contract. K's Merch. Mart, Inc. v. Northgate Ltd. P'ship, 359 Ill.App.3d 1137, 296 Ill.Dec. 612, 835 N.E.2d 965, 971 (Ill. App.Ct.2005). There being no legally cognizable contractual requirement for Defendants to provide support for the LRP, Plaintiff has no claim against them on that point. Count 1 is therefore dismissed.
2. Fraud in the Inducement
Plaintiff alleges that Defendants fraudulently induced him to make his two large investments in JED by falsely representing that the funds would be used to support, expand, and enhance the LRP. Defendants argue that only misrepresentations of present or existing fact, not promises of future performance, are actionable under Illinois law. See Bower v. Jones, 978 F.2d 1004, 1011 (7th Cir.1992).
While this is the general rule in Illinois, there is a well-recognized exception "where the false promise or representation of future conduct is alleged to be the scheme employed to accomplish the fraud." Steinberg v. Chicago Med. Sch., 69 Ill.2d 320, 13 Ill.Dec. 699, 371 N.E.2d 634, 641 (1977). "Where a party makes a promise of performance, not intending to keep the promise but intending for another party to rely on it, and where that other party relies upon it to his detriment, the false promise will be considered an intended scheme to defraud the victim and will be actionable." Concord Indus., Inc. v. Harvel Indus. Corp., 122 Ill.App.3d 845, 78 Ill. Dec. 898, 462 N.E.2d 1252, 1255 (Ill.App. Ct.1984).
Plaintiff's allegations that Defendants persuaded him to invest in JED by making promises that they had no intention of keeping while concealing JED's true financial condition, and that Plaintiff relied on those promises in agreeing to invest in JED, do indeed state a cause of action under Illinois law. The motion to dismiss Count 2 is therefore denied.
C. Rule 17 Motions
Defendants move to dismiss Counts 3 and 4 on the basis that the LLC is the real party in interest and that Plaintiff therefore has no standing to bring these claims. Federal Rule of Civil Procedure 17(a)(1) provides that "[an] action must be prosecuted in the name of the real party in interest." A court must dismiss a cause where the plaintiff is not the real party in interest, after allowing a reasonable opportunity for the real party in interest to be joined or substituted under Rule 17(a)(3). See McWhirter v. Otis Elevator Co., 40 F.Supp. 11 (W.D.S.C.1941) (holding that Rule 17 is mandatory and defendant has right to be sued by real party in interest).
1. Illinois LLC Act (Count 3)
Plaintiff brings a claim against Harada for alleged violations of his fiduciary duties toward JED under the Illinois LLC Act, 805 Ill. Comp. Stat. 180/15-3. Generally, a plaintiff should seek redress for such injuries through a derivative suit on behalf of the company, not through a direct suit on his own behalf. See, Elmhurst Consulting, LLC v. Gibson, 219 F.R.D. 125, 127 (N.D.Ill.2003).
An LLC member may, however, bring an action in the right of an LLC after the *916 members or managers with authority to bring such an action have refused to do so, or when demanding that they bring such an action would have been futile. 805 Ill. Comp. Stat. 180/40-1. A plaintiff in a derivative action must plead with particularity either the demand made to initiate the action or the reasons why demand would have been futile. 805 Ill. Comp. Stat. 180/40-10.
Plaintiff does not claim to have made a demand on the relevant director of the LLC (in this case, Harada); rather Plaintiff claims that such a demand would be futile. Under Illinois law, it is within the trial court's discretion to determine whether the demand requirement is excused. Powell v. Gant, 199 Ill.App.3d 259, 145 Ill.Dec. 339, 556 N.E.2d 1241, 1245 (Ill.App.Ct.1990). The doctrine of futility excuses demand where a majority of the directors are the alleged wrongdoers. Id. Demand futility is established where a plaintiff sufficiently alleges facts that raise a reasonable doubt as to (1) the directors' disinterestedness or independence or (2) whether the challenged transaction was the product of a valid business judgment. In re Abbott Labs. Derivative S'holder Litig., 325 F.3d 795, 807 (7th Cir.2003).
Plaintiff unquestionably alleges that Harada, the sole manager of JED, is the wrongdoer. Plaintiff alleges that Harada withheld JED's true financial condition when persuading Plaintiff to invest in JED; threatened to fire Plaintiff if he didn't invest; made false promises about how Plaintiff's investment money would be used; used JED funds to finance his other businesses; re-opened JED after agreeing to close it; and failed to distribute any profits to Plaintiff after re-opening JED. Taken together, these allegations raise reasonable doubts about Harada's disinterestedness, i.e., his undivided loyalty to JED's member-investors. The Court finds that Plaintiff has sufficiently pled that a demand would be futile. The motion to dismiss Count 3 is therefore denied.
2. Accounting and Damages (Count 4)
Generally, a court will exercise jurisdiction for purpose of ordering an accounting when discovery is necessary, when complicated or mutual accounts are involved, or when a fiduciary relationship exists between parties. Metro-Goldwyn-Mayer, Inc. v. Antioch Theatre Co., Inc., 52 Ill.App.3d 122, 9 Ill.Dec. 813, 367 N.E.2d 247, 255 (Ill.App.Ct.1977). Illinois courts have held that an order for an accounting is within the court's discretion. Newton v. Aitken, 260 Ill.App.3d 717, 198 Ill.Dec. 751, 633 N.E.2d 213, 218 (Ill.App. Ct.1994). Plaintiff sufficiently pleads a cause of action for accounting by alleging that Harada, who had a fiduciary relationship with JED and its members, re-opened JED and failed to distribute the profits to its members.
Less recent Illinois case law suggests that an action for equitable accounting will not lie until a plaintiff has made a demand for an accounting or established that a demand would be futile. See, Am. Sanitary Rag Co. v. Dry, 346 Ill.App. 459, 105 N.E.2d 133, 135 (Ill.App.Ct.1952); Patterson v. N. Trust Co., 170 Ill.App. 501 (Ill. App.Ct.1912). Even if this rule were to apply, the Court finds that any demand would be futile, as explained above. The motion to dismiss Count 4 is therefore denied.
IV. CONCLUSION
For the reasons stated herein, the Court rules as follows:
1. Defendants' Motion to Dismiss under Federal Rule of Civil Procedure 12(b)(1) is denied. The Court has subject matter jurisdiction under 28 U.S.C. § 1331.
*917 2. Defendants' Motions to Dismiss Counts 1 and 7 are granted. Counts 1 and 7 are dismissed without prejudice. Plaintiff has leave to amend his Complaint within four weeks of this order.
3. Defendants' Motions to Dismiss Counts 2, 3, 4, and 6 are denied.
IT IS SO ORDERED.
| {
"pile_set_name": "FreeLaw"
} |
Connie Oustainge
Connie Oustainge (married name Connie Miles), was a female English international table tennis player.
She captained the England team and competed in the 1938 World Table Tennis Championships and was women's doubles quarter-finalist with Vera Dace.
See also
List of table tennis players
List of World Table Tennis Championships medalists
References
Category:English female table tennis players
Category:1917 births
Category:2013 deaths | {
"pile_set_name": "Wikipedia (en)"
} |
---
abstract: 'I describe harmonic-oscillator-based effective theory (HOBET) and explore the extent to which the effects of excluded higher-energy oscillator shells can be represented by a contact-gradient expansion in next-to-next-to-leading order (NNLO). I find the expansion can be very successful provided the energy dependence of the effective interaction, connected with missing long-wavelength physics associated with low-energy breakup channels, is taken into account. I discuss a modification that removes operator mixing from HOBET, simplifying the task of determining the parameters of an NNLO interaction.'
address: |
Inst. for Nuclear Theory and Dept. of Physics, University of Washington\
Seattle, WA 98195, USA\
E-mail: [email protected]
author:
- 'W. C. HAXTON'
title: 'HARMONIC-OSCILLATOR-BASED EFFECTIVE THEORY'
---
Introduction
============
Often the problem of calculating long-wavelength nuclear observables – binding energies, radii, or responses to low-momentum probes – is formulated in terms of pointlike, nonrelativistic nucleons interacting through a potential. To solve this problem theorists have developed both nuclear models, which are not systematically improvable, and exact numerical techniques, such as fermion Monte Carlo. Because the nuclear many-body problem is so difficult – one must simultaneously deal with anomalously large NN scattering lengths and a potential that has a short-range, strongly repulsive core – exact approaches are numerically challenging, so far limited to the lighter nuclei within the 1s and lower 1p shells. The Argonne theory group has been one of the main developers of such exact methods [@argonne].
However, effective theory (ET) offers an alternative, a method that limits the numerical difficulty of a calculation by restricting it to a finite Hilbert space (the $P$- or “included"-space), while correcting the bare Hamiltonian $H$ (and other operators) for the effects of the $Q$- or “excluded"-space. Calculations using the effective Hamiltonian $H^{eff}$ within $P$ reproduce the results using $H$ within $P+Q$, over the domain of overlap. That is, the effects of $Q$ on $P$-space calculations are absorbed into $P(H^{eff}-H)P$. There may exist some systematic expansion – perhaps having to do with the shorter range of interactions in $Q$ – that simplifies the determination $P(H^{eff}-H)P$ [@weinberg; @savage].
One interesting challenge for ET is the case of a $P$-space basis of harmonic oscillator (HO) Slater determinants. This is a special basis for nuclear physics because of center-of-mass separability: if all Slater determinants containing up to $n$ oscillator quanta are retained, $H^{eff}$ will be translationally invariant (assuming $H$ is). Such bases are also important because of powerful shell-model (SM) techniques that have been developed for interative diagonalization and for evaluating inclusive responses. The larger $P$ can be made, the smaller the effects of $H^{eff}-H$.
There are two common approaches to the ET problem. One is the determination of $P(H^{eff}-H)P$ from a given $H$ known throughout $P+Q$, a problem that appears naively to be no less difficult than the original $P+Q$ diagonalization of $H$. However, this may not be the case if $H$ is somehow simpler when acting in $Q$. For example, if $Q$ contains primarily high-momentum (short-distance) interactions, then $H^{eff}-H$ might have a cluster expansion: it becomes increasingly unlikely to have $m$ nucleons in close proximity, as $m$ increases (e.g., a maximum of four nucleons can be in a relative s-state). Thus one could approximate the full scattering series in $Q$ by successive two-body, three-body, etc., terms, with the expectation that this series will converge quickly with increasing nucleon number. This would explain why simple two-nucleon ladder sums – g-matrices – have been somewhat successful as effective interactions [@kuobrown] (however, see Ref. ).
The second approach is that usually taken in effective field theories [@savage], determining $H^{eff}$ phenomenologically. This is the “eliminate the middleman" approach: $H$ itself is an effective interaction, parameterized in order to reproduce $NN$ scattering and other data up to some energy. So why go to the extra work of this intermediate stage between QCD and SM-like spaces? This alternative approach begins with $PHP$, the long-range $NN$ interaction that is dominated by pion exchange and constrained by chiral symmetry. The effects of the omitted $Q$-space, $P(H^{eff}-H)P$, might be expressed in some systematic expansion, with the coefficients of that expansion directly determined from data, rather than from any knowledge of $H$ acting outside of $P$.
While we explored this second approach some years ago, some subtle issues arose, connected with properties of HO bases. This convinced us that the first step in our program should be solving and thoroughly understanding the effective interactions problem via the first approach, so that we would have answers in hand to test the success of more phenomenological approaches. Thus we proceeded to follow the first approach using a realistic $NN$ potential, $av18$ [@argonne2], generating $H^{eff}$ numerically for the two- and three-body problems in a variety of HO SM spaces. Here I will use these results to show that a properly defined short-range interaction provides an excellent representation of the effective interaction. This is an encouraging result, one that suggests a purely phenomenological treatment of the effective interaction might succeed.
The key observation is that HOBET is an expansion around momenta $k \sim 1/b$, and thus differs from EFT approaches that expand around $k \sim 0$. Consequently a HOBET $P$-space lacks both high-momentum components important to short-range $NN$ interactions and long-wavelength components important to minimizing the kinetic energy. While our group has previously discussed some of the consequences of the combined infrared/ultraviolet problem in HOBET, here I identify another: a sharp energy dependence in $H^{eff}$ that must be addressed before any simple representation of $H^{eff}-H$ is possible. This, combined with a trick to remove operator mixing, leads to a simple and successful short-range expansion for $H^{eff}-H$. I conclude by noting how these results may set the stage for a successful determination of the HOBET $H^{eff}$ directly from data.
Review of the Bloch-Horowitz Equation
=====================================
The basis for the approach described here is the Bloch-Horowitz (BH) equation, which generates a Hermitian, energy-dependent effective Hamiltonian, $H^{eff}$, which operates in a finite Hilbert space from which high-energy HO Slater determinants are omitted: $$\begin{aligned}
\label{wh:eq1}
H^{eff} = H &+& H {1 \over E - Q H} Q H \nonumber \\
H^{eff} |\Psi_P \rangle = E |\Psi_P \rangle ~~~&&~~~ |\Psi_P \rangle
= (1-Q) |\Psi \rangle.\end{aligned}$$ Here $H$ is the bare Hamiltonian and $E$ and $\Psi$ are the exact eigenvalue and wave function (that is, the results of a full solution of the Schroedinger equation for $H$ in $P+Q$). The BH equation must be solved self-consistently, as $H^{eff}$ depends on $E$. If this is done, the model-space calculation reproduces the exact $E$, and the model-space wave function $\Psi_P$ is simply the restriction of $\Psi$ to $P$. If one takes for $P$ a complete set of HO Slater determinants with HO energy $\le \Lambda_P \hbar \omega$, $H^{eff}$ will be translational invariant. $P$ is then defined by two parameters, $\Lambda_P$ and the HO size parameter $b$.
The BH equation was solved numerically for the $av18$ potential using two numerical techniques. In work carried out in collaboration with C.-L. Song [@song], calculations were done for the deuteron and $^3$He/$^3$H by directly summing the effects of $av18$ in the $Q$-space. Because this potential has a rather hard core, sums to 140 $\hbar \omega$ were required to achieve $\sim$ 1 keV accuracy in the deuteron binding energy, and 70 $\hbar \omega$ to achieve $\sim$ 10 keV accuracies for $^3$He/$^3$H. In work carried out with T. Luu [@luu], such cutoffs were removed by doing momentum-space integrations over all possible excitations.
The results are helpful not only to the goals discussed previously, but also in illustrating general properties of $H^{eff}$ that may not be widely appreciated. For example, Table 1 gives the evolution of the $P$-space $^3$He $av18$ wave function as a function of increasing $\Lambda_P$ for fixed $b$. $\Psi_P$ evolves simply, with each increment of $\Lambda_P$ adding new components to the wave function, while leaving previous components unchanged. One sees that the probability of residing in the model space grows slowly from its 0$\hbar \omega$ value (31%) toward unity.
Effective operators are defined by $$\hat{O}^{eff} = (1 + HQ {1 \over E_f - HQ}) \hat{O}
(1 + {1 \over E_i - QH}QH)$$ and must be evaluated between wave functions $\Psi_P$ having the nontrivial normalization illustrated in Table 1 and determined by $$1 = \langle \Psi| \Psi \rangle = \langle \Psi_P |
\hat{1}^{eff} | \Psi_P \rangle.$$ The importance of this is illustrated in Fig. 1, where the elastic magnetic responses for deuterium and $^3$He are first evaluate with exact wave functions $\Psi_P$ but bare operators, then re-evaluated with the appropriate effective operators. Bare operators prove a disaster even at intermediate momentum transfers of 2-3 f$^{-1}$. By using the effective operator and effective wave function appropriate to $\Lambda_P$, the correct result – the form factor is independent of the choice of $\Lambda_P$ (or $b$) – is obtained, as it must in any correct application of effective theory.
![Deuteron and $^3$He elastic magnetic form factors evaluated for various $P$-spaces with bare operators (various dashed and dotted lines) and with the appropriate effective operators (all results converge to the solid lines).](fig1_wh){width="9cm"}
The choice of a HO basis excludes not only high-momentum components of wave functions connected with the hard core, but also low-momentum components connected with the proper asymptotic fall-off of the tail of the wave functions. This combined ultraviolet/infrared problem was first explored by us in connection with the nonperturbative behavior of $H^{eff}$: the need to simultaneously correct for the missing long- and short-distance behavior of $\Psi_P$ is the reason one cannot define a simple $P$ that makes evaluation of $H^{eff}$ converge rapidly. We also found a solution to this problem, a rewriting of the BH equation in which the relative kinetic energy operator is summed to all orders. This summation can be viewed as a transformation of a subset of the Slater determinants in $P$ to incorporate the correct asymptotic falloff. This soft physics, obtained from an infinite sum of high-energy HO states in $Q$, is the key to making $H^{eff}$ perturbative.
It turns out this physics is also central to the issue under discussion here, the existence of a simple representation for $H^{eff} = H + H { 1 \over E-QH} QH$, where $H=T+V$. The reorganized BH $H^{eff}$ is the sum of the three left-hand-side (LHS) terms in Eqs. (\[wh:eq4\]) $$\begin{aligned}
\langle \alpha | T + TQ {1 \over E-QT} QT | \beta \rangle&\underset{nonedge}{\longrightarrow}&\langle \alpha | T | \beta \rangle \nonumber \\
\langle \alpha | {E \over E-TQ} V {E \over E-QT} | \beta \rangle&\underset{nonedge}{\longrightarrow}&\langle \alpha | V | \beta \rangle \nonumber \\
\langle \alpha | {E \over E-TQ} V {1 \over E-QH} QV {E \over E-QT} | \beta \rangle&\underset{nonedge}{\longrightarrow}&\langle \alpha | V {1 \over E-QH} QV | \beta \rangle
\label{wh:eq4}\end{aligned}$$
The first LHS term is the effective interaction for $T$, the relative kinetic energy. As $QT$ acts as a ladder operator in the HO, $E/E-QT$ is the identity except when it operates on an $|\alpha \rangle$ with energy $\Lambda_P\hbar \omega$ or $(\Lambda_P-1) \hbar \omega$. We will call these Slater determinants the edge states. For nonedge states, this new expression and the BH form given in Eq. (\[wh:eq1\]) both reduce to the expressions on the right of Eqs. (\[wh:eq4\]).
Noting that the first LHS term in Eqs. (\[wh:eq4\]) can be rewritten as $$\langle \alpha | {E \over E-TQ} (T-{TQT \over E}) {E \over E-QT} | \beta \rangle,$$ we see that the $QT$ summation can be viewed as a transformation to a new basis for $P$, $E/(E-QT) |\alpha \rangle$, that is orthogonal but not orthonormal. This edge-state basis builds in the proper asymptotic behavior governed by $QT$ (free propagation) and the binding energy $E$. The transformation preserves translational invariance, as $T$ is the relative kinetic energy operator. Viewed in the transformed basis, the appropriate effective interaction in given by the LHS terms in the square brackets in Eqs. (\[wh:eq6\]) below.
Alternatively, the results can be viewed as two equivalent expressions for the effective interaction between HO states, but with a different division between “bare" and “rescattering" contributions $$\begin{aligned}
\mathrm{bare:}{E \over E-TQ} \left[ H - {TQT \over E} \right] {E \over E-QT}&\Leftrightarrow&H \nonumber \\
\mathrm{rescattering:}{E \over E-TQ} \left[ V {1 \over E-QH} QV \right] {E \over E-QT}&\Leftrightarrow& H {1 \over E-QH} QH
\label{wh:eq6}\end{aligned}$$ [*It is this new division that is critical.*]{} The expressions are identical for nonedge states. But for edge states, only the expression on the left isolates a quantity, $VGV$, that is short-range and nonperturbative. We will see that this is the term that can be represented by a simple, systematic expansion.
Figure 2 shows the extended tail that is induced by $E/E-QT$ acting on a HO state. Figure 3 is included to emphasize that there are important numerical differences between the two expressions in Eqs. (\[wh:eq6\]). It compares calculations done for the deuteron using the two “bare" interactions: thus in both cases $V$ enters only linearly between low-momentum states, and all multiple scattering of $V$ in $Q$ in ignored. Figure 3 gives the resulting deuteron binding energy as a function of $b$, for several values of $\Lambda_P$. For the standard form of the BH equation, a small model space overestimates the kinetic energy (too confining) and overestimates short-range contributions to $V$ (too little freedom to create the needed wave-function “hole"). Making $b$ larger to lower the kinetic energy exacerbates the short-range problem, and conversely. Thus the best $b$ is a poor compromise that, even in a 10 $\hbar \omega$ bare calculation, fails to bind the deuteron. But the new bare $H$ on the LHS of Eqs. (\[wh:eq6\]) sums $QT$ to give the correct wave-function behavior at large $r$, independent of $b$. Then, for the choice $b \sim$ 0.4-0.5 f, the short-range physics can be absorbed directly into the $P$ space. The result is excellent 0th-order ground-state energy, with the residual effects of multiple scattering through $QV$ being very small and perturbative [@luu].
![A comparison of the $|n l\rangle$ and extended $(E/E-QT) |n l\rangle$ radial wave functions, for the edge state $(n,l)=(6,0)$ in a $\Lambda_P=10$ deuteron calculation. Note that the normalization of the extended state has been adjusted to match that of $|nl\rangle$ at $r$=0, in order to show that the shapes differ only at large $r$. Thus the depletion of the extended state at small $r$ is not apparent in this figure.](fig2_wh){width="10cm"}
![Deuteron ground-state convergence in small $P$-spaces, omitting all effects due to the multiple scattering of $V$ in $Q$. The standard BH formulation with $P(T+V)P$ fails to bind the deuteron, even with $\Lambda_P=10$. The reorganized BH equation, where $QT$ has been summed to all orders but $V$ still appears only linearly, reproduces the correct binding energy for $\Lambda_P$=6.](fig3_wh){width="10cm"}
Harmonic-Oscillator-Based Effective Theory
==========================================
Now I turn to the question of whether (and how) the $Q$-space rescattering contribution to $H^{eff}$ might be expressed through some systematic short-range expansion. There are two steps important in applying such an expansion to HOBET. One has to do with the form of the short-range expansion. A contact-gradient (CG) expansion, constructed to include all possible LO (leading order), NLO (next-to-leading order) , NNLO (next-to-next-to-leading order), ..., interactions is commonly used, $$\begin{aligned}
a_{LO}^{ss}(\Lambda_P,b) \delta({\bf r}) +
a_{NLO}^{ss}(\Lambda_P,b) (\overleftarrow{\nabla}^2 \delta({\bf r}) +
\delta({\bf r}) \overrightarrow{\nabla}^2)+ \nonumber \\
a_{NNLO}^{ss,22}(\Lambda_P,b) \overleftarrow{\nabla}^2 \delta({\bf r}) \overrightarrow{\nabla}^2 +
a_{NNLO}^{ss,40} (\Lambda_P,b)(\overleftarrow{\nabla}^4 \delta({\bf r}) + \delta({\bf r}) \overrightarrow{\nabla}^4).
\label{wh:eq5}\end{aligned}$$
Because HOBET is an expansion around a typical momentum scale $\sim~1/b$, rather than around $\vec{k}=0$, it is helpful to redefine the derivatives appearing in the CG expansion Noting $$\overrightarrow{\nabla}^n \exp{i \vec{k} \cdot \vec{r}}~\arrowvert_{k=0} = 0, n=1,2,....,$$ we demand by analogy in HOBET $$\overrightarrow{\nabla}^n \psi_{1s}(b) = 0, n=1,2,...$$ This can be accomplished by redefining the operators $\hat{O}$ of Eqs. (\[wh:eq5\]) by $$\hat{O} \rightarrow e^{r^2/2} \hat{O} e^{r^2/2}$$
The gradients in Eq. (\[wh:eq5\]) then act on polynomials in $r$, a choice that removes all operator mixing. That is, if $a_{LO}$ is fixed in LO to the $n=1$ to $n=1$ matrix element, where $n$ is the nodal quantum number, it remains fixed in NLO, NNLO, etc. Furthermore, the expansion is in nodal quantum numbers, e.g., $$\overrightarrow{\nabla}^2 \sim (n-1)~~~~~~~~\overrightarrow{\nabla}^4 \sim (n-1)(n-2)$$ so that matrix elements become trivial to evaluate in any order. It can be shown that the leading order in $n$ contribution agrees with the plane-wave result, and that operator coefficients are a generalization of standard Talmi integrals for nonlocal potentials, e.g., $$a_{NNLO}^{ss,22} \sim \int^\infty_0 \int^\infty_0 e^{-r_1^2} r_1^2 V(r_1,r_2) r_2^2 e^{-r_2^2} r_1^2 r_2^2 dr_1 dr_2$$
The next step is to identify that quantity in the BH equation that should be identified with the CG expansion. This has to do with the two forms of the BH equation discussed previously. Consider the process of progressively integrating out $Q$ in favor of the CG expansion, beginning at $\Lambda >> \Lambda_P$ and progressing to $\Lambda=\Lambda_P$. Using the projection operator $$Q_\Lambda = \sum_{\alpha=\Lambda_P+1}^{\Lambda} | \alpha \rangle \langle \alpha |~~~~
Q_{\Lambda_P} \equiv 0$$ we can isolate the contributions, above some scale $\Lambda$, to the two BH rescattering terms of Eqs. (\[wh:eq6\]) $$\begin{aligned}
\Delta(\Lambda)&=&H {1 \over E-QH} QH - H {1 \over E-Q_\Lambda H} Q_\Lambda H \nonumber \\
\Delta_{QT}(\Lambda)&=&{E \over E-TQ} \left[ V {1 \over E-QH} QV - V {1 \over E-Q_\Lambda H} Q_\Lambda V \right] {E \over E-QT}.\end{aligned}$$ The goal of a CG expansion might be successful reproduction of the matrix elements of $\Delta(\Lambda)$ – the $Q$-space rescattering contributions for the standard form of the BH equation – as $\Lambda \rightarrow \Lambda_P$. This would allow us to replace all $Q$-space rescattering by a systematic short-range expansion, opening the door to a purely phenomenological determination of $H^{eff}$ for the SM. The test case will be an 8$\hbar \omega$ $P$-space calculation for the deuteron ($\Lambda_{P}$ = 8, $b$=1.7 f). The running of the 15 independent $^3$S$_1$ matrix elements of $\Delta(\Lambda)$ are plottted in Fig. 4a. Five of these are distinguished because they involve an edge-state bra or ket (or both). The evolution of these contributions with $\Lambda$ is seen to be somewhat less regular than that of nonedge-state matrix elements. The results for $\Lambda=\Lambda_P$ show that rescattering is responsible for typically 12 MeV of binding energy.
The CG fit to the results in Fig. 4a were done in LO, NLO, and NNLO as a function of $\Lambda$, using the standard form of the BH equation. The coefficients are fit to the lowest-energy matrix elements. Thus in LO $a_{LO}(\Lambda)$ is fixed by the $1s - 1s$ matrix element, leaving 14 unconstrained matrix elements; the NNLO fit ($1s-1s$, $1s-2s$, $1s-3s$, and $2s-2s$) leaves 11 matrix elements unconstrained. This is easily done, because the operators do not mix; e.g., among these four, only the $1s-3s$ matrix element is influenced by $a_{NNLO}^{ss,40}$. The result is a set of coefficient that run as a function of $\Lambda$ in the usual way, with $a_{LO}$ small and dominant for large $\Lambda$, and with the NLO and NNLO terms turning on as the scale is dropped. Figs. 4b-d show the residuals – the differences between the predicted and calculated matrix elements. For non-edge-state matrix elements the scale at which typical residuals in $\Delta$ are significant, say greater than 100 keV (above $\sim$ 1%), is brought down successively, e.g., from $\sim 100 \hbar \omega$, to $\sim 55 \hbar \omega$ (LO), to $\sim 25 \hbar \omega$ (NLO), and finally to $\sim \Lambda_P \hbar \omega$ (NNLO). But matrix elements involving edge states break this pattern: the improvement is not significant, with noticeable deviations remaining at $\sim 100 \hbar \omega$ even at NNLO.
![In a) rescattering contributions to $H^{eff}$ due to excitations in $Q$ above $\Lambda$ are given for the standard form of the BH equation. These results are for the 15 matrix elements that arise in an 8$\hbar \omega$ calculation for the deuteron, with $b$=1.7 f. In b)-d) the residuals of LO, NLO, and NNLO fits are shown (see text). Matrix elements with bra or ket (dashed) or both (dot-dashed) edge states are seen not to improve systematically.](fig4_sq){width="12cm"}
This failure could be anticipated: because $QT$ strongly couples nearest shells across the $P-Q$ boundary, $H{1 \over E-QH} QH$ contains long-range physics. The candidate short-range interaction is $V {1 \over E-QH} QV$, not $H{1 \over E-QH} QH$: this is the reason $QT$ should be first summed, putting the BH equation in a form – the LHS of Eqs. (\[wh:eq6\]) – that isolates this quantity. This reorganization affects edge-state matrix elements only, those with the large residuals in Figs. 4b-d.
To use the reorganized BH equation, the $QT$ sums appearing in Eqs. (\[wh:eq4\]) must be completed. There are several procedures for doing this, but one convenient method exploits the raising/lowering properties of $T$. The result is a series of continued fractions $\tilde{g}_i(2 E/\hbar \omega, \{\alpha_i\},\{\beta_i\})$, where $\alpha_i =(2n+2i+l-1/2)/2$ and $\beta_i = \sqrt{(n+i)(n+i+l+1/2)}/2$. For any operator $\hat{O}$ (e.g., $V$, $V {1 \over E-QH} QV$, etc.) $$\langle n' l' | {E \over E-TQ} O {E \over E-QT} | n l \rangle = \sum_{i,j=0} \tilde{g}_j(n',l') \tilde{g}_i(n,l) \langle n'+j~ l | O |n+i~ l \rangle$$ It follows that the coefficients of the CG expansion for a HO basis must be redefined for edge states, with a state- and E-dependent renormalization $$\begin{aligned}
&&a_{LO} \rightarrow a_{LO}'(E/\hbar \omega ; n',l',n,l) = a_{LO} \sum_{i,j=0} \tilde{g}_j(n',l') \tilde{g}_i(n,l) \nonumber \\
&&\times \left[ {\Gamma(n'+j+1/2)
\Gamma(n+i+1/2) \over \Gamma(n'+1/2) \Gamma(n+1/2)} \right]^{1/2}
\left[{(n'-1)! (n-1)! \over (n'+j-1)! (n+i-1)!} \right]^{1/2} .\end{aligned}$$ This renormalization, which introduces no new parameters, can be evaluated in a similar way for heavier systems: $T$ remains a raising operator.
![As in Fig. 4, but with the edge states treated according to the $QT$-summed reorganization of the BH equation, as described in the text.](fig5_sd){width="12cm"}
Figs. 5 shows the results: the difficulties encountered for $\Delta(\Lambda)$ do not arise for $\Delta_{QT}(\Lambda)$. The edge-state matrix elements are now well behaved, and the improvement from LO to NLO to NNLO is systematic in all cases. When $\Lambda \rightarrow \Lambda_P$, the CG potential continues to reproduce $H^{eff}$ for the $av18$ potential remarkably well, with an the average error in $^3$S$_1$ NNLO matrix elements of about 100 keV (or 1% accuracy). Other channels we explored behaved even better: the average error for the 15 $^1$S$_0$ matrix elements is about 10 keV (or 0.1% accuracy). Because all matrix elements of $H^{eff}$ are reproduced well, the CG potential preserves spectral properties, not simply properties of the lowest energy states within $P$. The NNLO calculation in the $^3$S$_1$-$^3$D$_1$ channel yields a deuteron ground-state energy of -2.21 MeV.
Several points can be made:\
$\bullet$ The net effect of the $QT$ summation is to weaken the CG potential for HO edge states: the resulting, more extended state has a reduced probability at small $r$. Consequently the effects of $QV$ are weaker than in states immune from the effects of $QT$.\
$\bullet$ The very strong $QT$ coupling of the $P$ and $Q$ spaces is clearly problematic for an ET: small changes in energy denominators alter the induced interactions. Thus it is quite reasonable that removal of this coupling leads to a strong energy dependence in the effective interaction between HO states. I believe that proper treatment of this energy dependence will be crucial to a correct description of the bound-state spectrum in the HO SM.\
$\bullet$ This process can also be viewed as a transformation to a new, orthogonal (but not normalized) basis for $P$ in which $|\alpha \rangle \rightarrow {E \over E-QT} |\alpha \rangle$. This yields basis states with the proper asymptotic behavior for each channel. A CG expansion with fixed coefficients can be used between these states, following the reorganized BH equation of Eqs. (\[wh:eq4\]).\
$\bullet$ While our calculations have been limited to the deuteron, this same phenomena must arise in heavier systems treated in HO bases – $QT$ remains the ladder operator. As the issue is extended states that minimize the kinetic energy, it is clear that the relevant parameter must be the Jacobi coordinate associated with the lowest breakup channel. This could be an issue for treatments of $H^{eff}$ based on the Lee-Suzuki transformation, which transforms the interaction into an energy-independent one . In approaches like the no-core shell model [@nocore], the Lee-Suzuki transformation is generally not evaluated exactly, but instead only at the two-body level. If such an approach were applied, for example, to $^6$Li, a system weakly bound (1.475 MeV) to breaking up as $\alpha$+d, it is not obvious that a two-body Lee-Suzuki transformation would treat the relevant Jacobi coordinate responsible for the dominant energy dependence. This should be explored.\
$\bullet$ I believe the conclusions about the CG expansion will apply to other effective interactions. For example, V-low-k [@achim], a soft potential obtained by integrating out high-momentum states, is derived in a plane-wave basis, where $T$ is diagonal. Thus it should be analogous to our CG interaction, requiring a similar renormalization when embedded into a HO SM space. It would be interesting to test this conclusion.
Summary
=======
These results show that the effective interaction in the HO SM must have a very sharp dependence on the binding energy, defined as the energy of the bound state relative to the first open channel. This is typically 0 to 10 MeV for the bound states of most nuclei (and 2.22 MeV for the deuteron ground state explored here). Once this energy dependence is identified, the set of effective interaction matrix elements can be represented quite well by a CG expansion, and the results for successive LO, NLO, and NNLO calculations improve systematically.
This result suggests that the explicit energy dependence of the BH equation is almost entirely due to $QT$ – though this inference, based on the behavior of matrix elements between states with different number of HO quanta, must be tested in a case where multiple bound states exist.
We also presented a simple redefinition of the gradients associated with CG expansions, viewing the expansion as one around a momentum scale $\sim 1/b$. This definition removes operator mixing, making NNLO and higher-order fits very simple. The expansion then becomes one in nodal quantum numbers, with the coefficients of the expansion related to Talmi integrals, generalized for nonlocal interactions.
While our exploration here has been based on “data" obtained from an exact BH calculation of the effective interaction for the $av18$ potential, this raises the question, is such a potential necessary to the SM? That is, now that the success of an NNLO description of $Q$-space contributions is established, could one start with $PHP$ and determine the coefficients for such a potential directly from data, without knowledge of matrix elements of $H$ outside of $P$? I believe the answer is yes, even in cases (like the deuteron) when insufficient information is available from bound states. It turns out that the techniques described here can be extended into the continuum, so that observables like phase shifts could be combined with bound-state information to determine the coefficients of such an expansion. An effort of this sort is in progress.
I thank M. Savage for helpful discussions, and T. Luu and C.-L. Song for enjoyable collaborations. This work was supported by the U.S. Department of Energy Division of Nuclear Physics and by DOE SciDAC grant DE-FG02-00ER-41132.
References
==========
[9]{} S. C. Pieper and R. B. Wiringa, [*Ann.Rev.Nucl.Part.Sci.*]{} [**51**]{}, 53 (2001).
S. Weinberg, [*Phys. Lett.*]{} [**B251**]{}, 288 (1990), [*Nucl. Phys.*]{} [**B363**]{}, 3 (1991), and [*Phys. Lett.*]{} [**295**]{}, 114 (1992).
S. R. Beane, P. F. Bedaque, W. C. Haxton, D. R. Philips, and M. J. Savage, in [*At the Frontier of Particle Physics, Vol. 1*]{} (World Scientific, Singapore, 2001), p. 133.
T. T. S. Kuo and G. E. Brown, [*Nucl. Phys.*]{} [**A114**]{}, 241 (1968).
B. R. Barrett and M. W. Kirson, [*Nucl. Phys.*]{} [**A148**]{}, 145 (1970).
T. H. Shucan and H. A. Wiedenmüller, [*Ann. Phys. (N.Y.)*]{} [**73**]{}, 108 (1972) and [**76**]{}, 483 (1973).
R. B. Wiringa, V. Stoks, and R. Schiavilla, [*Phys. Rev.*]{} [**C51**]{}, 28 (1995).
W. C. Haxton and C.-L. Song, [*Phys. Rev. Lett.*]{} [**84**]{}, 5484 (2000).
W. C. Haxton and T. C. Luu, [*Nucl. Phys.*]{} [**A690**]{}, 15 (2001) and [*Phys. Rev. Lett.*]{} [**89**]{}, 182503 (2002); T.C. Luu, S. Bogner, W. C. Haxton, and P. Navratil, [*Phys. Rev.*]{} [C70]{}, 014316 (2004).
P. Navratil, J. P. Vary, B. R. Barrett, [*Phys. Rev. Lett.*]{} [**84**]{}, 5728 (2000).
A. Schwenk, G. E. Brown, and B. Friman, [*Nucl. Phys.*]{} [**A703**]{}, 745 (2002); A. Schwenk, [*J. Phys.*]{} [**G31**]{}, S1273 (2005).
| {
"pile_set_name": "ArXiv"
} |
Congress demands PMO explanation on Snoopgate 2′, BJP says non-issue
Hyderabad, March 15 (IANS) The Congress on Sunday demanded an explanation from the Prime Minister’s Office on why the police were seeking details about its vice president Rahul Gandhi even as the BJP accused the opposition party of making an issue out of a "routine" security-related inquiry.
The Congress was also set to raise the issue in parliament on Monday.
Terming the incident "Snoopgate 2", Congress MP Shashi Tharoor said the prime minister needed to explain why the government needed details of a person protected by the Special Protection Group (SPG).
"PMOIndia needs to explain why it needs details of a person protected by the SPG. All his movements are recorded by SPG," he tweeted.
Delhi Police personnel visited Rahul Gandhi’s residence last week and also sought details about his height and colour of eyes and hair.
Party spokesperson Anand Sharma said the party would raise the issue in parliament.
Addressing reporters at the Congress headquarters in New Delhi, he said the Narendra Modi government "has much to answer when it comes to right of privacy of citizens".
"They are now trying to do it everywhere what was happening in one state. Both Modi and Amit Shah are now here. It is not confined to one person. It is much deeper. The practice that they had adopted in Gujarat, they want to carry it out now every where," he said.
Sharma, who has alleged in a newspaper interview that phones of senior leaders are being "tapped" and that they are under "surveillance", backed his statement, saying "letters are not sent for phone tapping to political leaders, judges and others … It can be proved only if the prime minister, home minister give letters to opposition leaders regarding their phone tapping".
The Bharatiya Janata Party accused the Congress of trying to politicize the issues.
In Hyderabad, union Parliamentary Affairs Minister M. Venkaiah Naidu said Prime Minister Modi or Home Minister Rajnath Singh were in no way involved in the police trying to find out details about Rahul Gandhi.
"According to Delhi Police, there was a security-related check and inquiry at the house of the Congress leader. Neither the prime minister nor home minister or government are in any way involved in this routine check and security drill by the security apparatus of Delhi Police," Naidu told reporters.
He also claimed that the same thing happened to him when he was in the opposition.
"They came and gave a questionnaire and asked me to sign that also. When I became minister, there was some inquiry. They said it is a routine check and we have to do it because we are giving you Z-plus security. They asked who are frequent visitors; any suspicion about anybody who is roaming around your house; do you notice anybody who is not familiar," he said.
The minister said same questions were put to senior parliamentarian L.K. Advani, BJP president Amit Shah and even Prime Minister Modi earlier.
"We should not make issues out of non-issues and create controversies simply because some questioning has been done," Naidu said.
During Congress regime, there used to be surveillance on telephones and lots of such complaints were received, he alleged.
On Saturday, the Congress had condemned Delhi Police’s "unnecessary and weird enquiries" about Rahul Gandhi and termed it "political espionage".
"This kind of political espionage, snooping, surveillance and intrusion in political opponent’s life may be Gujarat model but not Indian model," party spokesperson Abhishek Singhvi said, referring to Modi’s oft-quoted Gujarat model of development.(IANS Roundup) | {
"pile_set_name": "Pile-CC"
} |
Coronavirus: Prime Minister Boris Johnson tests positive - notlukesky
https://www.bbc.com/news/uk-52060791
======
dean177
“I’m shaking hands continuously. I was at a hospital the other night where I
think there were actually a few coronavirus patients and I shook hands with
everybody, you’ll be pleased to know. I continue to shake hands.“
Guess who said that a couple of weeks ago.
~~~
MulliMulli
Guess that is what they call a super spreader.
------
philbarr
Possibly completely unrelated: PM chief advisor Dominic Cummings seen running
out of Downing Street in the last hour
[https://twitter.com/AllieHBNews/status/1243520576007872513](https://twitter.com/AllieHBNews/status/1243520576007872513)
------
beaunative
'We are going to lose loved ones'
------
s0l1dsnak3123
He claimed to be going to see his mother on Mothers' day (5 days ago in the
UK). He may well have killed his own mother out of sheer self-righteousness
and ego.
~~~
lucozade
Do you have reason to believe his mother is dead?
Do you have reason to believe that he didn't just mean "seeing his mother"
literally?
I saw my mother on Mothers' Day. I stayed 200+ miles away from her while doing
so. Facetime is a wonderful thing.
I'd be tempted to ascribe the self-righteousness moniker differently.
| {
"pile_set_name": "HackerNews"
} |
Campaign for Liberty News and Commentary
Subscribe to Ron Paul - Campaign for Liberty
Tuesday, June 13, 2017
Global Peace Index: Where Do We Rank...And Why?
By Daniel McAdams - June 13, 2017 at 01:11PM
The new world ranking of peaceful and non-peaceful countries is out, and the results present the best case imaginable against US interventionism overseas. Of the ten least peaceful countries, nine of them have been on the receiving end of US destabilization, "regime change," or "liberation" efforts over the past decade or so. While US interventions are sold to the public as in our national security interest or to promote humanitarianism, the interventions all have one thing in common: they make things worse for the recipient country. So why do we keep doing it? Tune in to today's program: | {
"pile_set_name": "Pile-CC"
} |
Multifunctional "smart" particles engineered from live immunocytes: toward capture and release of cancer cells.
Multifunctional "smart" particles with magnetic, topographic, cell-targeting, and stimulus-responsive properties are obtained using a "live template" strategy. These particles exhibit improved efficiency in capture of target cancer cells by introducing synergistic topographic interactions, and enable the release of captured cells with high viability via reduction of disulfide bonds. Diverse multifunctional particles can be designed using the "live template" strategy. | {
"pile_set_name": "PubMed Abstracts"
} |
Dentists
Posted on April 22, 2015by
One of my best friends is a dentist’s wife. Another best friend is her husband the dentist. In fact, I have known quite a few dentists who were pretty wonderful people. So why is it that I still come home and burst into tears after any dental visit that is more invasive than a cleaning? | {
"pile_set_name": "Pile-CC"
} |
Medical decision-making for older adults without family.
Each year in the United States, individuals who lack decision-making capacity because of acute or chronic cognitive impairment are in situations in which important medical decisions must be made for them, but tens of thousands of these individuals have no known family members or designated surrogates available to help with those decisions. Such individuals constitute 16% of patients in intensive care units, 3% of nursing home residents, and a large but unspecified number of individuals in a variety of settings who are facing end-of-life decisions. Several approaches are currently used to aid in medical decision-making for people without families or designated surrogates, including hospital ethics committees, court-appointed surrogate agents, reliance on advance directives if they are available, and even the use of computer-based decision systems. These approaches all have limitations and often result in individuals receiving care that would not have been their preference. Additionally, because clinical care teams must wrestle with uncertainty about best approaches to care, lengths of hospital stay for individuals without family are longer, resulting in higher healthcare costs and potentially more-aggressive interventions than individuals with family experience. This article reviews medical decision-making for older adults without families or designated surrogates and proposes a solution: "health fiduciaries"--a new type of professional trained and certified to act as a surrogate decision-maker for individuals who are unable to make decisions for themselves. | {
"pile_set_name": "PubMed Abstracts"
} |
Menu
For all your random k-pop needs
QT’s Marry, Hug & Kill: Cougar Edition-BTS (Bangtan Boys)
Hey everyone this weeks Marry, Hug & Kill would be with BTS also known as Bangtan Boys.
For those who read BTS “Skool Luv Affair” album review, knows that I don’t really know the boys that well and I still don’t. Shouldn’t this be interesting? hehe
We were having an issue of who to figure in this weeks Marry, Hug & Kill because majority of the current active groups are younger than us. So we figured might as well have fun with this and have a cougar edition. It’ll be in your surprise how great of cougars we are! ;3 | {
"pile_set_name": "Pile-CC"
} |
Q:
When accessing characters of strings to be pushed into an vector of unions, strings in vector get messed up
Here's an SSCCE (simple example to show the problem):
#include <iostream>
#include <string>
#include <vector>
using namespace std;
enum Type {oInt, oFloat, oString, oArray};
struct Object; // fwd decl for union
union ObjectNative {
int oInt;
float oFloat;
const char* oString;
vector<Object>* oArray;
};
struct Object {
Type type;
ObjectNative obj;
};
vector<Object> exec(vector<string> tokens, vector<Object> stack);
void printStack(vector<Object> stack);
int main() {
vector<string> tokens{"test", "another test", "even more test", "test test", "test test test", "lotsa test"};
vector<Object> stack;
stack = exec(tokens, stack);
printStack(stack);
return 0;
}
vector<Object> exec(vector<string> tokens, vector<Object> stack) {
for (string s : tokens) {
ObjectNative nObj;
// !!!!!!!!!!!!!!!!!!!!!! THIS LINE !!!!!!!!!!!!!!!!!!!!!!
s[0];
nObj.oString = s.c_str();
Object obj = Object{oString, nObj};
stack.push_back(obj);
// debugging lines
printStack(stack);
cout << "-------" << endl;
}
return stack;
}
void printStack(vector<Object> stack) {
for (unsigned int i = 0; i < stack.size(); i ++) {
Object o = stack[i];
cout << o.obj.oString;
cout << endl;
}
}
Notice the line I marked in the exec function:
s[0];
I'm just accessing the first character in the string; I'm not even doing anything with it! However, if I comment out that line, I get the correct output:
test
-------
test
another test
-------
(etc....)
-------
test
another test
even more test
test test
test test test
lotsa test
But with that line, I... uh, I'm not sure what's happening. This is the output:
test
-------
ä7R
another test
-------
ä7R
even more test
even more test
-------
test test
ä7R
ä7R
test test
-------
test test
test test test
test test test
test test
test test test
-------
lotsa test
ä7R
ä7R
lotsa test
ä7R
lotsa test
-------
lotsa test
ä7R
ä7R
lotsa test
ä7R
lotsa test
It seems like there's nothing wrong with the code, but clearly I'm doing something very wrong. Why is the vector being corrupted like this, and how on earth is it being caused by doing nothing with the first character of the string?
A:
The lifetime of the const char * returned by string::c_str() is limited. If you're trying to keep those strings, you need to copy them into storage dedicated for the purpose.
The string s gets replaced by a new string from tokens on each iteration. When the for loop assigns a new string to s on the next iteration, it is allowed to invalidate the c_str() from the previous iteration as a result.
The fact that it worked at all is probably a lucky fluke of the implementation: Under the hood, s may have borrowed the storage for the string from the entry in tokens. The call to operator[], however, was probably causing it to make its own, private copy of the string. That would explain the difference in behavior for c_str().
To save copy in dedicated storage, you need to allocate space for it and copy the string into it. Code like the following would suffice:
nObj.oString = new char[s.size() + 1]; // allocate the space
std::strcpy( nObj.oString, s.c_str() ); // copy in the string
Now, techically, this won't copy in the entire string if it contains ASCII NULs. Your original code didn't care about those and my suggestion above doesn't change that. :-) You can find std::strcpy() in <cstring>.
Note that because you've allocated your own storage with new[], you'll have to remember to delete[] it later when you're done with it, otherwise you will have a memory leak. And make sure you use delete[], not delete or free().
| {
"pile_set_name": "StackExchange"
} |
/*
* Open Source Software published under the Apache Licence, Version 2.0.
*/
package io.github.vocabhunter.gui.common;
import org.junit.jupiter.api.Test;
import java.util.List;
import static java.util.stream.Collectors.toList;
import static org.junit.jupiter.api.Assertions.assertEquals;
public class WordUseToolTest {
@Test
public void testEmpty() {
validate("", "");
}
@Test
public void testSingleWord() {
validate("and", "and");
}
@Test
public void testWordAtStart() {
validate("And then there were none.", "And", " then there were none.");
}
@Test
public void testWordInMiddle() {
validate("Chalk and cheese.", "Chalk ", "and", " cheese.");
}
@Test
public void testWordAtEnd() {
validate("Try ending with and", "Try ending with ", "and");
}
@Test
public void testPrefix() {
validate("Andian", "Andian");
}
@Test
public void testSuffix() {
validate("Sand", "Sand");
}
@Test
public void testInfix() {
validate("Sandy", "Sandy");
}
@Test
public void testVaried() {
validate("And then the sandy and andian and and", "And", " then the sandy ", "and", " andian ", "and", " ", "and");
}
private void validate(final String use, final String... expected) {
WordUseTool tool = new WordUseTool("and", use);
List<String> actual = tool.stream()
.collect(toList());
assertEquals(List.of(expected), actual, "Use: " + use);
}
}
| {
"pile_set_name": "Github"
} |
Britain's Adam Pengilly in 2009. The former skeleton racer and an International Olympic Committee (IOC) member until Feb. 25 is described as the victim of an IOC vendetta. AP/Yonhap
By Oh Young-jinWhat happened in the assault case involving British International Olympic Committee (IOC) member Adam Pengilly in PyeongChang last week? This much has been confirmed. The IOC admitted Saturday that it ignored the Korean organizers'wish to keep Pengilly in Korea and decided to send him home through its ethics committee discussion. In a press conference, taped by Reuters Saturday and released Sunday, IOC President's spokesman Mark Adams, "POCOG (the PyeongChang Organizing Committee) at its various highest levels originally didn't want to allow him to get out of the country." Then Adams said that the guard suffered "bruises and scratches." Oddly, he said he didn't know when asked whether there was violence involved. Back home, Pengilly is described as the victim of an IOC political vendetta, after criticizing the IOC decision to allow Russia to compete in the 2016 Summer Games. Hours later after the case was revealed, the IOC wasted no time in saying Pengilly would be sent back to Britain. The decision was swift but not just for Pengilly, who was reportedly unsure about the level of physical contact and for the guard himself, who remains silent about the incident. Although he has not raised the issue yet, it is unclear whether the guard's rights were well respected and protected, especially in case he decides to take legal action against Pengilly. The IOC obviously had the CCTV footage, but did not reveal it or explain how he was allowed to go without being charged.It is also unclear whether Pengilly was under the influence of alcohol when he defied the guard's request to use a pedestrian path rather than walking in a bus lane, verbally abused the guard and got into a tussle. IOC President Thomas Bach also apologized in person. In the process of making its Pengilly decision, the IOC involved its ethics committee and Korean legal authorities, thanking the police and authorities in passing when it replied to The Korea Times inquiry. But it did not go into any detail.When a case is in dispute, it is best to be open about how it has been handled.The IOC did not do this, and the way it is behaving shows it has not changed its secretive ways ― believing that if it waits long enough, all its problems will go away. In this case, the PyeongChang Games will be over in a week. So will Pengilly's term of office at the IOC. | {
"pile_set_name": "Pile-CC"
} |
Pass Windows Server 2016 first time or train again for free. This is our guarantee. We’re confident you’ll pass your course first time. But if not, come back within a year and only pay for accommodation, exams and incidental costs
You’ll learn more. A day with a traditional training provider generally runs from 9am – 5pm, with a nice long break for lunch. With Firebrand Training you’ll get at least 12 hours/day quality learning time, with your instructor
You’ll learn Windows Server 2016 faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
You’ll be studying Windows Server 2016 with the best. We’ve been named in Training Industry’s “Top 20 IT Training Companies of the Year” every year since 2010. As well as winning many more awards, we’ve trained and certified 72,074 professionals, and we’re partners with all of the big names in the business
You'll do more than study Firebrand's courseware. We use practical exercises to make sure you can apply your new knowledge to the work environment. Our instructors use demonstrations and real-world experience to keep the day interesting and engaging
On this accelerated 4 day Installation, Storage and Compute in Windows Server 2016 course, learn the fundamental skills to bring the benefits of Windows Server 2016 to your organisation.
You’ll learn how to install Windows Server 2016 - including Nano Server, Hyper-V and Virtual Machines. You'll also cover how to migrate from your existing server platform to Windows Server 2016. In addition to this, you'll develop your knowledge of disaster recovery technologies and be capable of planning, creating and managing a failover cluster.
This course is 20% faster than traditional training, meaning you will be back in work sooner using your new skills.
Using Firebrand’s unique Lecture | Lab | Review technique, your Microsoft Certified Trainer will immerse you in Microsoft Official Curriculum combined with practical labs. This will help you develop skills applicable to real-world scenarios, including how to:
Install, upgrade and migrate servers and workloads
Install, deploy and manage Windows Server and Hyper-V containers
Plan and implement a high availability and disaster recovery solution
Manage, monitor and maintain virtual machine installations
As part the course, you will be prepared for exam 70-740: Installation, Storage and Compute in Windows Server 2016. You will sit this exam on-site as part of the course, covered by your Certification Guarantee.
If you're an IT professional looking to build knowledge of storage and compute funcationality using Windows Server 2016, this course is ideal. It's also highly relevant if you're looking to migrate to Windows Server 2016 from previous server technologies.
This course, 20740C: Installation, Storage, and Compute with Windows Server 2016, forms part of the full MCSA: Windows Server 2016 track, which can be completed in just 11 days.
Use your free Microsoft training vouchers
You may be entitled to heavily-discounted training via Microsoft's Software Assurance Training Voucher (SATV) scheme. If your business has bought Microsoft software, check to see if it came bundled with free training vouchers! Vouchers can be exchanged against training for all Microsoft technologies. If you’re unsure, get in touch with us
Firebrand is a Microsoft Learning partner, meaning you will benefit from:
Microsoft Certified Trainers - learn from expert instructors certified by Microsoft to deliver your course. With years of in-industry experience, you will benefit from their real world knowledge.
Microsoft Official Curriculum - access the latest and most relevant content to Windows Server 2016.
Microsoft Official Practice Tests - reinforce your knowledge and simulate a Microsoft exam situation with official practice tests aligned to the MOC content you are learning.
This course emphasises practical tasks with labs integrated throughout the content to build upon the theoretical knowledge developed. This will help you develop knowledge applicable to real-world scenarios.
Other accelerated training providers rely heavily on lecture and independent self-testing and study.
Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.
Firebrand Training provides instruction to meet every learning need:
Intensive group instruction
One-on-one instruction attention
Hands-on labs
Lab partner and group exercises
Question and answer drills
Independent study
This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a Certification Guarantee. Pass first time or train again for free (just pay for accommodation, exams and incidental costs). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.
This module describes the new features of Windows Server 2016, and explains how to prepare for and install Nano Server and Server Core. It describes how to plan a server upgrade and migration strategy, and explains how to perform a migration of server roles and workloads within and across domains. You'll also learn how to choose an activation model based on your environment characteristics.
Lessons
Introducing Windows Server 2016
Preparing and installing Server Core
Preparing for upgrades and migrations
Migrating server roles and workloads
Windows Server activation models
Lab : Installing and configuring Server Core
Installing Server Core
Completing post-installation tasks on Windows Server 2016 Core
Performing remote management
After completing this module, you'll be able to:
Describe the new features of Windows Server 2016.
Prepare for and install Server Core.
Plan a server upgrade and migration strategy.
Perform a migration of server roles and workloads within a domain and across domains.
Module 4: Implementing Storage Spaces and Data DeduplicationThis module explains how to implement and manage Storage Spaces. This module also explains how to implement Data Deduplication.Lessons
Implementing Storage Spaces
Managing Storage Spaces
Implementing Data Deduplication
Lab : Implementing Storage Spaces
Creating a Storage Space
Lab : Implementing Data Deduplication
Installing Data Deduplication
Configuring Data Deduplication
After completing this module, you'll be able to:
Describe and implement the Storage Spaces feature in the context of enterprise storage needs.
Manage and maintain Storage Spaces.
Describe and implement Data Deduplication.
Module 5: Installing and configuring Hyper-V and virtual machinesThis module provides an overview of Hyper-V and virtualisation. It explains how to install Hyper-V, and how to configure storage and networking on Hyper-V host servers. Additionally, it explains how to configure and manage Hyper-V virtual machines.Lessons
Overview of Hyper-V
Installing Hyper-V
Configuring storage on Hyper-V host servers
Configuring networking on Hyper-V host servers
Configuring Hyper-V virtual machines
Managing virtual machines
Lab : Installing and configuring Hyper-V
Verify installation of the Hyper-V server role
Configuring Hyper-V networks
Creating and configuring virtual machines
Enable nested virtualisation for a virtual machine
After completing this module, you'll be able to:
Describe Hyper-V and virtualisation.
Install Hyper-V.
Configure storage on Hyper-V host servers.
Configure networking on Hyper-V host servers.
Configure Hyper-V virtual machines.
Manage Hyper-V virtual machines.
Module 6: Deploying and managing Windows and Hyper-V containersThis module provides an overview of containers in Windows Server 2016. Additionally, this module explains how to deploy Windows Server and Hyper-V containers. It also explains how to install, configure, and manage containers by using Docker.Lessons
Overview of containers in Windows Server 2016
Deploying Windows Server and Hyper-V containers
Installing, configuring, and managing containers by using Docker
Lab : Installing and configuring containers
Installing and configuring Windows Server containers by using Windows PowerShell
Installing and configuring Windows Server containers by using Docker
After completing this module, you'll be able to:
Describe containers in Windows Server 2016.
Explain how to deploy containers.
Explain how to install, configure, and manage containers using Docker.
Module 7: Overview of high availability and disaster recoveryThis module provides an overview of high availability and high availability with failover clustering in Windows Server 2016. It further explains how to plan high availability and disaster recovery solutions with Hyper-V virtual machines. Additionally, this module explains how to back up and restore the Windows Server 2016 operating system and data by using Windows Server Backup.Lessons
Module 10: Implementing Network Load BalancingThis module provides an overview of NLB clusters. It also explains how to plan and configure an NLB cluster implementation.Lessons
Overview of NLB
Configuring an NLB cluster
Planning an NLB implementation
Lab : Implementing NLB
Implementing a Network Load Balancing (NLB) cluster
Configuring and managing the NLB cluster
Validating high availability for the NLB cluster
After completing this module, you'll be able to:
Describe NLB.
Configure an NLB cluster.
Explain how to plan an NLB implementation.
Module 11: Creating and managing deployment imagesThis module provides an overview of the Windows Server 2016 image deployment process. It also explains how to create and manage deployment images by using the Microsoft Deployment Toolkit (MDT). Additionally, it describes different workloads in the virtual machine environment.Lessons
This module provides an overview on Windows Server Update Services (WSUS) and the requirements to implement WSUS. It explains how to manage the update process with WSUS. Additionally, this module provides an overview of Windows PowerShell Desired State Configuration (DSC) and Windows Server 2016 monitoring tools. Finally, this module describes how to use Performance Monitor, and how to manage event logs.
Microsoft Official Curriculum
Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.
Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.
Firebrand goes digital
We’re currently migrating from printed to digital courseware. Some courseware is already available in digital, while other books remain in printed form. To find out if this course is digital, call us on +33 (0) 181 22 44 68.
There are several benefits of easy-to-use digital courseware: downloads are immediate, and you’ll always have your courseware available wherever you are. You won’t need to wait for a printed book to be delivered before you start learning – and it’s better for the environment. You can choose to download the courseware to your own device, or borrow one of ours.
Considering a Microsoft course? Always have the most up-to-date Microsoft digital courseware with ‘Fresh Editions’. This gives you access to all versions of digital courseware – you’ll receive updates and revisions of your textbook, at no charge, for the life of that course.
Examination Passing Policy
Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year. Students will only be responsible for accommodations and vendor exam fees.
Please note
* Not on all courses
** Examination vouchers are not included for the following courses: PMI, GIAC, CREST and CISSP CBK Review. Exam vouchers may also not be included for Apprentices and will require a separate purchase by an employer due to Education and Skills Funding Agency guidelines.
*** On site testing is not included for our PMI, GIAC, CREST, CSX Practitioner or ITIL Managers and Revision Certification Courses
Unsure whether you meet the prerequisites?
Just call us on +33 (0) 181 22 44 68 and speak to one of our enrolment consultants.
Firebrand is an immersive environment and requires commitment. Some prerequisites are simply guidelines; you may find your unique experience, attitude and determination enables you to succeed on your accelerated course.
Reviews
Here's the Firebrand Training review section. Since 2001 we've trained exactly 72,074 students and asked them all to review our Accelerated Learning. Currently, 96.74% have said Firebrand exceeded their expectations.
Read reviews from recent accelerated courses below or visit Firebrand Stories for written and video interviews from our alumni.
"If you are capable of keeping up with intense training you will definitely be qualified by the end of your course!" Ben Gerrard, Fourteen IP. - Microsoft Windows Server 2016 - Installation, Storage and Compute (4 days) (12/10/2017 to 15/10/2017)
"Really good course, great pace and the instructor was of course very knowledgeable about the subject. I feel like I have a greater understanding of the workings of server 2016, and I am very excited for the next part of the course.
Cheers guys! " Kristian Ward, Switch Networks Ltd. - Microsoft Windows Server 2016 - Installation, Storage and Compute (4 days) (12/10/2017 to 15/10/2017)
"Recommend this course for anyone in the IT industry as Firebrand has a great base of knowledge. " Anonymous - Microsoft Windows Server 2016 - Installation, Storage and Compute (4 days) (12/10/2017 to 15/10/2017)
"The training centre is very well organised and professional, I found the course very detailed and got a lot out of it." Joseph Naber. - Microsoft MTA Software Development Fundamentals (2 days) (10/1/2019 to 11/1/2019)
"Firebrand training is a good way to get qualifications fast. Be prepared with the self-learning before hand and for long days." Anonymous. - Microsoft MTA Software Development Fundamentals (2 days) (10/1/2019 to 11/1/2019)
"The course was intense but well delivered, the instructor engaged with the group and took the time to give good feedback and help." Joseph Naber, Games Workshop. - Microsoft MTA Software Development Fundamentals (2 days) (10/1/2019 to 11/1/2019)
"My instructor was extremely committed to help with our studying, with a group who have had very little experience in the topic our course was based on. The resources provided were also very useful." Sam Hughes, BBC. - Microsoft MTA Security, Windows Server Administration & Networking (6 days) (7/1/2019 to 12/1/2019)
"Firebrand are the best training provider I have used, with knowledge and engaged instructors.
" M.P.. - Microsoft Azure Academy: Infrastructure and Networking (4 days) (7/1/2019 to 10/1/2019)
"The course was very helpful to me as I do C# at my job. They cover all basic fundamentals. The food here is great as well. The stay was comfortable and flexible. You can stay here easily and learn quickly." S.Y.. - Microsoft Programming in C# (4 days) (7/1/2019 to 10/1/2019)
"The training provided was all relevant and useful for me to prepare for the exam. " Anonymous. - Microsoft MTA HTML5 App Development Fundamentals (2 days) (7/1/2019 to 8/1/2019)
"Training is relevant but extremely intense, there is a lot to take in in a short amount of time. " Anonymous. - Microsoft MTA HTML5 App Development Fundamentals (2 days) (7/1/2019 to 8/1/2019)
"Intensive training, I would recommend, decent level of experience required, but it worked for me to do that extra knowledge required to become MCSA certified. Thanks." Barry Mansell, CPTO. - Microsoft MCSA: Windows Server 2016 (11 days) (6/12/2018 to 16/12/2018)
"Good trainer who has lots of experience in the field. Taught at a good pace and got through all off the content." Jess Chapman, Natures Way Foods. - Microsoft MCSA: Windows Server 2016 (11 days) (6/12/2018 to 16/12/2018)
"I will happily use firebrand again the staff and the teachers are great, its hard work but completely worth it. " Anonymous. - Microsoft MCSA: SQL Server 2016 - Business Intelligence Development (5 days) (26/11/2018 to 30/11/2018)
"I love training at Firebrand. As a consultant, every day matters as you do not get paid if you do not work. The immersive bootcamp allows myself to cover twice the material in half the time. I also like getting into my bubble by it being residential so I can focus on absorbing and recalling. Great having the test centre onsite.. Maximises exam cram time. Thank you FB Wyboston." Roy Casella, Designated. - Microsoft MCSA: SQL Server 2016 - Business Intelligence Development (5 days) (26/11/2018 to 30/11/2018)
"I enjoyed my course at Firebrand. The trainers are friendly and extremely knowledgeable. This was my first experience of Microsoft exams and I would not hesitate to recommend Firebrand for anyone looking to achieve certification." Darren Conley, Nicander Ltd.. - Microsoft MCSA: SQL Server 2016 - Business Intelligence Development (5 days) (26/11/2018 to 30/11/2018)
"Studying with Firebrand is tough, theres no getting away from the fact that the days are long and full of content, however, the trainers are knowledgeable and the training is delivered professionally, in excellent facilities." Rob Sims. - Microsoft MCSA: SQL Server 2016 - Business Intelligence Development (5 days) (26/11/2018 to 30/11/2018)
"My experience of this intensive course was a good one! This was due to my instructor who was so helpful and engaged us all from the beginning to the end. Thanks to the instructor for being an amazing , intelligent , funny and caring instructor" Louise-Clair Elliot, Freightliner. - Microsoft MCSA: BI Reporting (4 days) (22/11/2018 to 25/11/2018)
"Different type of training and it was intense. Covered many topics in express speed. It was a good learning experience. " John Jesudason. - Microsoft Managing SharePoint Server 2016 (6 days) (19/11/2018 to 24/11/2018)
"The instructor is a great trainer that will help you understand SharePoint much better and get certified." Anonymous. - Microsoft MCSE: Productivity (SharePoint Server 2016) (6 days) (19/11/2018 to 24/11/2018) | {
"pile_set_name": "Pile-CC"
} |
Acute S-ketamine application does not alter cerebral [18F]altanserin binding: a pilot PET study in humans.
Modeling short-term psychotic states with subanaesthetic doses of ketamine provides substantial experimental evidence in support of the glutamate hypothesis of schizophrenia. Ketamine exerts its pharmacological effects both directly via interactions with glutamate receptors and indirectly by stimulating presynaptic release of endogenous serotonin (5-HT). The aim of this feasibility study was to examine whether acute ketamine-induced 5-HT release interferes with the binding of the 5-HT(2A) receptor (5-HT(2A)R) radioligand [(18)F]altanserin and positron emission tomography (PET). Two subjects treated with ketamine and one subject treated with placebo underwent [(18)F]altanserin PET at distribution equilibrium conditions. Robust physiological, psychopathological and cognitive effects were present at ketamine plasma concentrations exceeding 100 microg/l during >70 min. Notwithstanding, we observed stable radioligand binding (changes +/-95% CI of -1.0 +/- 1.6% and +4.1 +/- 1.8% versus -1.2 +/- 2.6%) in large cortical regions presenting high basal uptake of both, [(18)F]altanserin and ketamine. Marginal decreases of 4% of radioligand binding were observed in the frontal lobe, and 8% in a posteriorily specified frontomesial subregion. This finding is not compatible with a specific radioligand displacement from 5-HT(2A)R which should occur proportionally throughout the whole brain. Instead, the spatial pattern of these minor reductions was congruent with ketamine-induced increases in cerebral blood flow observed in a previous study using [(15)O]butanol PET. This may caused by accelerated clearance of unspecifically bound [(18)F]altanserin from cerebral tissue with increased perfusion. In conclusion, this study suggests that [(18)F]altanserin PET is not sensitive to acute neurotransmitter fluctuations under ketamine. Advantageously, the stability of [(18)F]altanserin PET towards acute influences is a prerequisite for its future use to detect sub-acute and chronic effects of ketamine. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
Missing artifact org.apache.camel:camel-xmljson - JBOSS
I'm trying develop my first switchyard application whatching that tutorial: https://www.youtube.com/watch?v=Gd8goj-Uj_U
When i try add org.apache.camel to de dependencies and i got that error:
http://i.imgur.com/lEqabrA.png
Regards, Agostinho
A:
Look at your 'pom.xml' file. There you have all dependencies. You must define a repositories to download all those 'jars'.
If there are no jar in defined repositories (or another version of library) the 'jars' will not be downloaded. You can use search through some repository to find your library.
For example the definition of repositories in 'pom.xml' file:
<repositories>
<repository>
<id>java.net</id>
<url>http://search.maven.org/</url>
</repository>
<repository>
...
</repository>
</repositories>
| {
"pile_set_name": "StackExchange"
} |
It features a built- in USB hub for managing free apps , charging USB devices software to make backing up. Of particular note are the 14 different types of sensors as indicated by the icons that resemble a multimeter that Windows 7 seems to agate Backup Plus Hub 8TB 3.Jul 27 big THANK YOU to progresslanguage , · A big, big, pszalapski who gave me the perfect suggestions to solve my problem: I bought last June a 3 TB External WD MyBook but never was able to. Sporting an 8TB capacity it keeps your music, photos, videos documents backed up for your peace of mind.In Windows XP Professional you cannot access , modify GPT disk, but you can convert a GPT disk to MBR by using the clean command in DiskPart, remove all data , which will delete GPT protective partition partition structures from the disk. By looking at the icons alone, Windows 7 natively distinguishes at least an 81 different types of devices.
Kenwood ka 8100 owners manual
Kia sorento automotive repair manual
Driver Acer windows
You do not mention “ how” you tried to connect. Either IP or name.
Mybook Solitaire
So try for the dashboard. For Windows explorer try \ 192. Just purchesed a My Book and it does not work with Windows 10.
Mybook Download vice
How long has the Windows 10 been around for WD to integrate their products with this operating system - answer is quite awhile. * If your product is not listed above, please visit the product page. Oct 16, · Similar help and support threads Thread: Forum: External Hard Drive Not Detected I have a western digital mybook ( WD5000Cthat for some reason is not being detected by Windows. Western Digital provides data storage solutions, including systems, HDD, Flash SSD, memory and personal data solutions to help customers capture and preserve their most valued data. Jan 14, · Hello, I was in the process of converting my external 2tb Mybook into an internal sata drive.
Windows Epson
I have done so in the past with my 500gb mybook and it. Nov 02, · Windows 7 Forums is the largest help and support community, providing friendly help and advice for Microsoft Windows 7 Computers such as Dell, HP, Acer, Asus or a custom build. Why we need to delete GPT protective partition? | {
"pile_set_name": "Pile-CC"
} |
The home visit in resident education: program description and evaluation.
A home visit rotation was developed to provide family practice residents with a more comprehensive understanding of the effect of patient life-style on health status. The rotation emphasizes geriatric, community, and rehabilitative medicine. In addition, the curriculum addresses issues related to patient compliance, assessment of activities of daily living, patient psychosocial needs, community services, and exposure to medical equipment of potential use to homebound individuals. Over a three-year period, 209 home visits were made. Program evaluation data suggest that at the end of the three-month rotation, residents were less concerned with personal safety and more likely to agree that home visits were an important part of residency training. A comparison of pre- and post-test knowledge scores indicated significant increases in geriatric medicine, patient compliance issues, patient functional status, and community services. A follow-up telephone interview with patients found that some patients experienced anxiety when the home visit was scheduled, but the majority were positive about the experience. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
Msbuild createproperty
I have done like this:
<Target Name="CreateProperties">
<GetAssemblyFileVersionTask strFilePathAssemblyInfo="$(AssemblyInfo)">
<Output TaskParameter="strAssemblyFileVersion" PropertyName="strAssemblyFileVersion" />
</GetAssemblyFileVersionTask>
<Message Text="AssemblyFileVersion = $(strAssemblyFileVersion)" />
<CreateProperty
Value="$([System.Text.RegularExpressions.Regex]::Replace( $(strAssemblyFileVersion), '^(\d+)\.(.+)\.\d+$', '$1_$2' ) )">
<Output
TaskParameter="Value"
PropertyName="rev" />
</CreateProperty>
<CreateProperty
Value="$(ProjName)">
<Output
TaskParameter="Value"
PropertyName="proj" />
</CreateProperty>
</Target>
When I run the msbuild I can see that both rev and proj are alive both inside the target CreateProperties and my other targets in the same msbuild file.
BUT....when I use another msbuild file that is importet in this file it is like they dont exist. The properites are empty. Any idea why?
A:
You have to "pass" properties down to the "helper" proj file. ("SomeCommonLogic.proj" is my "helper" file in the below example)
Note how I pass properties from the "outside" proj file TO the "helper" proj file, via "Properties" in the below sample.
<Target Name="SomeCommonLogicTarget">
<Message Text=" " />
<Message Text=" " />
<MSBuild Projects="..\..\MSBuildCommonLogic\SomeCommonLogic.proj" Targets="SomeTargetInTheHelperFile" Properties="Configuration=$(Configuration);RevisionNumber=$(SubVersionRevision)" />
</Target>
Also, the "helper" file does NOT like relative paths.
You have to convert any relative files to a full path.
<ItemGroup>
<WorkingCheckoutItemGroupForParameterPassing Include=".\MyFile.txt" />
</ItemGroup>
<CreateProperty Value="%(WorkingCheckoutItemGroupForParameterPassing.fullpath)">
<!-- Use the .fullpath value to get the full path to push it into the xsl(document function) -->
<Output TaskParameter="Value" PropertyName="WorkingCheckoutFullPath" />
</CreateProperty>
<Message Text=" WorkingCheckoutFullPath = $(WorkingCheckoutFullPath)" />
| {
"pile_set_name": "StackExchange"
} |
Ben Harper + Charlie Musselwhite Live at The Orpheum Vancouver, They brought out an all ages crowd for some amazing tunes. We were so pleased to recieve the message that we were allowed to shoot these awesome artists.
Our friend over at Celine Pinget Photographywas at the show capturing some amazing masterpieces for us at Justin Ruscheinski Media Group.
Justin was born in Burnaby and now resides in Richmond. He was given his first camera at the age of 13 and has since turned his passion for photography into a career. His favorite part of being a photographer is helping people capture those precious moments. | {
"pile_set_name": "Pile-CC"
} |
- 72 + 19. Let t(l) = -2*l. What is t(a(z))?
62*z - 14
Let f(v) = -2 + 2 + 3*v. Let h(k) = -5*k - 3. Suppose -5*x + 38 = 23. Let g(m) = -6*m - 4. Let s(q) = x*g(q) - 4*h(q). Determine s(f(z)).
6*z
Let r(w) = 765*w + 136. Let g(j) = 9*j - 10*j - 16*j - 3. Let n(f) = 136*g(f) + 3*r(f). Let y(l) = l**2. What is n(y(m))?
-17*m**2
Let m(s) = -4*s. Let o(w) = -43*w. Let q(a) = 44*m(a) - 4*o(a). Suppose 2*f + 14 - 18 = 0. Let j(p) = -2*p**2 - 4*p**2 + 6*p**f - 2*p**2. What is j(q(c))?
-32*c**2
Let a(z) = z**2. Let q be -3 + 0 - (2 - 7). Let h(k) = -44*k**q - 4*k**2 - 17*k**2. Calculate h(a(n)).
-65*n**4
Let r(m) = m**2. Suppose i - 18 + 12 = 0. Let p(d) = -5*d - i*d + 17*d. Calculate p(r(n)).
6*n**2
Let t(l) = 5*l. Let r(x) be the third derivative of 11*x**5/30 + x**3/3 + 189*x**2. Give t(r(p)).
110*p**2 + 10
Let z(a) = 20*a. Let d(w) be the third derivative of w**7/1680 - 19*w**5/60 - 17*w**2. Let q(l) be the third derivative of d(l). Determine z(q(f)).
60*f
Let y(d) = -2*d**2. Let z(l) = -190247*l. What is y(z(p))?
-72387842018*p**2
Let j(i) = -9*i**2 - 2. Let s(o) = -o**2 - 1. Let u(w) = j(w) - 2*s(w). Let t(b) be the first derivative of 7*b**3 + 14 - b**3 - 5*b**3. Calculate t(u(y)).
147*y**4
Let m(i) be the second derivative of 0 + 0*i**3 - 2*i + 5/3*i**4 + 0*i**2. Let l(h) = -2*h. Give l(m(a)).
-40*a**2
Let s(i) be the third derivative of i**5/15 + 46*i**2. Let w(d) be the third derivative of -d**4/12 - d**2. Give w(s(r)).
-8*r**2
Let k(j) = 3*j. Let o(q) = -25367*q - 2 - 5 + 25419*q. Determine k(o(t)).
156*t - 21
Let n be (0/(-1)*-1)/(-2). Let l(d) be the first derivative of 2 + 0*d + n*d**2 + 2/3*d**3. Let k(a) = 3*a**2. What is k(l(y))?
12*y**4
Let w(o) = -11*o - 4. Let j(r) = -31*r - 11. Let m(b) = -4*j(b) + 11*w(b). Let k(l) be the first derivative of -2/3*l**3 - 1 + 0*l**2 + 0*l. Determine k(m(c)).
-18*c**2
Let y(x) = x. Let n(a) = 259*a - 91*a - 96*a. What is n(y(f))?
72*f
Let r(a) = a - 3*a + 0*a. Let n(j) = 42001*j + 82*j**2 - 42001*j. Determine n(r(f)).
328*f**2
Let j(i) = 2*i. Suppose 9*g - 77 = -59. Let f(h) be the third derivative of 1/2*h**4 - 6*h**g + 0*h**3 + 0 + 0*h. Determine j(f(z)).
24*z
Let b(q) = -7*q**2. Let w(f) be the third derivative of 13*f**2 + 0 - 1/6*f**4 + 0*f**3 + 0*f. Give b(w(z)).
-112*z**2
Let h(f) = 9*f - 7. Let a be h(1). Let k(r) = -a*r + 3*r + 2*r + r. Let l(s) = -6*s. Determine l(k(j)).
-24*j
Let f(b) = -37*b. Let y(x) be the third derivative of -31*x**5/60 - 616*x**2. Calculate y(f(m)).
-42439*m**2
Let b(w) = 8793824*w**2. Let f(r) = r**2. What is f(b(q))?
77331340542976*q**4
Let b(o) = -2*o. Let m(u) = u**2 + 1. Let w(z) = -3*z**2 + 4*z - 6. Let x(l) = -6*m(l) - w(l). Give x(b(j)).
-12*j**2 + 8*j
Let h(m) be the second derivative of 2*m**4/3 + 14*m + 5. Let y(o) = o. What is h(y(x))?
8*x**2
Let m = 5 - 11. Let v be 372/18 - (-4)/m. Let s(j) = 2*j - v + 20. Let x(c) = -11*c. Determine x(s(r)).
-22*r
Let x(f) be the third derivative of -7*f**4/24 - 314*f**2. Let m(q) = -q - 1. Let n(v) = -20*v - 16. Let j(b) = -16*m(b) + n(b). Calculate x(j(k)).
28*k
Let r(y) = y. Let g(v) = 227*v**2 + 11*v**2 + 96*v**2 + 108*v**2. Determine g(r(u)).
442*u**2
Let g(o) = -3684*o**2 + 1. Let s(j) = -101*j**2. Give g(s(n)).
-37580484*n**4 + 1
Let y(v) = 6*v + 35. Let u(a) = 4*a + 25. Let l(x) = -7*u(x) + 5*y(x). Let r(m) be the first derivative of -m**2/2 + 1. Give l(r(h)).
-2*h
Let g(i) = -4*i. Let f(m) = -1870*m. Determine g(f(j)).
7480*j
Let y(c) = -64*c + 186*c - 2 - 57*c - 63*c - 3. Let f(p) = 3*p. Calculate y(f(s)).
6*s - 5
Let b(n) be the second derivative of 0 + 2/3*n**4 + 0*n**3 - 3*n + 0*n**2. Let y(q) = -3*q**2. Calculate y(b(l)).
-192*l**4
Let h(l) = -17*l**2. Let x(c) = 725*c. Give h(x(r)).
-8935625*r**2
Let w(p) = 468*p - 1. Let a(h) = -3*h**2. Give a(w(l)).
-657072*l**2 + 2808*l - 3
Let g(s) be the first derivative of -88*s**3/3 - 3*s**2/2 - 572. Let q(r) = r. Give g(q(y)).
-88*y**2 - 3*y
Let b(f) = 0*f + 0*f - 2*f. Let m(z) = 45*z - 31*z - 9*z - 12*z. What is m(b(y))?
14*y
Let c(i) = -2*i. Let y(n) = -99696*n. Give y(c(x)).
199392*x
Let v(u) = 2*u**2 - 7*u + 1. Let m(w) = -2*w**2 - w. Let s(x) = 28*m(x) - 4*v(x). Let q(l) = -2*l**2. Determine q(s(c)).
-8192*c**4 - 1024*c**2 - 32
Let k(z) be the second derivative of 7*z**3/6 - 5*z. Let y(c) = 5 - 3 - 2 + 2656*c - 2657*c. Give y(k(b)).
-7*b
Let w(k) be the second derivative of 2*k**4 - 48*k. Let u(o) be the second derivative of -o**3/6 - 2*o. Give u(w(y)).
-24*y**2
Let q(j) = -j + 71 - 33 - 38. Let o(a) = a**3 + 11*a**2 + 10*a + 4. Let c be o(-10). Let t(v) = -6*v + 0*v + v + c*v. What is q(t(h))?
h
Let h be -2*1/2*-3. Let b(x) = -h*x + x + 3*x. Let a(l) = 15*l**2. Calculate a(b(m)).
15*m**2
Let o(x) = x**2. Let c(p) = -3 + 3 - 1 - 8542*p + 8501*p. Determine c(o(i)).
-41*i**2 - 1
Let m(k) = k. Let v(a) = -183818*a. What is v(m(l))?
-183818*l
Let i(d) = -30*d. Let s = 59 - 31. Let b(c) = 28 - s + 2*c - 4*c. Give b(i(k)).
60*k
Let b(k) = 16*k + 96 - 4*k**2 - 96 - 16*k. Let f(z) = -30*z. Determine b(f(u)).
-3600*u**2
Let d(b) = 105*b**2 - 1. Let h(r) = -2*r - 8. Give h(d(s)).
-210*s**2 - 6
Let h(o) = 45*o**2. Let v(w) = 10*w**2 - 6*w - 2. Let u(j) = 10*j**2 - 9*j - 3. Let d(g) = -2*u(g) + 3*v(g). Give d(h(p)).
20250*p**4
Let w(a) = -5*a**2 - 14*a. Let y(v) = 1192*v**2. Give w(y(b)).
-7104320*b**4 - 16688*b**2
Let j(b) be the second derivative of 11*b**5/30 + 10*b**2 - b. Let t(p) be the first derivative of j(p). Let g(q) = q**2. Give g(t(l)).
484*l**4
Let q(d) = -50*d**2. Let n(f) = -25*f**2 + 33*f**2 - 9*f**2. What is q(n(w))?
-50*w**4
Let g(j) be the second derivative of -409*j**4/6 - 200*j. Let d(b) = b**2. Calculate d(g(a)).
669124*a**4
Let f(q) be the second derivative of 4*q + 0*q**2 + 0*q**3 - 1/12*q**4 + 0. Let p(j) = 6*j - 4. Let g(x) = 7*x - 5. Let l(a) = -4*g(a) + 5*p(a). Give l(f(y)).
-2*y**2
Let c(n) = n**2 - 1. Let u(q) = -1. Let y(o) = 4*c(o) - 4*u(o). Let l(t) = 34*t + 8. Let p(b) = 12*b + 3. Let w(d) = -3*l(d) + 8*p(d). Calculate w(y(m)).
-24*m**2
Let i(q) = 12*q**2 - 2*q. Let c(s) = -9*s - 2. Calculate c(i(r)).
-108*r**2 + 18*r - 2
Let k(t) = -t - 1. Let g(y) = 4 - 74*y - 22 - 19. Let l(x) = g(x) - 37*k(x). Let p(i) = -i**2. Give p(l(n)).
-1369*n**2
Let z(f) = -13*f**2 + 5. Let n(x) = 18*x**2 - 7. Let v(r) = 5*n(r) + 7*z(r). Let c(l) = -116*l**2. Calculate v(c(i)).
-13456*i**4
Let t(a) = -89*a - 12. Let b(u) = -18335*u - 2470. Let o(z) = 6*b(z) - 1235*t(z). Let p(s) = 3*s. What is o(p(m))?
-285*m
Let p(a) = -27*a**2 - 4*a. Let u(v) = 53*v**2 + 7*v. Let h(n) = -7*p(n) - 4*u(n). Let o(q) = 10*q. What is h(o(t))?
-2300*t**2
Let g = -4 + 12. Let f(c) = -68*c - 8. Let l(t) = -45*t - 5. Let w(k) = g*l(k) - 5*f(k). Let r(v) = v. Calculate w(r(s)).
-20*s
Let l(y) = 7*y. Suppose -17 = 3*q - 5*g, 0 = -3*g + 4 + 8. Let h = q - 1. Let v(s) = h*s + 2*s - s - 2*s. Calculate l(v(d)).
-7*d
Let k(i) be the first derivative of i**2/2 - 1. Suppose 4*m = -0*h - 3*h + 20, -3*m + h + 2 = 0. Let p(z) = z**2 - m + 3 - 1. Calculate k(p(b)).
b**2
Let l(b) = -5*b - 2. Let c(x) be the second derivative of -x**4/12 + 624*x. Determine l(c(s)).
5*s**2 - 2
Let w(s) = -44*s**2. Let u(p) = -2*p**2 - 2483*p. Give u(w(o)).
-3872*o**4 + 109252*o**2
Let u(a) be the second derivative of -19*a**3/6 + a. Suppose 266*k = 267*k - 4600. Let f(t) = -4600 + t + k. Determine u(f(c)).
-19*c
Let w(r) = -r**2. Suppose 15*h + 80 = 20*h. Let g(d) = 3*d**2 + h*d - 16*d. Give g(w(c)).
3*c**4
Let c(l) = 16*l**2 + 56010*l. Let a(f) = -3*f. Give a(c(d)).
-48*d**2 - 168030*d
Let m(d) = d + d - 2*d - 9 + 5*d. Let k(f) = 2*f - 4. Let v(i) = -9*k(i) + 4*m(i). Let c(h) be the first derivative of -4*h**3 - 5. What is c(v(o))?
-48*o**2
Let l(y) = 5*y. Let f(u) = 2 + 2*u - u + 0*u + 0. Let z(g) = g + 1. Let h(q) = f(q) - 2*z(q). Give h(l(d)).
-5*d
Let c(s) = -18*s**2 - 8*s**2 + 0*s + 0*s + 27*s**2. Let o(b) be the third derivative of 0*b + 0 + b**2 - 1/12*b**4 + 0*b**3. Calculate o(c(m)).
-2*m**2
Let g(f) = -7*f**2. Let d(o) be the third derivative of 0 + 0*o**3 + 0*o + 1/30*o**5 + 47*o**2 + 0*o**4. Give d(g(s)).
98*s**4
Let h(u) = -3979*u**2. Let w(r) = 5*r**2. Give w(h(v)).
79162205*v**4
Let c(n) = 93*n**2 - 5*n + 10. Let k(z) = 372*z**2 - 21*z + 42. Let w(s) = -21*c(s) + 5*k(s). Let h(p) = -5*p. Calcu | {
"pile_set_name": "DM Mathematics"
} |
import React from 'react';
import demand from 'must';
import { shallow } from 'enzyme';
import { Lists } from '../Lists';
import ListTile from '../ListTile';
describe('<Lists />', () => {
it('should render the lists', () => {
const lists = [{}, {}];
const component = shallow(<Lists lists={lists} listsData={{}} counts={{}} />);
demand(component.find(ListTile).length).eql(lists.length);
});
it('should not prefix the admin url for external lists', () => {
const externalPath = 'http://someurl.com/some/path';
const internalPath = 'some/path';
const lists = [{
external: true,
path: externalPath,
}, {
path: internalPath,
}];
const component = shallow(<Lists lists={lists} listsData={{}} counts={{}} />);
demand(component.find(ListTile).at(0).prop('href')).eql(externalPath);
});
it('should render counts', () => {
const lists = [
{
key: 'somekey',
path: 'some/path',
},
];
const counts = {
somekey: 50,
};
const component = shallow(<Lists lists={lists} listsData={{}} counts={counts} />);
demand(component.find(ListTile).at(0).prop('count')).eql('50 Items');
});
it('should change the pluralization of the counts', () => {
const lists = [
{
key: 'somekey',
path: 'some/path',
}, {
key: 'someotherkey',
path: 'some/other/path',
},
];
const counts = {
somekey: 1,
someotherkey: 100,
};
const component = shallow(<Lists lists={lists} listsData={{}} counts={counts} />);
demand(component.find(ListTile).at(0).prop('count')).eql('1 Item');
demand(component.find(ListTile).at(1).prop('count')).eql('100 Items');
});
it('should hide the create button if it\'s a nocreate list', () => {
const internalPath = 'some/path';
const lists = [{
path: internalPath,
}];
const listData = {
[internalPath]: {
nocreate: true,
},
};
const component = shallow(<Lists lists={lists} listsData={listData} counts={{}} />);
demand(component.find(ListTile).at(0).prop('hideCreateButton')).true();
});
describe('lists object', () => {
it('should allow lists to be an object', () => {
const lists = {
somekey: {
path: 'some/path',
},
someotherkey: {
path: 'some/other/path',
},
};
const component = shallow(<Lists lists={lists} listsData={{}} counts={{}} />);
demand(component.find(ListTile).length).eql(Object.keys(lists).length);
});
it('should render counts', () => {
const lists = {
somekey: {
path: 'some/path',
},
};
const counts = {
somekey: 50,
};
const component = shallow(<Lists lists={lists} listsData={{}} counts={counts} />);
demand(component.find(ListTile).at(0).prop('count')).eql('50 Items');
});
it('should change the pluralization of the counts', () => {
const lists = {
somekey: {
path: 'some/path',
},
someotherkey: {
path: 'some/other/path',
},
};
const counts = {
somekey: 1,
someotherkey: 100,
};
const component = shallow(<Lists lists={lists} listsData={{}} counts={counts} />);
demand(component.find(ListTile).at(0).prop('count')).eql('1 Item');
demand(component.find(ListTile).at(1).prop('count')).eql('100 Items');
});
});
});
| {
"pile_set_name": "Github"
} |
Q:
Firebase: combine query and child event listener
I have a structure similar to this
{
posts : {
post1Key: {
title : "First Post",
comments : {
comment1Key : {},
comment2Key : {},
comment3Key : {}
}
}
}
...
}
And I'm using the "child updated" events on the key "/posts/post1Key/comments" to listen for new comments.
How can I combine Firebase Query and the event listeners.
Edit: I know this is possible with Firebase, however, I'm using nativescript-plugin-firebase
A:
As at the time of writing, this isn't possible using the nativescript-plugin-firebase. The workaround is to do the sorting/filtering in the eventHandler after you have received the data.
var onChildEvent = function(result) {
//
// Sort: result.value here
//
};
// listen to changes in the /users path
firebase.addChildEventListener(onChildEvent, "/users").then(
function(listenerWrapper) {
var path = listenerWrapper.path;
var listeners = listenerWrapper.listeners; // an Array of listeners added
// you can store the wrapper somewhere to later call 'removeEventListeners'
}
);
| {
"pile_set_name": "StackExchange"
} |